____ are excellent tools for building both the data and the models that decision support systems need.
Word files
SpreadsheetsCorrect
Notepads
Data lists
____ are the main reasons behind the slow adoption of new forms of electronic payments.
Immediate deductions
Flexible payment options
Cashless payments
Security concernsCorrect
____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.
SpywareCorrect
Groupware
Honeytoken
Honeypot
____ is a methodology of solving a new problem established on the solutions of similar problems.
Sensitivity analysis
Yield management
Case-based reasoningCorrect
What-if analysis
____ is a security measure in which users are required to identify themselves only once before accessing several different systems which are linked through a network.
SP (single password)
Digital footprint
SSO (single sign-on)Correct
Multiple encryption
____ is a tool used to translate MS-Word documents to multiple languages.
WordPad
Unix
Linux
WordfastCorrect
____ is meant to guarantee that the experts have passed tests that ensure their skills.
Systems analysis
CertificationCorrect
Feasibility studies
Standardization
____ often help ensure that a user does not receive the same unsolicited information multiple times.
Hosting
Phishing
CookiesCorrect
Podcasts
____ service is usually the most expensive of hosting options.
Co-locationCorrect
Virtual private server hosting
Shared Hosting
Dedicated hosting
____ software closely conforms to an individual unit's subculture, which makes the transition to a new system easier for employees.
User-developedCorrect
In-house
Licensed
Commissioned
_____ are applications that combine features of two or more online applications.
Spreadsheets
Databases
MashupsCorrect
Neural networks
_____ are entered to manipulate data, including adding, deleting, and updating data.
Reports
QueriesCorrect
Foreign keys
Primary keys
_____ describes the role of IT in an organization.
IT vision
IT strategy outlines
IT mission statement
IT tactical plans
_____ enables business partners to set standards for data formats in Web pages.
CGI
XMLCorrect
SQL
Perl
_____ enables managers to see summaries and ratios of the intersection of any two dimensions in a database.
SCM
CRM
CAD
OLAPCorrect
_____ encryption is defined as encryption that comprises two keys: a public key, and a private key.
Cascade
Parallel
AsymmetricCorrect
Super
_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.
Shared hosting
Co-location
Virtual private server hosting
Dedicated hostingCorrect
_____ helps the users know what they can find and analyze in the data warehouse.
A foreign key
Encapsulation
MetadataCorrect
A composite key
_____ include ERP, SCM, and CRM applications and typically cost millions of dollars.
Enterprise software applicationsCorrect
Project software applications
Inventory software applications
Basic software applications
_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.
Big DataCorrect
Schema
Metadata
Data dictionary
_____ is a set of processes and methods used by project managers to determine which projects will meet the organization's operational and financial goals in relation to its strategic objectives as well as the needs of its customers.
Project portfolio managementCorrect
Change management
Supply chain management
Customer relationship management
_____ is a traditional approach to systems development.
DSDM
ASD
RUP
SDLCCorrect
_____ is independent of particular programming languages, but it does provide standard visual symbols and notations for specifying object-oriented elements, such as classes and procedures.
Unified Modeling Language (UML)Correct
Structured Query Language (SQL)
Algebraic Modeling Language (AML)
Extensible Markup Language (XML)
_____ is one of the primary languages used to compose and retrieve web pages and support the presentation of pictures with marked areas.
SGML
CSS
HTTP
XMLCorrect
_____ is the term for any unsolicited commercial email.
Adware
Phishing
SpamCorrect
Spyware
_____ might be thought of as "real=C2=ADtime e=C2=ADmail," because, unlike e=C2=ADmail, it is synchronous in exchanging information.
Instant messaging
RSS feeds
Podcasting
E-Tailing
_____ should first be done to decide which data should be collected and how it should be organized.
Data structuring
Report modeling
Data modelingCorrect
Object structuring
_____ software records individual keystrokes.
Public-key encryption
KeyloggingCorrect
Clickstream
Honeytoken
_____ transfers visitor inquiries from a busy server to a less busy server for identical information and services.
Load balancingCorrect
Shared hosting
Pure playing
Co-location
______ allow Internet access to anyone within range who uses a wireless-equipped device, provided logging in is not limited by controlled access codes.
Intranets
VPNs
VANs
HotspotsCorrect
______ is a secured protocol used for confidential transactions.
FTP
VOIP
HTTPSCorrect
HTTP
______ is a standard method of wireless communications, specifically for high-speed data transmission for mobile phones.
Near-field communication
Long-Term EvolutionCorrect
WiMAX
Bluetooth
______ is a structured, disciplined approach that facilitates the adoption of new or modified systems by various groups and individuals within an organization.
Data mining
Prototyping
Change managementCorrect
Knowledge extraction
______ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.
Incremental methods
Waterfall methods
Agile methodsCorrect
Traditional methods
_______ is a process for outsourcing a variety of tasks to a distributed group of people, both online or offline.
CrowdsourcingCorrect
Load balancing
Debugging
Consumer profiling
_______ is a software application that is used to create and manage databases, and can take the form of a personal DBMS, used by one person, or an enterprise DBMS that can be used by multiple users
DBMSCorrect
_______ is a standard for software that digitizes and compresses voice signals and transmits the bits via the Internet link.
TCP/IP
VoIPCorrect
IRC
SoIP
_______ made programming somewhat easier because they aggregated common commands into "words," although many of those "words" are not English=C2=ADlike.
Procedural languages
Utility languages
Programming languages
Assembly languagesCorrect
________ is a feature that enables a user to access additional information by clicking on selected text or graphics.
Groupware
Graphical user interface
HypermediaCorrect
Graphics accelerator
_________ is a popular medium for connecting computers and networking devices because it is relatively flexible, reliable, and low cost.
Twinaxial cable
Coaxial cable
Twisted pair cableCorrect
Optical fiber
_________ is used to try to interpret handwritten and printed texts not originally designed for source data entry.
Ergonomics
Optical character recognition technologyCorrect
Radio-frequency identification
Technology convergence
_________ keyboards are split in the middle, and the two parts are twisted outward to better fit the natural position of the forearms.
QWERTY
Dvorak
ErgonomicCorrect
AZERTY
_________ refers to an organization's initiative of adding to a product or service to increase its value to the consumer.
Enhancement of existing products or services
Appreciation of existing products or services
Incrementing value
Scaling value
______is the attempt by organizations to put procedures and technologies in place to transfer individual knowledge into databases.
Data mining
Knowledge extraction
Knowledge managementCorrect
Data warehousing
_____, those without which the business cannot conduct its operations, are given the highest priority by the disaster recovery coordinator.
Backup applications
Customer applications
Mission-critical applicationsCorrect
Recovery applications
_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective.
Search advertisingCorrect
Reach advertising
Near-field advertising
Location-based advertising
“Information plays a vital role in organizations, andin recent years companies have recognized the significance of corporate data asan organizational asset”.
FALSECorrect
A ____ is a bogus record in a networked database that neither employees nor business partners would ever access for legitimate purposes.
honeytokenCorrect
phish
flame
canary trap
A ____ is a server with invalid records set up to make intruders think they have accessed a production database.
bogus server
honeytoken
phish
honeypotCorrect
A ____ is a specific area of knowledge.
neural network
domainCorrect
domino
protocol
A ____ is an activity that the system executes in response to a user.
use caseCorrect
class
state
interaction
A ____ is required when it is not possible to exploit expertise by coupling quantitative data from a database with decision models.
sensitivity analysis
expert systemCorrect
what-if analysis
decision support system
A _____ can be thought of as a "tunnel" through the Internet or other public network that allows only authorized users to access company resources.
WAN
VPNCorrect
peer-to-peer LAN
WLAN
A _____ can connect dissimilar networks and can be programmed to also act as a firewall to filter communications.
switch
routerCorrect
modem
repeater
A _____ includes a description of a database's structure, the names and sizes of the fields, and details such as which field is a primary key.
metadata
schemaCorrect
entity
query
A _____ is a device that connects two networks, such as a LAN, to the Internet.
modem
router
switch
bridgeCorrect
A _____ is created "on the fly" as a result of a query and exists only for the duration the user wishes to view it or to create a paper report from it.
join tableCorrect
two-way table
entity table
object table
A _____ is the field by which records in a table are uniquely identified.
query
database model
object
primary keyCorrect
A _____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.
database query
database system
database modelCorrect
database catalog
A _____ is unique if the value (content) in that field appears only in one record.
keyCorrect
object
item
entity
A _____ line is made of 24 channels (groups of wires) of 64 Kbps each.
T2
T4
T1Correct
T3
A _____ model is one that is automatically adjusted based on changing relationships among variables.
static
constantly modified
fixed variable
dynamically modifiedCorrect
A ______ is a network used only by the employees of an organization.
intranetCorrect
supranet
extranet
internet
A _______ is a socket used to connect a computer to external devices.
bus
portCorrect
stylus
trackpad
A _______ is an independent memory device and is also known as a thumb drive.
circuitry card
memory card
USB driveCorrect
hard drive
A _______ is one for which there is no algorithm to follow to reach an optimal solution.
structured report
unstructured problemCorrect
structured plan
unstructured discussion
A __________ system is used at all levels of an organization, and often by non-managerial staff.
supply chain management
decision supportCorrect
customer relationship management
enterprise resource planning
A carefully drawn can provide a useful representation of a system, whether existing or planned.
directed acyclic graph
data flow diagramCorrect
structure chart
business process model
A challenge with traditional file storage is _____.
low data redundancy
high data accuracy
high data integrityCorrect
low data misrepresentation
A collection of related records, such as all the records of a college's students, is called a _____.
fileCorrect
item
character
field
A computer network within a building, or a campus of adjacent buildings, is called a ______.
WAN (wide area network)
PAN (personal area network)
MAN (metropolitan area network)
LAN (local area network)Correct
A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee's password to fix a problem. This is an example of ____.
social engineeringCorrect
data mining
data encryption
social pathology
A database is an organized collection of related information.
TrueCorrect
A device that receives and analyzes packets and then routes them towards their destination.
RouterCorrect
A major effort of most businesses, especially retail businesses, in using customer relationship management (CRM) systems is to collect ____ about customers.