Your browser does not support JavaScript!

Information Management

Showing 301-375 of 377 answers

The data analyst is a statistician who always needs to drill deep down into data.
  • The Professional Data Analyst Correct
The data is time-variant this means that whenever data is loaded into the data warehouse, it receives a time stamp, which allows for comparisons between different time periods.
  • True Correct
The design phase is concerned with the physical construction of the system. Included are the design or configuration of the network ,design of user interfaces,design of system interfaces and security issues.
  • True Correct
The developers of ______ can obtain the source code free of charge, usually on the web.
  • multimedia software
  • proprietary software
  • open source software Correct
  • hypermedia software
The development of a new information system is economically justified if the ____.
  • costs exceed returns
  • benefits outweigh the costs Correct
  • operational costs are high
  • return on investment is negative
The disadvantage of waterfall development is that it allows for departmentalization and managerial control.
  • False Correct
The first step in systems analysis is ____, which determines whether there is a real need for a system and whether the system as conceived is feasible.
  • search
  • investigation Correct
  • research
  • quest
The frequently asked questions (FAQs) pages of many companies have been replaced with options for ______.
  • graphical data
  • statistical survey
  • questionnaires
  • open-ended questions
The fundamental unit of data transmitted over the Internet.
  • Packet Correct
The Greek word tele, which means "______," is part of such words as "telephone," "teleconference," and other words referring to technologies that allow communications over large distances.
  • far
  • distance Correct
  • path
  • away
The inference engine is the brain of the expert system.
  • True Correct
The is the portion of customerdemands that can be easily satisfied from the stock available.
  • order fill rate Correct
The IT users can be found from across the organization.
  • False Correct
The lack of a ____ in Big Data can make data collected from nontraditional sources a challenge to analyze.  
  • nontraditional data
  • data warehouse
  • granular level of storage
  • traditional data structure Correct
The level is concerned withperforming day to day business transactions of the organization.
  • operational Correct
The major advantage of mobile phone is that _______.
  • they are attached to offices
  • they use Internet-based phone services
  • they create a virtual private network
  • they are attached to people Correct
The major downside of internet service provided by television cable firms is that cable _____.
  • nodes are shared by all the subscribers connected to the cable Correct
  • networks are not as secured as other networking services
  • cannot provide Internet access
  • provides services only to one subscriber at a time
The most common computer-related type of repetitive-stress injury is _______.
  • upper-body discomfort
  • headache
  • double vision
  • carpal tunnel syndrome Correct
The most important and pervasive set of protocols for telecommunications and networks today is called _____.
  • WPA
  • CDMA
  • NFC
  • TCP/IP Correct
The most popular OOP languages are Java, Visual Basic, and ______.
  • XML
  • HTML
  • HTTP
  • C++/C Correct
The motive for developing and improving _________ is not monetary, but rather the satisfaction of solving programming problems and the recognition of one's contribution.
  • proprietary software
  • packaged software
  • multimedia software
  • open source software Correct
The number next to ______ refers to data speed in multiples of 51.84 Mbps, considered the base rate bandwidth of a very high connection speed service.
  • Wi-Fi
  • BPL
  • OC Correct
  • DSL
The part of the BI software application that parses the questions entered by employees is known as the ____.
  • network layer
  • session layer
  • data link layer
  • semantic layer Correct
The popular name of an interface for business intelligence tools is ____.
  • graphic user interface
  • whiteboard
  • dashboard Correct
  • command line interface
The process of _____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences.
  • localization
  • glocalization Correct
  • globalization
  • socialization
The purpose of ____ is mainly to learn where to find information about a given subject.
  • knowledge management Correct
  • data mining
  • business intelligence
  • business analytics
The purpose of _______ is to manage computer resources and perform routine tasks that are not specific to any application.
  • system software Correct
  • production software
  • packaged software
  • multimedia software
The purpose of a _____ is to create the impression that the client maintains its own server.
  • proxy server
  • mirror server
  • dynamic server
  • virtual private server Correct
The recent trend in less rich countries is to adopt ____ to avoid high costs.
  • free open source software Correct
  • software with restricted source code
  • paid licenses
  • a single standard for information systems
The smallest piece of data is called a ___.
  • query
  • character
  • field
  • record
The spiral life cycle is shown as a spiral model that begins with the planning phase first from the center (inward) of the spiral, eventually working its way outward, over and over again, until completion of the project.
  • True Correct
The standard ______ was developed for devices that communicate with each other within a short range of up to 10 meters (33 feet) in the office, at home, and in motor vehicles. 
  • WiMAX
  • MBWA
  • Bluetooth Correct
  • Wi-Fi
The system analysis phase focuses on what the system will do in an effort that views all stakeholders, as viable sources of information.
  • True Correct
The term betadata can be understood as “data about data.”
  • False Correct
The term business-to-business refers to the process of selling products and services directly between consumers who are the end-users of its products or services.
  • false Correct
The term knowledge acquisition means how to get required domain knowledge by the expert system.
  • True Correct
The term refers to such massively large data sets that conventional database tools do not have the processing power to analyze them.
  • new buzzword Correct
The three major components of a DSS are a data management module, a model management module, and a _____ module.
  • dialog Correct
  • network
  • inference engine
  • knowledge base
There are two basic types of access modes for data storage: and direct (random) access.
  • haphazard
  • selective
  • sequential Correct
  • indirect
There are two overall approaches to maintaining data: the traditional file approach—which has no mechanism for tagging, retrieving, and manipulating data—and the _____, which does have this mechanism.
  • asymmetric approach
  • object-oriented approach
  • indexed file approach
  • database approach Correct
These are suitable for most office printing needs.
  • Laser printers Correct
These are usually small text files, given ID tags that are stored on your computer's browser directory or program data subfolders.
  • cookies Correct
These radio waves can be picked up within a radius of approximately ________ by devices with a wireless adapter
  • 65 feet Correct
This component takes the user's query in a readable form and passes it to the inference engine.
  • User interface Correct
This data type allows for text longer than 256 characters
  • Paragraph Text Correct
This first phase of the development life cycle, security considerations are key to diligent and early integration, thereby ensuring that threats, requirements, and potential constraints in functionality and integration are considered.
  • Planning Correct
This internal set of web pages is called an extranet.
  • False Correct
This section addresses security considerations unique to the second SDLC phase.
  • Analysis Correct
Thisstage is basically the logistics phase, where customer orders are accepted anddelivery of the goods is planned.
  • Deliver Correct
To ensure compatibility with other applications within an organization, the organization's IT professionals should adopt and supply_________tools to interested users.
  • licensed development
  • in-house development
  • standard development Correct
  • commissioned development
To find the ____, the net present value of the system is calculated by combining the net present value of the costs of the system with the net present value of the benefits of the system.
  • rate of return (ROR)
  • return on assets (ROA)
  • return on capital (ROC)
  • return on investment (ROI) Correct
To link records from one table with records of another table, the tables must have at least one field in common, and that field must be a ____ field for one of the tables.
  • foreign key
  • primary key Correct
  • main key
  • imitable key
Transaction processing systems are used torecord day to day business transactions of the organization.
  • TRUE Correct
Transactional data is copied into a ______, which is a separate data repository. 
  • database schema
  • data warehouse Correct
  • traditional database
  • data dictionary
Two qualities to check when purchasing a laser or ink-jet printer are speed, measured in ______, and density, measured in dots per inch (DPI).
  • characters per second (cps)
  • Kbytes per second (Kbps)
  • words per minute (wpm)
  • pages per minute (PPM) Correct
Typically, ____ is fairly simple and limited in scope.
  • user-developed software Correct
  • licensed software
  • in-house-developed software
  • commissioned software
VoIP is stands for
  • voice over internet protocol Correct
Web enabled refers to a product or service that can be used through, or in conjunction with, the World Wide Web.
  • true Correct
When ______ a software package, the buyer gains several benefits such as immediate system availability, high quality, low price, and available support.
  • outsourcing
  • developing
  • licensing Correct
  • commissioning
When a device intends to send a message to another device,it breaks the message down into smaller pieces, called packets.
  • True Correct
When a packet is sent from one device out over the Internet, it does follow a straight path to its destination.
  • False Correct
When a system is developed by a software vendor for a wide market rather than for a specific client, conversion often takes place at ___.
  • beta sites Correct
  • alpha sites
  • delta sites
  • gamma sites
When building a new database, users must first build a _____.
  • structure
  • model
  • schema Correct
  • relationship
When executives talk about productivity tools, they really mean computer programs, commonly known as software _____.
  • utilities
  • devices
  • applications Correct
  • sites
When requesting vendor bids, the project management team prepares a ___, a document specifying all the system requirements and soliciting a formal plan from each vendor contacted.
  • request for proposal (RFP) Correct
  • request for information (RFI)
  • request for quotation (RFQ)
  • request for comments (RFC)
When soliciting vendor details, the project manager sends a ____ to the vendors identified, requesting general, somewhat informal information about a product.
  • request for comments (RFC)
  • request for proposal (RFP)
  • request for quotation (RFQ)
  • request for information (RFI) Correct
Which of the following is a good practice to consider when designing websites for an international audience?
  • Plan the site before developing Correct
  • Do not be egalitarian
  • Use automated methods to translate content
  • Do not tailor each local site to local preferences
Which of the following is true of objective-oriented programming languages?
  • They require more code than other languages
  • Operations are linked to the data that they run on Correct
  • Their primary emphasis is on the procedure for performing a task
  • Data and the operations to manipulate the data are kept separate from each other
Which of the following is true of operating systems?
  • Windows operating systems are considered to be more user- friendly than Mac operating systems
  • Operating systems are not expected to function if the user makes a mistake
  • Operating systems based on UNIX are known to be unstable
  • Stable operating systems do not cause a computer to freeze or produce error messages Correct
Which of the following statements is true about radio frequency identification tags?
  • They are not always flat Correct
  • They need enormous power
  • They should be several square inches in size
  • They do not have a memory to store data
While ____ might sound benign, many privacy advocates claim that it violates privacy rights.
  • cookie profiling
  • load balancing
  • reverse auctioning
  • consumer profiling Correct
While blogging is publishing text and other visual material, _____ is publishing sound and video.
  • hosting
  • crowdsourcing
  • posting
  • podcasting Correct
While the SDLC or any other waterfall approach requires users to sign off on their requirements and then wait for the system to be completed, ____ encourage users' involvement throughout the process.
  • traditional methods
  • spiral methods
  • sequential methods
  • agile methods Correct
Wi-fi is an important wireless technology that has enabled many functionalities that are used every day.
  • False Correct
Wi-Fi is stands for
  • Wireless Fidelity Correct
All courses