CDA 48749

subject Type Homework Help
subject Pages 10
subject Words 2155
subject Authors Amy Phillips, Paige Baltzan

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
What is a feature of IPTV?
A. IPTV uses low bandwidth.
B. IPTV offers personalization.
C. IPTV supports multiple devices.
D.All of these are correct.
How would a company like Flickr use social tagging on its website?
A. by applying keywords that do not match user content
B. by building a tagging game for customers to participate in
C. by allowing users to upload images and tag the images with their own keywords
D. by selecting the keywords to associate with each image a customer uploads
page-pf2
What is a subset of sustainable MIS that refers to the environmentally responsible use,
manufacture, and disposal of technology products and computer equipment?
A.clean computing
B. green personal computer
C. upcycle
D. corporate social responsibility
When considering the 5 steps of the order-to-delivery business process, manufacturing
goods are included in which step?
A. Step 2 " Sales
B. Step 1 " Marketing
C. Step 3 " Operations management
D. Step 5 " Customer service
page-pf3
If a business is following a focused strategy, then its competitive scope is ________.
A. broad market
B. narrow market
C. broad range products
D. broad range of services
What is wireless fidelity (Wi-Fi)?
A. a metropolitan area network that uses radio signals to transmit and receive data
B. a communications technology aimed at providing high-speed wireless data over
metropolitan area networks
C.a means by which portable devices can connect wirelessly to a local area network,
using access points that send and receive data via radio waves
D. includes the inner workings of a Wi-Fi service or utility, including the signal
transmitters, towers, or poles and additional equipment required to send out a Wi-Fi
signal
page-pf4
Which of the following represents sales force automation?
A. helping an organization identify its customers across applications
B. selling additional products or services to a customer
C. tracking all of the steps in the sales process automatically
D. selling larger products or services to a customer
Which of the following produces an improved product customers are eager to buy, such
as a faster car or larger hard drive?
A. sustaining technology
B. disruptive technology
C. reputation system
D. personalization
Which reports present data that is distributed inside the organization and is intended for
employees within an organization?
page-pf5
A.internal reports
B. detailed internal reports
C. summary internal reports
D. exception reports
The sales department needs to rely on information from operations to understand
_________.
A. inventory
B. customer orders
C. demand forecasts
D. All of these are correct.
During the critical analysis phase, what are the specific business requests the system
page-pf6
must meet to be successful, while also driving the entire systems development effort?
A. COBIT
B. conversion
C.business requirements
D. sign-off
Nike offers people the opportunity to visit its website to create running shoes in the
style and color they choose. How would you classify Nike's ebusiness strategy?
A. information richness
B. mass customization
C. personalization
D. interactivity
page-pf7
Which of the following include the three components of an MIS infrastructure?
A. information MIS, aggregated MIS, and sustainable MIS infrastructures
B. information MIS, operational MIS, and changing MIS infrastructures
C.information MIS, agile MIS, and sustainable MIS infrastructures
D. varies depending on the industry
Janet is a financial aid counselor at a local community college and she shares an office
with her three coworkers. Janet feels safe in her office environment and frequently
leaves her username and password on a sticky note next to her computer. Without
realizing it Janet is creating the potential for which type of information security breach
to occur?
A. insiders to hack into the college system
B. dumpster diving to find usernames and passwords
C. viruses and worms to spread through the college system
D. All of these are correct.
page-pf8
Charles Mott works for a company called VeriSign that acts as a trusted third party to
verify information. One of Charles's largest clients is CheckMd, which holds and
authenticates customer reviews of doctors and dentists online, and a third party
validating the reviews is critical to CheckMd's success. What type of authentication
technique is VeriSign providing for CheckMD?
A. firewall
B. certificate authority
C. online certificate
D. digital content certificate
What allows an organization to reduce the cost and time required during the design
process of a product?
A. supply chain event management
B. selling chain management
C. collaborative engineering
D. collaborative demand planning
page-pf9
Which department manages the process of converting or transforming resources into
goods or services?
A. sales
B. operations management
C. accounting
D. finance
If an organization implemented only one policy, which one would it want to
implement?
A. information privacy policy
B. acceptable use policy
C. internet use policy
D.ethical computer use policy
page-pfa
What is data converted into a meaningful and useful context?
A. competitive intelligence
B. information
C. buyer power
D. first-mover advantage
Which of the following is not a technique for choosing strategic projects?
A. categorize projects
B. perform a financial analysis
C. focus on organizational goals
D.develop a project plan
page-pfb
Where would you categorize threats in a SWOT analysis?
A. internal, helpful
B. internal, harmful
C. external, helpful
D. external, harmful
Which system supports the capturing, organization, and dissemination of knowledge
throughout an organization?
A. cybermediation system
B. knowledge management system
C. source code system
D. social media system
page-pfc
Which of the following are included as potential external opportunities in a SWOT
analysis that are helpful to an organization?
A. core competencies, market leaders, cost advantages, excellent management
B. lack of strategic direction, obsolete technologies, lack of managerial talent, outdated,
product line
C.expanded product line, increase in demand, new markets, new regulations
D. new entrants, substitute products, shrinking markets, costly regulatory, requirements
Why do we use satellite communications?
A. cell phones
B. mobile base stations
C. satellite dish receivers
D.All of these are correct.
page-pfd
Which data types are typically found in the sales department?
A. sales data, customer data, commission data, and customer support data
B. employee data, promotion data, vacation data
C. investment data, monetary data, reporting data
D. transactional data, purchasing data, payroll data, tax data
What is the systems development life cycle?
A. the establishment of a high-level plan of the intended project and determining
project goals
B. the analyzation of end-user business requirements and refining project goals into
defined functions and operations of the intended system
C. the description of the desired features and operations of the system
D.the overall process for developing information systems from planning and analysis
through implementation and maintenance
page-pfe
What is a router?
A. a device whereby the sending computer divides a message into a number of
efficiently sized units called packets, each of which contains the address of the
destination computer
B. an intelligent connecting device that examines each packet of data it receives and
then decides which way to send it onward toward its destination
C. a reference to the geometric arrangement of the actual physical organization of the
computers and other network devices in a network
D. a model for applications in which the bulk of the back-end processing, such as
performing a physical search of a database, takes place on a server, while the front-end
processing, which involves communicating with the users, is handled by the clients
Which characteristics support an information MIS infrastructure?
A. accessibility, availability, maintainability, portability, reliability, scalability, usability
B.backup and recovery plan, disaster recovery plan, business continuity planning
C. grid computing, cloud computing, and virtualization
D. storage, network, and server virtualization
page-pff
What is the Child Online Protection Act?
A. the unauthorized use, duplication, distribution, or sale of copyrighted software
B. refers to the ability of a company to identify, search, gather, seize, or export digital
information in responding to a litigation, audit, investigation, or information inquiry
C.passed to protect minors from accessing inappropriate material on the Internet
D. a technological solution that allows publishers to control their digital media to
discourage, limit, or prevent illegal copying and distribution
Which of the below is <i>not</i> contributing to ewaste?
A. VCR
B.automobile
C. microwave
D. computer
page-pf10
Which of the following are tangible benefits?
A. improved decision making
B. improved community service
C. improved goodwill
D.increased quantity or sales

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.