CMCS 12627

subject Type Homework Help
subject Pages 13
subject Words 1748
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which type of cable is similar to a phone or twisted-pair cable?
A.WAP
B.Broadband cable
C.Optical fiber
D.Cat 5
If you were to identify and investigate a problem in your organization, what decision
making phase would you be in?
A.Design
B.Preliminary or investigative
C.Intelligence
D.Planning
Personal productivity software include all the following except?
A.Photoshop
B.WordPerfect
C.Quicken
D.Linux
page-pf2
If you needed to connect your flash drive to your computer, what type of hardware
device would you need?
A.Storage
B.Connecting
C.Telecommunications
D.Output
Compared to the agricultural age where the work force focuses on the production of
food, we now work in the _____ age where the focus has shifted to the production of
knowledge.
A.Information age
B.Industrial age
C.Knowledge age
D.Technology age
page-pf3
What type of hardware and/or software should you install to protect your computer
from intruders entering into your system from your network connection?
A.Passports
B.Anti-virus
C.Firewall
D.Network monitor
Which of the following are real-world applications for biometrics?
A.Remote surgical procedures
B.Custom clothing
C.Rescue and recovery
D.Animal training for the disabled
Which of the following is not a flat-panel display?
A.Liquid crystal display
B.Gas plasma display
page-pf4
C.Cathode ray tube display
D.LCDs, GPDs, and CRTs can be flat panel or not
Due to the massive amounts of information gathered about customers, what type of
software is one of the fastest growing?
A.CRM
B.ARM
C.Adware, Sneakware, and Cookie management
D.Anonymous Web browsing
Which computer is designed to fulfill all personal computing needs but is also designed
to be portable?
A.PDA
B.Notebook computer
C.Desktop computer
D.Portable computer
page-pf5
What type of computer are keyboards are most commonly used with?
A.PDAs and tablets
B.PCs and laptops
C.PCs and slates
D.Slates, tablets, PDAs, and PCs
Which of the following are large electronic repositories of very detailed information?
A.Libraries
B.Data compilations
C.Data collections
D.Databases
What is information?
A.Data that is stored about a person, object, or event in a database or transaction file
page-pf6
B.A collection of related records
C.Data that has a particular meaning within a specific context
D.A collection of facts about an organization's internal and external environment
In the future, what two types of systems will work together to capture secured events
and the individual and personal information surrounding that event?
A.Biometrics and transaction processing
B.Forensics and data mining
C.Database management and CAVE
D.Biometrics and virtual reality
What does a switch enable a network to do?
A.Listen to each other's transmissions
B.Repeat messages to other computers so that the messages are not lost or dropped
C.Allow computers to have different conversation at the same time
D.Create direct links between separate networks or subnets
page-pf7
What is phishing?
A.An investigative Web service
B.A type of Internet game that allows subscribers to find out information about you and
others living in its "virtual city"
C.Information bots that surf the Web for you searching for specific information that you
need
D.Email and other online techniques that attempt to gain personal information from you
Which of the following is an electronic marketplace that connects buyers and sellers
across many industries, primarily for MRO materials commerce?
A.Horizontal e-marketplace
B.B2C e-markets
C.Reverse auctions
D.Direct market
Which type of software helps you maintain your personal financial records (e.g.,
page-pf8
personal checkbooks, credit cards, bills)?
A.Personal finance
B.Personal budgeting and planning
C.Personal information management
D.Personal database management system
Is copyright infringement illegal?
A.Yes
B.Yes, outside of a fair use situation
C.No, not unless the material is patented
D.If the material is not patented and on the Internet it is not illegal, otherwise it is
Which of the following captures screen images?
A.Key logger
B.Packet sniffer
C.Log analysis tools
D.Screen capture software
page-pf9
Which of the following serial ports have traditionally been used to connect keyboards
and mice to a computer?
A.USB
B.Flash
C.Fire
D.PS/2
What type of predictive agent continually observes changes in information and events
and reports its findings back to the user?
A.Shopping bot
B.Data-mining agent
C.Monitoring-and-surveillance agent
D.Personal agent
page-pfa
Which of the following is an approach to allocating a percentage of your IT budget to
various projects based upon business strategies?
A.Tactical information planning (TIP)
B.Strategic technology planning (STP)
C.Run-grow-transform (RGT) framework
D.Transforming IS strategy (TISS)
Which infrastructure-centric metric measures the amount of information that can pass
through a system in a given amount of time?
A.Transaction speed
B.Accuracy
C.Throughput
D.Bandwidth
What is it called when a business focuses its efforts on a small set of products and
services compared to an extensive product or service line?
A.Differentiation
B.Loss leader
C.Product leader
page-pfb
D.Focus
A _____ IT structure develops from a strong "command and control" management
approach.
A.Fully-integrated
B.Matrix
C.Top-down silo
D.Most IT structures develop from a strong "command and control" management
approach
Which type of software helps you design and develop Web pages?
A.Personal productivity
B.Web authoring
C.Presentation
D.Personal information management
page-pfc
If you were using a computer that did not have to translate your words into its binary
equivalent before processing it, what type of computer device would you be using?
A.Multi-state CPU
B.Hographic systems
C.CAVE
D.Hyper systems
There are four main types of decisions. Which one represents decisions that always
have a right answer?
A.Recurring
B.Ad hoc
C.Defined
D.Structured
According to Porter, when there are many alternative products or services to the ones
your business provides, the _____ is high.
page-pfd
A.Threat of substitute products or services
B.Buyer and supplier power
C.Financial power
D.Threat of increase products, services, and power amongst all players and finances
Which of the following pointing devices would be used on a PDA?
A.Touchpad
B.Keyboard
C.Stylus
D.Trackball
Which type of system supports the capturing, organizing, and dissemination of
knowledge throughout the organization?
A.Database management (DBM) system
B.Knowledge management (KM) system
C.Business Intelligence (BI) system
D.Brainpower.com
page-pfe
What is the main disadvantage of a centralized infrastructure?
A.Lack of standards for hardware, software, procedures, and operations
B.Uncontrolled access to information
C.Inflexibility
D.Low degree of control over data and information
Which of the following systems primarily concentrates on the customer?
A.CRM
B.ERP
C.SCM
D.CCM
A _____ approach to structuring IT often occurs when there is a strong "command and
control" management style.
page-pff
Using digital technologies to transform government operations to increase efficiencies
is referred to as _____.
_____ are arrangements made between e-commerce sites that direct users from one site
to the other.
A shopping bot is also called a(n) _____.
Hardware and/or software that protects computers from outsides is called a(n) _____.
page-pf10
_____ is the process of building a model that demonstrates the features of a proposed
product, service, or system.
_____ is the number of billions of CPU cycles per second.
A(n) _____ is a decision support system designed specifically to work with spatial
information.
A(n) _____ is used to fulfill and support customer orders.
page-pf11
_____ is used to convince people of the worth of a proposed system.
_____ is knowledge about your customers, your competitors, your partners, your
competitive environment, and your own internal operations.
_____ is simply data that have a particular meaning within a specific context.
_____ is the activity of drawing a graphical representation of a design.
page-pf12
A(n) _____ subsystem controls facilities for backing up the database and establishing
security.
A(n) _____ mimics one ability of the human brain.
A _____ is a product sold at or below cost to entice customers into a store in the hope
that they will also buy more profitable products.
_____ is the use of your physiological characteristics such as your fingerprint, the blood
page-pf13
vessels in the iris of your eye, the sound of your voice, or perhaps even your breath to
provide identification.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.