CS 49079

subject Type Homework Help
subject Pages 22
subject Words 2571
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
When applying Porter's Five Forces Model you should first analyze the competition that
affects or may affect your business.
Minicomputers are commonly used as calendars and address books. These "mini"
computers are small enough to carry around in your pocket, and use batteries for power.
WiFi is a wireless communication technology that uses red light to send and receive
information.
Before you can establish a wireless network, you must contract with a wireless Internet
service provider for Internet access.
page-pf2
Ethics are the principles and standards that guide our behavior toward other people.
To play a critical role in shaping the future of business, you would need to be in upper
management.
Information is simply data that have a particular meaning within a specific context.
page-pf3
Agent-based modeling involves multiple intelligent agents that can adapt to changing
conditions.
Mainframe computers are designed to facilitate the needs of more people than
minicomputers
Joysticks are commonly used input devices in most business settings.
Performance measures how many ways a single system can be designed to perform
exactly the same function.
page-pf4
Virtual teams work in an integrated collaboration environment (ICE).
The IT architecture is the implementation of the IT infrastructure.
Government accounting involves helping individuals figure out their federal tax returns.
Designing the technical architecture is part of the development phase.
page-pf5
A social networking site is a virtual space that allows people to build and maintain
friendships.
Electronically sharing educational requirements between the state and local government
would be an example of G2G.
A haptic interface adds a sense of smell to virtual reality.
page-pf6
Click-and-mortar organizations have both a physical and electronic presence.
A headset is an input device that captures and records the shape and movement of your
hand and fingers and the strength of your hand and finger movements.
Management information systems deal only with the use of information technology
tools to help people perform tasks related to information processing and management.
A recurring decision is one that happens repeatedly, and often periodically, whether
weekly, monthly, quarterly, or yearly.
page-pf7
Identity theft losses are starting to decrease with the use of emerging technology.
Bluetooth technology provides entirely wireless connections for cell phone and PDA to
a computer.
Phishing is also called carding or brand spoofing.
page-pf8
Adding additional features that were not part of the initial project definition is an
example of scope creep.
A data warehouse is a logical collection of information gathered from many different
operational databases used to create business intelligence that supports business
analysis activities and decision-making tasks.
Coaxial cable (coax) has one central wire surrounded by insulation, a metallic shield,
and a final case of insulating material.
Data marts focus on the entire organization, while data warehouses focus on specific
needs.
page-pf9
Geographic information systems are a type of artificial intelligence.
Disintermediation occurs when the travel agent is bypassed if hotel reservations are
made directly on the Internet.
Spam is unsolicited e-mail that advertises goods and services.
page-pfa
The B2C segment is where the dollar volume of e-commerce has always been widely
expected to be concentrated.
Training held in a classroom and lead by an instructor is workshop training.
Fuzzy logic works like the human brain in that it needs precise facts to process
information.
Commodity-like products are the best to sell when dealing with the B2C e-commerce
segment.
page-pfb
An affiliate program between two e-commerce sites directs viewers from one site to the
other.
If you were working in an environment where each IT system was partitioned into
layers and each layer performed a specific function, what type of infrastructure would
you be using?
A.Distributed
B.Client/server
C.Decentralized
D.Tiered
Should your telecommunications platform enable you to access a network either wired
or wirelessly?
A.It should depend on the application being used
B.It should depend on the level of security needed
page-pfc
C.No, the organization should set policy
D.Yes
What document defines the what, when, and who questions of systems development
including all activities to be performed, the individuals, or resources, who will perform
the activities, and the time required to complete each activity?
A.Requirements
B.Project plan
C.Project milestones
D.Critical success factors
What is the most common type of network interface card (NIC)?
A.WAP
B.Cat 5
C.Broadband router
D.Ethernet card
page-pfd
Your parents grew up prior to the digital society in which we now live. What is the term
for this generation?
A.Generation X
B.Digital immigrants
C.Generation Y
D.Echo boomers
Which of the following is not considered a dominate player in ERP systems?
A.Oracle and PeopleSoft
B.SSA Global
C.Cognos
D.Microsoft
What is a connecting device?
A.A device that allows one person to talk with another person
page-pfe
B.A device that allows you to connect an outside device, like a printer, to a computer
C.A device that supports online dating systems on the internet
D.A device needed by telephones to facilitate IM
Being socially and ethically responsible requires individual accountability and
accountability for which of the following?
A.The evolution of our culture
B.Protecting your organization against the actions of others
C.Forming of technology-laws
D.Technological innovation and usage
Fingerprints are an example of which form of biometric security?
A.What you know
B.Who you are
C.What you have
D.What you can do
page-pff
Your decisions about an ethical dilemma are influenced by practical circumstances.
Which of the following is not considered an influencing circumstance?
A.Consequences
B.Society's opinion
C.Likelihood of effect
D.Time from action
What is the term for raw facts that describe a particular phenomenon?
A.Facts
B.Data
C.Detail
D.Items
Ying Yang wished to upgrade her current home communications system. She wanted to
page-pf10
replace her current Internet, TV, and phone to a fiber optics system. As a buyer, which
force discussed by Porter did Ying need to deal with most?
A.Threat of new entrants
B.Switching costs
C.Entry barrier
D.First-mover
What is a hypercube?
A.A hyper text link stored in a database
B.Data definitions that are linked to other related, but external, attributes or fields
C.Database that is built on Internet technology
D.Multidimensional representation of information
Which type of high-speed circuit is used by businesses for their Internet connection?
A.T1 and DS3
B.Cable
C.Satellite
D.Dish
page-pf11
Which type of technology allows you to wirelessly connect to and use your school's
information technology?
A.Networking applications
B.Operations management tools
C.Mobile computing
D.Laptop applications
A database management system contains five important software components. Which of
the following components allows you to define the structure of a database?
A.Data definition subsystem
B.Data manipulation subsystem
C.Application generator subsystem
D.Data administration subsystem
page-pf12
During analysis, specific activities occur. Which of the following is not one of these
activities?
A.Gather the business requirements
B.Evaluate alternative logical designs for the proposed system
C.Prioritize business requirements
D.Sign-off on the requirements definition document
What does it mean to live in the "digital age"?
A.Payment for goods is made with hard cash
B.Living, working, learning, and playing in a digital world
C.Accessing information over the Internet
D.Being born after 1990
Which of the following IT skills are not recommended for a career in management?
A.Spreadsheets
B.Database management
C.Enterprise resource planning
D.Customer relationship management
page-pf13
Which of the following is not a high-bandwidth telecommunications line capable of
providing high-speed Internet service?
A.DSL
B.Dial-up circuits
C.Cable modems
D.Satellite modems
Which type of e-commerce occurs when an individual sells products and services to a
government entity?
A.C2G
B.E-CG
C.I-CG
D.G2C
page-pf14
What techniques do "phishers" use?
A.Search online database, financial institutions, and archives from MySpace, Facebook,
and other social networking websites
B.Social networking services
C.Pretend to be legitimate businesses
D.Artificial intelligence
What is smack shopping according to Mark McGuire?
A.Online shopping
B.Traditional shopping with online customer support
C.Online shopping with a quick turnaround sale to an auction site
D.Online collaborative shopping by groups of customers
What is a data warehouse?
A.A large hardware environment that supports multiple platforms
B.A logical collection of information gathered from many different operational
databases to create business intelligence
C.An operational database system used to manage and analyze transactional data
page-pf15
D.An accumulation of all operational data stored by large organizations
"The proposed information system must connect 25,000 employees working in Europe,
US, and Africa working in 5 satellite sites" is an example of a _____.
A.Enduring goal
B.Milestone
C.Feature creep
D.Business requirement
Which type of infrastructure has one or more computers that provide services to other
computers?
A.Centralized
B.Decentralized
C.Distributed
D.Client/server
page-pf16
Which data manipulation tool allows you to quickly define the formats of needed
business reports from information stored in a database?
A.Query tools
B.Data administration tools
C.Report generators
D.Application reports
Which of the following systems development techniques allows end users to develop
business applications?
A.Outsourcing
B.Insourcing
C.Netsourcing
D.Selfsourcing
What type of legislation keeps patient information confidential?
A.Fair Use Doctrine
B.Identify Teft, Medical Information, and Assumption Deterrence Act
page-pf17
C.Sarbanes-Oxley Act
D.Health Insurance Portability and Accountability Act
In Hospitality and Tourism Management, which of the following positions would be in
charge of guest service functions in a hotel?
A.Guest service manager
B.Revenue manager
C.Director of room operations
D.Director of human resources
In a data warehouse, which tool would you use to build reports quickly and without
having to write programming code?
A.Application generator
B.Intelligent agents
C.Multidimensional analysis tools
D.Query-and-reporting tools
page-pf18
A distributed infrastructure involves little or no sharing of information systems.
A(n) _____ may rent software to users in the future so that users do not have to
purchase and store software on all devices.
_____ is software you do not want hidden inside software you do want.
A company must complete all steps in a ____________ to complete a business process.
page-pf19
According to your textbook, a(n) _____ permits you to see the contents of a database
file, change the contents, and sort the file.
A(n) _____ is a multidimensional representation of information.
The purpose of building a(n) _____ is to enable sharing of information and expensive
resources.
A(n) _____ can be used to transfer money from one person's account to another.
page-pf1a
_____ is responsible for the more technical and operational aspects of managing the
information contained in organizational databases.
The _____ is a written definition of the project scope and is usually no longer than a
paragraph.
_____ clearly defines the high-level system requirements.
_____ are important for Hospitality and Tourism Management since the industry is fast
paced and information intensive. Without such systems, organizations would have
difficulty analyzing and interpreting information to make informed and timely
decisions.
page-pf1b
A(n) _____ consists of two or more computers connected so that they can communicate
with each other and share information, software, peripheral devices, and/or processing
power.
A(n) _____ is a separate facility that does not include computer equipment but can be
occupied by knowledge workers following a disaster.
_____ and _____ are concerns in deciding to use an ASP.
page-pf1c
_____ is the science of making machines imitate human thinking and behavior.
A(n) _____ is a standardized set of activities that accomplishes a specific task for
instance, processing a customer's order, delivering the customer order, service after the
sale, and so on.
Having information that describes the _____ you are considering is one aspect of the
timeliness of information.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.