Your browser does not support JavaScript!

Information Management

Showing 76-150 of 377 answers

A network allows you to share internet connections, data and resourceswithin your business, improving both efficiency and speed of working.
  • TRUE Correct
A network device that connects multiple devices together and filters packets based on their destination within the connected devices
  • Switch Correct
A network device that connects two networks together and only allows packets through that are needed
  • bridge Correct
A new buzzword that has been capturing the attention of businesses lately is big data.
  • True Correct
A repeated field that links records between two tables, is a primary key in one table, and a ____ in the other field.
  • primary key
  • composite key
  • imitable key
  • foreign key Correct
A simple network device that connects other devices to the network and sends packets to all the devices connected to it.
  • hub Correct
A special form of the number data type that formats all values with a currency indicator and two decimal places.
  • Currency Correct
A switch will send a packet to another router; in other cases, it will send it directly to its destination.
  • False Correct
A system analyst is defined as an interactive and reliable computer-based decision-making system which uses both facts and heuristics to solve complex decision-making problems.
  • False Correct
A technological challenge to information systems is the way characters are usually represented by _____ in computers.
  • whole words
  • Unicode
  • bytes Correct
  • bits
A Web site that allows users to add and update content on the site using their own Web browser.
  • Wiki Correct
According to the ____, all legal matters are confined to the country from which a site operates.
  • country-of-origin principle Correct
  • country-of-destination principle
  • privacy laws
  • American Uniform Code Council (UCC)
According to the European Union, people ____.
  • have the right to object to the processing of personal data Correct
  • need not be disclosed the ways in which their personal data will be used
  • need not know that their personal data is being used by third parties
  • have no rights to obtain confirmation that data about them is being processed
After the planning phase, the SDLC includes four major phases: analysis, design, implementation, and ____.
  • support Correct
  • production
  • execution
  • documentation
Agile methods are an efficient approach to development when a system is ____, when it deals with unstructured problems, and when the users cannot specify all the requirements at the start of the project.
  • small Correct
  • complex
  • large
  • well-funded
All of these are advantages of Business Intelligence except one:
  • To improve invisibility Correct
Although ________ systems vary in sophistication, all receive voice input from a microphone or telephone and process it with software.
  • speech recognition Correct
  • sequential storage
  • parallel processing
  • solid-state storage
Although ____, part of the support phase of a system's lifecycle, is viewed by IS professionals as lacking in glamour, it should not be taken lightly or left to less-experienced professionals.
  • executive training
  • database design
  • analysis
  • maintenance Correct
Among the general statistical models, a ______ model is the best-fit straight-line relationship between two variables, such as sales and the money spent on marketing.
  • linear regression Correct
  • exponential curve
  • logarithmic statistical
  • quadratic
Among the methods for system development, ____ is clearly the best option for many small companies.
  • purchasing software
  • in-house development
  • outsourcing
  • software on demand Correct
An advantage of outsourcing IT services is that it ____.
  • reduces license and maintenance fee Correct
  • lengthens implementation cycles
  • increases control over IT operations
  • ensures the security of trade secrets
An alternative for households that cannot obtain cable or DSL connections to the Internet is _____.
  • T1 lines
  • T3 lines
  • optical carriers
  • fixed wireless Correct
An extranet might be viewed as connecting ____ of business partners.
  • usenets
  • intranets Correct
  • supernets
  • internets
An increasing amount of ____ in the financial services and many other industries are made in real time using DSSs.
  • data automation
  • materials management
  • decision making Correct
  • long-range forecasts
Anis a set of interrelated components that collect,manipulate, store, and disseminate data and information and provide a feedbackmechanism to meet an objective
  • Information System Correct
Applications that can be integrated with other software to create new useful applications are called ______.
  • coders
  • compilers
  • utilities
  • mashups Correct
are now rarely used except for special purposes.
  • impact printers Correct
are used by senior management to make non-routine decisions.
  • Decision support systems Correct
As a consumer, you regularly encounter information systems that support the business processes and operations at the many retail stores where you shop.
  • Support of Business Processes and Operations Correct
As an independent memory device, flash memory takes two main forms: as a memory card, and as a ______. 
  • USB port
  • index drive
  • index port
  • USB drive Correct
As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.
  • Unicode Correct
  • EBCDIC
  • ASCII code
  • eight-bit bytes
As whole the term ______ means for this purpose only.
  • Ad hoc Correct
Assumptions and constraints should also be documented.
  • True Correct
Astrategic information system is not developed to respond to the corporateworld and many business initiatives.
  • FALSE Correct
At this stage, business needs are studied with the intention of making business processes more efficient.
  • Analysis Correct
Audio Modeling helps us understand and organize complex endeavors.
  • False Correct
BI also helps to improve the visibility of these processes and make it possible to identify any areas which need attention.
  • True Correct
BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.
  • SQL Server Correct
  • DB2
  • DBMS
  • MySQL
BI system also helps organizations as decision makers get an overall bird's eye view through typical BI features like dashboards and scorecards
  • True Correct
BI system assigns accountability in the organization as there must be someone who should own accountability and ownership for the organization's performance against its set goals
  • True Correct
BI system helps them to get fresh insights to develop unique business strategies.
  • True Correct
BI takes out all complexity associated with business processes. It also automates analytics by offering predictive analysis, computer modeling, bench marking and other methodologies
  • True Correct
Bluetooth was created in ________by______________, it was intended to replace wired connections between devices.
  • 1994; Ericsson Correct
Both data-mining and OLAP software are often integrated into ____ for the purpose of collecting business intelligence about customers.
  • HRM systems
  • SCM systems
  • ERP systems
  • CRM systems Correct
Building several technologies into a single piece of hardware is called _________. 
  • technology resurgence
  • parallel technology
  • computer convergence
  • technology convergence Correct
Businesses use ______ to analyze data.
  • ideas
  • facts
  • models Correct
  • beliefs
Businesses use _______ to save on travel costs and lodging, car fleets, and the time of highly salaried employees incurred on bringing together employees working in different organizations or at different sites in the same organization.  
  • hotspots
  • videoconferencing Correct
  • graphic communications
  • access points
By using cookies and recording shoppers' movements, ____ software can create electronic consumer profiles for each shopper and buyer.
  • CRM Correct
  • SQL
  • XML
  • CGI
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.
  • secure sockets layer (SSL)
  • security assertion markup language (SAML)
  • mandatory access control (MAC)
  • single sign-on (SSO) Correct
Clicking different areas of a map can zoom in and out as well as bring up related information in the form of other maps or text, utilizing the ____ capabilities of the web to the fullest.
  • storage
  • hypertext
  • multimedia Correct
  • hypergraphics
CMR is a softwareallows for more efficient communication with your prospects and clients.
  • FALSE Correct
Coding a message into a form unreadable to an interceptor is called ____.
  • modulation
  • classification
  • encryption
  • demodulation
Companies might offer two versions of their sites, one for wide bandwidth and another for ____.
  • short wave
  • wide frequency
  • weak bandwidth
  • narrow bandwidth Correct
Companies should not rely on end users to develop applications that ____.
  • will be used briefly and discarded
  • can be maintained by the users themselves
  • are vital for the organization's survival Correct
  • are needed immediately
Companies such as Razorfish, DoubleClick, and Engage Software use ____ to collect consumer data.
  • riskware
  • spyware Correct
  • middleware
  • malware
Companies that provide IT services are commonly called ____.
  • vendors Correct
  • dealers
  • users
  • clients
Companies that sell online maintain large warehouses and pay for picking, packing, and shipping, three activities known as _____.
  • pure play
  • profiling
  • auctioning
  • fulfillment Correct
Compared to the Universal Product Code (UPC), the additional bar in the _____ identifies a product's country of origin.
  • GTIN-14 bar code
  • EAN bar code Correct
  • RFID code
  • EZ code
Computer networks are systems ofinformation processing components that use a variety of hardware, software,data management, and telecommunications network technologies.
  • TRUE Correct
consists of raw facts, such as an employeenumber, total hours worked in a week, inventory part numbers, or sales orders.
  • Data Correct
Contracts for ____ software development might be incompatible with agile development methods.
  • outsourced Correct
  • open source
  • licensed
  • rented
Current microcomputers have words of _____ and 64 bits.
  • 48
  • 24
  • 16
  • 32 Correct
Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions
  • True Correct
Data warehouses could be regarded as a type of ____, where new useful information is the precious find.
  • vault
  • reservoir
  • mine Correct
  • wheel
DBMS is stands for
  • Database Management System Correct
Deliverable then need to be documented along with the project scope.
  • True Correct
Determining which stock will yield the highest return by the end of the year is an example of a _______ problem.
  • unstructured
  • limited
  • semi-structured
  • structured
Different ____ can significantly impact what a company may or may not display from its servers.
  • national standards followed across nations
  • time zones across global regions
  • payment mechanisms used in e-commerce
  • laws regarding free speech Correct
DNS which acts as the directory on the Internet.
  • True Correct
Domain name is used if you had to try to remember the IP address of every web server you wanted to access, the Internet would not be nearly as easy to use.
  • False Correct
Duplication of applications is one of the major drawbacks of ____.
  • outsourcing
  • licensing
  • using software as a service
  • user development Correct
During this phase of SDLC, the security architecture is designed.
  • Design Correct
E-business and e-commerceapplications involve interconnected business information systems under applications.
  • TRUE Correct
Even if storage cost is not as attractive as that of CDs, portability and the fact that their ports are ubiquitous in PCs might push one toward selecting a ______.
  • flash disk
  • Zip disk
  • USB flash drive Correct
  • memory card
Every time you download a file from a Web site or attach files to e-mail, you are using a ______ application. 
  • POP
  • NNTP
  • TCP
  • FTP Correct
All courses