MPCS 65077

subject Type Homework Help
subject Pages 12
subject Words 1678
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which type of manager handles compensation and benefit decisions?
A.Sales managers
B.Public relations managers
C.Supply function manager
D.Human resources manager
What is the primary advantage to a centralized infrastructure?
A.It's adherence to strict standards throughout the systems
B.Flexibility in addressing end user and departmental needs
C.It allows for a high degree of control
D.Open access to information
If every technology officer working for your organization reported to you, your title
would be _____.
A.CTO (chief technology officer)
B.CSO (chief security officer)
C.CIO (chief information officer)
D.CPO (chief privacy officer)
page-pf2
What technology hides your identity from the Web sites you visit?
A.AntiHacking
B.Private Agent Surfing Services (PASS)
C.Stealthware
D.Anonymous Web browsing (AWB)
Automatic speech recognition systems complete three steps. Which step attempts to
make sense of what you saying by taking the matched words and comparing them
against words in a language database?
A.Pattern classification
B.Feature analysis
C.Word classification and sentence construction
D.Language processing
page-pf3
What is the title for the person responsible for overseeing both the underlying IT
infrastructure within an organization and the user-facing technologies?
A.CIO (chief information officer)
B.CPO (chief privacy officer)
C.CSO (chief security officer)
D.CTO (chief technology officer)
Automatic speech recognition systems complete three steps. Which step captures words
as you speak into a microphone, eliminates background noise, and converts these
signals into phonemes?
A.Pattern classification
B.Feature analysis
C.Language processing
D.Signal capture and arrangement
What Windows option do you need to activate so that you can share files on your home
network?
A.VPN
B.File-sharing
page-pf4
C.FTP
D.Internet options
Which of the following systems development techniques requires IT specialists that are
in-house to develop business applications?
A.Outsourcing
B.Insourcing
C.Netsourcing
D.Selfsourcing
What option is available to you with outsourcing?
A.Purchase existing software
B.Purchase existing software and requiring modifications to it
C.Contracting for the development of a new information system
D.You can outsource each of these options
page-pf5
The SDLC contains 7 phases. Which phase is devoted to creating a solid plan for
developing your information system?
A.Initiation
B.Planning
C.Design
D.Analysis
What are two basic categories of monitors?
A.OMR and Flat-panel
B.CRT and Flat-panel
C.CRT and Flat-CRT
D.Flat-panel and liquid crystal display
What is business intelligence or BI?
A.Interrelated and stored data about a person, object, or event
page-pf6
B.Collective information about a business' customers, competitors, partners,
environment, and operations
C.An enterprise-wide set of common and interrelated data
D.Data that has a particular meaning with a specific context
If you were visiting Disney World and you used its touch-screen monitors to locate a
restaurant, what type of hardware device would you be using?
A.Input
B.Connecting
C.Input and Output
D.Storage
If you offered your expert opinion about some expected outcome, what type of
organizational information are you offering?
A.External
B.Subjective
C.Objective
D.Judgment
page-pf7
Data-mining tools include all but which of the following?
A.Query-and-reporting
B.Intelligent agents
C.Data manipulation
D.Statistical
The SDLC contains 7 phases. Which phase involves end users and IT specialist
working together to gather, understand, and document the business requirements for the
proposed system?
A.Initiation
B.Planning
C.Design
D.Analysis
page-pf8
Which of the following is considered a bottom-line strategic point of view?
A.A focus on expenses
B.Low customer ratings
C.Legacy computer systems
D.Lack of strategic planning
Which of the following marketing job positions designs creative marketing solutions for
all forms of advertising?
A.Brand manger
B.Marketing coordinator
C.Account manager
D.Creative marketing specialist
What is Trojan horse software?
A.A software program that comes bundled with some other program; you can access it
with one click
B.Copy protection technology; to use the software your must first click on a copy
protection agreement
C.Downloading and installation utilities
page-pf9
D.Hidden software that is placed on your computer because you agreed to something
buried in a disclaimer or agreement
Which of the following terms represent an organized and structured collection of
information?
A.Database management system
B.Database
C.Data dictionary
D.Structured query system
What says that you may use copyrighted material in certain situations for example, in
the creation of new work or, within certain limits, for teaching purposes?
A.Ethics
B.Intellectual property
C.Copyright
D.Fair Use Doctrine
page-pfa
Which type of software dominates the supply chain management (SCM) environment?
A.Transaction processing
B.E-collaboration
C.Front office systems
D.Enterprise resource planning
Which type of e-commerce refers to the electronic commerce activities performed
between a government and its citizens?
A.G2C
B.C2G
C.E-CG
D.I-GC
What is Software-as-a-service (SaaS)?
A.A type of intelligent bot
page-pfb
B.A company who specializes in software development
C.Software that you pay for its use; the more often you use it the more often you pay
D.Software that performs some service for you; for instance; locating information on
the Internet
If you rewarded employees for trying new technologies even if they prove to be
unsuccessful, what would you be encouraging?
A.Increased risk of failure
B.Technology innovative failure
C.Emerging technology
D.Runaway trains
What must you define before adding any information to a relational database?
A.The intended audience
B.The physical hardware structure
C.The administrative rights of users
D.The logical structure of the database
page-pfc
The SDLC contains 7 phases. Which phase verifies that the system works and meets all
the business requirements developed in an earlier phase?
A.Development
B.Transformation
C.Implementation
D.Testing
Which type of infrastructure must determine the location of specific applications and
information before it can respond to requests from end users or applications?
A.Decentralized
B.Client/server
C.Distributed
D.Centralized
page-pfd
Which systems are typically used to fulfill and support customer orders?
A.Back office systems
B.Front office systems
C.Side office systems
D.Information sales systems
What is hot swapping?
A.Dynamic storage
B.A new dating Internet site dedicated to quickly identifying potential dates
C.Quickly and automatically moving to new, unused storage space when existing space
is filled
D.Connecting and disconnecting devices while the computer is running
Which of the following is not required of an ERP system?
A.Modular design
B.Decentralized database systems
C.Integrated functions
D.Internet-enabled
page-pfe
Many people consider _____ ads to be acceptable.
A(n) _____ transmits information over a closed, connected path.
_____ is unsolicited e-mail that advertises goods and services.
A(n) _____ is an input device that captures and records the movement of your feet as
you walk or turn in different directions.
page-pff
_____ cable is a better-constructed version of the phone twisted-pair cable.
_____ is a process of continuously measuring results and comparing those results to
optimal performance so that actual performance may be improved.
_____ is the unauthorized use, duplication, distribution or sale of copyrighted software.
_____ refers to keeping the costs of transportation as low as possible consistent with
safe and reliable delivery.
page-pf10
A database consists of _____ and a(n) _____.
_____ provides an IT-based approach for creating and managing a corporate-wide
system for communicating and sharing information.
A(n) _____ represents how users see information to meet their particular business
needs.
A(n) _____ key is made available to everyone, while a(n) _____ key is kept secret.
page-pf11
A group of people who responds to end users' questions is called a(n) _____.
_____ are raw facts that describe a particular phenomenon.
_____ ensure the validity of database updates when multiple users attempt to access and
change the same information.
A(n) _____ supports the capturing, organization, and dissemination of knowledge.
page-pf12
_____ refers to using electronic commerce within a single nation's government.
A(n) _____ links you to people you know, and from there, to people your contacts
know.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.