CMCS 33839

subject Type Homework Help
subject Pages 9
subject Words 1253
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which network device sends information privately over the network?
A.Hub
B.Switch
C.Router
D.Virtual connector
What is the number of dots printed per inch and is the same principle as the resolution
in monitors?
A.Resolution of a printer
B.Dot pitch
C.Pixel
D.Density
Which of the following IT skills is the least important skill needed by accountants?
A.Database design
B.Web research
C.Statistical analysis
D.Network security
page-pf2
What is a computer virus?
A.Software that is written with malicious intent to cause annoyance or damage
B.Software that hides your identity from Web sites you visit
C.Utilities that hide themselves from the operating system and monitor the software you
have
D.Applications that record activities and site information regarding your surfing
sessions
Which of the following is a smaller, more focused data warehouse?
A.Data warehouse
B.Data mart
C.Operational database
D.OLAP
page-pf3
Which of the following can be used to help identify people in a crowd?
A.Biochip
B.Implant chip
C.Facial recognition software
D.Vision chip
If your company sold widgets to the automobile industry and these sales were
conducted through the internet, what type of e-commerce model would you be using?
A.E-CB
B.I-BB
C.B2B
D.C2B
Which of the following are areas of accounting?
A.Public practice and industry
B.Government and industry
C.Private and public practice
D.Public practice, industry, and government
page-pf4
What is the difference between the terms internet and Internet?
A.There is not difference, the words are used interchangeably
B.The term internet is another term for the World Wide Web (WWW); Internet refers to
the network of computers on the WWW
C.The term internet refers to network external to an organization; Internet refers to
internal networks
D.The term internet refers to a network connected by different organizations; the term
Internet refers to the network connected by different people
What type of system is often referred to as a predictive system because it sees patterns
in vast amounts of information?
A.Decision support system
B.Neural network
C.Geographic information system
D.Knowledge management system
page-pf5
What is the process in which a buyer posts its interest in buying a certain quantity of
items with specified purchasing requirements and suppliers then compete for this
business?
A.Vertical e-marketing
B.Reverse auction
C.Request for bid (RFB)
D.B2B E-mart
Where would a computer look up the site location for a computer it needs to send
information to?
A.Yellow pages
B.VPN directory assistance
C.The sender would first need to send a routing address to the receiving computer
D.Domain Name Systems (DNS)
In a data warehouse, which artificial intelligence tools allows you to discover
information and build intelligence?
A.Query-by-example
page-pf6
B.Query-and-reporting
C.Hypercube
D.Intelligent agent
Which of the following DBMS components allows you to quickly develop computer
routines or tasks that will process your business transactions?
A.Programming query
B.Automatic module generator
C.Application generation subsystem
D.Fast programming
Which of the following is not a common job title in marketing?
A.Market development manager
B.Account manager
C.Product manager
D.Operations Analyst
page-pf7
What is the set of marketing tools that your organization will use to pursue its
marketing objectives in reaching and attracting customers?
A.Ad campaigns
B.Marketing campaigns
C.Marketing strategies
D.Marketing mix
If you were trying to access your campus network but the system was unable to respond
to you because it was overwhelmed with a flood of requests coming from some virus,
what type of attack would you be experiencing?
A.Worms
B.Script kiddies
C.Denial-of-service
D.Cyber blackmail
page-pf8
If you were making a decision involving "fuzzy logic" what type of decision would you
be making?
A.Nonstructured
B.Ad hoc
C.Controlled
D.Muddled
How often should you test your disaster recovery plan?
A.Annually
B.At least once a year; several times a year would be better
C.Each time the plan is adjusted you should test it
D.The organization should rotate between pieces of the plan on a semi-annual basis
with a full-blown test occurring every other year
If you were working in Raleigh, NC and the main computer located in New York City
sent the computer application and data to your computer for processing, you would be
using a _____ infrastructure.
A.Decentralized
B.Distributed
page-pf9
C.Centralized
D.Client/server
Secure Sockets Layer is an example of which of the following?
A.Encryption
B.Worm
C.Virus
D.Spyware
What systems development approach focuses on building small self-contained blocks of
code that can be reused across a variety of applications within an organization?
A.Rapid prototyping
B.Project scoping
C.Agile development
D.Component-based development
page-pfa
What type of device can be installed on a vehicle that collects information about a
person's reckless driving?
A.Event data recorder (EDR)
B.Traffic Safety Monitor (TSM)
C.Mom's Offsite Monitor for Automobiles (MOMA)
D.Parents Against Reckless Driving (PARD)
If you were working in Princeton, NJ and all of your ERP application ran from a
computer located in Philadelphia, PA you would be using a _____ infrastructure.
A.Client/server
B.Centralized
C.Decentralized
D.Distributed
Which of the following can a virus do?
A.Hurt your hardware
page-pfb
B.Hurt any files it wasn't designed to attack
C.Infect files on write-protected disks
D.Target and corrupts specific applications or files
In what decision making phase do you implement solutions and monitor and adjust the
environment based on the consequences of these solutions?
A.Choice
B.Execution
C.Implementation
D.Maintenance
Because a _____ infrastructure connects all of its information systems, it can share
information and applications.
A.Centralized
B.Connected
C.Decentralized
D.Distributed
page-pfc
What is the term that refers to people who break into the computer systems of others?
A.Hijacker
B.Spytech
C.Worm
D.Hacker
What is the term used to show the great differences between those who have technology
and those who do not?
A.Web barrier
B.Digital divide
C.Technological disadvantaged
D.Information Poor
Which of the following is considered an e-society on the Internet?
page-pfd
A.ELife
B.MySpace and Facebook
C.AOL
D.Second Life

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.