AccurateWarbler just signed up and they study Marketing Management 📈
JointParrotfish downvoted the question #2818
.
StripedAntlion just signed up and they study Psychology 🧸
LightCat downvoted the question #1324
.
AshamedGazelle downvoted the question #18165
.
AshamedGazelle downvoted the question #18165
.
AshamedGazelle downvoted the question #18180
.
AshamedGazelle downvoted the question #18180
.
MoralRabbit upvoted the question #3863
.
MoralRabbit just signed up and they study Hotel Management 🏨
AMA University Answers
Earn money
Login
Register
AMA OED
Courses
ITE
ITE-6220
Information Management
Showing 1-75 of 416 answers
____ are excellent tools for building both the data and the models that decision support systems need.
Word files
Spreadsheets
Correct
Notepads
Data lists
____ are the main reasons behind the slow adoption of new forms of electronic payments.
Immediate deductions
Flexible payment options
Cashless payments
Security concerns
Correct
____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.
Spyware
Correct
Groupware
Honeytoken
Honeypot
____ is a methodology of solving a new problem established on the solutions of similar problems.
Sensitivity analysis
Yield management
Case-based reasoning
Correct
What-if analysis
____ is a security measure in which users are required to identify themselves only once before accessing several different systems which are linked through a network.
SP (single password)
Digital footprint
SSO (single sign-on)
Correct
Multiple encryption
____ is a tool used to translate MS-Word documents to multiple languages.
WordPad
Unix
Linux
Wordfast
Correct
____ is meant to guarantee that the experts have passed tests that ensure their skills.
Systems analysis
Certification
Correct
Feasibility studies
Standardization
____ often help ensure that a user does not receive the same unsolicited information multiple times.
Hosting
Phishing
Cookies
Correct
Podcasts
____ service is usually the most expensive of hosting options.
Co-location
Correct
Virtual private server hosting
Shared Hosting
Dedicated hosting
____ software closely conforms to an individual unit=E2=80=99s subculture, which makes the transition to a new system easier for employees.
User-developed
Correct
In-house
Licensed
Commissioned
_____ are applications that combine features of two or more online applications.
Spreadsheets
Databases
Mashups
Correct
Neural networks
_____ are entered to manipulate data, including adding, deleting, and updating data.
Reports
Queries
Correct
Foreign keys
Primary keys
_____ describes the role of IT in an organization.
IT vision
IT strategy outlines
IT mission statement
IT tactical plans
_____ enables business partners to set standards for data formats in Web pages.
CGI
XML
Correct
SQL
Perl
_____ enables managers to see summaries and ratios of the intersection of any two dimensions in a database.
SCM
CRM
CAD
OLAP
Correct
_____ encryption is defined as encryption that comprises two keys: a public key, and a private key.
Cascade
Parallel
Asymmetric
Correct
Super
_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.
Shared hosting
Co-location
Virtual private server hosting
Dedicated hosting
Correct
_____ helps the users know what they can find and analyze in the data warehouse.
A foreign key
Encapsulation
Metadata
Correct
A composite key
_____ include ERP, SCM, and CRM applications and typically cost millions of dollars.
Enterprise software applications
Correct
Project software applications
Inventory software applications
Basic software applications
_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.
Big Data
Correct
Schema
Metadata
Data dictionary
_____ is a set of processes and methods used by project managers to determine which projects will meet the organization=E2=80=99s operational and financial goals in relation to its strategic objectives as well as the needs of its customers.
Project portfolio management
Correct
Change management
Supply chain management
Customer relationship management
_____ is a traditional approach to systems development.
DSDM
ASD
RUP
SDLC
Correct
_____ is independent of particular programming languages, but it does provide standard visual symbols and notations for specifying object-oriented elements, such as classes and procedures.
Unified Modeling Language (UML)
Correct
Structured Query Language (SQL)
Algebraic Modeling Language (AML)
Extensible Markup Language (XML)
_____ is one of the primary languages used to compose and retrieve web pages and support the presentation of pictures with marked areas.
SGML
CSS
HTTP
XML
Correct
_____ is the term for any unsolicited commercial email.
Adware
Phishing
Spam
Correct
Spyware
_____ might be thought of as =E2=80=9Creal=C2=ADtime e=C2=ADmail,=E2=80=9D because, unlike e=C2=ADmail, it is synchronous in exchanging information.
Instant messaging
RSS feeds
Podcasting
E-Tailing
_____ should first be done to decide which data should be collected and how it should be organized.
Data structuring
Report modeling
Data modeling
Correct
Object structuring
_____ software records individual keystrokes.
Public-key encryption
Keylogging
Correct
Clickstream
Honeytoken
_____ transfers visitor inquiries from a busy server to a less busy server for identical information and services.
Load balancing
Correct
Shared hosting
Pure playing
Co-location
______ allow Internet access to anyone within range who uses a wireless-equipped device, provided logging in is not limited by controlled access codes.
Intranets
VPNs
VANs
Hotspots
Correct
______ is a secured protocol used for confidential transactions.
FTP
VOIP
HTTPS
Correct
HTTP
______ is a standard method of wireless communications, specifically for high-speed data transmission for mobile phones.
Near-field communication
Long-Term Evolution
Correct
WiMAX
Bluetooth
______ is a structured, disciplined approach that facilitates the adoption of new or modified systems by various groups and individuals within an organization.
Data mining
Prototyping
Change management
Correct
Knowledge extraction
______ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.
Incremental methods
Waterfall methods
Agile methods
Correct
Traditional methods
_______ is a process for outsourcing a variety of tasks to a distributed group of people, both online or offline.
Crowdsourcing
Correct
Load balancing
Debugging
Consumer profiling
_______ is a software application that is used to create and manage databases, and can take the form of a personal DBMS, used by one person, or an enterprise DBMS that can be used by multiple users
DBMS
Correct
_______ is a standard for software that digitizes and compresses voice signals and transmits the bits via the Internet link.
TCP/IP
VoIP
Correct
IRC
SoIP
_______ made programming somewhat easier because they aggregated common commands into =E2=80=9Cwords,=E2=80=9D although many of those =E2=80=9Cwords=E2=80=9D are not English=C2=ADlike.
Procedural languages
Utility languages
Programming languages
Assembly languages
Correct
________ is a feature that enables a user to access additional information by clicking on selected text or graphics.
Groupware
Graphical user interface
Hypermedia
Correct
Graphics accelerator
_________ is a popular medium for connecting computers and networking devices because it is relatively flexible, reliable, and low cost.
Twinaxial cable
Coaxial cable
Twisted pair cable
Correct
Optical fiber
_________ is used to try to interpret handwritten and printed texts not originally designed for source data entry.
Ergonomics
Optical character recognition technology
Correct
Radio-frequency identification
Technology convergence
_________ keyboards are split in the middle, and the two parts are twisted outward to better fit the natural position of the forearms.
QWERTY
Dvorak
Ergonomic
Correct
AZERTY
_________ refers to an organization's initiative of adding to a product or service to increase its value to the consumer.
Enhancement of existing products or services
Appreciation of existing products or services
Incrementing value
Scaling value
______is the attempt by organizations to put procedures and technologies in place to transfer individual knowledge into databases.
Data mining
Knowledge extraction
Knowledge management
Correct
Data warehousing
_____, those without which the business cannot conduct its operations, are given the highest priority by the disaster recovery coordinator.
Backup applications
Customer applications
Mission-critical applications
Correct
Recovery applications
_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective.
Search advertising
Correct
Reach advertising
Near-field advertising
Location-based advertising
“Information plays a vital role in organizations, and in recent years companies have recognized the significance of corporate data as an organizational asset”.
False
Correct
“Information plays a vital role in organizations, andin recent years companies have recognized the significance of corporate data asan organizational asset”.
FALSE
Correct
A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.
honeytoken
Correct
phish
flame
canary trap
A ____ is a server with invalid records set up to make intruders think they have accessed a production database.
bogus server
honeytoken
phish
honeypot
Correct
A ____ is a specific area of knowledge.
neural network
domain
Correct
domino
protocol
A ____ is an activity that the system executes in response to a user.
use case
Correct
class
state
interaction
A ____ is required when it is not possible to exploit expertise by coupling quantitative data from a database with decision models.
sensitivity analysis
expert system
Correct
what-if analysis
decision support system
A _____ can be thought of as a =E2=80=9Ctunnel=E2=80=9D through the Internet or other public network that allows only authorized users to access company resources.
WAN
VPN
Correct
peer-to-peer LAN
WLAN
A _____ can connect dissimilar networks and can be programmed to also act as a firewall to filter communications.
switch
router
Correct
modem
repeater
A _____ includes a description of a database's structure, the names and sizes of the fields, and details such as which field is a primary key.
metadata
schema
Correct
entity
query
A _____ is a device that connects two networks, such as a LAN, to the Internet.
modem
router
switch
bridge
Correct
A _____ is created =E2=80=9Con the fly=E2=80=9D as a result of a query and exists only for the duration the user wishes to view it or to create a paper report from it.
join table
Correct
two-way table
entity table
object table
A _____ is the field by which records in a table are uniquely identified.
query
database model
object
primary key
Correct
A _____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.
database query
database system
database model
Correct
database catalog
A _____ is unique if the value (content) in that field appears only in one record.
key
Correct
object
item
entity
A _____ line is made of 24 channels (groups of wires) of 64 Kbps each.
T2
T4
T1
Correct
T3
A _____ model is one that is automatically adjusted based on changing relationships among variables.
static
constantly modified
fixed variable
dynamically modified
Correct
A ______ is a network used only by the employees of an organization.
intranet
Correct
supranet
extranet
internet
A _______ is a socket used to connect a computer to external devices.
bus
port
Correct
stylus
trackpad
A _______ is an independent memory device and is also known as a thumb drive.
circuitry card
memory card
USB drive
Correct
hard drive
A _______ is one for which there is no algorithm to follow to reach an optimal solution.
structured report
unstructured problem
Correct
structured plan
unstructured discussion
A __________ system is used at all levels of an organization, and often by non-managerial staff.
supply chain management
decision support
Correct
customer relationship management
enterprise resource planning
A carefully drawn can provide a useful representation of a system, whether existing or planned.
directed acyclic graph
data flow diagram
Correct
structure chart
business process model
A challenge with traditional file storage is _____.
low data redundancy
high data accuracy
high data integrity
Correct
low data misrepresentation
A collection of related records, such as all the records of a college=E2=80=99s students, is called a _____.
file
Correct
item
character
field
A computer network within a building, or a campus of adjacent buildings, is called a ______.
WAN (wide area network)
PAN (personal area network)
MAN (metropolitan area network)
LAN (local area network)
Correct
A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee=E2=80=99s password to fix a problem. This is an example of ____.
social engineering
Correct
data mining
data encryption
social pathology
A database is an organized collection of related information.
True
Correct
A device that receives and analyzes packets and then routes them towards their destination.
Router
Correct
« Previous
1
2
3
4
5
6
Next »
Search
Search
Need to search and CTRL+F on AMA modules?
All courses
ACTG
Cost Accounting and Control -
(102 answers)
Intermediate Accounting 3 -
(122 answers)
BAMM
Macroeconomics Theory and Practice -
(127 answers)
BIO
Biological Science -
(152 answers)
COMM
Introduction to Communication Media -
(23 answers)
COMP
Current Trends and Issues -
(453 answers)
CPE
Introduction to HDL -
(100 answers)
CS
2D/3D Digital Animation -
(113 answers)
Algorithms and Complexity -
(107 answers)
Animation Project -
(61 answers)
Application Life Cycle Management -
(266 answers)
Automata Theory and Formal Language -
(279 answers)
Discrete Mathematics -
(338 answers)
Discrete Structures 2 -
(106 answers)
Load Testing -
(145 answers)
Object Oriented Programming -
(154 answers)
Principles of Operating Systems and its Applications -
(192 answers)
Software Engineering 1 -
(345 answers)
Software Engineering 2 -
(63 answers)
Statistical Analysis with Software Application -
(188 answers)
Unified Functional Testing -
(140 answers)
ECE
Electronics 1: Electronic Devices and Circuits -
(171 answers)
Fundamentals of Mixed Signals and Sensors -
(97 answers)
ENG
Computer Aided Drawing -
(119 answers)
Engineering Economincs -
(79 answers)
ENGL
Philippine Literature -
(284 answers)
Purposive Communication 2 -
(238 answers)
ETHNS
Euthenics 1 -
(163 answers)
Euthenics 2 -
(243 answers)
FILI
Kritikal na Pagbasa, Pagsulat at Pagsasalita -
(726 answers)
Pagsasaling Pampanitikan -
(270 answers)
GE
Art Appreciation -
(162 answers)
Environmental Science -
(269 answers)
Ethics -
(139 answers)
Life and Works of Jose Rizal -
(377 answers)
Living in the IT Era -
(135 answers)
Mathematics in the Modern World -
(112 answers)
Philippine Popular Culture -
(149 answers)
Purposive Communication 1 -
(59 answers)
Readings in Philippine History -
(222 answers)
Science, Technology, and Society -
(337 answers)
The Contemporary World -
(228 answers)
Understanding the Self -
(207 answers)
GMAT
General Mathematics -
(8 answers)
IA
Accounting Information System -
(143 answers)
IT
Advanced Database Management Systems -
(142 answers)
Audio and Video Production -
(57 answers)
Cisco - Introduction to Packet Tracer -
(21 answers)
Data Communications and Networking 1 -
(274 answers)
Data Communications and Networking 2 -
(363 answers)
Data Communications and Networking 3 -
(250 answers)
Data Communications and Networking 4 -
(141 answers)
Database Management System 1 (Oracle) -
(122 answers)
Database Management System 2 (Oracle 10g Admin) -
(155 answers)
Information Assurance and Security 1 -
(443 answers)
Information Assurance and Security 2 -
(95 answers)
Integrative Programming and Technology 1 -
(109 answers)
Introduction to Human Computer Interaction -
(436 answers)
Introduction to Multimedia -
(411 answers)
IT Capstone Project 1 -
(83 answers)
Network Security -
(30 answers)
Quantitative Methods -
(19 answers)
Screenwriting -
(112 answers)
System Administration and Maintenance -
(74 answers)
System Integration and Architecture 1 -
(239 answers)
Web Application Development 1 -
(222 answers)
Web Systems Technologies -
(116 answers)
ITE
Application Development and Emerging Technology -
(577 answers)
Cloud Computing and the Internet of Things -
(111 answers)
Computer Programming 1 -
(766 answers)
Computer Programming 2 -
(146 answers)
Data Structures and Algorithm Analysis -
(241 answers)
Fundamentals of Database System -
(52 answers)
Information Management -
(416 answers)
Introduction to Computing -
(148 answers)
Social and Professional Issues -
(453 answers)
Technopreneurship -
(108 answers)
MATH
Calculus 1 -
(165 answers)
Data Analysis -
(221 answers)
Number Theory -
(259 answers)
Numerical Methods -
(256 answers)
MGT
Strategic Management -
(138 answers)
NSCI
Calculus-Based Physics 1 -
(225 answers)
Calculus-Based Physics 2 -
(260 answers)
NSTP
National Service Training Program 1 -
(139 answers)
National Service Training Program 2 -
(198 answers)
OFAD
Web Design -
(55 answers)
PHYED
Individual/Dual Sports -
(81 answers)
Physical Fitness -
(539 answers)
Rhythmic Activities -
(122 answers)
Team Sports -
(113 answers)
PSYC
Abnormal Psychology -
(14 answers)
Developmental Psychology -
(315 answers)
Introduction to Psychology -
(248 answers)
Physiological Psychology -
(98 answers)
RSCH
Accounting Research Methods -
(57 answers)
Inquiries, Investigations and Immersion -
(225 answers)
Practical Research 1 -
(199 answers)
TAX
Income Taxation -
(74 answers)