Note: This Question is unanswered, help us to find answer for this one
13. In the five-component model, the process of automation is a process of moving work from ________.
Answer
Correct Answer:
The human side to the computer side
Note: This Question is unanswered, help us to find answer for this one
14. In the design of an organization, another name for ""market structure"" is ""________ structure.""
Answer
Correct Answer:
Customer
Note: This Question is unanswered, help us to find answer for this one
15. In the criterion, <=250, the operator will return values for the specified field that are ____.
Answer
Correct Answer:
Less than or equal to 250
Note: This Question is unanswered, help us to find answer for this one
16. Click-through rate reflects ________.
Answer
Correct Answer:
The ratio of surfers who click on an ad divided by the number of times it was displayed
Note: This Question is unanswered, help us to find answer for this one
17. The ____ e-commerce model is an example of the government selling confiscated cars at auction.
Answer
Correct Answer:
G2B
Note: This Question is unanswered, help us to find answer for this one
18. According to the disruptive growth engine, executive leadership will allow a firm to ________.
Answer
Correct Answer:
Gain credibility and to bridge sustaining and disruptive product development
Note: This Question is unanswered, help us to find answer for this one
19. According to brooks' law, adding more people to a late project ________.
Answer
Correct Answer:
Makes the project later
Note: This Question is unanswered, help us to find answer for this one
20. A(n) ________ is a formal description of a system's response to use and misuse scenarios.
Answer
Correct Answer:
Test plan
Note: This Question is unanswered, help us to find answer for this one
21. A(n) ________ capability allows users to view more detailed views of data.
Answer
Correct Answer:
Drill-down
Note: This Question is unanswered, help us to find answer for this one
22. A social bookmarking site is dedicated to providing all of the following except ________.
Answer
Correct Answer:
To reconnect with colleagues for business progress
Note: This Question is unanswered, help us to find answer for this one
23. A schematic diagram that uses symbols to represent the parts of a system is a(n) ____.
Answer
Correct Answer:
Flow chart
Note: This Question is unanswered, help us to find answer for this one
24. A ________ is a group of related data that can be stored, sorted, organized, and queried.
Answer
Correct Answer:
Database
Note: This Question is unanswered, help us to find answer for this one
25. A ________ involves balancing three critical factors: requirements, cost, and time.
Answer
Correct Answer:
Trade-off
Note: This Question is unanswered, help us to find answer for this one
26. A ________ has a microchip that is loaded with identifying data.
Answer
Correct Answer:
Smart card
Note: This Question is unanswered, help us to find answer for this one
27. ________ solicits online input such as product ratings from consumers.
Answer
Correct Answer:
Crowdsourcing
Note: This Question is unanswered, help us to find answer for this one
28. ________ is an example of an inter-enterprise information system.
Answer
Correct Answer:
ARES
Note: This Question is unanswered, help us to find answer for this one
29. ________ behavior is not conforming to a set of approved standards of behavior.
Answer
Correct Answer:
Unethical
Note: This Question is unanswered, help us to find answer for this one
30. ________ are reports produced when something out of predefined bounds occurs.
Answer
Correct Answer:
Exception reports
Note: This Question is unanswered, help us to find answer for this one
31. ________ are predesigned procedures for using software products.
Answer
Correct Answer:
Inherent processes.
Note: This Question is unanswered, help us to find answer for this one
32. ________ a site means to take extraordinary measures to reduce a system's vulnerability.
Answer
Correct Answer:
Hardening
Note: This Question is unanswered, help us to find answer for this one
33. ________ is used to solve large-scale computing problems.
Answer
Correct Answer:
Grid computing
Note: This Question is unanswered, help us to find answer for this one
34. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.
Answer
Correct Answer:
Reporting analysis
Note: This Question is unanswered, help us to find answer for this one
35. ________ is redistributing goods or products we own by sharing them.
Answer
Correct Answer:
Collaborative consumption
Note: This Question is unanswered, help us to find answer for this one
36. ________ is a management methodology that translates a firm's goals into operational targets.
Answer
Correct Answer:
BPM
Note: This Question is unanswered, help us to find answer for this one
37. You can sort files ____.
Answer
Correct Answer:
No matter which view you use
Note: This Question is unanswered, help us to find answer for this one
38. A _____ is automatically launched by some trigger and appears behind the active window.
Answer
Correct Answer:
Pop-under ad
Note: This Question is unanswered, help us to find answer for this one
39. In the ________ phase a prototype of the website will often be created.
Answer
Correct Answer:
Design
Note: This Question is unanswered, help us to find answer for this one
40. Costs that do not vary according to production volume are called _____.
Answer
Correct Answer:
Fixed costs
Note: This Question is unanswered, help us to find answer for this one
41. A social media policy used by an organization is a statement that ________.
Answer
Correct Answer:
That delineates employees' rights and responsibilities
Note: This Question is unanswered, help us to find answer for this one
42. Lead generation is a common departmental information system activity in the ________ department.
Answer
Correct Answer:
Sales and marketing
Note: This Question is unanswered, help us to find answer for this one
43. In the 1990s, business process management was known as ________.
Answer
Correct Answer:
Business process reengineering
Note: This Question is unanswered, help us to find answer for this one
44. In the _____, the production process begins with a forecast.
Answer
Correct Answer:
Push model
Note: This Question is unanswered, help us to find answer for this one
45. An internally focused system helps an organization coordinate with its ________.
Answer
Correct Answer:
Its departments
Note: This Question is unanswered, help us to find answer for this one
46. ________ includes general management, finance, accounting, legal, and government affairs.
Answer
Correct Answer:
Firm Infrastructure
Note: This Question is unanswered, help us to find answer for this one
47. ____ enables business partners to send and receive information on business transactions.
Answer
Correct Answer:
Electronic data interchange
Note: This Question is unanswered, help us to find answer for this one
48. Record keeping, payroll, and simple inventory problems are examples of ____ tasks.
Answer
Correct Answer:
Structured
Note: This Question is unanswered, help us to find answer for this one
49. Identifying the stage of a group's development is important to managers because ___________.
Answer
Correct Answer:
When problems arise within the group, the manager will know how to help the group work through them
Note: This Question is unanswered, help us to find answer for this one
50. In most large organizations, the is department is divided into the following functions __________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
51. The executive level of an organization is also known as the ________ level.
Answer
Correct Answer:
Strategic
Note: This Question is unanswered, help us to find answer for this one
52. The key use of the order promising module of supply chain management is to ________.
Answer
Correct Answer:
Provide answers to customer relationship management queries regarding product availability, costs, and delivery times
Note: This Question is unanswered, help us to find answer for this one
53. Peering usually takes place at neutral sites called _____.
Answer
Correct Answer:
IXPs
Note: This Question is unanswered, help us to find answer for this one
54. A _____ can be as powerful as a desktop computer.
Answer
Correct Answer:
Laptop
Note: This Question is unanswered, help us to find answer for this one
55. An internal user is one who is a ____.
Answer
Correct Answer:
Worker in an organization
Note: This Question is unanswered, help us to find answer for this one
56. A web ______ is a computer that delivers requested webpages to your computer or mobile device.
Answer
Correct Answer:
Server
Note: This Question is unanswered, help us to find answer for this one
57. As water warms, it ________.
Answer
Correct Answer:
Decreases in density
Note: This Question is unanswered, help us to find answer for this one
58. An executive information system (eis) is a branch of ____.
Answer
Correct Answer:
DSS
Note: This Question is unanswered, help us to find answer for this one
59. You use ________ to predict when a computer hardware system becomes saturated.
Answer
Correct Answer:
Capacity planning
Note: This Question is unanswered, help us to find answer for this one
60. __________ are achieved by using middleware
Answer
Correct Answer:
Integrations
Note: This Question is unanswered, help us to find answer for this one
61. Semistructured decisions are often used in _____.
Answer
Correct Answer:
Sales forecasting
Note: This Question is unanswered, help us to find answer for this one
62. In online analytical processing systems, ________ provide a way to summarize the data.
Answer
Correct Answer:
Dimensions
Note: This Question is unanswered, help us to find answer for this one
63. The basal nuclei (basal ganglia) ________.
Answer
Correct Answer:
Collection of gray matter w/in each cerebral hemisphere
Note: This Question is unanswered, help us to find answer for this one
64. By default, access and other dbmss create indexes automatically for the ____ keys.
Answer
Correct Answer:
Primary and foreign
Note: This Question is unanswered, help us to find answer for this one
65. Symmetric dsl usually has an upstream rate of ____ mbps.
Answer
Correct Answer:
1.5
Note: This Question is unanswered, help us to find answer for this one
66. The connection between two tables in a database is called a _________.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
67. One of the challenges with unsupervised data mining is ________.
Answer
Correct Answer:
The analyst must develop explanations for patterns after observing the pattern
Note: This Question is unanswered, help us to find answer for this one
68. An organization that uses cloud services ________.
Answer
Correct Answer:
Can limit the response time of its Web pages
Note: This Question is unanswered, help us to find answer for this one
69. The data ____ component is used to add, delete, modify, and retrieve records from a database.
Answer
Correct Answer:
Data manipulation
Note: This Question is unanswered, help us to find answer for this one
70. Data mining is more ________ than olap.
Answer
Correct Answer:
Discovery driven
Note: This Question is unanswered, help us to find answer for this one
71. Control in a global information system (gis) requires _____.
Answer
Correct Answer:
Defined behaviors for different processes
Note: This Question is unanswered, help us to find answer for this one
72. Significant changes in is should trigger a reassessment of the _____________.
Answer
Correct Answer:
Business strategy
Note: This Question is unanswered, help us to find answer for this one
73. Identifying customers is a responsibility of the ________ function.
Answer
Correct Answer:
Sales and marketing
Note: This Question is unanswered, help us to find answer for this one
74. In 2025, emergence in the context of management would most likely mean a(n) ________.
Answer
Correct Answer:
Loss of control over employees
Note: This Question is unanswered, help us to find answer for this one
75. Identifying competitive advantages can be difficult and explains why they are typically __________.
Answer
Correct Answer:
Temporary
Note: This Question is unanswered, help us to find answer for this one
76. E-commerce fulfills the product information activity using _____.
Answer
Correct Answer:
Web sites
Note: This Question is unanswered, help us to find answer for this one
77. Discussion forums are better suited than emails in asynchronous communication because ________.
Answer
Correct Answer:
They keep the discussion from getting off track.
Note: This Question is unanswered, help us to find answer for this one
78. Business intelligence systems generate business intelligence by __________ data.
Answer
Correct Answer:
Identifying patterns in
Note: This Question is unanswered, help us to find answer for this one
79. Browser-based database applications differ from traditional applications in that they ________.
Answer
Correct Answer:
Are usually open to the public
Note: This Question is unanswered, help us to find answer for this one
80. A(n) ________, in which the highest bidder wins, is the most common form of auction.
Answer
Correct Answer:
English auction
Note: This Question is unanswered, help us to find answer for this one
81. A field or a group of fields that make a record unique in a table is called a(n) ________.
Answer
Correct Answer:
Primary key
Note: This Question is unanswered, help us to find answer for this one
82. A business process is a network of ________ that receive inputs and produce outputs.
Answer
Correct Answer:
Activities
Note: This Question is unanswered, help us to find answer for this one
83. A business process in the ________ function is producing bills of material.
Answer
Correct Answer:
Manufacturing and production
Note: This Question is unanswered, help us to find answer for this one
84. A build-to-order supply-chain model is also called a ________ model.
Answer
Correct Answer:
Demand-driven
Note: This Question is unanswered, help us to find answer for this one
85. A ________ pretends to be a legitimate company and sends emails requesting confidential data.
Answer
Correct Answer:
Phisher
Note: This Question is unanswered, help us to find answer for this one
86. A ________ is a worldwide-unique term that is affiliated with a public ip address.
Answer
Correct Answer:
Domain name
Note: This Question is unanswered, help us to find answer for this one
87. ________ systems are designed to handle multiple concurrent transactions from customers.
Answer
Correct Answer:
OLTP
Note: This Question is unanswered, help us to find answer for this one
88. ________ refers to the source, format, assumptions and constraints, and other facts about the data.
Answer
Correct Answer:
Metadata
Note: This Question is unanswered, help us to find answer for this one
89. ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
Answer
Correct Answer:
Acquisition
Note: This Question is unanswered, help us to find answer for this one
90. ________ is defined as recorded facts or figures.
Answer
Correct Answer:
Data
Note: This Question is unanswered, help us to find answer for this one
91. ________ is a popular commercial webinar product used in virtual sales presentations.
Answer
Correct Answer:
WebEx
Note: This Question is unanswered, help us to find answer for this one
92. ________ delivers business intelligence to users without any request from the users.
Answer
Correct Answer:
Push publishing
Note: This Question is unanswered, help us to find answer for this one
93. ________ decisions are the most structured and have very little need for collaboration.
Answer
Correct Answer:
Operational
Note: This Question is unanswered, help us to find answer for this one
94. ________ can be induced by tens of thousands of repetitions under low-impact loads.
Answer
Correct Answer:
RSI
Note: This Question is unanswered, help us to find answer for this one
95. ________ are viruses that masquerade as useful programs or files.
Answer
Correct Answer:
Trojan horses
Note: This Question is unanswered, help us to find answer for this one
96. When the granularity of data is too fine, ________.
Answer
Correct Answer:
It can be made coarser by summing and combining
Note: This Question is unanswered, help us to find answer for this one
97. Using a vpc, an organization can store its ________.
Answer
Correct Answer:
Most sensitive data.
Note: This Question is unanswered, help us to find answer for this one
98. Traditional database application programs are ________.
Answer
Correct Answer:
Think applications that need to be installed on users' computers
Note: This Question is unanswered, help us to find answer for this one
99. The two types of visionary leadership are _____.
Answer
Correct Answer:
Charismatic leadership and transformational leadership
Note: This Question is unanswered, help us to find answer for this one
100. The traditional network design approach does not work well for _________ networks.
Answer
Correct Answer:
Rapidly growing
Note: This Question is unanswered, help us to find answer for this one
101. The results generated in the map phase are combined in the ________ phase.
Answer
Correct Answer:
Reduce.
Note: This Question is unanswered, help us to find answer for this one
102. The output of an information system is _____.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
103. The outermost components of the is framework ________.
Answer
Correct Answer:
Can take action
Note: This Question is unanswered, help us to find answer for this one
104. As a result of moore's law, ________.
Answer
Correct Answer:
The price to performance ratio of computers has fallen dramatically
Note: This Question is unanswered, help us to find answer for this one
105. A typical example of a geographic information system is a(n) _____.
Answer
Correct Answer:
Map
Note: This Question is unanswered, help us to find answer for this one
106. In dbms, data are kept separate from the application's programming code. this means that ________.
Answer
Correct Answer:
The database does not need to be changed if a change is made to an application
Note: This Question is unanswered, help us to find answer for this one
107. In comparison with unstructured information, semi-structured information ________.
Answer
Correct Answer:
Is easier to query and aggregate
Note: This Question is unanswered, help us to find answer for this one
108. In cloud computing, resources are said to be ""pooled"" because organizations ________.
Answer
Correct Answer:
Share the same physical hardware through virtualization
Note: This Question is unanswered, help us to find answer for this one
109. Bookseller barnes & noble is an example of a ________ company.
Answer
Correct Answer:
Click -and -motar
Note: This Question is unanswered, help us to find answer for this one
110. An organization is ________.
Answer
Correct Answer:
A deliberate arrangement of people to accomplish some specific purpose
Note: This Question is unanswered, help us to find answer for this one
111. An enterprise resource planning (erp) solution does not include ________.
Answer
Correct Answer:
The company's operational data
Note: This Question is unanswered, help us to find answer for this one
112. An end-user license agreement, or _____, grants one user the right to use the software.
Answer
Correct Answer:
EULA
Note: This Question is unanswered, help us to find answer for this one
113. All of the following sequences are stages of the machine cycle except _________.
Answer
Correct Answer:
The real step are Fetch, execute and store and decode
Note: This Question is unanswered, help us to find answer for this one
114. A(n) _____ provides software and a network that connects businesses within an industry.
Answer
Correct Answer:
Electronic exchange
Note: This Question is unanswered, help us to find answer for this one
115. All of the following are challenges in implementing an enterprise system except ________.
Answer
Correct Answer:
Old technology
Note: This Question is unanswered, help us to find answer for this one
116. The purpose of predeparture language and cross-cultural training is to _____.
Answer
Correct Answer:
Reduce the uncertainty felt by expatriates
Note: This Question is unanswered, help us to find answer for this one
117. An e-commerce web site that processes orders requires, at minimum, a ________ system architecture.
Answer
Correct Answer:
Two-tier
Note: This Question is unanswered, help us to find answer for this one
118. When customers access a web site and make purchases, they generate _____.
Answer
Correct Answer:
Clickstream data
Note: This Question is unanswered, help us to find answer for this one
119. Users of smart cards are required to enter a ________ to be authenticated.
Answer
Correct Answer:
Personal identification number
Note: This Question is unanswered, help us to find answer for this one
120. Transaction processing (tp) systems ____.
Answer
Correct Answer:
Process data generated by day-to-day business operations
Note: This Question is unanswered, help us to find answer for this one
121. Problematic data are referred to as ________.
Answer
Correct Answer:
Dirty data
Note: This Question is unanswered, help us to find answer for this one
122. Organizations should protect sensitive data by storing it in ________ form.
Answer
Correct Answer:
Encrypted
Note: This Question is unanswered, help us to find answer for this one
123. In a typical company organizational model, middle managers ____.
Answer
Correct Answer:
Provide direction, necessary resources, and performance feedback to supervisors and team leaders
Note: This Question is unanswered, help us to find answer for this one
124. For communications equipment, k stands for ________.
Answer
Correct Answer:
1000
Note: This Question is unanswered, help us to find answer for this one
125. For bi analysis, data need to represent the proper ________, the proper level of detail.
Answer
Correct Answer:
Granularity
Note: This Question is unanswered, help us to find answer for this one
126. Backup and recovery against computer security threats are ________.
Answer
Correct Answer:
Data safeguards
Note: This Question is unanswered, help us to find answer for this one
127. Adaptive maintenance ____
Answer
Correct Answer:
Adds enhancements to an operational system and makes the system easier to use
Note: This Question is unanswered, help us to find answer for this one
128. A ________ is a hierarchical arrangement of criteria that predict a classification or a value.
Answer
Correct Answer:
A decision tree
Note: This Question is unanswered, help us to find answer for this one
129. _____ is a term used to describe unpredictable, but highly impactful events.
Answer
Correct Answer:
Black swans
Note: This Question is unanswered, help us to find answer for this one
130. The need for collaboration is greatest for ________ decisions.
Answer
Correct Answer:
Strategic.
Note: This Question is unanswered, help us to find answer for this one
131. The field in a table that is used to relate that table to other tables is called the ____.
Answer
Correct Answer:
Primary key
Note: This Question is unanswered, help us to find answer for this one
132. The fiber-optic cables that span the globe over land and under sea make up the internet _____.
Answer
Correct Answer:
Backbone
Note: This Question is unanswered, help us to find answer for this one
133. Security systems ultimately depend on the behavior of their ________.
Answer
Correct Answer:
Users
Note: This Question is unanswered, help us to find answer for this one
134. Knowing the sparsity of a column helps you decide whether the use of ____ is appropriate.
Answer
Correct Answer:
An index
Note: This Question is unanswered, help us to find answer for this one
135. In a star schema, attributes are often used to search, filter, or classify ____.
Answer
Correct Answer:
Facts
Note: This Question is unanswered, help us to find answer for this one
136. Fact and dimension tables are related by ____ keys.
Answer
Correct Answer:
Foreign
Note: This Question is unanswered, help us to find answer for this one
137. Computers that reside in different geographic locations are connected using a(n) ________.
Answer
Correct Answer:
WAN
Note: This Question is unanswered, help us to find answer for this one
138. Computed or derived facts are sometimes called ____ to differentiate them from stored facts.
Answer
Correct Answer:
Metrics
Note: This Question is unanswered, help us to find answer for this one
139. A(n) _____ is a logical grouping of related fields.
Answer
Correct Answer:
Record
Note: This Question is unanswered, help us to find answer for this one
140. To analzye various alternative scenarios, a manager would use _______.
Answer
Correct Answer:
The spreadsheet's 'what-if' capability
Note: This Question is unanswered, help us to find answer for this one
141. Traditional data formats change ______ while big data formats change _______.
Answer
Correct Answer:
Slowly, rapidly
Note: This Question is unanswered, help us to find answer for this one
142. The functions of a data warehouse are to do all of the following, except ________.
Answer
Correct Answer:
Filter data
Note: This Question is unanswered, help us to find answer for this one
143. The control dimension of a global information system requires a(n) _____ architecture for data.
Answer
Correct Answer:
Centralized
Note: This Question is unanswered, help us to find answer for this one
144. Technology is the essential foundation of an effective information security program. _____________
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
145. The software and procedure components of the is framework are both ________.
Answer
Correct Answer:
Sets of instructions
Note: This Question is unanswered, help us to find answer for this one
146. Thin-client applications are typically limited by the capabilities of the ________.
Answer
Correct Answer:
Browser.
Note: This Question is unanswered, help us to find answer for this one
147. The dimension of ________ in information quality describes whether data is available when needed.
Answer
Correct Answer:
Timeliness
Note: This Question is unanswered, help us to find answer for this one
148. The dimension of ________ describes whether data elements are consistently defined.
Answer
Correct Answer:
Consistency.
Note: This Question is unanswered, help us to find answer for this one
149. Value chains determine ________.
Answer
Correct Answer:
Structured business processes
Note: This Question is unanswered, help us to find answer for this one
150. Your organization can choose one of ________ alternative competitive strategies.
Answer
Correct Answer:
Four
Note: This Question is unanswered, help us to find answer for this one
151. The primary models used for oo detailed design are ____ diagrams.
Answer
Correct Answer:
Design class and interaction
Note: This Question is unanswered, help us to find answer for this one
152. One of the goals of business intelligence is to _________.
Answer
Correct Answer:
Present the results in an easy to understand manner
Note: This Question is unanswered, help us to find answer for this one
153. Measuring performance and __________ are parts of the foundation of any control system.
Answer
Correct Answer:
Taking corrective action
Note: This Question is unanswered, help us to find answer for this one
154. Information systems provide a competitive advantage by all of the following, except ________.
Answer
Correct Answer:
By collecting and storing large amounts of data
Note: This Question is unanswered, help us to find answer for this one
155. In the ____ model, each record can have multiple parent and child records.
Answer
Correct Answer:
Network model
Note: This Question is unanswered, help us to find answer for this one
156. Data type helps a database management system (dbms) to ________.
Answer
Correct Answer:
Allocate storage space
Note: This Question is unanswered, help us to find answer for this one
157. Adware and spyware are similar to each other in that they both ________.
Answer
Correct Answer:
Reside in the background and observe a user's behavior
Note: This Question is unanswered, help us to find answer for this one
158. A group of similar rows or records is known as ________.
Answer
Correct Answer:
Table
Note: This Question is unanswered, help us to find answer for this one
159. A building, office equipment, computer hardware, and network equipment are examples of _____.
Answer
Correct Answer:
Capital assets
Note: This Question is unanswered, help us to find answer for this one
160. ________ specifies the characteristics of a field, such as the type of data it will hold.
Answer
Correct Answer:
Data definition
Note: This Question is unanswered, help us to find answer for this one
161. ________ involve the people and procedure components of information systems.
Answer
Correct Answer:
Human safeguards
Note: This Question is unanswered, help us to find answer for this one
162. ________ deals with more objective, rational, and technical knowledge.
Answer
Correct Answer:
Explicit knowledge
Note: This Question is unanswered, help us to find answer for this one
163. _____ is an example of an enterprise-class electronic software.
Answer
Correct Answer:
Oracle E-Business Suite
Note: This Question is unanswered, help us to find answer for this one
164. _____ are an example of internal source of data for an information system.
Answer
Correct Answer:
Personnel records
Note: This Question is unanswered, help us to find answer for this one
165. ____ uses multiple sources of information and provides multidimensional analysis.
Answer
Correct Answer:
OLAP
Note: This Question is unanswered, help us to find answer for this one
166. ____ rules specify which users have what type of access to which data in the database.
Answer
Correct Answer:
Authorization
Note: This Question is unanswered, help us to find answer for this one
167. ____ refers to identifying the browser used by each visitor, typically via javascript code.
Answer
Correct Answer:
Browser sniffing
Note: This Question is unanswered, help us to find answer for this one
168. ____ provide(s) an employee more control over his or her work situation.
Answer
Correct Answer:
Job enrichment
Note: This Question is unanswered, help us to find answer for this one
169. ____ policy creates standards for using corporate e-mail.
Answer
Correct Answer:
E-mail
Note: This Question is unanswered, help us to find answer for this one
170. ____ is a process for controlling changes in system requirements during software development.
Answer
Correct Answer:
Configuration management
Note: This Question is unanswered, help us to find answer for this one
171. ____ implies that no site should depend on another site to perform its database functions.
Answer
Correct Answer:
Local autonomy
Note: This Question is unanswered, help us to find answer for this one
172. ____ generally uses internal data and responds in real time.
Answer
Correct Answer:
OLTP
Note: This Question is unanswered, help us to find answer for this one
173. ____ converts a table that is in third normal form to a table no longer in third normal form.
Answer
Correct Answer:
Denormalization
Note: This Question is unanswered, help us to find answer for this one
174. ____ are normally expressed in the form of rules.
Answer
Correct Answer:
Constraints
Note: This Question is unanswered, help us to find answer for this one
175. ____ consists of predrawn electronic images.
Answer
Correct Answer:
Clip art
Note: This Question is unanswered, help us to find answer for this one
176. Routines performed to verify input data and correct errors prior to processing are known as
Answer
Correct Answer:
Edit checks
Note: This Question is unanswered, help us to find answer for this one
177. Which of the following is most likely to rely on parallel processing?
Answer
Correct Answer:
Supercomputer
Note: This Question is unanswered, help us to find answer for this one
178. Which of the following are included in an MIS audit?
Answer
Correct Answer:
Physical facilities - telecommunications - control systems - and manual procedures
Note: This Question is unanswered, help us to find answer for this one
179. Each of the following is a rule of thumb for handling graphics in desktop publishing application EXCEPT
Answer
Correct Answer:
Using serif typefaces in graph labels
Note: This Question is unanswered, help us to find answer for this one
180. A transmission over a telecommunications network in which data can flow two ways - but in only one direction at a time - is described as
Answer
Correct Answer:
Half duplex
Note: This Question is unanswered, help us to find answer for this one
181. _____ tools is a project management technique that structures and sequences tasks - and budgets the time - money - and technical resources required to complete these tasks.
Answer
Correct Answer:
Formal planning
Note: This Question is unanswered, help us to find answer for this one
182. The predefined packet of data in some LANs - which includes data indicating the sender - receiver - and whether the packet is in use - is known as a
Answer
Correct Answer:
Token
Note: This Question is unanswered, help us to find answer for this one
183. Which of the following concerns is addressed by front-end CASE (computer-assisted software engineering) tools?
Answer
Correct Answer:
Analysis
Note: This Question is unanswered, help us to find answer for this one
184. In an individual MIS - the most commonly-used technique for conducting operations research is ______ programming.
Answer
Correct Answer:
Linear
Note: This Question is unanswered, help us to find answer for this one
185. Which of the following storage media generally has the slowest access speed?
Answer
Correct Answer:
Magnetic disk
Note: This Question is unanswered, help us to find answer for this one
186. A processing system rejects an order transaction for 10 -000 units - on the basis that no order larger than 70 units had been placed previously. This is an example of a
Answer
Correct Answer:
Reasonableness check
Note: This Question is unanswered, help us to find answer for this one
187. In its current form - the technology of electronic data interchange (EDI) is appropriate for transmitting all of the following EXCEPT
Answer
Correct Answer:
Solicitations
Note: This Question is unanswered, help us to find answer for this one
188. Which of the following types of applications is generally most dependent on the graphical user interface (GUI) environment?
Answer
Correct Answer:
Desktop publishing
Note: This Question is unanswered, help us to find answer for this one
189. The representation of data as they appear to an application programmer or end user is described as a(n) _____ view.
Answer
Correct Answer:
Logical
Note: This Question is unanswered, help us to find answer for this one
190. Which of the following types of organizations is LEAST likely to make use of a hierarchical database?
Note: This Question is unanswered, help us to find answer for this one
191. The most time-consuming element of system conversion plans is
Answer
Correct Answer:
Data conversion
Note: This Question is unanswered, help us to find answer for this one
192. Which of the following is NOT a type of knowledge work system (KWS)?
Answer
Correct Answer:
Decision support system (DSS)
Note: This Question is unanswered, help us to find answer for this one
193. The predominant programming language for business was
Answer
Correct Answer:
COBOL
Note: This Question is unanswered, help us to find answer for this one
194. When all the elements in a system are in the same category - ______ is said to be at a minimum.
Answer
Correct Answer:
Uncertainty
Note: This Question is unanswered, help us to find answer for this one
195. Which of the following styles of systems development is most often used for information systems at the enterprise level?
Answer
Correct Answer:
Traditional life cycle
Note: This Question is unanswered, help us to find answer for this one
196. Which of the following signifies the international reference model for linking different types of computers and networks?
Answer
Correct Answer:
OSI
Note: This Question is unanswered, help us to find answer for this one
197. Of the following file organization methods - the only one that can be used on magnetic tape is
Answer
Correct Answer:
Sequential
Note: This Question is unanswered, help us to find answer for this one
198. Which of the following systems exists at the strategic level of an organization?
Answer
Correct Answer:
Executive support system (ESS)
Note: This Question is unanswered, help us to find answer for this one
199. Which of the following steps in the business systems planning (BSP) process is typically performed FIRST?
Answer
Correct Answer:
Defining business processes
Note: This Question is unanswered, help us to find answer for this one
200. Which of the following is a shared network service technology that packages data into bundles for transmission but does not use error correction routines?
Answer
Correct Answer:
Frame relay
Note: This Question is unanswered, help us to find answer for this one
201. In what type of processing can more than one instruction be processed at once - by breaking down a problem into smaller parts and processing them simultaneously?
Answer
Correct Answer:
Parallel
Note: This Question is unanswered, help us to find answer for this one
202. In most organizations - the chief information officer is given a rank equivalent to
Answer
Correct Answer:
Vice president
Note: This Question is unanswered, help us to find answer for this one
203. Which of the following is a commercial digital information service that exists to provide business information?
Answer
Correct Answer:
Dialog
Note: This Question is unanswered, help us to find answer for this one
204. Which of the following is an object-oriented programming language that can deliver only the software functionality needed for a particular task - and which can run on any computer or operating system?
Answer
Correct Answer:
Java
Note: This Question is unanswered, help us to find answer for this one
205. According to Simon's description - there are four stages in any decision-making process. Decision support systems are designed primarily to help monitor the ______ stage.
Answer
Correct Answer:
Implementation
Note: This Question is unanswered, help us to find answer for this one
Management Information Systems (MIS) MCQs | Topic-wise