COP 80074

subject Type Homework Help
subject Pages 23
subject Words 2671
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A Web log consists of one line of information for every visitor to a Web site and is
usually stored on a Web server.
The most common wired transmission medium for home networks is Cat 5 cable, which
is a cheaper version of the twisted-pair cable used for telephones.
Given two monitors with equal quoted size (i.e., 19"), a CRT has a larger viewable
image size than a flat panel display.
Biometrics is the use of your physiological characteristics such as your fingerprint, the
blood vessels in the iris of your eye, the sound of your voice, or perhaps your breath to
provide identification.
page-pf2
The theory behind the Long Tail is that e-commerce has a social effect on not only the
users of e-commerce, but on society as a whole.
A worm attaches itself to a Word file.
For a consumer, a commodity-like product is the same no matter where it is purchased.
page-pf3
The project plan defines the what, when, and who questions of system development
including all activities to be performed, the individuals, or resources, who will perform
the activities, and the time required to complete each activity.
E-mail is completely secure.
Laser printers only produce black and white images.
Hospitality and Tourism Management employs approximately 1 million people
worldwide.
page-pf4
ASPs can provide software on a pay per use basis.
An online or banner ad is an ad that appears on a Web site.
An expert system can be used for medical diagnosis by giving symptoms and trying to
determine what is wrong.
page-pf5
Project managers use database management systems for building requirements, budgets,
and schedules for projects.
A CPU uses more power when running at higher speeds.
Random access memory is a temporary holding space for data and software.
Information technology is any computer-based tool that people use to work with
information and support the information and information-processing needs of an
organization.
page-pf6
Electronic privacy cannot be invaded.
A virtual private network establishes a dedicated network connection between two ore
more networks.
CRM systems automatically track all of the steps in the sales process.
page-pf7
Prototyping helps determine technical feasibility.
Retailers are planning to use RFID in their supply chain management.
Infrared communications can penetrate walls, buildings, and other structures.
Biotechnology encourages atoms to "self-assemble" into new forms.
page-pf8
Technology cannot improve the human condition.
A critical success factor is a factor critical to your organization's success.
Hackers are generally very knowledgeable computer users who use their knowledge to
invade other people's computers.
Amazon.com is an example of a click-and-order or pure play.
page-pf9
A CRM system only interfaces with a front office system to better serve the customer.
A supply chain management system automates inventory tracking but still requires that
information be transferred manually.
Backup and recovery facilities are included in the data administration subsystem.
page-pfa
Defining the project plan is part of the analysis phase.
A cookie a small file created by a Web page and stored on your computer.
Privacy is the right to be left alone when you want to be, to have control over your own
personal possessions, and not to be observed without your consent.
People rarely do anything unethical involving computers.
page-pfb
A CAVE (cave automatic virtual environment) is a special 3-D virtual reality room that
can display images of other people and objects located in other CAVEs all over the
world.
Which of the following technologies will affect push technology the most?
A.Systems software, operating systems, and utility tools
B.Telephone technology
C.I-phones
D.Database and Data warehouses
Which of the following greatly accelerates the collecting of business requirements and
the development of the software?
A.End-user involvement
B.Outsourcing
C.Insourcing
D.Requirements definition
page-pfc
Production and operations management is a specialization that deals with all but which
of the following?
A.Production
B.Manufacturing
C.Selling
D.Transportation
If you were developing a new information system using selfsourcing, what should be a
key consideration of yours?
A.Identifying companies that can support your development and maintenance needs
B.Supporting the changing requirements and needs of others who uses the new
information system
C.Ensuring that the requirements document is complete and extensive enough to
educate the development team properly
D.Ensuring that the development team meets the critical success factors identified in the
SDLC
page-pfd
Which of the following is considered a technical architecture for the proposed system?
A.A description of the needed hardware, software, and telecommunications equipment
B.A drawing or graphical representation of the proposed system including proposed
screens, reports, software, and databases
C.A logical model that defines the structure of needed modules and sub modules and
their interrelationships
D.The needed data structures, definitions and business rules
If you were working for a large pharmaceutical company and building a sales report on
current prescription writing habits of doctors, what type of information repository
would you be most likely working with?
A.Data warehouse
B.Operational database
C.Transactional database
D.Data mart
Which type of scanner is used to capture images, photos, text and other forms of
artwork from paper or other like material?
page-pfe
A.Image scanner
B.Video and text scanner
C.Optical scanner
D.Graphic scanner
What happens to a CD when you burn images, videos, and music to it?
A.Information about the software and hardware that you used are stored on the CD
B.Personal and identifying information about you is stored on the CD
C.Cookies that are stored on your computer are also transferred to your CD
D.A distinct signature from the CD drive is left on your CD
Which of the following is gained from business intelligence (BI)?
A.Knowledge
B.Information
C.Competitive data
D.Comparative analysis
page-pff
Which of the following would not be investigated when a business was analyzing
competitive pressures?
A.Buyer and supplier power
B.Internal operational capacity
C.Threat of substitute products or services and of new entrants
D.Rivalry among existing competitors
If you were to allow only a select group of people to use the new system so that you
could determine if it was working correctly, what type of implementation method would
you be following?
A.Pilot implementation
B.Parallel implementation
C.Plunge implementation
D.Phase implementation
page-pf10
Which of the following statements is true with regards to switching costs?
A.Switching costs are the financial costs of switching to a new product or service
B.Switching costs are the financial and non-financial costs of switching to a new
product or service
C.Switching costs are start-up costs incurred when replacing old technology
D.Switching costs are the financial costs incurred by the supplier to ensure that their
current systems are operationally sound
Which type of environment allows you to go beyond operational database systems to
support business intelligence?
A.Transactional systems
B.Application generators
C.Relational DBMS
D.Data warehouses
Which database management subsystem helps you create and maintain the data
dictionary and define the structure of the files in a database?
A.Data definition subsystem
B.Data manipulation subsystem
page-pf11
C.Application generator
D.Data administration subsystem
What type of intelligence is based on the collective behavior of groups of simple agents
and how these groups work to solve complex and mutual problems?
A.Group intelligence
B.Social intelligence
C.Swarm intelligence
D.Crowd behavior
Which computer offers both a horizontal and vertical system box?
A.Mainframe computer
B.Minicomputer
C.Supercomputer
D.Desktop computer
page-pf12
IT supports CRM with front and back office systems. Which statement describes a front
office system?
A.The notepad that salespeople use to record customer information while at the
customer site
B.The computer interfaces that collect customers' information and sends it to the main
information system
C.The computer systems that process customer orders and other customer information
D.The systems that interact with the supply chain management systems
What type of technology captures spoken words and forms them into sentences that a
computer can understand and react to?
A.Language translators
B.Automatic speech recognition
C.Interpreters
D.Dialogue decipher
Using a check digit to verify that the data has not been altered is ensuring _____ of the
page-pf13
data.
Which of the following is not a common job title in finance?
A.Stock broker
B.Portfolio manager
C.Security analyst
D.Database manager
Who uses hacking code on Web sites to click-and-point their way into systems to cause
damage or spread viruses?
A.White-hat hacker
B.Black-hat hacker
C.Hacktivists
D.Script kiddies
page-pf14
What is a distribution chain?
A.The path a product follows once it leaves the warehouse
B.The business partners involved with supplying and distributing products or services
C.The path a product or service follows from the originator of it to the consumer
D.The distribution list for e-communications established for any product or service
Which of the following is a type of input device?
A.Keyboard
B.POS
C.Optical Mark Reader
D.All of the above
What is the difference between extreme programming (XP) and the agile methodology
to software development?
A.XP focuses on component-base development; the agile methodology focuses on the
RAD
B.XP uses prototyping, the agile methodology does not
page-pf15
C.Agile methodology involves users much more than XP
D.XP focuses more on team coding; the agile methodology focuses on limiting project
scope
What is the name of the new anti-Spam bill?
A.No-Spam
B.CAN-Spam
C.Spam-Away
D.Stop Spam
Which term is used for a three-dimensional computer simulation in which you actively
and physically participate?
A.3-D Modeling
B.Multi-state blending
C.Virtual Reality
D.Holosuite
page-pf16
What is objective information?
A.Information gathered from an expert
B.External information
C.Raw data
D.Quantifiable information
In what phase of the SDLC is the technical architecture for the proposed system
defined?
A.Planning
B.Design
C.Analysis
D.Development
Which of the following protects expressions of ideas, literary and dramatic works,
musical and theatrical compositions, and works of art?
page-pf17
A.Intellectual property
B.Pirating laws
C.Fair Use Doctrine
D.Copyright
According to the SOA philosophy, what is the most important organizational resource?
A.Data warehouses
B.Computer applications
C.Information
D.People
What two primary and distinct parts are contained in a CPU?
A.Control unit and logic unit
B.RAM and control unit
C.Cache and logic unit
D.Arithmetic logic unit and control unit
page-pf18
_____ has one central wire surrounded by insulation, a metallic shield, and a final case
of insulating material.
Views are located within the _____ subsystem of the DBMS.
The chief _____ officer is responsible for the technical aspects of ensuring the security
of information.
A(n) _____ is an input device that captures and records the shape and movement of
your hand and fingers and the strength of your hand and finger movements.
page-pf19
A(n) _____ is a network device that connects computers and passes messages by
repeating each computer's transmissions only to the intended recipient, not to all the
connected computers.
_____ maintain statistics regarding how the DBMS engine physically accesses
information.
Many companies, such as banks, maintain copies of your documents for many years.
A(n) _____ system could be used to track these.
_____ is the process of reinstalling the backup information in the event the information
was lost.
page-pf1a
A(n) _____ decision involves processing a certain kind of information in a specified
way so that you will always get the right answer.
_____ software helps you communicate with other people.
A(n) _____ is a small record deposited on your hard disk by a Web site containing
information about you and your Web activities.
_____ are people who grew up during the digital revolution.
page-pf1b
A(n) _____ simply means that a company rents space and telecommunications
equipment from another company, or a collocation vendor.
A(n) _____ combines software (to provide for a secure transaction) and payment
information.
Electronic Data Interchange is direct computer-to-computer transfer of _____
information contained in standard business documents.
page-pf1c
Many accounting systems require _____ reports or structural changes; thus, accountants
need to be familiar with database management.
A network that covers a metropolitan area is called a(n) _____.
_____ is commerce, but it is commerce accelerated and enhanced by IT.
_____ are databases that support OLTP.
page-pf1d
_____ is a total business objective which encompasses many different aspects of a
business including software, hardware, services, support, and strategic business goals.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.