CICS 20578

subject Type Homework Help
subject Pages 11
subject Words 2311
subject Authors Amy Phillips, Paige Baltzan

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
What is immediate, up-to-date information?
A.real-time information
B. real-time systems
C. information granularity
D. information governance
Service-oriented architecture (SOA) is a business-driven enterprise architecture that
supports integrating a business as linked, repeatable activities, tasks, or services.
What is unavailable?
A.a system that is not operating and cannot be used
B. refers to the ability of an application to operate on different devices or software
platforms, such as different operating systems
C. measures how quickly a system performs a process or transaction
page-pf2
D. the degree to which a system is easy to learn and efficient and satisfying to use
A desktop computer sits on, next to, or under a user's desk and is too large to carry
around. The computer box is where the CPU, RAM, and storage devices are held with a
monitor on top, or a vertical system box (called a tower) usually placed on the floor
within a work area.
True
False
What occurs when a primary machine recovers and resumes operations, taking over
from a secondary server?
A.failback
B. disrupting communications
page-pf3
C. warm site
D. hot site
Which business application consists of hardware, software, and data that provide
location information for display on a multidimensional map?
A. radio-frequency identification
B. global positioning systems
C.geographic information systems
D. location-based services
What software can remove software that is no longer needed?
A. preventive security software
B. spyware software
C. crash-proof software
D. uninstaller software
page-pf4
Which type of ebusiness model is Barnes &Noble using?
A. pure-play
B. brick-and-mortar
C. click-and-mortar
D. virtual
Many industries have been forced to change due to technology advances. Which of the
following industries has felt the lowest amount of economic impact from ebusiness?
A. auto industry
B. retail industry
C. travel industry
D. waste or recycling industry
page-pf5
What is project scope?
A. quantifiable criteria that must be met for the project to be considered a success
B. products, services, or processes that are not specifically a part of the project
C. any measurable, tangible, verifiable outcome, result or item that is produced to
complete a project or part of a project
D.defines the work that must be completed to deliver a product with the specified
features and functions
What is an electronic book that can be read on a computer or special reading device?
A. tablet
B. ebook
C. appliance
D. minicomputer
page-pf6
Which of the following best describes Web 2.0?
A. static websites
B. intelligent websites
C. social media and user-generated web content
D. hypertext markup language
What is static information?
A. the person responsible for creating the original website content
B. the person responsible for updating and maintaining website content
C.includes fixed data incapable of change in the event of a user action
D. includes data that change based on user action
page-pf7
What is a device that enables a computer to transmit and receive data?
A. broadband
B.modem
C. bandwidth
D. ISP
What is a data artist?
A. processes and manages algorithms across many machines in a computing
environment
B. focuses on forecasting future trends and producing insights using sophisticated
quantitative methods, including statistics, descriptive and predictive data mining,
simulation, and optimization
C. occurs when the user goes into an emotional state of over-analysis (or over-thinking)
a situation so that a decision or action is never taken, in effect paralyzing the outcome
D. a business analytics specialist who uses visual tools to help people understand
complex data
page-pf8
How would the law enforcement industry use business intelligence?
A.track crime patterns, locations, and criminal behavior
B. analyze customer demographics
C. predict sales, inventory levels, and distribution
D. predict hardware failures
Which of the following business ideas is not using AI?
A. Best Buy implements a software system that will determine how many customers are
needed to increase gross profits to $5 million.
B. McDonald's unveils a robot that cleans and tidies the restaurant, while also asking
guests if it can take their trays to the trash.
C. Starbucks creates a system that works like a hand and lifts and moves the mixing
pots for the coffees to and from the coffee machines to the counters.
D. Golf courses create an automated golf cart that can offer swing suggestions, club
suggestions, and even navigate the course for the driver.
page-pf9
What is microblogging?
A. a self-photograph placed on a social media website
B. the practice of sending brief posts to a personal blog
C. a web format used to publish frequently updated works
D. a magazine published only in electronic form on a computer network
What emphasizes extensive user involvement in the rapid and evolutionary construction
of working prototypes of a system to accelerate the systems development process?
A.RAD methodology
B. agile methodology
C. waterfall methodology
D. extreme programming
page-pfa
Which assembly language is difficult for people to understand?
A. fifth generation machine language
B.second generation machine language
C. third generation machine language
D. fourth generation machine language
How are the majority of companies today typically organized?
A. by departments or functional areas
B. by departments or financial areas
C. by degree or financial areas
D. by manager or knowledge area
page-pfb
Which of the following is not an example of a primary enterprise system?
A. supply chain management
B. customer relationship management
C. enterprise revenue planning
D. enterprise resource planning
Which of the following is considered a core driver of the information age?
A. fact
B. goods
C. competitive Intelligence
D. data
page-pfc
In the information technology world, which of the following are examples of ethical
issues that a company may have to manage?
A. employees copying and distributing company-owned software
B. employees searching other employee's private information without consent
C. employees intentionally creating or spreading viruses to confuse IT
D.All of these are correct.
What are Porter's three generic strategies?
A. evaluates an organization's strengths, weaknesses, opportunities, and threats to
identify significant influences that work for or against business strategies
B. analyzes the competitive forces within the environment in which a company operates
to assess the potential for profitability in an industry
C. views a firm as a series of business processes, each of which adds value to the
product or service
D. generic business strategies that are neither organization nor industry specific and can
be applied to any business, product, or service
page-pfd
Which of the following is a problem associated with dirty data?
A. formatted data
B.misleading data
C. correct data
D. All of these are correct.
What serves only one customer or organization and can be located on or off the
customer's premises?
A. community cloud
B.private cloud
C. utility computing
D. public cloud
page-pfe
Which of the following is an effect a company could experience because of a disaster
such as a fire, flood, or hurricane?
A. disrupting communications
B. damaging physical infrastructures
C. halting transportation
D.All of these are correct.
In terms of big data what is veracity?
A. includes different forms of structured and unstructured data
B.includes the uncertainty of data, including biases, noise, and abnormalities
C. includes the scale of data
D. includes the analysis of streaming data as it travels around the Internet
page-pff
What is a business analytics specialist who uses visual tools to help people understand
complex data?
A. distributed computing
B. advanced analytics
C. analysis paralysis
D. data artist
In the center of Porter's Five Forces model is competition. Which of the following
represents the four outer boxes?
A. buyer power, systems power, threat of false entrants, and threat of substitute
products or services
B. buyer power, systems power, threat of new entrants, and threat of substitute products
or services
C.buyer power, supplier power, threat of new entrants, and threat of substitute products
or services
D. business power, supplier power, threat of new entrants, and threat of powerful
services
page-pf10
What is the portion of a computer's primary storage that does not lose its contents when
one switches off the power?
A. RAM
B. ROM
C. volatility
D. flash memory
What requires more than two means of authentication such as what the user knows
(password), what the user has (security token), and what the user is (biometric
verification)?
A. single-factor authentication
B. two-factor authentication
C. multifactor authentication
D. biometrics
page-pf11
What is source code?
A. any proprietary software licensed under exclusive legal right of the copyright holder
B. any software whose source code is made available free for any third party to review
and modify
C. contains instructions written by a programmer specifying the actions to be performed
by computer software
D. consists of nonproprietary hardware and software based on publically known
standards that allow third parties to create add-on products to plug into or interoperate

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.