CAS CS 44733

subject Type Homework Help
subject Pages 22
subject Words 2625
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The only factor involved in ethical decisions is the person's basic ethical structure
developed since childhood.
A legacy information system is a powerful system capable of supporting the needs of
many functional areas in business.
A push technology is an environment in which businesses and organizations come to
you with information, services, and product offerings based on your profile.
Project milestones represent key dates for which you need a certain group of activities
performed.
page-pf2
A headset is a combined input and output device that (1) captures and records the
movement of your head and (2) contains a screen that covers your entire field of vision
and displays various views of an environment based on your movements.
A glove is an input device that captures and records hand and finger movements.
Joint application development is a meeting between users and IT specialists to define
and review business requirements for the project.
page-pf3
IT personnel do not need a strong understanding of the business environment since they
are often partners with other business professionals.
A database is a collection of information that you organize and access according to the
logical structure of that information.
Public key encryption utilizes two keysonly a person with both keys can encrypt a
message or file.
Resolution of a printer is the number of dots per inch it produces.
page-pf4
Encryption scrambles the contents of a file so that no unauthorized personnel can read
it.
Biometric scanners are used to detect illnesses.
An expert system is an artificial intelligence system that applies reasoning capabilities
to reach a conclusion.
page-pf5
Structured query language (SQL) is a standardized first-generation query language
found in most DBMSs.
Maintenance, repair, and operations materials are also referred to as direct materials.
The Fair Use Doctrine says that you may not use copyrighted material in certain
situations for example, in the creation of new work or, within certain limits, for teaching
purposes.
Revenue and profit are optimized by a well-designed supply chain management.
page-pf6
Uninstaller software organizes your information on your hard disk in the most efficient
way.
The implementation phase includes monitoring and supporting the new system to be
sure it meets business goals.
The design phase involves end users and IT specialists working together to gather,
understand, and document the business requirements for the proposed system.
page-pf7
The acronym DBMS stands for Database Marketing System and is a type of database
designed to support the marketing function within a business.
The direct computer-to-computer transfer of transaction information contained in
standard business documents, conducted in a standard format, is termed Electronic Data
Interchange.
Biometrics identifies individuals based on physiological characteristics.
Information technology (IT) is any computer-based tool that people use to work with
information and support the information and information-processing needs of an
organization.
page-pf8
A multi-state CPU can process letters and special characters without converting them to
their binary equivalents.
Scope creep and feature creep lead to better systems development projects.
Modeling is the activity of drawing a graphical representation of a design.
page-pf9
A relational database model uses a series of physically related two-dimensional tables
or files to store information in the form of a database.
A hardware key logger is a hardware device that captures keystrokes on their journey
from the keyboard to the motherboard.
Smart cards are plastic cards the size of a credit card that contain an embedded chip on
which digital information can be stored.
One of the advantages of using an ERP system is that each department can control its
own database.
page-pfa
The necessity for a common database was the main difference between ERP and MRP
systems.
Multi-state CPUs work with information represented by more than 2 states, where each
state can represent a digit between 0 and 9. This requires the CPU to do more
computations than before.
A disaster recovery plan should consider the location of the backup information.
page-pfb
Which part of a relational database contains the logical structure for the information?
A.Data dictionary
B.Relation
C.Query
D.SQL
What type of model describes an environment when a server's only duty is to help with
data management; the computer receiving the information does everything else?
A.Client model
B.Server-to-peer model
C.Hierarchical model
D.Distributed data model
Marketing professionals use technology in which of the following ways?
A.Data mining tools to understand buying behavior
B.What if analysis to explore a new campaign
C.Publishing software to create advertising materials
D.Marketing professionals use technology in each of these ways
page-pfc
If you were reading an article located on a Web site and were able to update the article
based on information that you discovered from your work, what type of Web site would
you be working on?
A.Wiki
B.RSS
C.Push and pull
D.User Subscribed and Enabled Research (USER)
What is the single most important resource in any organization?
A.Money
B.Opportunity
C.Technology
D.People
page-pfd
Which of the following is not one of the five forces identified in Michael Porter's Five
Forces Model?
A.Buyer and supplier power
B.Threat of substitutive products or service or the threat of new entrants
C.Rivalry among existing competitors
D.Financial power
What network technology allows you to send voice calls over the Internet and avoid toll
charges?
A.Wireless access point
B.Voice over IP
C.Voice access point
D.Bluetooth
What is SQL?
A.A fourth generation language found in most DBMSs
B.A storage tool that holds the data and definitions for a database
C.An administrative tool that allows you to set access rights for database users
page-pfe
D.A programming language that can be used instead of a DBMS
If you needed to determine what part of your TV ad appealed most to the viewers, what
future technology could you use?
A.Hactic interfaces
B.Nanotechnology
C.Biotechnology
D.eMotion
Which of the following activities is not part of component-based development?
A.Learning and using new technologies to enhance existing information systems
B.Search existing software libraries for code that can be reused in the proposed
information system
C.Build new software applications that can be used in other software development
projects
D.All of these activities are part of component-based development
page-pff
In the area of Information Technology, which of the job positions listed below is
responsible for working with end users to determine the logical requirements for a new
IT system and then creating the technical design documents to describe these
requirements?
A.Data warehouse analyst/developer
B.Business analyst
C.Programmer
D.Database designer/developer
_____ allows you to query by pointing, clicking, and dragging and then specifying a
selection criteria.
What type of IT infrastructure evolved from users or departments developing their own
systems or applications without any central control?
A.Centralized
B.Distributed
C.Client/server
page-pf10
D.Decentralized
What network device connects computers together and passes messages by repeating all
network transmissions to all the other computers?
A.Cat 5
B.Broadband router
C.Switch
D.Hub
What type of analysis documents the possible threats to your organization and its
assets?
A.Impact analysis
B.Impact scenario analysis
C.Requirements recovery analysis
D.Threat analysis
page-pf11
Which type of software helps you develop databases and use the information stored in
them?
A.Personal information systems
B.File management systems
C.Operations systems
D.Database management system
Why do we consider technology invasive?
A.Technology is an integral part of our personal, as well as our professional, lives
B.Technology is so pervasive that we believe we cannot live without it
C.Technology invades our personal thoughts
D.Technology requires that most modern employees work more than 40 hours per week
In what phase of business continuity planning, would you create a disaster recovery
plan?
A.Design
B.Analysis
page-pf12
C.Requirements
D.Implementation
Which of the following include a variety of hardware and software associated with the
capturing, creating, and manipulating of information in forms other than text and
numbers?
A.Object-oriented databases
B.Data warehouses
C.Web systems
D.Multimedia tools
If your team member brought information to your group that he/she obtained from a
flash news story broadcasted over the Internet, what quality attribute should you be
concerned about?
A.Validity
B.Timeliness
C.Relevance
D.Form
page-pf13
Which of the following is not an operating system?
A.Linux
B.Firefox
C.Windows XP
D.Mac OS
Do businesses use social networking systems?
A.Not during business hours or with organizational systems
B.Contemporary businesses provide space in their systems for socializing but time and
space is limited and monitored
C.Yes, to connect to influential people from outside your immediate environment or
organization
D.Social networking systems are an emerging technology whose potential is still
unknown
page-pf14
If you were performing an impact analysis, threat analysis, and impact scenario
analysis, you would be in the _____ phase of business continuity planning.
A.Initial investigation
B.Feasibility
C.Requirements
D.Analysis
What is the primary advantage of the client/server infrastructure?
A.It off-loads the application programs and information from the server
B.It increases the speed or movement of information in the network
C.It increases the power of processing
D.It increases the speed of transmission and the power of processing
There are many disadvantages to decentralized infrastructures. Which one is not one of
these?
A.Prevents users from easily combining processing power
B.Systems and software solutions are inflexible
C.Users are unable to compare information between various systems
page-pf15
D.It encourages data duplication and inconsistencies in information
In what decision making phase do you recognize a problem, need, or opportunity?
A.Predication and decision
B.Choice
C.Preliminary or investigative
D.Intelligence
What is used to prove the technical feasibility of a proposed system?
A.Prototyping
B.Prototype
C.Proof-of-concept prototype
D.Selling prototype
page-pf16
What is a network that uses encryption to protect confidentiality of transmission?
A.Public network
B.Private network
C.Virtual private network
D.VoIP
Porter's Five Forces Model focuses on which of the following analytical steps to
determine which technology to use?
A.Determine critical business strategies needed to succeed
B.Identify key business processes that support business strategies
C.Align technology to key business processes
D.Assess your competition and the pressures facing them, your industry, and you
Which computer is a small hand-held device that helps you surf the Web and perform
simple tasks such as note taking?
A.PDA
B.Notebook computer
page-pf17
C.Desktop computer
D.Touch-sensitive computer
What is the waterfall methodology?
A.A sequential, activity based SDLC
B.An assessment methodology that ensures quality applications
C.An outsource development methodology to information systems
D.A process management technique that identifies and includes end users and
management in the SDLC
_____ software helps you create and edit photos and art.
_____ software detects and removes or quarantines computer viruses.
page-pf18
Natural resource managers might use a(n) _____ to identify, protect, and manage
resources.
A(n) _____ consists of one line of information for every visitor to a Web site and is
usually stored on a Web server.
A(n) _____ is a tool you use to see, hear, or otherwise accept the results of your
information-processing requests.
page-pf19
_____ is the blueprint for translating a business strategy into a plan.
_____ materials used in the normal operation of a business but not related to primary
business operations.
_____ refers to ensuring that production lines function smoothly because high quality
parts are available as needed.
With respect to the circumstances that surround making an ethical decision, _____
refers to the number of people affected by your action.
page-pf1a
The _____ consists of electrical pathways that move information between basic
motherboard components.
Corporate finance, investments, and banking are all common professional job paths in
_____.
A(n) _____ interface would allow an individual to interface with a computer if they
were sight-challenged.
_____ is the use of technology to support work activities with integrated collaboration
environments.
page-pf1b
A(n) _____ captures screen images.
_____ uses a very thin glass or plastic fiber through which pulses of light travel.
A(n) _____ defines formats of reports and what information you want to see in a report.
_____ helps you create and maintain to-do lists, calendars, and contacts.
page-pf1c
A(n) _____ is an artificial intelligence system that applies reasoning capabilities to
reach a conclusion.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.