A network allows you to share internet connections, data and resourceswithin your business, improving both efficiency and speed of working.
TRUECorrect
A network device that connects multiple devices together and filters packets based on their destination within the connected devices
SwitchCorrect
A network device that connects two networks together and only allows packets through that are needed
bridgeCorrect
A new buzzword that has been capturing the attention of businesses lately is big data.
TrueCorrect
A repeated field that links records between two tables, is a primary key in one table, and a ____ in the other field.
primary key
composite key
imitable key
foreign keyCorrect
A simple network device that connects other devices to the network and sends packets to all the devices connected to it.
hubCorrect
A special form of the number data type that formats all values with a currency indicator and two decimal places.
CurrencyCorrect
A switch will send a packet to another router; in other cases, it will send it directly to its destination.
FalseCorrect
A system analyst is defined as an interactive and reliable computer-based decision-making system which uses both facts and heuristics to solve complex decision-making problems.
FalseCorrect
A technological challenge to information systems is the way characters are usually represented by _____ in computers.
whole words
Unicode
bytesCorrect
bits
A Web site that allows users to add and update content on the site using their own Web browser.
WikiCorrect
According to the ____, all legal matters are confined to the country from which a site operates.
country-of-origin principleCorrect
country-of-destination principle
privacy laws
American Uniform Code Council (UCC)
According to the European Union, people ____.
have the right to object to the processing of personal dataCorrect
need not be disclosed the ways in which their personal data will be used
need not know that their personal data is being used by third parties
have no rights to obtain confirmation that data about them is being processed
After the planning phase, the SDLC includes four major phases: analysis, design, implementation, and ____.
supportCorrect
production
execution
documentation
Agile methods are an efficient approach to development when a system is ____, when it deals with unstructured problems, and when the users cannot specify all the requirements at the start of the project.
smallCorrect
complex
large
well-funded
All of these are advantages of Business Intelligence except one:
To improve invisibilityCorrect
Although ________ systems vary in sophistication, all receive voice input from a microphone or telephone and process it with software.
speech recognitionCorrect
sequential storage
parallel processing
solid-state storage
Although ____, part of the support phase of a system's lifecycle, is viewed by IS professionals as lacking in glamour, it should not be taken lightly or left to less-experienced professionals.
executive training
database design
analysis
maintenanceCorrect
Among the general statistical models, a ______ model is the best-fit straight-line relationship between two variables, such as sales and the money spent on marketing.
linear regressionCorrect
exponential curve
logarithmic statistical
quadratic
Among the methods for system development, ____ is clearly the best option for many small companies.
purchasing software
in-house development
outsourcing
software on demandCorrect
An advantage of outsourcing IT services is that it ____.
reduces license and maintenance feeCorrect
lengthens implementation cycles
increases control over IT operations
ensures the security of trade secrets
An alternative for households that cannot obtain cable or DSL connections to the Internet is _____.
T1 lines
T3 lines
optical carriers
fixed wirelessCorrect
An extranet might be viewed as connecting ____ of business partners.
usenets
intranetsCorrect
supernets
internets
An increasing amount of ____ in the financial services and many other industries are made in real time using DSSs.
data automation
materials management
decision makingCorrect
long-range forecasts
Anis a set of interrelated components that collect,manipulate, store, and disseminate data and information and provide a feedbackmechanism to meet an objective
Information SystemCorrect
Applications that can be integrated with other software to create new useful applications are called ______.
coders
compilers
utilities
mashupsCorrect
are now rarely used except for special purposes.
impact printersCorrect
are used by senior management to make non-routine decisions.
Decision support systemsCorrect
As a consumer, you regularly encounter information systems that support the business processes and operations at the many retail stores where you shop.
Support of Business Processes and OperationsCorrect
As an independent memory device, flash memory takes two main forms: as a memory card, and as a ______.
USB port
index drive
index port
USB driveCorrect
As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.
UnicodeCorrect
EBCDIC
ASCII code
eight-bit bytes
As whole the term ______ means for this purpose only.
Ad hocCorrect
Assumptions and constraints should also be documented.
TrueCorrect
Astrategic information system is not developed to respond to the corporateworld and many business initiatives.
FALSECorrect
At this stage, business needs are studied with the intention of making business processes more efficient.
AnalysisCorrect
Audio Modeling helps us understand and organize complex endeavors.
FalseCorrect
BI also helps to improve the visibility of these processes and make it possible to identify any areas which need attention.
TrueCorrect
BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.
SQL ServerCorrect
DB2
DBMS
MySQL
BI system also helps organizations as decision makers get an overall bird's eye view through typical BI features like dashboards and scorecards
TrueCorrect
BI system assigns accountability in the organization as there must be someone who should own accountability and ownership for the organization's performance against its set goals
TrueCorrect
BI system helps them to get fresh insights to develop unique business strategies.
TrueCorrect
BI takes out all complexity associated with business processes. It also automates analytics by offering predictive analysis, computer modeling, bench marking and other methodologies
TrueCorrect
Bluetooth was created in ________by______________, it was intended to replace wired connections between devices.
1994; EricssonCorrect
Both data-mining and OLAP software are often integrated into ____ for the purpose of collecting business intelligence about customers.
HRM systems
SCM systems
ERP systems
CRM systemsCorrect
Building several technologies into a single piece of hardware is called _________.
technology resurgence
parallel technology
computer convergence
technology convergenceCorrect
Businesses use ______ to analyze data.
ideas
facts
modelsCorrect
beliefs
Businesses use _______ to save on travel costs and lodging, car fleets, and the time of highly salaried employees incurred on bringing together employees working in different organizations or at different sites in the same organization.
hotspots
videoconferencingCorrect
graphic communications
access points
By using cookies and recording shoppers' movements, ____ software can create electronic consumer profiles for each shopper and buyer.
CRMCorrect
SQL
XML
CGI
CIOs often cite ____ as an effective way to bring down the amount of work their subordinates must do.
secure sockets layer (SSL)
security assertion markup language (SAML)
mandatory access control (MAC)
single sign-on (SSO)Correct
Clicking different areas of a map can zoom in and out as well as bring up related information in the form of other maps or text, utilizing the ____ capabilities of the web to the fullest.
storage
hypertext
multimediaCorrect
hypergraphics
CMR is a softwareallows for more efficient communication with your prospects and clients.
FALSECorrect
Coding a message into a form unreadable to an interceptor is called ____.
modulation
classification
encryption
demodulation
Companies might offer two versions of their sites, one for wide bandwidth and another for ____.
short wave
wide frequency
weak bandwidth
narrow bandwidthCorrect
Companies should not rely on end users to develop applications that ____.
will be used briefly and discarded
can be maintained by the users themselves
are vital for the organization's survivalCorrect
are needed immediately
Companies such as Razorfish, DoubleClick, and Engage Software use ____ to collect consumer data.
riskware
spywareCorrect
middleware
malware
Companies that provide IT services are commonly called ____.
vendorsCorrect
dealers
users
clients
Companies that sell online maintain large warehouses and pay for picking, packing, and shipping, three activities known as _____.
pure play
profiling
auctioning
fulfillmentCorrect
Compared to the Universal Product Code (UPC), the additional bar in the _____ identifies a product's country of origin.
GTIN-14 bar code
EAN bar codeCorrect
RFID code
EZ code
Computer networks are systems ofinformation processing components that use a variety of hardware, software,data management, and telecommunications network technologies.
TRUECorrect
consists of raw facts, such as an employeenumber, total hours worked in a week, inventory part numbers, or sales orders.
DataCorrect
Contracts for ____ software development might be incompatible with agile development methods.
outsourcedCorrect
open source
licensed
rented
Current microcomputers have words of _____ and 64 bits.
48
24
16
32Correct
Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions
TrueCorrect
Data warehouses could be regarded as a type of ____, where new useful information is the precious find.
vault
reservoir
mineCorrect
wheel
DBMS is stands for
Database Management SystemCorrect
Deliverable then need to be documented along with the project scope.
TrueCorrect
Determining which stock will yield the highest return by the end of the year is an example of a _______ problem.
unstructured
limited
semi-structured
structured
Different ____ can significantly impact what a company may or may not display from its servers.
national standards followed across nations
time zones across global regions
payment mechanisms used in e-commerce
laws regarding free speechCorrect
DNS which acts as the directory on the Internet.
TrueCorrect
Domain name is used if you had to try to remember the IP address of every web server you wanted to access, the Internet would not be nearly as easy to use.
FalseCorrect
Duplication of applications is one of the major drawbacks of ____.
outsourcing
licensing
using software as a service
user developmentCorrect
During this phase of SDLC, the security architecture is designed.
DesignCorrect
E-business and e-commerceapplications involve interconnected business information systems under applications.
TRUECorrect
Even if storage cost is not as attractive as that of CDs, portability and the fact that their ports are ubiquitous in PCs might push one toward selecting a ______.
flash disk
Zip disk
USB flash driveCorrect
memory card
Every time you download a file from a Web site or attach files to e-mail, you are using a ______ application.