Your browser does not support JavaScript!

Information Management

Showing 151-225 of 377 answers

Experience in ____ certain systems, such as ERP and SCM systems, can teach the IT staff for how many minutes or seconds per year the system is likely to fail.
  • developing
  • operating Correct
  • archiving
  • maintaining
Expert systems (ESs) use data from a ___.
  • knowledge base Correct
  • model module
  • database
  • inference engine
Facts on their own are of unlimited use.
  • False Correct
First developed by Tim Berners-Lee in 1990.
  • HTML Correct
Gaining a strategic advantage over competitors requires the innovative application of information technologies.
  • Support of Strategies for Competitive Advantage Correct
Hardware diagnostics, file comparison, and file sorting are __________ performed by an operating system.
  • object codes
  • applications
  • procedures
  • utilities Correct
Higher-level _______ enable the use of English-like statements to accomplish a goal, and these statements are translated by special software into the machine language.
  • assembly languages
  • programming languages Correct
  • utility languages
  • procedural languages
Hijacking is carried out by surreptitiously installing a small program called a ____ on a computer.
  • mine
  • bot Correct
  • sinkhole
  • trapdoor
HTML is short for
  • Hypertext Markup Language Correct
Identify a principle of the Directive on Data Privacy that conflicts with U.S. practices. 
  • Businesses can refrain from informing people of the ways their data will be used 
  • Personal data can be processed only if the subject has given consent 
  • Organizations can purchase personal data from third parties and never notify the subject Correct
  • Personal data can be used for processes other than the original one
Identify an advantage of certifications.
  • Protects potential employers against charlatans Correct
  • Increases competition outside a closed group
  • Provides simple ways of measuring competence
  • Provides knowledge that remains up to date
Identify the risk factor in decision support systems that lead to ethical issues.
  • High processing costs
  • Errors in personal data Correct
  • Lack of sensitivity tests
  • Real time data processing
If ______ need to be used as one large data warehouse, special software tools can unify them and make them appear as one large data warehouse.
  • database models
  • data marts Correct
  • traditional databases
  • data dictionaries
If the cost-accounting procedures of a particular company are so specific that no commercially available software can perform them, the company must develop ____ software.
  • dynamic code
  • adapted
  • custom-designed Correct
  • own-interface
Images on a monitor are made up of small dots called _______.
  • dots
  • pixels Correct
  • grains
  • granules
Impact printers are more expensive than other types ofprinters but are more economical if you do lots of printing and are relativelyfast.
  • FALSE Correct
Implementing ways to use information technology in business includes designing the basiccomponents of information systems.
  • FALSE Correct
In ____, criminals use personal information to attack organizational systems.
  • penetration testing
  • spear phishing Correct
  • spamming
  • hijacking
In ____, the old system is used along with the new system for a predetermined period of time.
  • cut-over conversion
  • flash cut conversion
  • parallel conversion Correct
  • phased conversion
In banking, ____ is employed to find profitable customers and patterns of fraud.
  • information integration
  • resource recovery
  • web scraping
  • data mining Correct
In caseof returns management, synchronizing material movements is a common issue thatneeds to be handled is called control.
  • TRUE Correct
In Japan, many people who order merchandise online prefer to pick it up at ____ called "konbini," and pay there for what they purchased.
  • logistic hubs
  • dealers' warehouses
  • centralized markets
  • convenience stores Correct
In relational database, a record or row is called a _____.
  • relation
  • table
  • tuple Correct
  • attribute
In the ___ phase of transferring data from a transactional database to a data warehouse, the builders create the files from transactional databases and save them on the server that will hold the data warehouse. 
  • extraction Correct
  • injection
  • loading
  • transformation
In the ____ phase, specialists ensure that all data is consistent.
  • extraction
  • loading
  • transformation Correct
  • divisional
In the ______ phase of data warehousing, specialists compare the data in the data warehouses with the original data to confirm completeness.
  • loading Correct
  • extraction
  • transformation
  • divisional
In the context of data management, _____ refers to all the occurrences sharing the same types of data.
  • encapsulation
  • entity Correct
  • metadata
  • schema
In the context of speed, the _______ of magnetic hard disks is still significantly better than that of CDs and their faster relatives, DVDs.
  • reliability
  • portability
  • transfer rate
  • durability
In the field of engineering, DSS models might simulate the ____ environment.
  • logical
  • business
  • financial
  • physical Correct
In the IT arena, hiring the services of another company to manage all or parts of the services that otherwise would be rendered by an IT unit of the organization is known as ____.
  • benchmarking
  • outsourcing Correct
  • tracking
  • licensing
In the permissive model of software ________, anyone can use modify, and make the software into a product that can be sold for profit.
  • licensing Correct
  • distributing
  • programming
  • dealing
In this phase, systems are in place and operating, enhancements and/or modifications to the system are developed and tested, and hardware and/or software is added or replaced.
  • Maintenance/Support Correct
Inference engine contains rules to solve a specific problem.
  • True Correct
Information systems also help store managers and other business professionals make better decisions.
  • Support of Business Decision Making Correct
Information Systems are used by tactical managers to monitor theorganization's current performance status.
  • FALSE Correct
Information that can be gleaned from stored data is ____.
  • experience
  • wisdom
  • intelligence
  • knowledge Correct
Inkjet printers are also slower than comparable laser printers.
  • True Correct
Inthe stage, defective or damaged goods are returned to the supplier by thecustomer.
  • Return Correct
Inthis stage, mainly concentrate on building a strong relationship with suppliersof the raw materials required for production.
  • Develop Correct
Inthis stage, the planning should mainly focus on designing a strategy thatyields maximum profit.
  • Plan Correct
Inthis stage, the products are designed, produced, tested, packaged, andsynchronized for delivery.
  • Make Correct
IP is stands for
  • Internet Protocol Correct
is a collection of facts organizedand processed so that they have additional value beyond the value of theindividual facts.
  • Information Correct
is can be described as: “an awareness and understanding of a set of information and the ways that information can be used to support a specific task or reach a decision”.
  • Knowledge Correct
is can be described as: “an awareness andunderstanding of a set of information and the ways that information can be usedto support a specific task or reach a decision”.
  • Knowlwdge Correct
is collected in order to create informationand knowledge about particular subjects that interest any given organization inorder for that organization to make better management decisions.
  • Data Correct
is often called the lead time.
  • cycle time Correct
is the process of building a model of a system
  • prototyping Correct
ISs, especially large ones, can often be broken into functional modules and phased into operation one at a time, a process called ____.
  • flash cut conversion
  • phased conversion
  • parallel conversion
  • cut-over conversion
It also plays a dominant role in maintaining the BI infrastructure.
  • The IT user Correct
It can be defined as themanagement of flow of products and services, which begins from the origin ofproducts and ends at the product’s consumption.
  • SCM Correct
IT companies that provide both hardware and software have seen revenue from ____ service portion of their business grow faster than from the sale of hardware and software.
  • licensing software
  • user-development
  • tailoring software
  • outsourcing Correct
It involves monitoring and evaluatingfeedback to determine whether a system is moving toward the achievement of itsgoal, it is called the  .
  • Control Correct
It is a ___ which solves the most complex issues in a specific domain.
  • computer application Correct
It is a form of transaction between businesses, such as one involving a manufacturer and wholesaler, or a wholesaler and a retailer
  • B2B Correct
It is a human-friendly name for a device on the Internet.
  • Domain Name Correct
It is a program that connects users to the Internet or network to send text messages.
  • Instant Messenger Correct
It is a set of processes, architectures, and technologies that convert raw data into meaningful information that drives profitable business actions.
  • Business Intelligence Correct
It is a set of rules that allow two (or more) devices to exchange information back and forth across the network.
  • protocol Correct
It is a suite of software and services to transform data into actionable intelligence and knowledge.
  • Business Intelligence Correct
It is a technology that takes an Internet signal and converts it into radio waves.
  • Wi-Fi Correct
It is a way of distributing audio files via the Internet.
  • Podcasting Correct
It is a way to easily distribute a list of headlines, update notices, and sometimes content to a wide number of people.
  • RSS Correct
It is an organized collection, because in a database, all data is described and associated with other data.
  • database Correct
It is as an umbrella term that encompasses e-commerce, e-sales, e-banking, e-learningand online communication.
  • e-business Correct
It is considered at the highest level of human intelligence and expertise.
  • Expert System Correct
It is data about the performance of asystem, it is the .
  • Feedback Correct
It is for storing non-numeric data that is brief, generally under 256 characters. The database designer can identify the maximum length of the text.
  • Text Correct
It is for storing numbers.
  • Number Correct
It is full of some very technical concepts based on some simple principles.
  • Networking Communication Correct
It is not important that the proposed design be tested for performance, and to ensure that it meets the requirements outlined during the analysis phase.
  • False Correct
It is the unique address of a network.
  • IP address Correct
It is used to query and analyze multi-dimensional data and produce information that can be viewed in different ways using multiple dimensions.
  • Online analytical processing Correct
It isused to query and analyze multi-dimensional data and produce information thatcan be viewed in different ways using multiple dimensions.
  • OLAP Correct
It refers the knowledge from the Knowledge Base
  • Inference Engine Correct
All courses