MPCS 15613

subject Type Homework Help
subject Pages 23
subject Words 2552
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Outsourcing is the delegation of specific work to a third party for a specified length of
time, at a specified cost, and at a specified level of service.
Ethical decisions are always easy and straightforward.
Digital wallets are plastic cards the size of a credit card which feature an embedded
chip capable of storing digital information.
A broadband connection is a high-capacity telecommunications pipeline capable of
providing high-speed Internet service.
page-pf2
Web services are arrangements made between e-commerce sites that direct users from
one site to the other.
Customer relationship management should be completely based upon softwarethere are
no other components to consider.
Software is the set of instructions that your hardware executes to carry out a specific
task.
page-pf3
Intelligent agents are used in OLAP and in online searching.
The chief privacy officer is responsible for ensuring that only the people who should
see information have access to that information.
Pirated software is the unauthorized use, duplication, distribution or sale of copyrighted
software.
The implementation phase of decision making involves carrying out the chosen
solution, monitoring the results, and making adjustments as necessary.
page-pf4
Information exhibits high quality if there is a large amount of it.
The current generation of ERP often includes CRM and SCM.
Computers on a switched network are more efficient than a shared network because
each computer only receives messages meant for them.
page-pf5
Nanotechnology is a discipline that seeks to control matter at the atomic and subatomic
levels for the purpose of building devices on the same scale.
Disaster recovery plans specify how an IT system or information can be recovered in
the event of a catastrophe.
An intelligent agent is software that assists you, or acts on your behalf, in performing
repetitive computer-related tasks.
The IT architecture is the blueprint for translating a business strategy into a plan.
page-pf6
An Ethernet card uses a standard telephone jack to connect the computer to a network.
End users should develop mission critical applications so they are available sooner.
One of Michael Porter's three approaches or strategies to beating the competition in any
industry is mass marketing.
page-pf7
A U.S. bank doing onshore outsourcing of some of its work is using another U.S.
company.
Selection as it refers to evolution means giving preference to better outcomes.
IT has become an indispensable and integral tool for any business; every business
decision affects IT and every IT decision impacts the business.
A network interface card (NIC) is an expansion card or a PC Card that connects your
computer to a network and provides the doorway for information to flow in and out.
page-pf8
Mobility refers to how easy it is for you to carry around your technology.
In Hospitality and Tourism Management, a director of room operations is responsible
for setting rates, restrictions, and selling strategies for hotel rooms and for managing
room inventory.
Biochips can be used with GPS to find lost animals.
page-pf9
A genetic algorithm follows a trial and error approach.
Feature analysis occurs when the system matches your spoken phonemes to a phoneme
sequence stored in an acoustic model database.
Viral marketing uses viruses transmitted via e-mail to advertise products.
Biosytems is the study of ecosystems and the application of the results to human
behavior.
page-pfa
The distribution chain is simply the path followed from the distributor of a product or
service to the end consumer.
A repeater is a device that receives a radio signal, strengthens it, and sends it on.
IWave uses a computer-connected camera to measure the saccadic motion of the eyes of
someone while watching a TV ad.
A nanonite is a Web site that allows you to create, change, or eliminate content from
page-pfb
their site.
Agile methodology is for use with large projects with many features.
Which of the following is not a phising technique?
A.Installing cookies on your computer
B.Sending fraudulent emails
C.Creating fraudulent Web sites
D.Hijacking and rerouting Web traffic
Having access to information that spans a period of time is an example of the _____
quality attribute of information.
page-pfc
A.Validity
B.Relevance
C.Timeliness
D.Period data
What is software?
A.The physical devices and the set of instructions that your computer executes
B.The set of instructions that your hardware executes to carry out specific tasks
C.The standards followed by the computer industry to ensure that your physical devices
can communicate with each other
D.The programming language used by your computer system
What is the difference between an expert system and a genetic algorithm?
A.An expert system uses a genetic algorithm to assist in understanding the problem
B.An expert system provides more accurate solutions that a genetic algorithm
C.A genetic algorithm provides you with the best solution; an expert system provides
you with many solutions along with the confidence level for each possible solution
D.Expert systems belong in the category of artificial intelligence; genetic algorithms
page-pfd
work with large database and warehouse systems that are not considered artificially
intelligent
Data warehouses always uses 2D tables to store data.
Which type of computer is a pen-based computer that provides you with portability and
the ability to use word processing, spreadsheets, database management, and other user
applications?
A.Laptop
B.Desktop
C.Tablet PC
D.Super computer
If you were working with an IT development team to design and create an information
page-pfe
system that had fuzzy requirements, what activities should you complete in the
requirements phase?
A.Design the system model
B.Develop the technical architecture
C.Develop a prototype
D.Each of these activities should be completed in this phase
Hospitality and tourism management is challenging for which of the following reasons?
A.Heterogeneity of customers
B.Simultaneous production and consumption of services
C.Dependence on labor
D.All of these issues cause challenges for this area
Which of the following is not a type of malware?
A.Encryption
B.Worm
C.Virus
D.Spyware
page-pff
In what type of tiered infrastructure do all the computing resources sit on one
computer?
A.1-tier
B.2-tier
C.3-tier
D.4-tier
Which computer is the most popular choice for personal computing needs?
A.PDA
B.Notebook computer
C.Desktop computer
D.Touch-sensitive computer
page-pf10
A password is an example of which form of biometric security?
A.What you have
B.What you know
C.Who you are
D.What you can do
If you wanted your children to play games with others who had the same gaming device
but you wanted to ensure that people outside their play area could not tap into the game,
what wireless device would you need?
A.WiFi
B.Bluetooth
C.Bluetooth or WiFi
D.RFID
Which type of e-commerce occurs when a business sells products or services to
customers who are primarily other businesses?
A.B2C
B.B2
C.E-BB
page-pf11
D.B2B
Which of the following is a characteristic of a proposed system that is essential to the
success of your organization?
A.Quality metric
B.Vital requirement
C.Critical success factor
D.Essential design feature
If you were able to provide a product or service in a way that customers value more
than what the competition is able to do, then you are creating a _____.
A.Treasure chest
B.Competitive advantage
C.Market position
D.Niche
page-pf12
Enacted in 1996, _____ requires that the health care industry formulate and implement
the first regulations to keep patient information confidential.
Which type of network covers a large geographic distance, such as a state, a country, or
even the entire world?
A.WAN
B.MAN
C.VPN
D.LAN
What does "click-and-mortar" refer to?
A.An organization that has a presence in the physical world and the virtual world
B.The act of purchasing products online and then having them delivered to you
C.Online Web sites such as eBay or Amazon.com
D.Organizations that sell products and services through the Internet
page-pf13
Which of the following systems can perform sales lead tracking, contact management,
and market analysis?
A.Sales force automation systems (SFA)
B.Customer relationship management systems (CRM)
C.Transaction processing systems (TPS)
D.Collaborative information systems (CIS)
What area of IT knowledge is needed by accountants to secure the assets of a
company's information?
A.Web
B.Network security
C.Spreadsheets
D.Accounting information systems
page-pf14
What type of computer virus finds your email contacts and sends itself to those
accounts?
A.Worms
B.Script kiddies
C.Denial-of-service attack
D.Online blackmail
The grade you earn for a specific course is an example of _____.
A.Data
B.Information
C.Knowledge
D.Business intelligence
What term describes a network in which one or more computers are servers and provide
services to other computers?
A.Client/server network
B.Peer-to-peer
C.Internet
page-pf15
D.Star network
The complexity of SCM is supported by technology. Which intricate SCM activity
needs strong monitoring by SCM systems?
A.Multi-channel service delivery
B.Customer tracking
C.Inter-modal transportation
D.Sales force tracking
Which type of input device captures images, photos, and artwork that already exist on
paper?
A.Touch screen
B.Optical mark recognition
C.Scanner
D.Media scan
page-pf16
What type of network threat causes a network failure which makes an e-commerce Web
site inaccessible?
A.Confidentiality
B.Authenticity
C.Integrity
D.Availability
What type of IT system is used by managers to analyze natural resources?
A.Geographical information systems
B.Enterprise resource planning
C.Database management
D.Internet and web portals
Which type of high-speed Internet connection works similarly to traditional modems
and allows you to use the telephone at the same time you're using the Internet?
A.Dial-up
B.Satellite modem
page-pf17
C.DSL
D.Router
What discipline needs a strong understanding of urban economics, consumer behavior,
and finance and regulatory issues?
A.Marketing
B.Finance
C.Accounting
D.Real estate and construction management
What type of computer tool allows you to send information to and receive it from
another person or location?
A.Input device
B.Output device
C.Storage device
D.Telecommunications device
page-pf18
Which of the following statements best describes a technology-literate knowledge
worker?
A.A computer savvy worker
B.A content expert who is comfortable with a computer
C.A worker who knows how and when to apply technology
D.A worker who is knowledgeable about emerging technology
What percentage of today's Fortune 500 companies are technology companies?
A.5%
B.10%
C.25%
D.50%
If you were "tweaking" your technology solution so that it worked more efficiently than
its original form, what decision making phase would you be in?
page-pf19
A.Implementation
B.Maintenance
C.Choice
D.Continuation
_____ are the principles and standards that guide our behavior toward other people.
_____ is the set of marketing tools that the firm uses to pursue its marketing objectives
in the target market.
A(n) _____ allows you to specify the logical organization for a database and access and
use the information within a database.
page-pf1a
PayPal is an example of a(n) _____.
A _____ infrastructure involves sharing the information and application of all locations
via a network.
A(n) _____ is stored on your computer.
The _____ involves determining a solid plan for developing your information system.
page-pf1b
The _____ phase of the SDLC involves monitoring an information system to be sure it
meets business needs.
The _____ phase of decision making finds or recognizes problems, needs, or
opportunities.
_____ permits you to use multiple software packages at the same time.
_____ is a session in which end users and IT specialists meet to define and review
business requirements.
page-pf1c
_____ is used to prove the technical feasibility of a proposed system.
_____ software helps you maintain financial records.
_____ products are best suited for B2C e-commerce.
_____ are IT-enabled systems that facilitate learning.
page-pf1d

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.