CMCS 52390

subject Type Homework Help
subject Pages 13
subject Words 1824
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which type of network requires an organization to use some sort of public
communications company?
A.MAN
B.WAN
C.LAN
D.MAN, WAN, and LAN requires communications support from public companies
Can you make a copy of software that you buy?
A.No
B.You can make one copy
C.Yes
D.Only if the software vendor grants you the right to copy it
Unlike our current two-state binary storage and processing environment, what type of
CPU represents data in more than two states?
A.Hyper CPU
B.Holographic CPU
C.Haptic CPU
page-pf2
D.Muti-state CPU
What type of technology would allow a customer in a SOA environment to connect to
any communications channel (e.g., fax or Web) in an organization?
A.Database
B.Internet
C.Plug-and-play
D.Telecommunication relay
How do business monitor email?
A.Through software that looks for specific words and phrases
B.Searching for high-activity and then reading the associated email
C.Hardware key logger
D.Software, processes, and hardware
page-pf3
What is a mathematical method of handling imprecise or subjective information?
A.Fuzzy logic
B.Statistical analysis
C.Algorithms
D.Knowledge analysis
What is the fundamental underlying infrastructure for any IT environment?
A.Databases
B.Software
C.Networks
D.Hardware
A satellite is a type of wired communications media.
page-pf4
Within an organization information will flow in four basic directions. Which of the
following describes the movement of data from operations to management?
A.Upward
B.Downward
C.Horizontal
D.Outward/inward
What is a long skinny socket on the motherboard into which you insert an expansion
card?
A.System bus
B.Expansion slot
C.Port
D.Expansion bus
Which term describes an approach that produces or delivers a product or service just at
the time the customer wants it?
page-pf5
A.Just-in-time
B.Supply chain
C.Distribution chain
D.Value chain
In what type of tiered infrastructure does the client handle the display and the server
handles the request?
A.1-tier
B.2-tier
C.3-tier
D.4-tier
We lose more money to white-collar crime than we spend on the Federal defense
budget. Which of the following statistics is not true about employees and their potential
to commit crime?
A.Most employees are honest and would not commit crime
B.10% of employees are complete honest
C.10% of employees will steal
page-pf6
D.Circumstances will dictate if most employees commit crime or not
If you were to create a self portrait and you place this portrait on your Web site, what
type of law protects your work from anyone downloading and using it?
A.Copyright
B.Patent law
C.Fair Use Doctrine
D.Pirating laws
In what accounting area does the accountant serve as an outside advisor to business
organizations?
A.Government
B.Public
C.Nonprofit
D.Education
page-pf7
What type of technology allows you to capture the saccadic motion of someone's eyes
while they watch TV so that you can discover what is appealing to them?
A.eMotion
B.Biofeedback
C.Nanotechnology
D.Facial Recognition
What type of technology enhances your experiences with computer applications by
adding a sense of touch to the environment?
A.Biometrics
B.Crowdsourcing
C.Haptic interface
D.CAVEs
Which of the following is not a common Web-centric metric?
A.Unique visitors
B.Total hits
page-pf8
C.Throughput
D.Conversion rate
How is outsourcing different from developing software internally?
A.With outsourcing, you turn over design, development, testing, implementation, and
maintenance to an outside organization
B.With outsourcing, you lose control over requirements with outsourcing
C.With outsourcing, you lose competitive advantage
D.All of these issues highlight differences between outsourcing and internal
development
What types of activities commonly occur in an e-society?
A.Finding, friends, dates and potentially soul mates
B.Playing games and cards with others
C.Building home-based businesses
D.All of these activities, and more, are part of an e-society
page-pf9
What type of materials is used to produce products or is sold directly in a retail
environment?
A.Reverse materials
B.Direct materials
C.Perishable materials
D.Converse materials
What hardware device captures keystrokes moving from the keyboard to the
motherboard?
A.Hardware key logger
B.Clickstream device
C.Keyboard monitoring systems (KMS)
D.Hardware loggers, clickstream devices, and KMSs
What is bandwidth?
page-pfa
A.The capacity of the communications medium to send information in a given amount
of time
B.The number of computers able to send information simultaneously over a network
C.The type of communication device connected to a network
D.The amount of data that can move over the Internet at any given time
If your U.S.-based company were to hire a vendor located in New York City, you would
be using _____ outsourcing.
A.Nearshore
B.Domestic
C.Onshore
D.Interior
If you were constructing a legal document for your software vendor that stipulated
needed requirements, schedules, costs, acceptance criteria, and assessment metrics,
what would you be creating?
A.RFP
B.Critical milestones
C.Critical success factors (CSF)
page-pfb
D.Service level agreement (SLA)
What is a common Web activity that is geared towards stealing your identity?
A.Phishing
B.Trojan horse
C.Denial of service attack
D.Phishing, Trojan horses, and denial of service attacks are all geared stealing your
identity
What biometric device can store medical information about you and help state agencies
find you if you get lost or are considered missing?
A.Implant chip
B.Biochip
C.Nanochip
D.Nanobots
page-pfc
What is hardware?
A.The set of instructions that your computer executes
B.The physical devices and the set of instructions that your computer executes
C.The physical devices that make up a computer
D.The set of standards followed by the computer industry
What is a baseline value that a system seeks to attain?
A.Milestone
B.Benchmark
C.Quality measures
D.Criterion
Which of the following can be considered a business process?
A.A service provided to customers; this service generates income for your business
B.The specific tasks involved in processing a customer's order
C.The set of tasks performed by all employees who are supervised by one manager;
page-pfd
each manager has a set of business processes that they are responsible for
D.A set of activities that provide value to your organization
Which of the four types of decisions occur sporadically, perhaps only once?
A.Structured
B.Nonrecurring or ad hoc
C.Nonstructured
D.Impromptu
Information has many attributes that help define its quality. Which of the following is
not one of these attributes?
A.Timeliness
B.Abundance
C.Location
D.Form
page-pfe
Law enforcement agencies that use computer applications to plan and deploy its police
force probably use _____ systems.
A.Geographic information
B.Database management systems
C.Crossover intelligent
D.Biomimicry
If you were to call your health insurance company about a medical procedure you
needed, and your questions were answered immediately, what metric would your call
apply to?
A.First call resolution (FCR)
B.Success to failure ration (SFR)
C.Average speed to answer (ASA)
D.Bottom-line rate
A(n) _____ connection is a high-capacity telecommunications pipeline capable of
providing high-speed Internet service.
page-pff
_____ is used primarily in B2B to pay for purchases.
An expert system and a neural network differ in that the neural network can _____.
Verifying that your bank really sent an email requesting you to change your password is
ensuring _____ of the message.
_____ is a technique used to gain personal information for the purpose of identity theft.
page-pf10
A(n) _____ tracks all steps in the sales process.
_____ testing determines if a system meets the business requirements and enables end
users to correctly perform their jobs.
_____ technology forces the user to look for, request, and find what they want.
Marketing firms and departments will rely on _____ to measure consumer behavior.
page-pf11
_____ is learning from ecosystems and adapting their characteristics to human
organizations.
_____ is the use of multiple channels of transportation used to move products from
their source to the customer.
_____ refers to the electronic integration of government agencies, activities, and
processes up and down federal, state, and local government levels.
page-pf12
A(n) _____ subsystem contains facilities for concurrency control.
A _____ is a web site that allows its visitor to create, edit, change, and even eliminate
content from its site.
_____ can be used to make long distance phone calls over a DSL or Cable connection.
A(n) _____ is used to capture digital video and upload it to the Web.
page-pf13
A(n) _____ occurs when a buyer posts its interest in buying a certain quantity of items,
and sellers compete for the business by submitting successively lower bids until there is
only one seller left.
A buyer agent is an intelligent agent on a Web site that helps the customer find _____.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.