Your browser does not support JavaScript!

Information Management

Showing 1-75 of 377 answers

____ are excellent tools for building both the data and the models that decision support systems need.
  • Word files
  • Spreadsheets Correct
  • Notepads
  • Data lists
____ are the main reasons behind the slow adoption of new forms of electronic payments. 
  • Immediate deductions
  • Flexible payment options
  • Cashless payments
  • Security concerns Correct
____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.
  • Spyware Correct
  • Groupware
  • Honeytoken
  • Honeypot
____ is a methodology of solving a new problem established on the solutions of similar problems.
  • Sensitivity analysis
  • Yield management
  • Case-based reasoning Correct
  • What-if analysis
____ is a security measure in which users are required to identify themselves only once before accessing several different systems which are linked through a network.
  • SP (single password)
  • Digital footprint
  • SSO (single sign-on) Correct
  • Multiple encryption
____ is a tool used to translate MS-Word documents to multiple languages.
  • WordPad
  • Unix
  • Linux
  • Wordfast Correct
____ is meant to guarantee that the experts have passed tests that ensure their skills.
  • Systems analysis
  • Certification Correct
  • Feasibility studies
  • Standardization
____ often help ensure that a user does not receive the same unsolicited information multiple times.
  • Hosting
  • Phishing
  • Cookies Correct
  • Podcasts
____ service is usually the most expensive of hosting options.  
  • Co-location Correct
  • Virtual private server hosting
  • Shared Hosting
  • Dedicated hosting
____ software closely conforms to an individual unit's subculture, which makes the transition to a new system easier for employees.
  • User-developed Correct
  • In-house
  • Licensed
  • Commissioned
_____ are applications that combine features of two or more online applications.
  • Spreadsheets
  • Databases
  • Mashups Correct
  • Neural networks
_____ are entered to manipulate data, including adding, deleting, and updating data.
  • Reports
  • Queries Correct
  • Foreign keys
  • Primary keys
_____ describes the role of IT in an organization.
  • IT vision
  • IT strategy outlines
  • IT mission statement
  • IT tactical plans
_____ enables business partners to set standards for data formats in Web pages.
  • CGI
  • XML Correct
  • SQL
  • Perl
_____ enables managers to see summaries and ratios of the intersection of any two dimensions in a database.
  • SCM
  • CRM
  • CAD
  • OLAP Correct
_____ encryption is defined as encryption that comprises two keys: a public key, and a private key.
  • Cascade
  • Parallel
  • Asymmetric Correct
  • Super
_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.
  • Shared hosting
  • Co-location
  • Virtual private server hosting
  • Dedicated hosting Correct
_____ helps the users know what they can find and analyze in the data warehouse.
  • A foreign key
  • Encapsulation
  • Metadata Correct
  • A composite key
_____ include ERP, SCM, and CRM applications and typically cost millions of dollars.
  • Enterprise software applications Correct
  • Project software applications
  • Inventory software applications
  • Basic software applications
_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.
  • Big Data Correct
  • Schema
  • Metadata
  • Data dictionary
_____ is a set of processes and methods used by project managers to determine which projects will meet the organization's operational and financial goals in relation to its strategic objectives as well as the needs of its customers.
  • Project portfolio management Correct
  • Change management
  • Supply chain management
  • Customer relationship management
_____ is a traditional approach to systems development.
  • DSDM
  • ASD
  • RUP
  • SDLC Correct
_____ is independent of particular programming languages, but it does provide standard visual symbols and notations for specifying object-oriented elements, such as classes and procedures.
  • Unified Modeling Language (UML) Correct
  • Structured Query Language (SQL)
  • Algebraic Modeling Language (AML)
  • Extensible Markup Language (XML)
_____ is one of the primary languages used to compose and retrieve web pages and support the presentation of pictures with marked areas.
  • SGML
  • CSS
  • HTTP
  • XML Correct
_____ is the term for any unsolicited commercial email.
  • Adware
  • Phishing
  • Spam Correct
  • Spyware
_____ might be thought of as "real=C2=ADtime e=C2=ADmail," because, unlike e=C2=ADmail, it is synchronous in exchanging information.
  • Instant messaging
  • RSS feeds
  • Podcasting
  • E-Tailing
_____ should first be done to decide which data should be collected and how it should be organized.
  • Data structuring
  • Report modeling
  • Data modeling Correct
  • Object structuring
_____ software records individual keystrokes.
  • Public-key encryption
  • Keylogging Correct
  • Clickstream
  • Honeytoken
_____ transfers visitor inquiries from a busy server to a less busy server for identical information and services.
  • Load balancing Correct
  • Shared hosting
  • Pure playing
  • Co-location
______ allow Internet access to anyone within range who uses a wireless-equipped device, provided logging in is not limited by controlled access codes.
  • Intranets
  • VPNs
  • VANs
  • Hotspots Correct
______ is a secured protocol used for confidential transactions.
  • FTP
  • VOIP
  • HTTPS Correct
  • HTTP
______ is a standard method of wireless communications, specifically for high-speed data transmission for mobile phones.
  • Near-field communication
  • Long-Term Evolution Correct
  • WiMAX
  • Bluetooth
______ is a structured, disciplined approach that facilitates the adoption of new or modified systems by various groups and individuals within an organization.
  • Data mining
  • Prototyping
  • Change management Correct
  • Knowledge extraction
______ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.
  • Incremental methods
  • Waterfall methods
  • Agile methods Correct
  • Traditional methods
_______ is a process for outsourcing a variety of tasks to a distributed group of people, both online or offline. 
  • Crowdsourcing Correct
  • Load balancing
  • Debugging
  • Consumer profiling
_______ is a software application that is used to create and manage databases, and can take the form of a personal DBMS, used by one person, or an enterprise DBMS that can be used by multiple users
  • DBMS Correct
_______ is a standard for software that digitizes and compresses voice signals and transmits the bits via the Internet link.
  • TCP/IP
  • VoIP Correct
  • IRC
  • SoIP
_______ made programming somewhat easier because they aggregated common commands into "words," although many of those "words" are not English=C2=ADlike.
  • Procedural languages
  • Utility languages
  • Programming languages
  • Assembly languages Correct
________ is a feature that enables a user to access additional information by clicking on selected text or graphics.
  • Groupware
  • Graphical user interface
  • Hypermedia Correct
  • Graphics accelerator
_________ is a popular medium for connecting computers and networking devices because it is relatively flexible, reliable, and low cost.
  • Twinaxial cable
  • Coaxial cable
  • Twisted pair cable Correct
  • Optical fiber
_________ is used to try to interpret handwritten and printed texts not originally designed for source data entry.
  • Ergonomics
  • Optical character recognition technology Correct
  • Radio-frequency identification
  • Technology convergence
_________ keyboards are split in the middle, and the two parts are twisted outward to better fit the natural position of the forearms.
  • QWERTY
  • Dvorak
  • Ergonomic Correct
  • AZERTY
_________ refers to an organization's initiative of adding to a product or service to increase its value to the consumer.
  • Enhancement of existing products or services
  • Appreciation of existing products or services
  • Incrementing value
  • Scaling value
______is the attempt by organizations to put procedures and technologies in place to transfer individual knowledge into databases.
  • Data mining
  • Knowledge extraction
  • Knowledge management Correct
  • Data warehousing
_____, those without which the business cannot conduct its operations, are given the highest priority by the disaster recovery coordinator.
  • Backup applications
  • Customer applications
  • Mission-critical applications Correct
  • Recovery applications
_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective. 
  • Search advertising Correct
  • Reach advertising
  • Near-field advertising
  • Location-based advertising
“Information plays a vital role in organizations, andin recent years companies have recognized the significance of corporate data asan organizational asset”.
  • FALSE Correct
A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.
  • honeytoken Correct
  • phish
  • flame
  • canary trap
A ____ is a server with invalid records set up to make intruders think they have accessed a production database.
  • bogus server
  • honeytoken
  • phish
  • honeypot Correct
A ____ is a specific area of knowledge.
  • neural network
  • domain Correct
  • domino
  • protocol
A ____ is an activity that the system executes in response to a user.
  • use case Correct
  • class
  • state
  • interaction
A ____ is required when it is not possible to exploit expertise by coupling quantitative data from a database with decision models.
  • sensitivity analysis
  • expert system Correct
  • what-if analysis
  • decision support system
A _____ can be thought of as a "tunnel" through the Internet or other public network that allows only authorized users to access company resources.
  • WAN
  • VPN Correct
  • peer-to-peer LAN
  • WLAN
A _____ can connect dissimilar networks and can be programmed to also act as a firewall to filter communications.
  • switch
  • router Correct
  • modem
  • repeater
A _____ includes a description of a database's structure, the names and sizes of the fields, and details such as which field is a primary key.
  • metadata
  • schema Correct
  • entity
  • query
A _____ is a device that connects two networks, such as a LAN, to the Internet.
  • modem
  • router
  • switch
  • bridge Correct
A _____ is created "on the fly" as a result of a query and exists only for the duration the user wishes to view it or to create a paper report from it. 
  • join table Correct
  • two-way table
  • entity table
  • object table
A _____ is the field by which records in a table are uniquely identified.
  • query
  • database model
  • object
  • primary key Correct
A _____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.
  • database query
  • database system
  • database model Correct
  • database catalog
A _____ is unique if the value (content) in that field appears only in one record.
  • key Correct
  • object
  • item
  • entity
A _____ line is made of 24 channels (groups of wires) of 64 Kbps each. 
  • T2
  • T4
  • T1 Correct
  • T3
A _____ model is one that is automatically adjusted based on changing relationships among variables.
  • static
  • constantly modified
  • fixed variable
  • dynamically modified Correct
A ______ is a network used only by the employees of an organization.
  • intranet Correct
  • supranet
  • extranet
  • internet
A _______ is a socket used to connect a computer to external devices.
  • bus
  • port Correct
  • stylus
  • trackpad
A _______ is an independent memory device and is also known as a thumb drive.  
  • circuitry card
  • memory card
  • USB drive Correct
  • hard drive
A _______ is one for which there is no algorithm to follow to reach an optimal solution.
  • structured report
  • unstructured problem Correct
  • structured plan
  • unstructured discussion
A __________ system is used at all levels of an organization, and often by non-managerial staff.
  • supply chain management
  • decision support Correct
  • customer relationship management
  • enterprise resource planning
A carefully drawn can provide a useful representation of a system, whether existing or planned.
  • directed acyclic graph
  • data flow diagram Correct
  • structure chart
  • business process model
A challenge with traditional file storage is _____.
  • low data redundancy
  • high data accuracy
  • high data integrity Correct
  • low data misrepresentation
A collection of related records, such as all the records of a college's students, is called a _____.
  • file Correct
  • item
  • character
  • field
A computer network within a building, or a campus of adjacent buildings, is called a ______.
  • WAN (wide area network)
  • PAN (personal area network)
  • MAN (metropolitan area network)
  • LAN (local area network) Correct
A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee's password to fix a problem. This is an example of ____.
  • social engineering Correct
  • data mining
  • data encryption
  • social pathology
A database is an organized collection of related information.
  • True Correct
A device that receives and analyzes packets and then routes them towards their destination.
  • Router Correct
A major effort of most businesses, especially retail businesses, in using customer relationship management (CRM) systems is to collect ____ about customers.
  • knowledge management parameters
  • personal information
  • artificial intelligence
  • business intelligence Correct
All courses