CMCS 50302

subject Type Homework Help
subject Pages 24
subject Words 2636
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The data administration subsystem is used to create the data dictionary.
Query optimization facilities are used to create backups just in case the database is
damaged or lost.
Project scope clearly defines the high-level system requirements.
The physical devices that make up a computer (computer system) are known as
hardware.
page-pf2
Testing is not an important phase in the SDLC.
Portability encompasses what you have the ability to do with your technology while
carrying it around.
The design phase of decision making focuses on determining how software will work.
Operational databases are databases that support OLAP.
page-pf3
A WAN covers a large geographic distance, such as a state, a country, or even the entire
world.
The best form of biometric security encompasses two factors: what you know and who
you are.
There are three broad tracks in finance including corporate finance, banking, and
investments.
page-pf4
The horizontal flow of information consists of information that is communicated to
customers, suppliers, distributors, and other partners for the purpose of doing business.
The chief information officer (CIO) is responsible for overseeing every aspect of an
organization's information resource.
Mutation refers to giving preference to newer outcomes.
When you do a search on the Internet you are using push technology.
page-pf5
Dial-up Internet connection is considered a broadband channel.
The possible consequences rarely influence an ethical decision.
Data warehouse technology is often used with push technology to notify you of special
services.
page-pf6
A cookie is a small file deposited on your hard disk by a Web site containing
information about you and your Web activities.
A trackball is an output device.
F2b2C is an e-commerce model where the customer can specify a custom order to a
factory.
Only IT majors will benefit from learning about the SDLC.
page-pf7
Amazon uses information agents to show products to customers hoping to generate new
purchases.
With ASR, you must insert clear pauses between each sentence.
The data manipulation subsystem is often the interface between the user and the
information contained in the database.
page-pf8
A Business Analyst is typically non-technical professional who works closely with an
IT professional.
Key logger, or key trapper software, is software that records sounds.
Backing up is not necessary.
A holographic device such as a CAVE can display objects in true four-dimensional
form.
page-pf9
Business requirements are gathered in the design phase.
Application software is the software that enables you to solve specific problems or
perform specific tasks.
Crossover refers to giving preference to better outcomes.
The government is planning to move from a brick-and-mortar to a click-and-mortar
approach to doing business.
page-pfa
A horizontal e-marketplace brings together buyers and sellers from the same industry.
Spatial information is any information that can be shown in its original form.
Virtual team members are typically located in the same geographic areas.
page-pfb
Telecommunications devices permit users to send and receive information from another
person or location.
A technology literate knowledge worker knows how and when to apply technology.
Virtual marketing encourages users of a product or service supplied by a B2C company
to ask friends to join in as well.
Which of the following is not a potential problem or risk of selfsourcing?
A.It may increase inadequate end user expertise that leads to inadequately developed
systems
B.It increases the vulnerability of your strategic information because the end users are
not involved in key development projects
page-pfc
C.Lack of organizational focus creates "privatized" IT systems
D.Insufficient analysis of design alternatives leads to subpar IT systems
What was the real significance of first-generation ERP systems?
A.Speed
B.Access to data
C.Greater accuracy with scheduling orders
D.Reducing the need for supplies from vendors
When did the second generation of ERP systems occur?
A.Late 1970s
B.Early 1980s
C.Late 1980s
D.Early 1990s
page-pfd
If you were developing marketing strategies and, in your job, decided to create a
database that tracked the progress of your marketing efforts, what kind of development
would you be engaging in?
A.Outsourcing
B.Netsourcing
C.Selfsourcing
D.Insourcing
The SDLC contains 7 phases. Which phase monitors and supports the new system to
ensure it continues to meet your business goals?
A.Implementation
B.Testing
C.Maintenance
D.Operations
Which of the following is not a type of flash memory?
page-pfe
A.Jump drive
B.Thumb drive
C.Memory stick
D.DVD
What type of twisted-pair cabling provides a slow, reliable path for information at up to
10 Mbps?
A.Cat 3
B.Optical fiber
C.Microwave
D.Coax
Which type of DSS allows you to analyze spatial information?
A.Geographic information system
B.Model information system
C.Expert system
D.Multidimensional information system
page-pff
Which of the following is true with regards to prototyping?
A.Prototyping is an iterative process
B.Prototypes are built from business requirements
C.End users review prototypes and suggest further changes which will then be used to
refine the prototype
D.Each of these items is true of prototyping
Which question does not support a business' efforts to support and maintain a
competitive edge?
A.Can this technology lower the cost of operating our business?
B.Can this technology increase our customer base?
C.Can this technology make the company look better?
D.Can this technology enhance our innovative efforts?
page-pf10
If you wished to block email from people or businesses that you don't know, what type
of software do you need to install on your computer?
A.Anti-virus
B.Spam blocker
C.Anti-spyware
D.Email management
Which of the following metrics is not used to measure the success of call centers?
A.Abandon rate
B.Average speed to answer (ASA)
C.Time service factor (TSF)
D.Total hits
What software should you install to protect your computer from computer viruses?
A.Spyware
B.Adware
C.Worms
D.Anti-virus
page-pf11
Which of the following is a type of application software?
A.Microsoft Windows XP
B.Microsoft Office
C.Mac OS
D.Linux
According to the authors, what vendor now offers ERP solutions - Great Plaine - to
small and medium-sized companies?
A.Cognos
B.Microsoft
C.SAP
D.Oracle
page-pf12
If your student information had two different birth dates for you, your data would not be
considered _____.
A.Legitimate
B.Correct
C.Clean
D.Acceptable
If you were typing a sensitive message to your manager and you wanted to ensure that
no one could read it but the person you were sending it to, what should you do to the
message?
A.Run anti-virus software before sending it to ensure it has not been infected by a virus
or spyware
B.Send it through a Web site that supports anonymizing
C.Use only your organization's internal systems so that it can't go through the Internet
D.Encrypt the message before sending it to the manager
Can a prototype become an operational system in a selfsourcing environment?
A.No
B.Yes
page-pf13
C.Yes, if the IT specialist revise it so that the code is efficient and adheres to existing
technical standards
D.Yes, but only if the prototype does not enter the mainstream environment
Which of the following is not a reason why marketing professionals need to understand
database management?
A.They work with large amounts of data
B.Understanding the logical organization of a database is essential
C.Understanding how the information is accessed is essential
D.Marketing professionals do not need to understand database management
What is the difference between information and business intelligence (BI)?
A.Information is about a specific situation; business intelligence is about internal and
external conditions and how they will affect strategy
B.Information is based upon facts or objective data; business intelligence is based on
perceptions
C.Information leads to strategic thinking; business intelligence leads to tactical thinking
D.Information is based on processed knowledge; business intelligence is based on
processed information
page-pf14
There are two fundamental factors that determine your ethical reaction to dilemmas.
What is one of them?
A.Your basic ethical structure
B.Your age
C.Your religious education
D.Your perceptions and intuitions
What is one of the best know spyware detection programs?
A.AdAware
B.The Anonymizer
C.Clickstream
D.The Snifter
What type of software encompasses email and contact management?
page-pf15
A.Database management
B.Accounting information systems
C.Desktop systems
D.Communications support
What type of Internet connection uses ordinary telephone lines and a modem?
A.DSL
B.Cable modem
C.Dedicated high-speed line
D.Dial-up circuits
What is the objective of business intelligence (BI)?
A.To process transactional information efficiently and effectively
B.To provide decisions makers with a great deal of information
C.To provide timely and quality information to decision makers
D.To process external information or information that is purchased from outside
vendors
page-pf16
Which of the following can be written to repeatedly?
A.CD-R
B.DVD
C.DVD-RW
D.CD-ROM
Which metric assesses whether or not some function or task is completed the fastest?
A.Benchmark
B.Effectiveness
C.Efficiency
D.Fitting metrics
page-pf17
In which SDLC phase do you build a help desk support system for the new information
system?
A.Maintenance
B.Implementation
C.Testing
D.Transformation
What term is being coined to describe people living through technology with the
Internet being at the epicenter?
A.Virtual life
B.Virtual living
C.E-society
D.Online humanity (OH)
Does selfsourcing encompass prototyping?
A.No
B.Sometimes, but not often
C.Yes
page-pf18
D.Yes, when the customer identifies it in the requirements document and project scope
What communications device receives a radio signal, strengthens it, and then sends it
on?
A.WiFi
B.Wireless fidelity
C.Repeater
D.Microwave
Which transmission method ensures that transactions traveling over the Internet are
legitimate as well as secure?
A.Shared Fusion Connectivity (SFC)
B.Secure Sockets Layers (SSL)
C.Financial Electronic Data Interchange (FEDI)
D.Secure Electronic Transactions (SET)
page-pf19
What is a person called who uses a computer to cause harm to people or destroy critical
systems?
A.Cyberterrorist
B.Black-hat hacker
C.CyberCracker
D.Hacktivist
Which organizational function is responsible for developing security procedures for an
organization?
A.Data security
B.Data protection
C.Information resource management
D.Database administration
A(n) _____ CPU is capable of working with information stored in more than two states.
page-pf1a
A _____ infrastructure makes it difficult to compare information between applications.
A(n) _____ is used to prioritize the business requirements and place them in a formal
comprehensive document.
The _____ phase of decision making carries out the chosen solutions, monitors the
results, and makes adjustments as necessary.
A(n) _____ serves as the primary interface for customers and the sales process.
page-pf1b
With respect to the circumstances that surround making an ethical decision, _____ is
the length of time will it take for the benefit or harm to take effect.
Supporting global customers with 24/7 operation deals with _____ of information.
A(n) _____ is a separate and fully equipped facility where the company can move
immediately after the disaster and resume business.
Multidimensional analysis tools use _____ techniques to view information from
different perspectives.
page-pf1c
A(n) _____ mimics the evolutionary survival-of-the-fittest process to generate
increasingly better solutions to a problem.
Focus, Inc. is renting a CRM application that they only run once a year through a(n)
_____.
_____ occurs when the ASR system captures your words as your speak into a
microphone, eliminates any background noise, and converts the digital signals of your
speech in phonemes (syllables).
The chief _____ officer is responsible for ensuring that information is used in an ethical
way and that only the right people have access to certain types of information.
page-pf1d
_____ testing verifies that separate systems can work together.
_____ is a systematic approach to assessing and improving the value of business
processes within your organization to further increase its competitive strengths.
Knowledge workers work with and produce _____ as a product.
A(n) _____ specifies a process for recovering information or an IT system following a
disaster.
page-pf1e
_____ occurs when developers add features that were not part of the initial
requirements.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.