CMCS 78696

subject Type Homework Help
subject Pages 21
subject Words 2450
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A Supply Chain Manager serves as a link between management and employees.
A desktop computer is a fully functional computer designed for you to carry around and
run on battery power.
Users should not be involved in the prototyping process.
The choice phase of decision making considers ways to solve problems, fill needs, or
take advantage of opportunities.
page-pf2
You cannot talk on the telephone while using a DSL Internet connection.
To be successful, you need to be an expert within one functional area and competent in
all the other functional areas.
Business requirements drive the entire systemif they are inaccurate or incomplete, the
system will more likely fail.
Plotters were the first type of color printers.
page-pf3
Accessibility determines when your IT system will be available for users to access.
RAM, or random access memory, is permanent storage that holds the information
you're working with, the application software you're using, and the operating system
software you're using.
A request for proposal is a formal document that describes in detail your logical
requirements for a proposed system and invites outsourcing organizations to submit
bids for its development.
page-pf4
An output device is a tool you use to store information for use at a later time.
A hypercube is a two-dimensional representation of information.
Insourcing is delegating work to an industry IT specialist via a bid.
Encryption schemes can only utilize a single key.
page-pf5
IT infrastructure is an easy term to define because it means the same thing to all
organizations.
The early stages of ERP goes back to the 1970s with Mainframe Requirements
Planning.
Data management and model management are both used in decision support systems.
page-pf6
Domestic supply chains rarely use inter-modal transportation.
A DS3 is a high-speed business network circuit and is about the same speed as a T1
line.
The project scope is defined in the project scope document. This document is often
several pages in length.
It is illegal for companies to monitor employee e-mail.
page-pf7
Wireless communications media transmits information over a closed, connected path.
The IT infrastructure deals with details of hardware and software requirements.
The Electronic Communications Privacy Act of 1986 completely forbids the
interception of wired and wireless communications completely.
A clickstream will record information about you during a Web surfing session such as
what Web sites you visited, how long you were there, what ads you looked at, and what
page-pf8
you bought.
If your browser displays a small picture of a lock or if the Web address begins httpq,
then you're using secure sockets layers to connect to another Web page.
The B2B e-commerce segment is relatively small compared to the B2C e-commerce
segment.
Benchmarking is used to improve an IT system performance.
page-pf9
Supply chain management only deals with the tracking of the final product as it is
delivered to the consumer.
A social networking system is the set of links and communication privileges for an
online social community.
E-commerce permits customers, consumers, and companies to form relationships that
would not be possible without technology.
page-pfa
Knowledge workers work with and produce information as a product.
Copying software so that your neighbor can install it on his/her machine is completely
legal and ethical, unless you charge a fee for the software.
A help desk is a group of people that respond to end users' questions.
On which group of people does business intelligence collect knowledge?
A.Customers and business partners
B.Competition and competitive environment
C.Internal operations
page-pfb
D.All of the above
C2C marketplaces that are supported by advertising are said to be _____.
A.B2C
B.Ad-supported
C.Market-oriented
D.Push technology
Which type of e-commerce occurs when a business sells products and services to a
government entity?
A.E-Gov
B.I-BG
C.E-BG
D.B2G
page-pfc
Which database management subsystem is responsible for backup and recovery,
security management, query optimization, concurrency control, and change
management?
A.Application management
B.Data administration
C.Data management
D.Data optimization
Which of the following is an advantage of a prototype?
A.Leads people to believe the final system will follow shortly
B.Gives no indication of performance under operational conditions
C.Leads the project team to forgo proper testing and documentation
D.Encourages active user participation
What type of IT infrastructure involves sharing information systems in one central area
or mainframe?
A.Client/server
page-pfd
B.Decentralized
C.Centralized
D.Distributed
What is the difference between a social networking site and a blog?
A.Social networking sites create a community of people; blogs keep people informed
B.A blog has more sophisticated systems than social networking site
C.Social networking sites provide frequently published news; blogs do not
D.Social networking sites allow you to be someone other than yourself; blogs do not
What is approximately one million bytes?
A.M-Byte
B.Megabyte
C.Gigabyte
D.Terabyte
page-pfe
What is the term used when intermediate business partners in traditional distribution
channels are bypassed?
A.Direct manufacturing
B.Consumer directed production
C.Disintermediation
D.Uninterrupted, consumer driven, manufacturing
A complete set of information about customer ages, gender, buying habits, and buying
preferences is an example of _____.
A.Information
B.Database
C.Customer breakdown
D.Business intelligence
If you were inventing a new biochip and you were attempting to get this biochip to "self
assemble" what discipline would you be working in?
page-pff
A.Biophysics
B.Metaphysics
C.Morphing biometrics
D.Nanotechnology
What is another name for a database?
A.Information repository
B.Data depository
C.Data warehouse
D.Information depot
What is the fourth and last step in the prototyping process?
A.Identify basic requirements
B.Develop initial prototype
C.Users reviewing
D.Revise and enhance the prototype
page-pf10
What is the difference between a smart card and a digital wallet?
A.A smart card is a physical device; a digital wallet is not
B.A smart card contains both software and information; a digital wallet contains only
information
C.A smart card is stored on the seller's computer; a digital wallet is stored on the client's
computer
D.A digital wallet contains a smart card; a smart card is part of the digital walled along
with other personal consumer information
If you needed to analyze the bear population in New Jersey and their interactions with
humans located in towns and cities, what type of computer application should you use?
A.Model management
B.Expert system
C.Geographic information system
D.Multidimensional information system
page-pf11
When does information exhibit quality?
A.When there is an abundance of it
B.When it leads to business intelligence
C.When it is pertinent, relevant, and useful to you
D.When you have access to it 24/7
What is the purpose of a data warehouse?
A.Backup and recovery
B.To support decision making and OLAP
C.To support transaction processing and OLTP
D.To support, backup and recovery, OLAP, and OLTP
What are the two main types, or categories, of software?
A.User-supported or computer-supported systems
B.Service or application
C.Application and system
D.Utility or operating systems
page-pf12
When a business is analyzing its technology needs, it should follow a series of steps.
Which of the following is not one of these steps?
A.Assess the state of competition and industry pressures affecting it
B.Determine the business strategies that are critical to its success
C.Determine the type of technology that employees are comfortable working with
D.Align technology with important business processes
What technology records information about you during a Web surfing session; such as
the Web sites you visited, how long you spent there, and what you bought?
A.Key trapper
B.Clickstream
C.Hacking
D.Anonymizer
page-pf13
Which system allows your organization to gather, process, and update transactional
information?
A.Online analytical processing (OLAP)
B.Business intelligence (BI)
C.File management systems (FMS)
D.Online transaction processing (OLTP)
Which computer is designed to meet the computing needs of hundreds of people in a
large business environment?
A.Mainframe computer
B.Minicomputer
C.Supercomputer
D.Desktop computer
What type of network security applications watches the current network traffic,
matching it against lists with characteristics of known attacks?
A.Firewall
B.Intrusion detection system
C.Denial-of-service
page-pf14
D.Authenticity
What type of metric does supply chain management seek to optimize?
A.Efficiency
B.Effectiveness
C.Systems
D.Top-line initiatives
In contemporary business, success depends on minimizing the _____ in an attempt to
reduce the costs of producing and selling products or services.
A.Level of internal communications
B.Level of customer support
C.Distribution chain
D.Complexity of needed information technology
page-pf15
Which type of artificial intelligent system mimics the evolutionary,
survival-of-the-fittest process to generate increasingly better solutions to a problem?
A.Fuzzy logic
B.Genetic algorithm
C.Intelligent database management systems (I-DBMS)
D.Expert system
What is e-government?
A.Marketplaces that support e-voting on current issues
B.A marketplace that facilitates individuals selling products and services to a
government entity
C.The use of digital technology to transform government operations
D.One government selling products or services to businesses
The prototyping process involves four steps. Which of these items is not one of these
steps?
A.Revise and enhance the prototype
page-pf16
B.Build from the design documents
C.Allow the end user to review and suggest revisions and modifications
D.Identify basic requirements
What new Web environment features online collaboration, dynamic and customized
feeds, and greater control of Web content by users?
A.Wiki
B.Web 2.0
C.CAVE
D.Social networking
Which of the following focuses on the development, use, and reuse of small
self-contained blocks of code to meet all the application software needs of an
organization?
A.XP
B.Rapid prototyping
C.RAD
D.Service-oriented architecture (SOA)
page-pf17
If you were to perform a regression analysis, what type of data warehouse tool would
you use?
A.Statistical
B.Multidimensional analysis
C.Production analysis
D.Hypercube
_____ communications radiate information into the air, either very narrowly beamed or
in many directions.
_____ is the use of EDI for payments.
page-pf18
_____ is a form of software that organizes information in the most efficient way on
your hard drive.
The _____ uses a series of logically related two-dimensional tables or files to store
information in the form of a database.
_____ occurs when two or more companies cooperate by integrating their IT systems.
A(n) _____ attack floods a Web site with so many requests for service that it slows
down or crashes.
page-pf19
A(n) _____ contains the logical structure for the information.
_____ defines the hardware, software, and telecommunication equipment required to
run the system.
The _____ helps you add, change, and delete information in a database and mine it for
valuable information.
_____ information describes the environment surrounding the organization.
page-pf1a
_____ is a standardized fourth-generation query language found in most DBMSs.
_____ is the use of the Internet as a means of order delivery whereby intermediate
players in the distribution channel can be bypassed.
_____ are the single most important resource in any organization.
The chief _____ officer is responsible for overseeing every aspect of an organization's
information resources.
page-pf1b
A(n) _____ is a network in which one or more computers are servers and provide
services to the other computers which are called clients.
_____ refers to the ability of an organization to tailor products to customer
specifications.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.