1. The ability to _____ is a characteristic of an mis system.
2. To get the number of items stored in a listbox, use the ________ property.
3. The web page displayed when a user first visits a site is called a(n) _____.
4. The term hard drive refers collectively to hard disks and ______.
5. The principal manager of the is department is typically referred to as the ______.
6. The ________ manager makes tactical decisions to implement the strategic goals of an organization.
7. Search tools typically use a(n) ______, which stores a variety of information about a file.
8. Scheduling and assigning employees might be handled by a _____.
9. most current displays are a type of ______ display.
10. Instead of using the if-then-else rules that expert systems use, _____ use patterns.
11. ____ software helps you carry out tasks using a computer, such as editing a photo.
12. ______ is a form of database processing that supports top-down, query-driven data analysis.
13. In the five-component model, the process of automation is a process of moving work from ________.
14. In the design of an organization, another name for ""market structure"" is ""________ structure.""
15. In the criterion, <=250, the operator will return values for the specified field that are ____.
16. Click-through rate reflects ________.
17. The ____ e-commerce model is an example of the government selling confiscated cars at auction.
18. According to the disruptive growth engine, executive leadership will allow a firm to ________.
19. According to brooks' law, adding more people to a late project ________.
20. A(n) ________ is a formal description of a system's response to use and misuse scenarios.
21. A(n) ________ capability allows users to view more detailed views of data.
22. A social bookmarking site is dedicated to providing all of the following except ________.
23. A schematic diagram that uses symbols to represent the parts of a system is a(n) ____.
24. A ________ is a group of related data that can be stored, sorted, organized, and queried.
25. A ________ involves balancing three critical factors: requirements, cost, and time.
26. A ________ has a microchip that is loaded with identifying data.
27. ________ solicits online input such as product ratings from consumers.
28. ________ is an example of an inter-enterprise information system.
29. ________ behavior is not conforming to a set of approved standards of behavior.
30. ________ are reports produced when something out of predefined bounds occurs.
31. ________ are predesigned procedures for using software products.
32. ________ a site means to take extraordinary measures to reduce a system's vulnerability.
33. ________ is used to solve large-scale computing problems.
34. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.
35. ________ is redistributing goods or products we own by sharing them.
36. ________ is a management methodology that translates a firm's goals into operational targets.
37. You can sort files ____.
38. A _____ is automatically launched by some trigger and appears behind the active window.
39. In the ________ phase a prototype of the website will often be created.
40. Costs that do not vary according to production volume are called _____.
41. A social media policy used by an organization is a statement that ________.
42. Lead generation is a common departmental information system activity in the ________ department.
43. In the 1990s, business process management was known as ________.
44. In the _____, the production process begins with a forecast.
45. An internally focused system helps an organization coordinate with its ________.
46. ________ includes general management, finance, accounting, legal, and government affairs.
47. ____ enables business partners to send and receive information on business transactions.
48. Record keeping, payroll, and simple inventory problems are examples of ____ tasks.
49. Identifying the stage of a group's development is important to managers because ___________.
50. In most large organizations, the is department is divided into the following functions __________.
51. The executive level of an organization is also known as the ________ level.
52. The key use of the order promising module of supply chain management is to ________.
53. Peering usually takes place at neutral sites called _____.
54. A _____ can be as powerful as a desktop computer.
55. An internal user is one who is a ____.
56. A web ______ is a computer that delivers requested webpages to your computer or mobile device.
57. As water warms, it ________.
58. An executive information system (eis) is a branch of ____.
59. You use ________ to predict when a computer hardware system becomes saturated.
60. __________ are achieved by using middleware
61. Semistructured decisions are often used in _____.
62. In online analytical processing systems, ________ provide a way to summarize the data.
63. The basal nuclei (basal ganglia) ________.
64. By default, access and other dbmss create indexes automatically for the ____ keys.
65. Symmetric dsl usually has an upstream rate of ____ mbps.
66. The connection between two tables in a database is called a _________.
67. One of the challenges with unsupervised data mining is ________.
68. An organization that uses cloud services ________.
69. The data ____ component is used to add, delete, modify, and retrieve records from a database.
70. Data mining is more ________ than olap.
71. Control in a global information system (gis) requires _____.
72. Significant changes in is should trigger a reassessment of the _____________.
73. Identifying customers is a responsibility of the ________ function.
74. In 2025, emergence in the context of management would most likely mean a(n) ________.
75. Identifying competitive advantages can be difficult and explains why they are typically __________.
76. E-commerce fulfills the product information activity using _____.
77. Discussion forums are better suited than emails in asynchronous communication because ________.
78. Business intelligence systems generate business intelligence by __________ data.
79. Browser-based database applications differ from traditional applications in that they ________.
80. A(n) ________, in which the highest bidder wins, is the most common form of auction.
81. A field or a group of fields that make a record unique in a table is called a(n) ________.
82. A business process is a network of ________ that receive inputs and produce outputs.
83. A business process in the ________ function is producing bills of material.
84. A build-to-order supply-chain model is also called a ________ model.
85. A ________ pretends to be a legitimate company and sends emails requesting confidential data.
86. A ________ is a worldwide-unique term that is affiliated with a public ip address.
87. ________ systems are designed to handle multiple concurrent transactions from customers.
88. ________ refers to the source, format, assumptions and constraints, and other facts about the data.
89. ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
90. ________ is defined as recorded facts or figures.
91. ________ is a popular commercial webinar product used in virtual sales presentations.
92. ________ delivers business intelligence to users without any request from the users.
93. ________ decisions are the most structured and have very little need for collaboration.
94. ________ can be induced by tens of thousands of repetitions under low-impact loads.
95. ________ are viruses that masquerade as useful programs or files.
96. When the granularity of data is too fine, ________.
97. Using a vpc, an organization can store its ________.
98. Traditional database application programs are ________.
99. The two types of visionary leadership are _____.
100. The traditional network design approach does not work well for _________ networks.
Web Application
Adobe Animate
Avid Media Composer
iMovie
Logic Pro
Microsoft Power Automate
Related MCQ's