MPCS 57971

subject Type Homework Help
subject Pages 23
subject Words 3613
subject Authors Amy Phillips, Paige Baltzan

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A minicomputer is designed to meet the computing needs of several people
simultaneously in a small to medium-size business environment.
True
False
Eprocurement is the business-to-business (B2B) online purchase and sale of supplies
and services.
A dynamic process is continuously changing and provides business solutions to
ever-changing business operations.
page-pf2
Spyware removes any software that employs a user's Internet connection in the
background without the user's knowledge or explicit permission.
A great GIS example, Google earth, combines satellite imagery, geographic data, and
Google's search capabilities to create a virtual globe that users can download to a
computer or mobile device.
Social graphs represent the interconnection of relationships in a social network.
page-pf3
A DBMS uses three primary data models for organizing informationthe hierarchical,
network, and the relational database.
Managerial business processes are semidynamic, semiroutine, monthly business
processes such as resource allocation, sales strategy, or manufacturing process
improvements.
A mainframe computer is designed to meet the computing needs of hundreds of people
in a large business environment. Mainframe computers are a step up in size, power,
capability, and cost from minicomputers.
page-pf4
Operational CRM supports back-office operations and strategic analysis and includes
all systems that do not deal directly with the customers.
An open system contains instructions written by a programmer specifying the actions to
be performed by computer software.
Spyware can remove software that is no longer needed.
True
False
page-pf5
A business catalog defines how a company performs certain aspects of its business and
typically results in either a yes/no or true/false answer.
Traceroute formats include a packet header, packet body containing the original
message, and packet footer.
Two-factor authentication requires the user to provide two means of authentication,
what the user knows (password) and what the user has (security token).
page-pf6
Businesses rarely need to update business strategies as the business environment
remains relatively stable.
Interactive voice response automatically dials outbound calls and forwards answered
calls to an available agent.
Social media monitoring is the process of monitoring and responding to what is being
said about a company, individual, product, or brand.
page-pf7
Information redundancy is the duplication of data, or the storage of the same data in
multiple places.
Consistent information asks if there is a value missing from the information.
The project requirements document defines the specifications for product/output of the
project and is key for managing expectations, controlling scope, and completing other
planning efforts.
page-pf8
Wired equivalent privacy (WEP) is a wireless security protocol to protect Wi-Fi
networks.
Infographics can present the results of large data analysis looking for patterns and
relationships that monitor changes in variables over time.
page-pf9
Core processes are patents that protect a specific set of procedures for conducting a
particular business activity.
Encrypt data protects confidential information from unauthorized eyes.
A disruptive technology is a new way of doing things that initially does not meet the
needs of existing customers.
page-pfa
RFID supports procurement.
Regression is a prediction based on time-series information.
Training is also provided for the system users and can be online or in a classroom.
The primary purpose of a data warehouse is to perform analytical processes.
page-pfb
File and data recovery software retrieves accidental deletion of photos or documents.
True
False
A business impact analysis identifies all critical business functions and the effect that a
specific disaster may have upon them.
Speech analytics is heavily used in the customer service department to help improve
page-pfc
processes by identifying angry customers and routing them to the appropriate customer
service representative.
Supplier relationship management discovers optimal sales channels by selecting the
right partners and identifying mutual customers.
Automatic call distribution routes inbound calls to available agents.
page-pfd
A client is a computer dedicated to providing information in response to requests.
Selling chain management applies technology to the activities in the order life cycle
from inquiry to sale.
Structured data has a defined length, type, and format and includes numbers, dates, or
strings such as Customer Address.
page-pfe
Key performance indicators can focus on external and internal measurements.
The structure of a typical organization is similar to a pyramid, with different levels that
require one consistent type of information to assist with all managerial decision making.
Which of the following is a special-purpose knowledge-based information system that
accomplishes specific tasks on behalf of its users?
A. intelligent agent
B. executive agent
C. expert agent
D. modeling system
page-pff
A social bookmarking site is dedicated to providing all of the following except
________.
A. to reconnect with colleagues for business progress
B. to share favorites
C. to store and categorize favorite sites
D. to annotate
What is the Internet of Things?
A. a world where interconnected, Internet-enabled devices or "things" can collect and
share data without human intervention
B. extracts information from data and uses it to predict future trends and identify
behavioral patterns
C. refers to devices that connect directly to other devices
D. opportunities to change the way people purchase books
page-pf10
If you were thinking about a home theater system, which of the following represents the
outputs?
A. the DVD player, DVD movie, speakers, TV, and electricity
B. playing the movie including the audio through the speakers and the video on the TV
C. a message stating that the disk is dirty and cannot be played
D. spinning the disk to play, pause, rewind, or fast forward
If you were thinking about an oven as a system, which of the following represents the
feedback?
A. the uncooked food
B. the cooked food
C.a light indicating that the oven has reached the preheated temperature
D. the oven running at 350 degrees for 20 minutes
page-pf11
What is the role of a foreign key?
A.It is a primary key of one table that appears as an attribute in another table and acts to
provide a logical relationship between the two tables.
B. It is a unique way to identify each record.
C. Is a field that uniquely identifies a give record in a table.
D. All of these are correct.
What do data warehouses support?
A. OLAP
B. analytical processing
C. OLTP
D. OLAP and analytical processing
page-pf12
What includes data that change based on user actions?
A. content creator
B. content editor
C. static information
D. dynamic information
What is one of the most common forms of computer vulnerabilities that can cause
massive computer damage?
A. virus
B. white-hat hackers
C. dumpster diving
D. All of these are correct.
page-pf13
What is anything that happens during the course of a business process?
A. BPMN event
B. BPMN activity
C. BPMN flow
D. BPMN gateway
All of the following are common tools used in industry to analyze and develop
competitive advantages, except _________.
A. the Five Forces Model
B. the three generic strategies
C.the competitive analysis model
D. value chain analysis
page-pf14
Data governance refers to the overall management of the availability, usability,
integrity, and security of company data.
What is another name for an eshop?
A. C2C
B. estore or etailer
C. ecustomer
D. econsumer
URLs use ________ to identify particular websites.
A. domain names
B. domain name hosting
C. applets
page-pf15
D. paradigm shifts
The business decisions made by the human resources department include employee
data, promotion data, and vacation data.
What is optimization?
A. a statement about what will happen or might happen in the future; for example,
predicting future sales or employee turnover
B.a statistical process that finds the way to make a design, system, or decision as
effective as possible; for example, finding the values of controllable variables that
determine maximal productivity or minimal waste
C. predictions based on time-series information
D. a statistical process for estimating the relationships among variables
page-pf16
What are material items or products that customers will buy to satisfy a want or need?
A. goods
B. services
C. production
D. productivity
What is threat of new entrants?
A. the ability of buyers to affect the price they must pay for an item
B. the suppliers' ability to influence the prices they charge for supplies (including
materials, labor, and services)
C.high when it is easy for new competitors to enter a market and low when there are
significant entry barriers to joining a market
D. high when there are many alternatives to a product or service and low when there are
few alternatives from which to choose
page-pf17
What produces graphical displays of patterns and complex relationships in large
amounts of data?
A. granularity
B. visualization
C. digital dashboard
D. All of these are correct.
Which of the following is a problem associated with dirty data?
A. accurate data
B. integrated data
C.violates business rules
D. All of these are correct.
page-pf18
What are the two categories that include intellectual and knowledge-based assets?
A. explicit knowledge; tacit knowledge
B. efficient knowledge; tacit knowledge
C. intelligent knowledge; explicit knowledge
D. open knowledge; closed knowledge
In terms of big data, what includes the analysis of streaming data as it travels around the
Internet?
A. variety
B. veracity
C. volume
D. velocity
page-pf19
What uses electronic tags and labels to identify objects wirelessly over short distances?
A. 3D Printing
B. robotics
C. drones
D.RFID
What is a VPN?
A. a direct network provider using a company server
B.a direct private network that creates a "private tunnel" within the Internet to connect
to the corporate server
C. a direct URL that creates a private tunnel for a company
D. a direct P2P that creates an open access community for a company
page-pf1a
Which of the following represents the types of data commonly found in the operations
management department?
A. monetary data
B. payroll data
C.production data
D. employee data
What is the confirmation or validation of an event or object?
A. fact
B. data
C. information technology
D. business intelligence
page-pf1b
What are robotics?
A. a process that buildslayer by layer in an additive processa three-dimensional solid
object from a digital model
B. the use of electronic tags and labels to identify objects wirelessly over short
distances
C. unmanned aircraft that can fly autonomously, or without a human
D.the focus on creating artificial intelligence devices that can move and react to sensory
input
What are areas around access points where users can connect to the Internet via Wi-Fi?
A.hotspots
B. cafor coffee shop
C. company break rooms
D. warmspots
page-pf1c
Which of the following occurs when a system produces incorrect, inconsistent, or
duplicate data?
A. information inconsistency issue
B.information integrity issue
C. data control issue
D. data mining issue
What receives and repeats a signal extending its attenuation or range?
A. proxy
B. broadband over power line
C. attenuation
D.repeater
page-pf1d
What is a domain name system (DNS)?
A. allows dynamic IP address allocation so users do not have to have a preconfigured IP
address to use the network
B.converts IP addresses into domains, or identifying labels that use a variety of
recognizable naming conventions
C. the efficient coexistence of telephone, video, and data communication within a single
network, offering convenience and flexibility not possible with separate infrastructures
D. the integration of communication channels into a single service
What has the potential to contain more than one value for an attribute?
A. single-valued attribute
B.multivalued attribute
C. null-valued attribute
D. All of these are correct.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.