CS 71912

subject Type Homework Help
subject Pages 19
subject Words 2306
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Facial recognition software can be integrated within vehicles to help users navigate.
A neural network is an artificial intelligence system that is capable of finding and
differentiating patterns.
Denial-of-service means not being able to log on because of an invalid password.
An intelligent agent utilizes artificial intelligence to "discover" information in data
warehouses.
page-pf2
QBE allows you to query by pointing, clicking, and dragging, unlike SQL.
Project managers define and develop project plans and track the plans to ensure that all
milestones are completed on time.
A byte is the smallest unit of information that your computer can process.
Information is raw facts that describe a particular phenomenon.
page-pf3
Since the IT infrastructure rarely changes it only needs to be reviewed about every 5
years.
Posting a customer payment would be an example of a business process.
The chief technology officer is responsible for overseeing both the underlying IT
infrastructure within an organization and the user-facing technologies.
page-pf4
Sign-off occurs when users and IT specialists meet to define or review the business
requirements for the system.
Horizontal e-marketing is electronic integration from the federal to the state
governments.
Data-mining tools support the concept of OLTP in manipulating information to support
decisions.
Both the front office and the back office systems send customer information to the
corporate database.
page-pf5
Information granularity refers to extent of detail within the information.
Applications software handles tasks specific to technology management and
coordinates the interaction of all technology devices.
A holographic storage device will store information on a storage medium of 3-D
crystal-like objects.
page-pf6
A buyer agent is an intelligent agent on a Web site that helps the customer find products
and services.
Uninstaller software is utility software that you can use to remove software from your
hard disk that you no longer want.
ASCII is an abbreviation for the American Standard Convention for Intelligent
Interchange.
Hardware consists of the instructions executed by the computer to complete a specific
task.
page-pf7
In the F2b2C model, the intermediary business is only involved in the distribution of
the purchase.
A U.S. media company is paying a Canadian company to do its help desk support. This
would be an example of offshore outsourcing.
An integrated e-marketplace brings together buyers and sellers from multiple industries,
often for direct materials.
page-pf8
Which of the following communication mediums is a type of radio transmission?
A.Cat 3
B.Optical fiber
C.Infrared
D.Microwave
For a moment, imagine yourself visiting your local florist to order flowers for a party
you were preparing for. The florist, however, did not have the type of flower
arrangement you hoped for but the florist was able to immediately find, order and
deliver this arrangement directly to your home from their supplier. What kind of
relationship does this represent?
A.An information partnership
B.A collaborative business
C.Dynamic communication
D.Customer sharing
What type of Internet company provides pay-per-use software?
A.Software leasing
B.Software developers
page-pf9
C.Software-as-a-service (Saas)
D.Application service provider (ASP)
If you were working in your kitchen and wanted to send information from the laptop
computer that you were currently working on to your desktop computer located in the
study, what wireless device would you need?
A.RFID
B.Bluetooth
C.WiFi or Bluetooth
D.Microwave
Which IT tool allows the financial professional to identify and measure the risk inherent
in a project?
A.Statistical packages
B.Database management
C.Spreadsheets
D.Web browsers
page-pfa
Which systems are typically used to support customers or sales?
A.Back office systems
B.Front office systems
C.Side office systems
D.Information sales systems
A virtual private network uses _____ to establish a secure channel for transmitting data.
The SDLC contains 7 phases. Which phase builds a technical blueprint of how the
proposed system will work?
A.Design
B.Planning
C.Analysis
D.Development
page-pfb
What is the term used to describe the sharing of information regardless of title or
department.
A.Open source
B.Data mining
C.Information sharing
D.Data distribution
How can you block a business' attempt to store information about your Web activities?
A.Avoid the Internet and purchasing products and services on it
B.Block cookies
C.Install and use SpamWare
D.Install and use SpyWare and SpamWare
Which of the following statement is true regarding an SOA philosophy about the end
page-pfc
user of IT?
A.The end user should be thought of in the same way as a customer
B.Because the organization's future depends on the customer, the end user's needs
should come after the customer's needs
C.Security is paramount and, because of this, access to information by the end user
should be limited to a specific geographical area
D.Both prioritizing customer needs and limiting end user's access to information
systems are both philosophies of SOA
To ensure that the newly developed information systems functions properly, what
should you create that lists the expected steps that the system should perform and
expected results from these steps?
A.Requirements document
B.Test conditions
C.Design specifications
D.Logical design specification
What type of computer tool enters information and commands into the computer?
A.Output device
B.Input device
page-pfd
C.Storage device
D.Telecommunications device
Which of the following is not a form of optical storage?
A.CD-ROM
B.CD-R
C.DVD
D.SD card
In the world of e-commerce, your business should be able to distinguish between which
of the following?
A.Mobile computing and traditional, hard communication devices
B.Web based computing and database management
C.Alternative operating environments such as Mac OS and Windows
D.End consumers and other businesses
page-pfe
Which type of storage device will store information on a storage medium of 3-D
crystal-like objects?
A.Holographic storage device
B.Biochip
C.Multi-state
D.CAVE
Successful business must always ____ themselves; constantly seeking to evolve and
build new and better businesses.
A.Transform
B.Reconstruct
C.Alter
D.Reiterate
What is external information?
page-pff
A.Information about the environment
B.Outsourced information
C.Information purchased from a consultant
D.Data obtained from a competitor
Which of the following uses software to establish a secure channel on the Internet for
transmitting data?
A.Public network
B.Private network
C.VAN
D.VPN
What term refers to your ability to download audio and video files into a handheld,
portable device?
A.RSS feed
B.I-Listen
C.EBroadcasting
D.Podcasting
page-pf10
If you were to create, read, or respond to a blog on Facebook, you would be working
with which of the following applications?
A.Knowledge management
B.Social networking site
C.E-Communication
D.E-Community
Which type of constraint ensures the quality of information in a relational database?
A.Environmental
B.Business constraint
C.Integrity constraint
D.Production constraint
page-pf11
What is the major difference between B2B and B2C e-commerce?
A.Customers interact freely in a B2B marketplace; they do not in a B2C marketplace
B.Consumers are expected to surf the Web and purchase items from multiple Web sites;
in a B2B marketplace long time relationships are established between the consumer and
its business partner in the B2C market
C.Interaction between consumers and businesses are direct in the B2B market; they are
indirect in the B2C market
D.The B2B marketplace does not involve consumers, just business partners; the B2C
marketplace involves consumers
According to the authors, which information technology will change the face of
business with respect to finding and making new contacts and facilitating learning?
A.Wiki
B.V-learning and e-communication
C.Social networking and e-learning
D.Webcasting and podcasting
What type of network security is concerned ensuring that data has not be altered in any
way during transmission?
A.Confidentiality
page-pf12
B.Authenticity
C.Integrity
D.Availability
If one of your responsibilities within an organization was to determine who had access
to employee's social security ID, your title would probably be _____.
A.CIO (chief information officer)
B.CTO (chief technology officer)
C.CSO (chief security officer)
D.CPO (chief privacy officer)
Which of the following IT areas is prevalent in accounting?
A.Multimedia systems
B.Web development
C.Statistical analysis
D.Accounting information systems
page-pf13
What type of analysis evaluates IT assets, their importance to the organization, and their
susceptibility to threats?
A.Impact analysis
B.Threat analysis
C.Impact scenario analysis
D.Requirements recovery analysis
If you allowed, and quickly reacted to, users requesting changes to software
requirements, what type of software development methodology would you be
following?
A.Evolutionary prototyping
B.Waterfall
C.Iteration
D.Extreme programming
If you were able to quickly pull information from student records with course records to
page-pf14
build students' schedules, you would be using a _____ tool.
A.Data administration
B.Query-by-example
C.Data definition
D.Data manipulation
One advantage of a(n) _____ over a UPC is it can be tied to a date of expiration.
A(n) _____ examines information passing through switches, hubs, or routers.
_____ e-commerce is relatively small compared to B2B e-commerce.
page-pf15
_____ is intangible creative work that is embodied in physical form.
A(n) _____ must be installed in each computer on the network.
During the _____ you build a technical blue print of how the proposed system will
work.
_____ is a high-speed Internet connection using phone lines, which allows you to use
your phone for voice communications at the same time.
page-pf16
_____ are generally very knowledgeable computer users who use their knowledge to
invade other people's computers.
_____ is the delegation of specific work to a third party for a specified length of time, at
a specified cost, and at a specified level of service.
In Hospitality and Tourism Management, a(n) _____ is responsible for setting rates,
restrictions, and selling strategies for hotel rooms and for managing room inventory.
A(n) _____ decision is one that happens repeatedly, and often periodically, whether
weekly, monthly, quarterly, or yearly.
page-pf17
_____ focuses on storing information within a decision support system.
_____ storage devices store information on a many-dimensional surface.
A(n) _____ represents how data is physically stored on a storage device.
A _____ is an extension of a transaction processing system that places technology in the
hands of an organization's customers and allows them to process their own transactions.
page-pf18
A(n) _____ is a technology-enabled microchip implanted into the human body.
_____ permit users to examine the impact of proposed structural changes on a database.
In an organization, _____ plans for, oversees the development of, and monitors the
information resource.
A(n) _____ is a geographic information system (GIS) that displays a particular
geographic area and then overlays content according to the user's desires.
page-pf19
A(n) _____ subsystem is used to create and maintain the data dictionary.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.