CAS CS 27455

subject Type Homework Help
subject Pages 22
subject Words 2488
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
CAVEs require even more special gear than does virtual reality.
In public accounting, the accountant serves as an outside advisor to businesses.
Spam can be perfectly blocked by using filters.
Building the technical architecture is part of the development phase.
page-pf2
Spyware, sneakware, and stealthware are all different versions of cookies.
Copyright statements vary in their details. For example, some allow installation on
multiple machines and some don't.
Firewire is also called WiFi.
Click-throughs are the count of the number of people who visit one site, click on an ad,
and are taken to the site of the advertiser.
page-pf3
Extreme programming (XP) methodology breaks the project down into many smaller
pieces or phases.
A finished prototype is known as a proof-of-concept prototype.
Professionals in real estate and construction management have few uses for GIS.
page-pf4
An example of language processing is that if your phoneme was "d," the system would
match it to the words do and due.
Database security and network security are the same thing.
A computer network consists of at least five computers connected to one another.
Adware is software to generate ads that installs itself on your computer when you
download some other (usually free) program from the Web.
page-pf5
The IT structure determines the culture within an organization.
Using the agile methodology improves customer satisfaction through early and
continuous delivery of valuable software.
In the United States, a person cannot legally make even one backup copy of software.
page-pf6
Assume you have an order entry database with an Order file and a Customer file. The
Order Date field most likely would be the common field used to relate the two files.
A buyer agent is also called a user agent.
The analysis phase develops the detailed steps the system must perform along with the
expected results of each step.
Expert systems are adaptive systems that work independently, carrying out specific,
repetitive, or predicable tasks.
page-pf7
The sole focus of MIS is information technology.
Today's most often used input technology is a mouse.
The planning phase involves determining a solid plan for developing your information
system.
page-pf8
A firewire port can support up to 53 daisy-chained devices.
The CPU cache is a type of memory on the CPU.
XYZ, Corp. would like to determine advertising strategies for customers who buy
high-priced products. It would use OLTP on its data warehouse.
Sharing information with your coworkers through an information system can create a
competitive advantage.
page-pf9
Knowledge of information technology tools is essential for all areas of business.
The IT infrastructure includes hardware but not software.
The project plan is a written definition of the project scope and is usually no longer than
a paragraph.
In the area of finance, a security analyst focuses on computer security.
page-pfa
A telephone modem is a device that connects your computer to your phone line so that
you can access another computer or network.
Items connected to a USB port can never be hot swapped.
A gigabyte (GB or Gig) is roughly 1 trillion bytes.
page-pfb
When a company encourages it employees to seek new and innovative ways to use
technology without punishment of failure, that company support the theory of Porter's 5
Force Model.
Spyware is software that comes hidden in free downloadable software and collects
information about you and your computer and reports it to someone without your
permission.
Garbage-in-garbage-out is related to which quality attribute?
A.Timeliness
B.Location
C.Form
D.Authority
page-pfc
Which of the following occurs when the scope of the project increases beyond its
original intentions?
A.Scope creep
B.Feature creep
C.Milestone
D.Rolling stone
If you were to implement the new system while the existing system continued to run,
what type of implementation method would you be following?
A.Pilot implementation
B.Phase implementation
C.Parallel implementation
D.Plunge implementation
After you understand your competition and its affects on your industry, what should you
do next?
A.Identify the limitations of technology
page-pfd
B.Define the knowledge base of your workforce
C.Align your strategies, processes, and technology with your understanding of your
industry
D.Determine your long-term goals and how these differ from your current thinking
Which of the following methodologies breaks a project into tiny phases; programmers
must develop the code for each phase before they can continue to the next phase?
A.Project milestones
B.Extreme programming
C.Operational prototyping
D.Design and build prototyping
What type of management deals with the production, manufacturing, warehousing, and
transportation of physical products?
A.Project management
B.Inventory management
C.Operation management
D.Production and operation management
page-pfe
What is data?
A.Information that has a particular meaning within a specific context
B.Raw facts that describe some phenomenon
C.A collection or set of information about a particular person, object, or event
D.Records that are stored in a database or transaction file
Which type of communication media transmits information through the air?
A.Communications media
B.Wired communications media
C.Wireless communications media
D.DSL
In business and in life, where do most decisions fit into?
page-pff
A.Recurring but fuzzy
B.Ad hoc
C.Between structured and unstructured
D.Muddled
Wikipedia.org is a contemporary web site providing definitions and descriptions of
many concepts. Wikipedia is not peer-reviewed (a group of peers or experts do not
verify the quality of information). Because of this, Wikipedia may not demonstrate
which of the following quality attributes?
A.Relevance
B.Validity
C.Authority
D.Weight
What type of printer would you purchase if you need a printer that could also scan and
make copies?
A.Inkjet printer
B.Laser printer
C.Plotter
page-pf10
D.Multifunction printer
Which of the following is the unauthorized use, duplication, distribution, or sale of
copyrighted software?
A.Pirated software
B.Spam
C.Phishing
D.Sneakware
What system sends bills over the Internet and provides an easy-to-use mechanism to
pay for them?
A.Cybermediary
B.Electronic check
C.E-Payment
D.Electronic bill presentment and payment (EBPP)
page-pf11
Which type of database model organizes and accesses information according to it
logical structure rather than its physical structure?
A.Hierarchical
B.File-based
C.Relational
D.Conventional
Which type of information is not found in a DSS?
A.Organizational information
B.Confidence levels
C.External information
D.Personal information
Which of the following wireless connections is designed for short range connectivity of
up to 30 feet?
A.IRDA
B.WiFi
page-pf12
C.802.11b
D.Bluetooth
What is information technology (IT)?
A.The theory of applying technology to organizations
B.A set of tools that help you work with and process information
C.Organizational systems
D.The hardware within an organization
Which of the following is a primary area of responsibility for public accountants?
A.Auditing
B.Auditing and tax advisory
C.Tax advisory
D.Managing financial risks
page-pf13
Which of the following is an example of commodity like merchandise?
A.Toothpaste
B.Computers
C.Job search services
D.Automobiles
What is the difference between a social networking site and a social networking
system?
A.A social networking site is a physical location; asocial networking system is a virtual
location
B.A social networking site is a virtual place to socialize; a social networking system is
the tools that link you to people
C.A social networking is a local space; a social networking is a global space
D.The two phrases can be used interchangeably
A decision support system (DSS) typically has three components. Which of the
following is not one of these components?
page-pf14
A.Model management
B.Query management
C.Data management
D.User interface management
Which of the following terms is used to define the set of instructions that a computer
executes to carry out a specific task for you?
A.Software
B.Utilities
C.Set of instructions
D.Rules
What is the systems development life cycle (SDLC)?
A.A method for testing new IT applications
B.A structured approach for developing information systems
C.Analysis and assessment tasks that need to be completed when designing and
developing information systems
D.Guidelines that an end user follows when developing their own business applications
page-pf15
How does DSL work?
A.By sending high frequency signals that are inaudible to humans over existing
telephone lines
B.By connecting computers with peripheral devices
C.By connecting many home computer devices over one line so that each one can share
the Internet connection
D.By transmitting radio signals from one computer device to the Internet connection
Which of the following is a wireless communications medium that uses light waves to
transmit signals or information?
A.Cat 3
B.Optical fiber
C.Infrared
D.Microwave
page-pf16
Which type of merchandise eliminates shipping costs by delivery of it via the Internet?
A.Commodity like
B.Electronic or digital
C.Convenience
D.Web service
Which of the following is more subjective and open to cultural interpretations?
A.Laws
B.Regulations
C.Ethics
D.Organizational rules
Several years ago, the IRS created a remote network access infrastructure that allowed
employees to work offsite and from home. What was the name of this system?
A.Internet Connection Companion Site (ICCS)
B.Access Remote Telecommunications Interface (ARTI)
page-pf17
C.Work interface From Anywhere (WiFA)
D.Enterprise Remote Access Project Virtual Private Network
What does an infrastructure-centric metric measure?
A.Efficiency
B.Speed
C.Capacity
D.Efficiency, speed, and capacity
Which type of business environment supports computer-to-computer transfer of
transaction information in a standard business document and format?
A.Thin wallets
B.Global eXchange services (GXS)
C.Electronic data interchange (EDI)
D.E-Business Financial Exchange (EBFE)
page-pf18
A _____ IT structure develops from a centralized IT department; one that serves the
whole organization and not just a piece of it.
A.Top-down silo
B.Fully-integrated
C.Matrix
D.Operational
Which person leads the SDLC?
A.End user
B.Project manager
C.Programmer
D.IT Administrator
A U.S. company using a central American outsourcing company would be an example
of _____ outsourcing.
page-pf19
A(n) _____ e-marketplace brings together buyers and sellers from the same industry.
A primary key field cannot be _____.
The _____ defines the what, when, and who questions of system development including
all activities to be performed, the individuals, or resources, who will perform the
activities, and the time required to complete each activity.
_____ is a bundle of copper wires used for transmitting voice or data communications.
page-pf1a
_____ and _____ both extract data meeting specific criteria from a database, but have
different user interfaces.
_____ tracks a salesperson contacting habits of potential customers.
_____ are materials that are used in production in a manufacturing company or are
placed on the shelf for sale in a retail environment.
A(n) _____ can protect availability of a network and prevent _____ attacks.
page-pf1b
_____ encourages users of a product or service to ask their friends to use the product or
service as well.
_____ are the detailed steps the system must perform along with the expected results of
each step.
In a multi-agent system, groups of intelligent agents can work _____ but also _____
with each other.
Query-by-example tools rely heavily upon the _____ within a database to find
information.
page-pf1c
_____ testing focuses on individual pieces of code within a new system.
_____ focuses on storing and managing statistical models used within decision support
systems.
_____ is an approach in which you allocate in terms of percentages how you will spend
your IT dollars on various types of business strategies.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.