Your browser does not support JavaScript!
AccurateWarbler just signed up and they study Marketing Management 📈
StripedAntlion just signed up and they study Psychology 🧸
MoralRabbit just signed up and they study Hotel Management 🏨

Information Management

Showing 1-75 of 416 answers

____ are the main reasons behind the slow adoption of new forms of electronic payments. 
  • Immediate deductions
  • Flexible payment options
  • Cashless payments
  • Security concerns Correct
____ is a methodology of solving a new problem established on the solutions of similar problems.
  • Sensitivity analysis
  • Yield management
  • Case-based reasoning Correct
  • What-if analysis
____ is meant to guarantee that the experts have passed tests that ensure their skills.
  • Systems analysis
  • Certification Correct
  • Feasibility studies
  • Standardization
____ service is usually the most expensive of hosting options.  
  • Co-location Correct
  • Virtual private server hosting
  • Shared Hosting
  • Dedicated hosting
_____ are applications that combine features of two or more online applications.
  • Spreadsheets
  • Databases
  • Mashups Correct
  • Neural networks
_____ describes the role of IT in an organization.
  • IT vision
  • IT strategy outlines
  • IT mission statement
  • IT tactical plans
_____ helps the users know what they can find and analyze in the data warehouse.
  • A foreign key
  • Encapsulation
  • Metadata Correct
  • A composite key
_____ include ERP, SCM, and CRM applications and typically cost millions of dollars.
  • Enterprise software applications Correct
  • Project software applications
  • Inventory software applications
  • Basic software applications
_____ is independent of particular programming languages, but it does provide standard visual symbols and notations for specifying object-oriented elements, such as classes and procedures.
  • Unified Modeling Language (UML) Correct
  • Structured Query Language (SQL)
  • Algebraic Modeling Language (AML)
  • Extensible Markup Language (XML)
_____ should first be done to decide which data should be collected and how it should be organized.
  • Data structuring
  • Report modeling
  • Data modeling Correct
  • Object structuring
_____ software records individual keystrokes.
  • Public-key encryption
  • Keylogging Correct
  • Clickstream
  • Honeytoken
_________ is used to try to interpret handwritten and printed texts not originally designed for source data entry.
  • Ergonomics
  • Optical character recognition technology Correct
  • Radio-frequency identification
  • Technology convergence
_________ refers to an organization's initiative of adding to a product or service to increase its value to the consumer.
  • Enhancement of existing products or services
  • Appreciation of existing products or services
  • Incrementing value
  • Scaling value
_____, those without which the business cannot conduct its operations, are given the highest priority by the disaster recovery coordinator.
  • Backup applications
  • Customer applications
  • Mission-critical applications Correct
  • Recovery applications
_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective. 
  • Search advertising Correct
  • Reach advertising
  • Near-field advertising
  • Location-based advertising
A ____ is a specific area of knowledge.
  • neural network
  • domain Correct
  • domino
  • protocol
A _____ model is one that is automatically adjusted based on changing relationships among variables.
  • static
  • constantly modified
  • fixed variable
  • dynamically modified Correct
A _______ is an independent memory device and is also known as a thumb drive.  
  • circuitry card
  • memory card
  • USB drive Correct
  • hard drive
A _______ is one for which there is no algorithm to follow to reach an optimal solution.
  • structured report
  • unstructured problem Correct
  • structured plan
  • unstructured discussion
A __________ system is used at all levels of an organization, and often by non-managerial staff.
  • supply chain management
  • decision support Correct
  • customer relationship management
  • enterprise resource planning
A carefully drawn can provide a useful representation of a system, whether existing or planned.
  • directed acyclic graph
  • data flow diagram Correct
  • structure chart
  • business process model
A challenge with traditional file storage is _____.
  • low data redundancy
  • high data accuracy
  • high data integrity Correct
  • low data misrepresentation
A computer network within a building, or a campus of adjacent buildings, is called a ______.
  • WAN (wide area network)
  • PAN (personal area network)
  • MAN (metropolitan area network)
  • LAN (local area network) Correct
Search
All courses