CDA 25207

subject Type Homework Help
subject Pages 10
subject Words 2134
subject Authors Amy Phillips, Paige Baltzan

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
What is a computer that sits on, next to, or under a user's desk and is too large to carry
around?
A. tablet
B. desktop computer
C. workstation
D. minicomputer
Within the sites that support disaster recovery, a ________ is a separate and fully
equipped facility where the company can move immediately after a disaster and resume
business.
A.hot site
B. cold site
C. warm site
D. disaster site
page-pf2
What is phishing?
A. reroutes requests for legitimate websites to false websites.
B. a technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent emails that look as though they came from legitimate businesses
C. a masquerading attack that combines spam with spoofing
D. a phishing expedition in which the emails are carefully designed to target a particular
person or organization
What is the identification of a user based on a physical characteristic, such as a
fingerprint, iris, face, voice, or handwriting?
A. smart card
B. token
C. biometrics
D. content filtering
page-pf3
What is one simplification that has occurred with Business 2.0?
A. helping online users create anonymity
B. limiting the sharing capabilities of devices
C. improving access to information
D. communicating via email
What are tangible benefits?
A. difficult to quantify or measure
B.easy to quantify and typically measured to determine the success or failure of a
project
C. the measure of the tangible and intangible benefits of an information system
D. periodic reviews of actual performance versus expected performance
page-pf4
If a supplier has high power, what can it do to influence its industry?
A. charge higher prices
B. shift costs to industry participants
C. limit quality or services
D. All of these are correct.
What are strategic business processes?
A. dynamic, nonroutine, long-term business processes such as financial planning,
expansion strategies, and stakeholder interactions
B. semidynamic, semiroutine, monthly business processes such as resource allocation,
sales strategy, or manufacturing process improvements
C. static, routine, daily business processes such as stocking inventory, checking out
customers, or daily opening and closing processes
D. None of these are correct.
page-pf5
Susan teaches many individuals and business professionals how, why, and the benefits
and challenges to using social media. Of the four ebusiness challenges, which of the
following is the most crucial challenge to consider before engaging in social media?
A. adhering to taxation rules
B. ensuring consumer protection
C. identifying limited market segments
D. managing consumer relationships
What are the three primary variables (or triple constraints) in any project?
A. time, cost, expense
B. time, expense, requirements
C.time, cost, scope
D. time, cost, quality
page-pf6
Which group of stakeholder's primary interests include adhering to regulations/laws,
increasing employment, and ethical taxation reporting?
A. partners/suppliers
B. shareholders/investors
C. community
D. government
Which of the following is not a primary trait of information?
A. governance
B. type
C. timeliness
D. quantity
The speed of transmission of a network is determined by the speed of its smallest
________.
page-pf7
A. unit of time
B. number of computers
C.amount of bandwidth
D. number of customers
What is an RFID's electronic product code?
A. systems are used to create the digital designs and then manufacture the products
B. a cultural trend that places value on an individual's ability to be a creator of things as
well as a consumer of things
C. a community center that provides technology, manufacturing equipment, and
educational opportunities to the public that would otherwise be inaccessible or
unaffordable
D.serialization or the ability to track individual items by using the unique serial number
associated with each RFID tag
page-pf8
Which of the following would not be considered part of the complete characteristic of
high-quality information?
A. Is a value missing from the personal information?
B.Is each transaction represented only once in the information?
C. Is the address incomplete?
D. Is the area code missing for the phone information?
Geographic information system (GIS) stores, views, and analyzes geographic data
creating multidimensional charts or maps. For example, GIS are monitoring global
warming by measuring the speed of glaciers melting in Canada, Greenland, and
Antarctica.
page-pf9
What is an interactive website kept constantly updated and relevant to the needs of its
customers using a database?
A. dynamic website
B.data-driven website
C. static information
D. dynamic information
Which cloud computing model offers applications on a pay-per-use basis?
A. infrastructure as a service
B. platform as a service
C.software as a service
D. information as a service
What is the primary problem with redundant information?
page-pfa
A. It is difficult to determine which values are the most current.
B. It is often inconsistent.
C. It is difficult to determine which values are the most accurate.
D. All of these are correct.
Which ERP component is a credit management feature typically included in?
A.accounting and finance components
B. production and managerial management components
C. human resource components
D. production and materials management components
Which of the following contains a subset of data warehouse information?
A. data miner
B.data mart
page-pfb
C. data pool
D. data analyzing tool
The packet header lists the destination (for example in IP packets the destination is the
IP address) along with the length of the message data.
Which gate is elaboration?
A. gate one
B.gate two
C. gate three
D. gate four
page-pfc
Imagine you are creating a new product to sell in an up-and-coming market. Which of
the following statements indicates that it would be difficult for you to enter this new
market?
A. The threat of new entrants force is high in the up-and-coming market.
B. The threat of new entrants force is low in the up-and-coming market.
C. The threat of new entrants force is high during the summer months in the
up-and-coming market.
D. All of these are correct, depending on the time of year.
Which of the following defines opt out?
A. a problem that occurs when someone registers purposely misspelled variations of
well-known domain names
B. the theft of a website's name that occurs when someone, posing as a site's
administrator, changes the ownership of the domain name assigned to the website to
another website owner
C. choosing to allow permission to incoming emails
D.choosing to deny permission to incoming emails
page-pfd
What software controls how the various technology tools work together along with the
application software?
A. system software
B. operating system software
C. embedded operating system
D. multitasking
What is software that, while purporting to serve some useful function and often
fulfilling that function, also allows Internet advertisers to display advertisements
without the consent of the computer user?
A. spyware
B. hacker
C. drive-by hacking
D.adware
page-pfe
What is a green personal computer?
A. a subset of sustainable MIS, refers to the environmentally responsible use,
manufacture, and disposal of technology products and computer equipment
B.built using environment friendly materials and designed to save energy
C. reuses or refurbishes ewaste and creates a new product
D. a company's acknowledged responsibility to society
What is pirated software?
A. the unauthorized use, duplication, distribution, or sale of copyrighted software
B. refers to the ability of a company to identify, search, gather, seize, or export digital
information in responding to a litigation, audit, investigation, or information inquiry
C. passed to protect minors from accessing inappropriate material on the Internet
D. a technological solution that allows publishers to control their digital media to
page-pff
discourage, limit, or prevent illegal copying and distribution
What is clustering?
A. determines values for an unknown continuous variable behavior or estimated future
value
B. determines which things go together
C.segments a heterogeneous population of more homogeneous subgroups
D. assigns records to one of a predefined set of classes
What is the ability to purchase goods and services through a wireless Internet-enabled
device?
A. ecommerce
B. mobile business
C. meconomics
page-pf10
D. ebusiness model

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.