COMP 95775

subject Type Homework Help
subject Pages 13
subject Words 1844
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In what decision making phase do you consider possible ways of solving problems,
filling needs, or capitalizing on opportunities?
A.Design
B.Intelligence
C.Choice
D.Prediction and decision
Which type of e-commerce refers to the electronic commerce activities performed
within a nation's government or between governments?
A.I-GG
B.E-GG
C.G2
D.G2G
What is approximately one trillion bytes?
A.T-Byte
B.Megabyte
C.Gigabyte
page-pf2
D.Terabyte
If you were deciding if your project should be developed by you or an IT specialist,
what factor should sway you to decide to develop the system by yourself?
A.It is related to the existing IT infrastructure
B.It is mission critical
C.It is an application that would be used mainly by you
D.It supports concurrent users
Which network device connects together networks of computers?
A.Hubs
B.Switches
C.Routers
D.Virtual connectors
page-pf3
What is a "sticky" Web site?
A.A Web site that gains popularity through e-channels
B.A Web site that is accessed frequently because it is able to reroute potential
consumers from other sites to it
C.A Web site that is located by pop-up and pop-under ads
D.A Web site that attracts consumers and encourages them to return
What are ethics?
A.The set of laws established for a nation
B.Standards that define acceptable or prohibited behavior
C.Principles and standards that guide our behavior toward other people
D.Religious customs
At upper organizational levels, information exhibits _____ granularity.
A.Low-levels of
B.High-levels of
page-pf4
C.Coarse
D.Complete
Which type of e-commerce model typically requires the use of an intermediary
organization to complete transactions?
A.E-BB
B.G2C
C.C2C
D.C2B
Which of the following communications medium is not classified as a broadband
connection?
A.Dial-up
B.DSL
C.Cable modem
D.Dedicated line
page-pf5
Which of the following is a count of the number of people who visit one site, click on
an ad, and are taken to the site of the advertiser?
A.Conversion rate
B.Click-through
C.Marketing hits
D.Viral speed
What type of communications medium is coaxial cable?
A.Optical fiber
B.Wired communications medium
C.Wireless communications medium
D.DSL channels
If you needed to store facts about information that you were collecting, you would store
these facts in the _____.
page-pf6
A.Relations
B.Database management system
C.Business rules
D.Data dictionary
What is open-source information?
A.Programming code that is available or open to customers
B.Information that is linked with the originator of the information and any related
sources of information
C.Evolving information or information that can be edited by the community that uses it
D.Information that requires further investigation into its credibility
A database management system contains five important software components. Which of
the following components accepts and processes requests from other the other four
database components?
A.DBMS engine
B.Data definition subsystem
C.Data manipulation subsystem
D.Data administration subsystem
page-pf7
Which type of Internet connection allows you to get Internet access from your satellite
dish?
A.Cable
B.Satellite
C.DSL
D.Dish
If you were traveling abroad and needed to use some software that you did not currently
have, and did not want to purchase, what type of software could you rent during this
trip?
A.Leasing Online Software and Services (LOSS)
B.Software-as-a-Service (SaaS)
C.Electronic Rental Software (eRent)
D.Application Service Provider (ASP)
page-pf8
There are different levels of uncertainty when faced with ethical decisions; each creates
a sort of ring around the dilemma. What is true of the outside level or ring?
A.Ethical violations are considered more serious
B.Decisions and circumstances surrounding the dilemma become confusing and
uncertain
C.The laws and ramifications regarding the dilemma become clearer and more
understood
D.The behavior or actions aren't considered awful and are more accepted by society
What type of access authentication system uses your physical characteristics to
determine if you should, or should not, have access to a computer system?
A.Behaviometrics
B.Human system recognition
C.Biometrics
D.Physiological systems
If part of your academic work was to read the Wall Street Journal's articles on
information technology and these articles were automatically delivered to your account,
what type of technology would you be using?
page-pf9
A.M-commerce
B.Internet search and deploy
C.Push
D.Pull
Who oversees the use of information in an organization?
A.Chief information officer
B.Lead programmers
C.Business analysts
D.Database managers
What is it called when a business gains a significant impact on market share by being
the fist to market giving it a competitive advantage?
A.Primary market
B.Competitive market
C.Primary advantage
D.First-mover advantage
page-pfa
Which of the following is a type of system software?
A.Microsoft Word
B.Microsoft Excel
C.Microsoft Access
D.Microsoft Windows XP
Which type of high-speed circuit is used by business to create "virtual circuits"
connecting multiple offices without having to run physical lines between each office?
A.T1
B.DS3
C.ATM
D.VPN
page-pfb
When a government agency such as the Small Business Administration (SBA) provides
loans to individuals hoping to start their own business, the _____ e-commerce model is
employed
A.G2G
B.G2B
C.G2C
D.I-GC
Which data manipulation tool allows you to graphically design the answer to your
business questions?
A.Report generators
B.Application reports
C.Query-by-example tools
D.Data administration tools
If you were to develop a new text messaging system for college students that had a
panic button so that, for instance, a message changed when a teacher were close by,
how would you be enhancing your competitive strategy?
A.Through focus
B.Through overall cost leadership
page-pfc
C.Through loyalty enhancement
D.Through differentiation
What is malicious software that secretly collects information about you and your
computer and then sends it back to some someone?
A.Adware
B.Spyware
C.Trojan horse
D.Worm
Which category of business application satisfies the SOA philosophy for the end user?
A.CRM
B.BI
C.SIS
D.ERP
page-pfd
What term depicts a virtual marketplace in which all businesses buy from and sell
products and services to each other, and share information?
A.Virtual Markets (VM)
B.E-Markets (EM)
C.Open Market
D.B2B e-marketplace
What organizational methodology develops detailed guidelines for disaster and
recovery efforts?
A.Business continuity planning
B.Disaster planning
C.Emergency reaction planning
D.High alert management
What is another name for a hub?
page-pfe
A.Focal point
B.Share network
C.Network midpoint
D.Router
Which of the following is not true about a typical home network?
A.Each computer has an Ethernet network car
B.There are network cables or wireless devices to transmit signals
C.The network has a switch that passes messages and information to each computer
D.A DSL cable or cable line connects the network to your ISP
When businesses utilize GIS software to generate maps, we call it _____.
page-pff
The ______________ attribute of information addresses the credibility of information.
_____ represents key dates for which you need a certain group of activities performed.
_____ are used to send large amounts of data to remote locations especially is there are
a number of receiving sites.
The know-how of an expert system actually comes from a(n) _____.
page-pf10
WiFi (wireless fidelity, 802.11a, b, or g) uses _____ transmissions.
_____ testing verifies that the units of a system function correctly when integrated into
the total system.
A(n) ____________ is a factor critical to your organization's success.
_____ is a delivery model for software on a pay-per-use basis versus purchasing.
page-pf11
A(n) _____ contains a subset of a data warehouse.
The primary advantage of the _____ infrastructure is it "off-loads" applications and
information from the server.
_____ is the language of business.
_____ is an approach that produces or delivers a product or service just at the time the
customer wants it.
page-pf12
_____ is software that comes hidden in free downloadable software and collects
information about you and your computer and reports it to someone without your
permission.
The term relation often describes each _____ table or file in the relational model.
The _____ is a structured step-by-step approach for developing information systems.
A typical speed of an infrared connection is _____.
page-pf13
The primary key of the Customer file is the Customer ID field and the primary key of
the Order file is the Order ID field. Therefore, the _____ field would be used to create a
logical relationship between the Customer and Order files.
A network that covers a large geographic area where buildings are not in immediate
proximity to each other is called a(n) _____.
During the _____ phase of the SDLC, the organization verifies that the new system
works and meets all business requirements.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.