1. Checklists with several items to be considered by respondents may be subject to _____.

2. In order to summarize qualitative data, a useful tool is a __________.

3. In a multiple rating list scale, ____.

4. An example of mathematical modeling software is ____

5. The ____ document is created during the requirements-gathering and analysis phase.

6. Organizing the database in computer disk storage is done in the ________ phase.

7. For communications equipment, m stands for ________.

8. Each variation in the sequence of actions required in a use case is a ____.

9. Each task or activity has a start date and ________, which determines its finish date.

10. Digital rights management (drm) offers ip holders the benefit of ________.

11. ____ feasibility determines whether there are specific budget limitations on a project decision.

12. ____ feasibility considers project risks due to reliance on a new, untested software package.

13. Software vendors usually bundle fixes of low-priority problems into larger groups called ________.

14. Information systems improve process quality by ________.

15. Some companies attempt to initiate problem recognition through ______.

16. The concept of the ""iron law"" of oligarchy was developed by sociologist ________.

17. The area under the normal curve to the right of mu equals _______.

18. Given the following perfect square trinomial, fill in the missing term. x2 − 16x + ____

19. Find the missing value to the nearest hundredth. sin ___ = 8/15

20. Find the missing value to the nearest hundredth. sin ___ = 7/12

21. 3 6 12 6 12 24 18 ___

22. Voluntary deductions include ____.

23. The key idea of the transformation called translation is _____.

24. The expression, (5 > 57 % 8), evaluates to ____.

25. A ____________ variable can have values that are numbers on the real number line.

26. Binary variables are identified with the _____designation in the solver parameters dialog box.

27. Which one of the following statements is true? compare .98 ____ .980 using (<, >, =)

28. Sample size and the confidence level width have a (n) __________ relationship.

29. As the degrees of freedom increase, the t distribution approaches the _____ distribution.

30. A critical value, z subscript alpha, denotes the _______.

31. ________ is a single value used to describe the center point of a data set.

32. The distribution of sample means ____.

33. The standard error of estimate can be used for constructing a(n) __________ interval about a value.

34. In point estimation, data from the _____.

35. A contingency table would be used to summarize data such as ________.

36. A scatter diagram is a(n) __________ step in exploring a relationship between two variables.

37. The t- distribution for developing a confidence interval for a mean has _____ degrees of freedom.

38. A skewed distribution typically has _____ tail(s) and a normal distribution has ____ tail(s).

39. The ________ measures the total variation in the dependent variable in simple regression analysis.

40. The ________ measures a distribution's standard deviation in terms of its percentage to the mean.

41. The test statistics for one-way anova follows the _______.

42. The probability that a normal random variable is less than its mean is _______.

43. The parameter p represents the ________ of successes in the population.

44. Children ages 2-5 watch an average of ____ hours of television a week.

45. The vertical _____ of the function secant are determined by the points that are not in the domain.

46. Use the graph below to fill in the blank with the correct number: f(1) = _______

47. Twice a certain number is tripled. the resulting number is _____.

48. The sampling distribution of chi-square is ____.

49. The expression 3r - 6 can be written as _____.

50. The domain of the sine function is _____.

51. The decimal form 1.46 becomes _______ expressed as a percent.

52. The _______ of a discrete random variable represents the mean value of the outcomes.

53. The ___ of an equation is formed by all the points in the plane that make it true.

54. Positive correlation is to negative correlation as _____ is to _____.

55. All businesses can discriminate against workers based on _____.

56. Clients want to work with people who can _______ problems, not with those who merely ______ them.

57. To divide a number by 1,000, move the decimal point _____.

58. If r is a real zero of even multiplicity of a function f, then the graph of f ____ the x-axis at r.

59. All of these statements are true about the maintenance phase except ________.

60. An event that occurs by reaching a point in time is called a _______ event.

61. Older systems that often contain data of poor quality are called ________ systems.

62. __________ describes the potential revenue stream from a specific customer:

63. ________ processes span an organization and support activities in multiple departments.

64. When assessing _____, a systems analyst must consider the interaction between time and costs.

65. To enhance salespeople's ability to cross-sell, the organization can perform _______.

66. The analysis of attempting to solve a problem with information systems is called ________.

67. The _____ is a top-down representation of a process.

68. Strategic planning starts with a _____ that reflects a firm's vision, purpose, and values.

69. One of the dangers in researching vendor solutions is that users and analysts _______.

70. On a systems sequence diagram, ____ indicate(s) a true/false condition.

71. In the context of an organization's information system, external users _____.

72. In the ____ phase, analysts define the problem and generate alternatives for solving it.

73. In launching a new information system, the greatest risk occurs when a company ____.

74. In a typical organizational model, top managers _____.

75. If consumer data is stolen from a business's computers, ________.

76. Good _____ systems provide a framework for best practices in business management.

77. For real-world objects the state of an object is the same as its _______.

78. Extranets use _____ technology to make communication over the internet more secure.

79. Examples of tangible benefits include all of the following except a(n) ____.

80. Enterprise information systems can solve all the following problems except ________.

81. Customer relationship management applications include all of the following except ________.

82. Components of an information system consist of all of the following, except ________.

83. Business support systems ____.

84. Accountants rely heavily on information systems to do all of the following except ________.

85. A(n) ________ is a complicated set of possibly nonlinear equations.

86. A(n) ____ provides regular, routine, and timely information to decision makers.

87. A _____ must be achieved to fulfill a company's mission.

88. ________ should not be considered in the decision to kill a project.

89. ________ focuses on achieving quality as a primary goal of all individuals within an organization

90. ________ are an intangible benefit of information systems.

91. Is a model that asks the traditional fact-finding questions in a systems development context.

92. To identify a problem, a manager ________.

93. To make effective decisions in today's fast-moving world, managers need to ________.

94. When problems are ________, managers must rely on ________ in order to develop unique solutions.

95. We all use shortcuts or ________ when making decisions.

96. The _____ approach to performance feedback is used by most managers.

97. The _____ approach forces members of a decision making group to reach a unanimous decision.

98. Programmed decision making is a(n) ______ process.

99. In planning, the goal is to come up with a clear and _____ map to follow in future activities.

100. Groups decisions are usually ________ individual decisions.

Business Statistics

Physics

Chemistry

Chemical Science

Sociology

Astronomy

Related MCQ's