MPCS 56066

subject Type Homework Help
subject Pages 21
subject Words 2496
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Flash memory devices are usually small enough to fit on your key ring.
Software such as Microsoft Word, Excel, PowerPoint, or Access are all considered
examples of utility software.
E-commerce is commerce, but it is commerce accelerated and enhanced by IT, in
particular the Internet
If a salesperson attempts to order merchandise for a customer who should but does not
exist in the customer database, the database will typically generate an error message.
This message indicates that an integrity constraint has been violated.
page-pf2
A recurring decision is one that you make infrequently and you may even have different
criteria for determining the best solution each time.
As the use of information technology increases in business the number of knowledge
workers will decrease.
Query-by-example (QBE) tools help you graphically design the answer to a question.
page-pf3
Buying U.S. savings bonds online is an example of a G2G.
A database actually consists of three parts: information, the logical structure of that
information, and tables.
A hot site is a separate facility that does not have any computer equipment but is a place
where the employees can move after the disaster.
Data warehouses support transaction processing.
page-pf4
Open source information is software for which the code is available and free to the
customer.
During the development phase, you build a technical blueprint of how the proposed
system will work.
Artificial intelligence (AI) is the science of making humans imitate computer thinking
and behavior.
page-pf5
Data is information that has been processed in some way.
The disaster recovery cost curve charts (1) the cost to your organization of the
unavailability of information and technology and (2) the cost to your organization of
recovering from a disaster over time.
Database management is an important skill for Hospitality and Tourism Management
since most hospitality applications are based on databases.
An e-collaboration system supports integrated collaborative work environments,
knowledge management, social networking, e-learning, and open-source collaboration.
page-pf6
Infrared is a wireless communications medium that uses light waves to transmit signals
or information.
An image scanner is used to capture human physical attributes.
VoIP can only be done over a cable Internet connection.
page-pf7
In a virtual reality system, you make use of special input and output devices that
capture your psychological movements and send psychological responses back to you.
Software-as-a-service is an easy way to get temporary software when you are on the
road.
A genetic algorithm is a neural network that mimics the evolutionary,
survival-of-the-fittest process to generate increasingly better solutions to a problem.
Parallel implementation of a new system is the least expensive and the most dangerous
method of testing.
page-pf8
ERP systems provide integration among operations, sales, human resources, and
financial areas.
A decision support system (DSS) is a highly flexible and interactive IT system that is
designed to support decision making when the problem is not structured.
An e-commerce Web site is a silver bullet and can save most businesses from
bankruptcy or failure.
page-pf9
A wireless access point is a device that allows computers to access a wired network
using radio waves.
Online analytical processing (OLAP) is the gathering of input information, processing
that information, and updating existing information to reflect the gathered and
processed information.
One way you can sometimes separate legitimate e-mails from phishing e-mails is to
examine the addresses closely.
The U.S. government sharing import and export requirements with Canada would be an
example of G2B.
page-pfa
A primary key must consist of one and only one field.
The great digital divide is marked by the electronic movement of all types of
information, not limited to numbers, words, graphs, and photos but including
physiological information such as voice recognition and synthesization, biometrics
(your retina scan and breath for example), and 3-D holograms.
If your Internet business helped customers find the right product for their needs and
then suggested other products based on the information you've gathered on this
customer and similar customers, what intelligent agent would you be using?
A.Data-mining agent
B.User agent
C.Predictive agent
D.Shopping bot
page-pfb
Can your wireless access point connect to a network the same way wired computers do?
A.Yes, it connects with a cable to the hub or switch
B.Yes, as long as you have an Ethernet card
C.No, not unless the network supports dedicated high speed lines such as T1 or DS3
D.No, it connects through wireless media
Which of the following do viruses harm?
A.Your keyboard
B.Your monitor
C.Your processor
D.Viruses do not harm hardware
page-pfc
Why do businesses store personal information on employees?
A.Avoid lawsuits
B.Ensure appropriate conduct
C.Compliance with laws
D.To avoid lawsuits, ensure proper conduct, and comply with laws
A key consideration in today's business environment is ______ or the assigning of
responsibility for ensuring the quality of information.
A.Accountability
B.Information ownership
C.Data security
D.Data management and control
Which of the following is an optimizing system; one that continues to process your
information until it discovers the best solution for your problem?
A.Expert system
B.Intelligent database management system (I-DBMS)
C.Genetic algorithm
page-pfd
D.Artificial intelligent synthesis system (AISS)
Which of the following is not an advantage to prototyping?
A.Prototyping encourages active user participation
B.Prototyping helps resolve discrepancies among users
C.Prototyping gives users the final system
D.Prototyping helps determine technical feasibility
What uses a microchip in a product label to store information that is transmitted by a
reader using radio waves?
A.Radio Frequency identification
B.Implant chips
C.Biochip
D.UPC
page-pfe
If your task was to determine if your clothing store demonstrated efficiency, which of
the following activities would you measure?
A.The number of times a customer wants a particular item that is not in inventory
B.The number of times a salesperson can not answer customer questions correctly
C.The number of customers who visit your store
D.Each of these activities measure efficiency
What is the term pinned on today's young people who have grown up with computers,
cell phones, iPods, and other technology devices?
A.Digitizers
B.Millenniums
C.Echo boomers
D.Screenagers
If you were on the Dell site purchasing a computer and Dell provided you a link to
MacAfee site so that you can easily buy virus protection software, MacAfee would be
considered a(n) _____ program.
A.Affiliate
page-pff
B.Click-through
C.Conversion
D.Pop-under
In which SDLC phase do you build the platform for the proposed information system
along with the database and the programs?
A.Development
B.Implementation
C.Design
D.Transformation
Which type of e-commerce occurs when an individual sells products and services to
another individual?
A.C2C
B.C2
C.E-CC
D.II
page-pf10
Which of the following is not a current application of RFID technology?
A.Tracking medical claims
B.Anti-theft car keys
C.Passports
D.Supply chain
Before you think about technological solutions to business problems or opportunities
enhanced by technology, what should you have?
A.A strong understanding of your target customers
B.An infrastructure that can support technological enhancements
C.Financial backing
D.An understanding of customers, supporting infrastructure, and financial backing
Which type of Internet connection is limited to the distance between you and your
page-pf11
phone company; generally about 3 miles?
A.Dial-up
B.DSL
C.Cable
D.Satellite
If you the end user participated on a team responsible for defining a prototype for a
proposed application, what phase in the SDLC would you be working in?
A.Analysis
B.Design
C.Planning
D.Development
Which of the following models describes an environment where the computer receiving
information from a server shares processing responsibilities with the server?
A.Distributed logic model
B.Remote data management model
C.Distributed presentation model
page-pf12
D.Distributed data management model
What is the process of continuously measuring system results and comparing those
results to values a system seeks to attain?
A.Critical milestones
B.Benchmarking
C.Quality testing
D.Criterion checking
Which of the following functions plans for, oversees the development of, and monitors
the information resources of an organization?
A.Data administration
B.Strategic management
C.Information resource planning
D.Operational planning
page-pf13
What is the title for the person responsible for the technical aspects of ensuring the
security of information such as the development and use of firewalls, intranets,
extranets, and anti-virus software?
A.CTO (chief technology officer)
B.CIO (chief information officer)
C.CPO (chief privacy officer)
D.CSO (chief security officer)
What is the use of physiological characteristics (e.g., fingerprints) to provide
identification?
A.Biometrics
B.Forensics
C.Feature analysis
D.Bioforensics
What device allows a computer to use radio waves to access a network?
A.Wireless access point (WAP)
page-pf14
B.Cat 5
C.Optical fiber
D.DSL modem
Which type of software is used to create letters, papers, or other basic documents?
A.Personal productivity
B.Spreadsheet
C.Word processing
D.Database management system
There are basic principles that apply to a network. Which of the following is not one of
these principles?
A.Each computer on a network must have a network interface
B.There is some sort of communication media on the network that connect to all the
hardware devices
C.Each computer must have software that supports the movement of information in and
out of the computer
D.Each computer is able to have different conversations at the same time with other
computers on the network
page-pf15
_____ are slice-and-dice techniques that allow you to view multidimensional
information from different perspectives.
If a business sends information to its partners, suppliers, or distributors, what type of
information flow is this considered?
A.Horizontal
B.Outward/inward
C.Downward
D.Upward
Which of the following is a common job title in Hospitality and Tourism Management?
A.Revenue Manager
B.Director of Room Operations
page-pf16
C.General Manager
D.All of these are common job titles
What type of equipment can be used in a virtual reality environment?
A.Glove
B.Glove and Headset
C.Walker
D.Glove, Headset, and Walker
What mechanism is used for sending money from your checking or savings account to
another person or organization?
A.Electronic check
B.Cybermediary
C.Cyber money
D.E-Payment
page-pf17
Which term below is not associated with a monitor?
A.Resolution of a screen
B.Dot pitch
C.Pixel
D.Bus
Data-mining agents are used to shift through a _____ looking for _____.
Accountants are responsible for the security of assets of the company, thus they should
be familiar with _____ to guard the company's information.
page-pf18
_____ is a discipline that seeks to control matter at the atomic and subatomic levels for
the purpose of building devices on the same scale.
Restricting payroll information to only authorized payroll employees is ensuring _____
of the information.
_____ is the legal protection afforded an expression of an idea, such as a song, video
game, and some types of proprietary documents.
_____ programming methodology breaks a project into tiny phases.
page-pf19
Grocery stores and other similar businesses use _____ scanners during the check-out
process, while other Point-of-Sale systems use _____ scanners.
The _____ infrastructure is basically client/server.
_____ are Internet-based companies that make it easy for one person to pay another
person over the Internet.
Finding, reaching, and establishing a relationship with customers is generally termed
_____.
page-pf1a
Report generators are contained within the _____ of the DBMS.
_____ software provides additional functionality to your operating system.
In _____ accounting, the accountant serves as an outside advisor to businesses.
A hacker who has been stealing credit card number would be considered a _____
hacker.
page-pf1b
_____ is the gathering of input information, processing that information, and updating
existing information to reflect the gathered and processed information.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.