The data analyst is a statistician who always needs to drill deep down into data.
The Professional Data AnalystCorrect
The data is time-variant this means that whenever data is loaded into the data warehouse, it receives a time stamp, which allows for comparisons between different time periods.
TrueCorrect
The design phase is concerned with the physical construction of the system. Included are the design or configuration of the network ,design of user interfaces,design of system interfaces and security issues.
TrueCorrect
The developers of ______ can obtain the source code free of charge, usually on the web.
multimedia software
proprietary software
open source softwareCorrect
hypermedia software
The development of a new information system is economically justified if the ____.
costs exceed returns
benefits outweigh the costsCorrect
operational costs are high
return on investment is negative
The disadvantage of waterfall development is that it allows for departmentalization and managerial control.
FalseCorrect
The first step in systems analysis is ____, which determines whether there is a real need for a system and whether the system as conceived is feasible.
search
investigationCorrect
research
quest
The frequently asked questions (FAQs) pages of many companies have been replaced with options for ______.
graphical data
statistical survey
questionnaires
open-ended questions
The fundamental unit of data transmitted over the Internet.
PacketCorrect
The Greek word tele, which means "______," is part of such words as "telephone," "teleconference," and other words referring to technologies that allow communications over large distances.
far
distanceCorrect
path
away
The inference engine is the brain of the expert system.
TrueCorrect
The is the portion of customerdemands that can be easily satisfied from the stock available.
order fill rateCorrect
The IT users can be found from across the organization.
FalseCorrect
The lack of a ____ in Big Data can make data collected from nontraditional sources a challenge to analyze.
nontraditional data
data warehouse
granular level of storage
traditional data structureCorrect
The level is concerned withperforming day to day business transactions of the organization.
operationalCorrect
The major advantage of mobile phone is that _______.
they are attached to offices
they use Internet-based phone services
they create a virtual private network
they are attached to peopleCorrect
The major downside of internet service provided by television cable firms is that cable _____.
nodes are shared by all the subscribers connected to the cableCorrect
networks are not as secured as other networking services
cannot provide Internet access
provides services only to one subscriber at a time
The most common computer-related type of repetitive-stress injury is _______.
upper-body discomfort
headache
double vision
carpal tunnel syndromeCorrect
The most important and pervasive set of protocols for telecommunications and networks today is called _____.
WPA
CDMA
NFC
TCP/IPCorrect
The most popular OOP languages are Java, Visual Basic, and ______.
XML
HTML
HTTP
C++/CCorrect
The motive for developing and improving _________ is not monetary, but rather the satisfaction of solving programming problems and the recognition of one's contribution.
proprietary software
packaged software
multimedia software
open source softwareCorrect
The number next to ______ refers to data speed in multiples of 51.84 Mbps, considered the base rate bandwidth of a very high connection speed service.
Wi-Fi
BPL
OCCorrect
DSL
The part of the BI software application that parses the questions entered by employees is known as the ____.
network layer
session layer
data link layer
semantic layerCorrect
The popular name of an interface for business intelligence tools is ____.
graphic user interface
whiteboard
dashboardCorrect
command line interface
The process of _____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences.
localization
glocalizationCorrect
globalization
socialization
The purpose of ____ is mainly to learn where to find information about a given subject.
knowledge managementCorrect
data mining
business intelligence
business analytics
The purpose of _______ is to manage computer resources and perform routine tasks that are not specific to any application.
system softwareCorrect
production software
packaged software
multimedia software
The purpose of a _____ is to create the impression that the client maintains its own server.
proxy server
mirror server
dynamic server
virtual private serverCorrect
The recent trend in less rich countries is to adopt ____ to avoid high costs.
free open source softwareCorrect
software with restricted source code
paid licenses
a single standard for information systems
The smallest piece of data is called a ___.
query
character
field
record
The spiral life cycle is shown as a spiral model that begins with the planning phase first from the center (inward) of the spiral, eventually working its way outward, over and over again, until completion of the project.
TrueCorrect
The standard ______ was developed for devices that communicate with each other within a short range of up to 10 meters (33 feet) in the office, at home, and in motor vehicles.
WiMAX
MBWA
BluetoothCorrect
Wi-Fi
The system analysis phase focuses on what the system will do in an effort that views all stakeholders, as viable sources of information.
TrueCorrect
The term betadata can be understood as “data about data.”
FalseCorrect
The term business-to-business refers to the process of selling products and services directly between consumers who are the end-users of its products or services.
falseCorrect
The term knowledge acquisition means how to get required domain knowledge by the expert system.
TrueCorrect
The term refers to such massively large data sets that conventional database tools do not have the processing power to analyze them.
new buzzwordCorrect
The three major components of a DSS are a data management module, a model management module, and a _____ module.
dialogCorrect
network
inference engine
knowledge base
There are two basic types of access modes for data storage: and direct (random) access.
haphazard
selective
sequentialCorrect
indirect
There are two overall approaches to maintaining data: the traditional file approach—which has no mechanism for tagging, retrieving, and manipulating data—and the _____, which does have this mechanism.
asymmetric approach
object-oriented approach
indexed file approach
database approachCorrect
These are suitable for most office printing needs.
Laser printersCorrect
These are usually small text files, given ID tags that are stored on your computer's browser directory or program data subfolders.
cookiesCorrect
These radio waves can be picked up within a radius of approximately ________ by devices with a wireless adapter
65 feetCorrect
This component takes the user's query in a readable form and passes it to the inference engine.
User interfaceCorrect
This data type allows for text longer than 256 characters
Paragraph TextCorrect
This first phase of the development life cycle, security considerations are key to diligent and early integration, thereby ensuring that threats, requirements, and potential constraints in functionality and integration are considered.
PlanningCorrect
This internal set of web pages is called an extranet.
FalseCorrect
This section addresses security considerations unique to the second SDLC phase.
AnalysisCorrect
Thisstage is basically the logistics phase, where customer orders are accepted anddelivery of the goods is planned.
DeliverCorrect
To ensure compatibility with other applications within an organization, the organization's IT professionals should adopt and supply_________tools to interested users.
licensed development
in-house development
standard developmentCorrect
commissioned development
To find the ____, the net present value of the system is calculated by combining the net present value of the costs of the system with the net present value of the benefits of the system.
rate of return (ROR)
return on assets (ROA)
return on capital (ROC)
return on investment (ROI)Correct
To link records from one table with records of another table, the tables must have at least one field in common, and that field must be a ____ field for one of the tables.
foreign key
primary keyCorrect
main key
imitable key
Transaction processing systems are used torecord day to day business transactions of the organization.
TRUECorrect
Transactional data is copied into a ______, which is a separate data repository.
database schema
data warehouseCorrect
traditional database
data dictionary
Two qualities to check when purchasing a laser or ink-jet printer are speed, measured in ______, and density, measured in dots per inch (DPI).
characters per second (cps)
Kbytes per second (Kbps)
words per minute (wpm)
pages per minute (PPM)Correct
Typically, ____ is fairly simple and limited in scope.
user-developed softwareCorrect
licensed software
in-house-developed software
commissioned software
VoIP is stands for
voice over internet protocolCorrect
Web enabled refers to a product or service that can be used through, or in conjunction with, the World Wide Web.
trueCorrect
When ______ a software package, the buyer gains several benefits such as immediate system availability, high quality, low price, and available support.
outsourcing
developing
licensingCorrect
commissioning
When a device intends to send a message to another device,it breaks the message down into smaller pieces, called packets.
TrueCorrect
When a packet is sent from one device out over the Internet, it does follow a straight path to its destination.
FalseCorrect
When a system is developed by a software vendor for a wide market rather than for a specific client, conversion often takes place at ___.
beta sitesCorrect
alpha sites
delta sites
gamma sites
When building a new database, users must first build a _____.
structure
model
schemaCorrect
relationship
When executives talk about productivity tools, they really mean computer programs, commonly known as software _____.
utilities
devices
applicationsCorrect
sites
When requesting vendor bids, the project management team prepares a ___, a document specifying all the system requirements and soliciting a formal plan from each vendor contacted.
request for proposal (RFP)Correct
request for information (RFI)
request for quotation (RFQ)
request for comments (RFC)
When soliciting vendor details, the project manager sends a ____ to the vendors identified, requesting general, somewhat informal information about a product.
request for comments (RFC)
request for proposal (RFP)
request for quotation (RFQ)
request for information (RFI)Correct
Which of the following is a good practice to consider when designing websites for an international audience?
Plan the site before developingCorrect
Do not be egalitarian
Use automated methods to translate content
Do not tailor each local site to local preferences
Which of the following is true of objective-oriented programming languages?
They require more code than other languages
Operations are linked to the data that they run onCorrect
Their primary emphasis is on the procedure for performing a task
Data and the operations to manipulate the data are kept separate from each other
Which of the following is true of operating systems?
Windows operating systems are considered to be more user- friendly than Mac operating systems
Operating systems are not expected to function if the user makes a mistake
Operating systems based on UNIX are known to be unstable
Stable operating systems do not cause a computer to freeze or produce error messagesCorrect
Which of the following statements is true about radio frequency identification tags?
They are not always flatCorrect
They need enormous power
They should be several square inches in size
They do not have a memory to store data
While ____ might sound benign, many privacy advocates claim that it violates privacy rights.
cookie profiling
load balancing
reverse auctioning
consumer profilingCorrect
While blogging is publishing text and other visual material, _____ is publishing sound and video.
hosting
crowdsourcing
posting
podcastingCorrect
While the SDLC or any other waterfall approach requires users to sign off on their requirements and then wait for the system to be completed, ____ encourage users' involvement throughout the process.
traditional methods
spiral methods
sequential methods
agile methodsCorrect
Wi-fi is an important wireless technology that has enabled many functionalities that are used every day.