MCQs > Engineering & Manufacturing > Computer Engineering MCQs > Information Systems & Management MCQs

Information Systems & Management MCQ

1. In the linux bash shell, the ____ key combination moves the cursor to the previous letter.

Answer

Correct Answer: Ctrl+b

Note: This Question is unanswered, help us to find answer for this one

2. In the linux bash shell, the ____ key combination deletes a word or consecutive characters.

Answer

Correct Answer: Alt+d

Note: This Question is unanswered, help us to find answer for this one

3. Banner ads are often billed based on _____.

Answer

Correct Answer: Cost per thousand impressions

Note: This Question is unanswered, help us to find answer for this one

4. As a user of is, an employee has a responsibility to avoid ________.

Answer

Correct Answer: Unauthorized hardware modifications

Note: This Question is unanswered, help us to find answer for this one

5. ____ involves studying the parts to understand the overall system.

Answer

Correct Answer: Synthesis

Note: This Question is unanswered, help us to find answer for this one

6. Traditional database application programs are written in object-oriented languages like ________.

Answer

Correct Answer: Visual Basic

Note: This Question is unanswered, help us to find answer for this one

7. The network effect refers to the notion that the value of a network is dependent on ________.

Answer

Correct Answer: Increases with the number of users in the network

Note: This Question is unanswered, help us to find answer for this one

8. The most common type of computer security incident is ________.

Answer

Correct Answer: Malware infection

Note: This Question is unanswered, help us to find answer for this one

9. The more technical an organization, the ________ the social policies.

Answer

Correct Answer: More lenient.

Note: This Question is unanswered, help us to find answer for this one

10. The internal data sources for an information system include _____.

Answer

Correct Answer: Personnel records

Note: This Question is unanswered, help us to find answer for this one

11. The frequencies licensed by telecommunication firms to provide wireless service is known as _____.

Answer

Correct Answer: Wireless spectrum

Note: This Question is unanswered, help us to find answer for this one

12. The _____ of an executive information system (eis) is responsible for managing data access.

Answer

Correct Answer: Administrative module

Note: This Question is unanswered, help us to find answer for this one

13. Normal processing procedures for operations personnel involve procedures for ________.

Answer

Correct Answer: Starting, stopping, and operating the system

Note: This Question is unanswered, help us to find answer for this one

14. A(n) ________ capability allows users to view more detailed views of data.

Answer

Correct Answer: Drill-down

Note: This Question is unanswered, help us to find answer for this one

15. The site that initiates the update in a two-phase commit is known as the ____.

Answer

Correct Answer: Coordinator.

Note: This Question is unanswered, help us to find answer for this one

16. When work that was formerly done by people has been moved to computers, it is said to be ________.

Answer

Correct Answer: Automated

Note: This Question is unanswered, help us to find answer for this one

17. Knowing what is expected and when to go into detail is directly related to knowing _____.

Answer

Correct Answer: WHO your targets are

Note: This Question is unanswered, help us to find answer for this one

18. Giving the ir team the responsibility for ____ is generally not recommended.

Answer

Correct Answer: Patch management

Note: This Question is unanswered, help us to find answer for this one

19. Following standardized guidelines to calculate sales commissions is an example of a(n) ________.

Answer

Correct Answer: Structured decision

Note: This Question is unanswered, help us to find answer for this one

20. As explained in this video, an inventory management program is an example of _____.

Answer

Correct Answer: Application software

Note: This Question is unanswered, help us to find answer for this one

21. A computer making a dns query is known as a dns client, or dns ___________.

Answer

Correct Answer: Resolver

Note: This Question is unanswered, help us to find answer for this one

22. If you have four tags in each table row, that table has ____ columns.

Answer

Correct Answer: Four

Note: This Question is unanswered, help us to find answer for this one

23. If voip traffic needs to traverse through a wan with congestion, you need ___________.

Answer

Correct Answer: Quality of service (QoS)

Note: This Question is unanswered, help us to find answer for this one

24. I2 technologies is a leading __________ vendor.

Answer

Correct Answer: SCM

Note: This Question is unanswered, help us to find answer for this one

25. Hybrid notebook-tablet computers are also called convertible tablets or ____.

Answer

Correct Answer: 2-in-1 computers

Note: This Question is unanswered, help us to find answer for this one

26. Google customer surveys is a service that publishers can use to ________ from their online content.

Answer

Correct Answer: Generate revenue

Note: This Question is unanswered, help us to find answer for this one

27. Fourth-generation languages (4gls) are sometimes called ____.

Answer

Correct Answer: Very-high-level languages

Note: This Question is unanswered, help us to find answer for this one

28. Flexibility is a major component of ergonomic design, mainly because: _______.

Answer

Correct Answer: ​all of these answers

Note: This Question is unanswered, help us to find answer for this one

29. Few companies today could realize their full-potential business value without updated ________.

Answer

Correct Answer: IT infrastructures and services.

Note: This Question is unanswered, help us to find answer for this one

30. Cam and mrp are examples of information systems used in ______.

Answer

Correct Answer: Manufacturing

Note: This Question is unanswered, help us to find answer for this one

31. By default, web pages are kept in internet explorer history _______.

Answer

Correct Answer: For 20 days

Note: This Question is unanswered, help us to find answer for this one

32. An internet connectivity plan is also known as a ________ plan.

Answer

Correct Answer: Data

Note: This Question is unanswered, help us to find answer for this one

33. An emotional health concern related to computer use is ____.

Answer

Correct Answer: An Internet addiction

Note: This Question is unanswered, help us to find answer for this one

34. All the following are major types of parallel cables except ________?

Answer

Correct Answer: Monitor

Note: This Question is unanswered, help us to find answer for this one

35. All the following are bus types that video cards use except ________?

Answer

Correct Answer: SPI

Note: This Question is unanswered, help us to find answer for this one

36. All of the following frequencies are noted in the text as being unlicensed except ____.

Answer

Correct Answer: 300 GHz

Note: This Question is unanswered, help us to find answer for this one

37. Accepting february 29 in only a leap year is a check that is done by a ________ check.

Answer

Correct Answer: Date

Note: This Question is unanswered, help us to find answer for this one

38. A threat source can be a situation or method that might accidentally trigger a(n) ____________.

Answer

Correct Answer: Vulnerability

Note: This Question is unanswered, help us to find answer for this one

39. A storage medium is inserted into its corresponding ____ in order to be read from or written to.

Answer

Correct Answer: Storage device

Note: This Question is unanswered, help us to find answer for this one

40. A global network must have _____ to guide packets to their destinations.

Answer

Correct Answer: Switching nodes

Note: This Question is unanswered, help us to find answer for this one

41. A fraud or scam carried out through the internet is a form of ____.

Answer

Correct Answer: Dot con

Note: This Question is unanswered, help us to find answer for this one

42. A diagram that shows the messages between an actor and the system is called a(n) _______.

Answer

Correct Answer: System Sequence Diagram

Note: This Question is unanswered, help us to find answer for this one

43. A _____ is a security weakness or soft spot.

Answer

Correct Answer: ​vulnerability

Note: This Question is unanswered, help us to find answer for this one

44. A _____ is a control used to enter text strings that may include several lines of content.

Answer

Correct Answer: Text area box

Note: This Question is unanswered, help us to find answer for this one

45. A _____ attribute can be further subdivided to yield additional attributes.

Answer

Correct Answer: Composite

Note: This Question is unanswered, help us to find answer for this one

46. A ____ is a program advertised as performing one activity but actually does something else.

Answer

Correct Answer: Trojan

Note: This Question is unanswered, help us to find answer for this one

47. ________ occurs when a hacker looks through your trash to find personal information.

Answer

Correct Answer: Dumpster diving

Note: This Question is unanswered, help us to find answer for this one

48. In a count-controlled loop, the counter performs ________ action(s).

Answer

Correct Answer: Three

Note: This Question is unanswered, help us to find answer for this one

49. A _____________ allows for an mtu as high as 9198 bytes.

Answer

Correct Answer: Jumbo frame

Note: This Question is unanswered, help us to find answer for this one

50. Consumers prefer mobile commerce sites ________.

Answer

Correct Answer: Offer effective search tools and transaction speeds

Note: This Question is unanswered, help us to find answer for this one

51. Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature.

Answer

Correct Answer: Drill down

Note: This Question is unanswered, help us to find answer for this one

52. An after-action review refers to ________.

Answer

Correct Answer: A meeting held after a project has been completed to document what worked well and what did not

Note: This Question is unanswered, help us to find answer for this one

53. A(n) ____ policy controls password characteristics for local user accounts.

Answer

Correct Answer: Password

Note: This Question is unanswered, help us to find answer for this one

54. A(n) ____ comes into existence as soon as a work is placed into a tangible form.

Answer

Correct Answer: Copyright

Note: This Question is unanswered, help us to find answer for this one

55. An apple ipad and a samsung galaxy tab are examples of ________ computers.

Answer

Correct Answer: Tablet

Note: This Question is unanswered, help us to find answer for this one

56. When an incident expands ________________________________.

Answer

Correct Answer: Only the functions and positions necessary are filled.

Note: This Question is unanswered, help us to find answer for this one

57. 2pac shakur said that when there is hopelessness, people _______.

Answer

Correct Answer: Revolt

Note: This Question is unanswered, help us to find answer for this one

58. One shortcoming of rapid application development (rad) is _____.

Answer

Correct Answer: A narrow focus, which might limit future development

Note: This Question is unanswered, help us to find answer for this one

59. Information technologies and ____ play a major role in implementing an scm system.

Answer

Correct Answer: The internet

Note: This Question is unanswered, help us to find answer for this one

60. In the early 1980s, ____ were invented and computer use increased dramatically.

Answer

Correct Answer: Microcomputers

Note: This Question is unanswered, help us to find answer for this one

61. Outsourcing has seen a huge increase because of the ________.

Answer

Correct Answer: Decrease in telecommunication costs.

Note: This Question is unanswered, help us to find answer for this one

62. The cpu stores the results of computations in ________.

Answer

Correct Answer: Main memory

Note: This Question is unanswered, help us to find answer for this one

63. The dbas ____ role covers activities involving the use of the dbms.

Answer

Correct Answer: Technical

Note: This Question is unanswered, help us to find answer for this one

64. The central processing unit (cpu) works in conjunction with ________ to perform processing.

Answer

Correct Answer: Main memory

Note: This Question is unanswered, help us to find answer for this one

65. The bulletin board systems of the 1970s are considered to be the forerunners of _____________.

Answer

Correct Answer: Content Communitiesb

Note: This Question is unanswered, help us to find answer for this one

66. Overseeing order transmissions are part of the ____ flow in a manufacturing firms scm system.

Answer

Correct Answer: Finances

Note: This Question is unanswered, help us to find answer for this one

67. Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.

Answer

Correct Answer: Low, repetitive, difficult

Note: This Question is unanswered, help us to find answer for this one

68. Operational feasibility is also known as behavioral feasibility. _________________________

Answer

Correct Answer: True.

Note: This Question is unanswered, help us to find answer for this one

69. Online communities, like facebook, utilize ____ as word-of-mouth marketing to spread information.

Answer

Correct Answer: Viral marketing

Note: This Question is unanswered, help us to find answer for this one

70. The entertainment industry primarily uses sentiment analysis to improve their ______.

Answer

Correct Answer: Marketing campaigns

Note: This Question is unanswered, help us to find answer for this one

71. It personnel use _____ to produce _____.

Answer

Correct Answer: IT components, IT services

Note: This Question is unanswered, help us to find answer for this one

72. It is estimated that the revenue generated by u.s. b2b e-commerce is _____ compared to b2c revenue.

Answer

Correct Answer: Nearly thirteen times larger

Note: This Question is unanswered, help us to find answer for this one

73. In the url http://www.irs.gov, irs is the ________.

Answer

Correct Answer: Correct domain name

Note: This Question is unanswered, help us to find answer for this one

74. In doe v. holder, the courts ruled that the nsl gag provision violates the _____.

Answer

Correct Answer: First Amendment

Note: This Question is unanswered, help us to find answer for this one

75. In an n-tiered architecture, the _____ is spread across two or more different sets of servers.

Answer

Correct Answer: Application logic

Note: This Question is unanswered, help us to find answer for this one

76. In the context of the data component of an information system, internal data sources include _____.

Answer

Correct Answer: Personnel records

Note: This Question is unanswered, help us to find answer for this one

77. In the __________ process, measured results are compared against expected results.

Answer

Correct Answer: Negative feedback loop

Note: This Question is unanswered, help us to find answer for this one

78. In recent years, the __________ certification program has added a set of concentration exams.

Answer

Correct Answer: CISSP

Note: This Question is unanswered, help us to find answer for this one

79. Returning the emergency unit to service is part of the _________.

Answer

Correct Answer: Termination phase

Note: This Question is unanswered, help us to find answer for this one

80. If your home air conditioner has an ip address, it is part of the ____.

Answer

Correct Answer: Internet of Things

Note: This Question is unanswered, help us to find answer for this one

81. Sourcing or procurement occurs in the ____________ component of the supply chain.

Answer

Correct Answer: Upstream

Note: This Question is unanswered, help us to find answer for this one

82. Users interact via avatars in a(n) _____.

Answer

Correct Answer: Virtual world

Note: This Question is unanswered, help us to find answer for this one

83. A(n) ________ spreadsheet model represents behavior over time.

Answer

Correct Answer: Dynamic.

Note: This Question is unanswered, help us to find answer for this one

84. The internet is playing an important role in helping organizations reduce expenses, because _____.

Answer

Correct Answer: Web applications can be used with minimum costs.

Note: This Question is unanswered, help us to find answer for this one

85. A(n) ________ has a microchip in it to hold data.

Answer

Correct Answer: Smart card

Note: This Question is unanswered, help us to find answer for this one

86. A(n) _____ is the electronic exchange of money or scrip.

Answer

Correct Answer: Electronic Payment

Note: This Question is unanswered, help us to find answer for this one

87. The gea group implemented a(n) ___________ to address its reporting issues.

Answer

Correct Answer: ERP system

Note: This Question is unanswered, help us to find answer for this one

88. Google ________ is an online store that can be used for self-publishing books.

Answer

Correct Answer: Play

Note: This Question is unanswered, help us to find answer for this one

89. The linkedin page for brands is called a _____ page.

Answer

Correct Answer: Help you make introductions to people with whom you're wanting to connect

Note: This Question is unanswered, help us to find answer for this one

90. In a dataflow diagram (dfd), a(n) ___________ portrays the transformation of data.

Answer

Correct Answer: Rounded box

Note: This Question is unanswered, help us to find answer for this one

91. In a database, bytes are grouped into __________.

Answer

Correct Answer: Columns

Note: This Question is unanswered, help us to find answer for this one

92. Having a conversation with someone using a cellular phone is an example of _________ transmission.

Answer

Correct Answer: Full-duplex

Note: This Question is unanswered, help us to find answer for this one

93. Hardware and software acquisition costs account for about ________ percent of tco.

Answer

Correct Answer: 20

Note: This Question is unanswered, help us to find answer for this one

94. Chevron employed ________ to provided detailed work instructions to its employees.

Answer

Correct Answer: Nimbus

Note: This Question is unanswered, help us to find answer for this one

95. Checking store inventory is an example of a(n) ________ decision.

Answer

Correct Answer: Structured

Note: This Question is unanswered, help us to find answer for this one

96. Cheating is ________ common at business schools ____________ tools like turnitin.

Answer

Correct Answer: More; even with

Note: This Question is unanswered, help us to find answer for this one

97. All of the following software applications are available for apple's smartwatch except ________.

Answer

Correct Answer: Linux for running web servers

Note: This Question is unanswered, help us to find answer for this one

98. Adjusting the ______ increases or decreases the crispness of objects in the photo.

Answer

Correct Answer: Sharpness

Note: This Question is unanswered, help us to find answer for this one

99. Activity trackers and smartwatches are two types of ______ devices.

Answer

Correct Answer: Wearable

Note: This Question is unanswered, help us to find answer for this one

100. Activity diagrams are useful in the development of ______________.

Answer

Correct Answer: System Sequence Diagrams

Note: This Question is unanswered, help us to find answer for this one

101. Activities within a business process are shown in ________.

Answer

Correct Answer: Rectangles

Note: This Question is unanswered, help us to find answer for this one

102. According to porter, strategy is fundamentally about being _____.

Answer

Correct Answer: Different

Note: This Question is unanswered, help us to find answer for this one

103. A secretary assisting management is considered a _________ worker.

Answer

Correct Answer: Data

Note: This Question is unanswered, help us to find answer for this one

104. In 1972, gordon bell formulated bell's law, which states ________.

Answer

Correct Answer: A new computer class forms roughly each decade establishing a new industry

Note: This Question is unanswered, help us to find answer for this one

105. If you decide you want to administer a network, you should look for jobs within the ______ area.

Answer

Correct Answer: Operations

Note: This Question is unanswered, help us to find answer for this one

106. If you are going to print an iron-on t-shirt transfer, you likely will use a(n) ______ printer.

Answer

Correct Answer: Inkjet

Note: This Question is unanswered, help us to find answer for this one

107. If active cell d12 contains the formula =d10+d11, cells d10 and d11 are _______ cells for d12.

Answer

Correct Answer: Precedent

Note: This Question is unanswered, help us to find answer for this one

108. Graphics that help a viewer know when one scene ends and another begins are called _____ .

Answer

Correct Answer: Transitions

Note: This Question is unanswered, help us to find answer for this one

109. Giving a user permissions to use a certain resource is ________.

Answer

Correct Answer: Authorization

Note: This Question is unanswered, help us to find answer for this one

110. Generally, _____ protect tangible material, such as books and drawings.

Answer

Correct Answer: Copyright laws

Note: This Question is unanswered, help us to find answer for this one

111. Cd-roms and dvds are examples of _____.

Answer

Correct Answer: Optical discs

Note: This Question is unanswered, help us to find answer for this one

112. Businesses must respond to and adopt technological changes because ________.

Answer

Correct Answer: The new technology can affect their business strategy

Note: This Question is unanswered, help us to find answer for this one

113. Bioinformatics is sometimes called _____ biology.

Answer

Correct Answer: Computational

Note: This Question is unanswered, help us to find answer for this one

114. Behavioral models of management see managers as being ________ than does the classical model.

Answer

Correct Answer: More informal

Note: This Question is unanswered, help us to find answer for this one

115. Because of _________, the ratio of computing price to performance has fallen drastically.

Answer

Correct Answer: Moore's Law

Note: This Question is unanswered, help us to find answer for this one

116. Auditing __________ the computer means inputs, outputs, and processing are checked.

Answer

Correct Answer: Through

Note: This Question is unanswered, help us to find answer for this one

117. Anonymity on the internet enhances the problems associated with _______.

Answer

Correct Answer: Criminal use of cloud computing

Note: This Question is unanswered, help us to find answer for this one

118. Analytical crm applications are based on data from _____________________.

Answer

Correct Answer: Operational CRM systems

Note: This Question is unanswered, help us to find answer for this one

119. An often overlooked aspect of an organization's incident response plan is ________.

Answer

Correct Answer: Practicing the incident response

Note: This Question is unanswered, help us to find answer for this one

120. An application component can be thought of as a(n) __________.

Answer

Correct Answer: Unit of software

Note: This Question is unanswered, help us to find answer for this one

121. When using a distributed workforce, collaborators are chosen based on ____.

Answer

Correct Answer: Medical research.

Note: This Question is unanswered, help us to find answer for this one

122. The wired or wireless means of connecting a computer to the internet is called a ________.

Answer

Correct Answer: Physical connection

Note: This Question is unanswered, help us to find answer for this one

123. A power failure that disrupts a computer system is an example of a(n) ________.

Answer

Correct Answer: Electromechanical problem

Note: This Question is unanswered, help us to find answer for this one

124. The internet has made intellectual property ________.

Answer

Correct Answer: Difficult to protect

Note: This Question is unanswered, help us to find answer for this one

125. _____ is a storage technology that is primarily used only for backups.

Answer

Correct Answer: Magnetic tape

Note: This Question is unanswered, help us to find answer for this one

126. The ____ utility schedules a command to run at a preset time.

Answer

Correct Answer: Crontab

Note: This Question is unanswered, help us to find answer for this one

127. According to the information presented in this video, an acceptable use policy _____.

Answer

Correct Answer: Defines acceptable uses of the​ company's information resources and computing equipment

Note: This Question is unanswered, help us to find answer for this one

128. ________ is most likely to be outsourced to the lowest bidder.

Answer

Correct Answer: Accounting skills

Note: This Question is unanswered, help us to find answer for this one

129. A website updated daily could be considered _____.

Answer

Correct Answer: Authoritative

Note: This Question is unanswered, help us to find answer for this one

130. A ____ is one of the tiny dots of light that form a grid on your screen.

Answer

Correct Answer: Pixel

Note: This Question is unanswered, help us to find answer for this one

131. Ascii defines up to ____ characters.

Answer

Correct Answer: 128

Note: This Question is unanswered, help us to find answer for this one

132. Electronic data interchange sometimes uses private network services called _____ networks.

Answer

Correct Answer: Value-added

Note: This Question is unanswered, help us to find answer for this one

133. E-readers serve as a ________ assistive technology for students with reading difficulties.

Answer

Correct Answer: High-tech.

Note: This Question is unanswered, help us to find answer for this one

134. E-procurement is an example of the ____ b2b e-commerce model.

Answer

Correct Answer: Seller-side marketplace

Note: This Question is unanswered, help us to find answer for this one

135. Digital device ______ is the trend of computers and devices with technologies that overlap.

Answer

Correct Answer: Convergence

Note: This Question is unanswered, help us to find answer for this one

136. Diane needs to create a work plan for an upcoming systems project. she must first _____.

Answer

Correct Answer: Identify the tasks and estimate the time needed to complete them

Note: This Question is unanswered, help us to find answer for this one

137. Conversion to an e-commerce or m-commerce system enables organizations to _________.

Answer

Correct Answer: Improve the level of customer service.

Note: This Question is unanswered, help us to find answer for this one

138. With _____, phone calls are treated as just another kind of data.

Answer

Correct Answer: Voice over IP

Note: This Question is unanswered, help us to find answer for this one

139. A good example of a useful policy to minimize waste and mistake is ____.

Answer

Correct Answer: Users should implement proper procedures to ensure correct input data

Note: This Question is unanswered, help us to find answer for this one

140. A firm that provides hardware and services to run web sites of others is known as a(n) _____.

Answer

Correct Answer: Web hosting service

Note: This Question is unanswered, help us to find answer for this one

141. A disaster recovery plan contains a _____________ that outlines the costs to support the plan.

Answer

Correct Answer: Disaster recovery cost curve

Note: This Question is unanswered, help us to find answer for this one

142. A database maintains information on ___________.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

143. A cylindrical symbol labeled "database" represents ________ because databases are stored on disks.

Answer

Correct Answer: A computer disk drive

Note: This Question is unanswered, help us to find answer for this one

144. A business process describes a specific set of _____.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

145. A ________ is a plastic card that has a microchip loaded with identifying data.

Answer

Correct Answer: Smart card

Note: This Question is unanswered, help us to find answer for this one

146. A ________ examines each part of a message and determines whether to let that part pass.

Answer

Correct Answer: Packet-filtering firewall

Note: This Question is unanswered, help us to find answer for this one

147. A _____ is a formal review of a project after it is up and running.

Answer

Correct Answer: Postimplementation audit

Note: This Question is unanswered, help us to find answer for this one

148. __________ of lessons learned are designed to improve performance on current and future projects.

Answer

Correct Answer: Retrospectives

Note: This Question is unanswered, help us to find answer for this one

149. _________ is a single unit of binary data routed through a network.

Answer

Correct Answer: Packet

Note: This Question is unanswered, help us to find answer for this one

150. _________ converts an audio broadcast to a digital music player.

Answer

Correct Answer: Podcasting

Note: This Question is unanswered, help us to find answer for this one

151. ________ is the goal of openid, an authentication protocol that works across participating sites.

Answer

Correct Answer: Identity portability

Note: This Question is unanswered, help us to find answer for this one

152. _____ refers to software that is free and where anyone to look at and potentially modify the code.

Answer

Correct Answer: Open source software

Note: This Question is unanswered, help us to find answer for this one

153. _____ refers to removing an organization from a firm's distribution channel.

Answer

Correct Answer: Disintermediation

Note: This Question is unanswered, help us to find answer for this one

154. _____ is an example of an expert system that can be applied to various financial applications.

Answer

Correct Answer: PortBlue

Note: This Question is unanswered, help us to find answer for this one

155. _____ display ads appear on top of a browser window, blocking the users view.

Answer

Correct Answer: Pop-up

Note: This Question is unanswered, help us to find answer for this one

156. _____ costs include expenses for items such as supplies, equipment rental, and software leases.

Answer

Correct Answer: Operational

Note: This Question is unanswered, help us to find answer for this one

157. _____ auctions are the most common auction model for large purchases.

Answer

Correct Answer: Reverse

Note: This Question is unanswered, help us to find answer for this one

158. _____, which are generated by web server software, record a users actions on a web site.

Answer

Correct Answer: Log files

Note: This Question is unanswered, help us to find answer for this one

159. A gift card for walmart is an example of a _________________.

Answer

Correct Answer: Stored-value money card

Note: This Question is unanswered, help us to find answer for this one

160. A computers hardware and ____________ specify its platform.

Answer

Correct Answer: System software

Note: This Question is unanswered, help us to find answer for this one

161. A ____ might involve maximums for one or more resources.

Answer

Correct Answer: Constraint

Note: This Question is unanswered, help us to find answer for this one

162. A ____ is considered a telecommunications device that sends and receives signals.

Answer

Correct Answer: Satellite

Note: This Question is unanswered, help us to find answer for this one

163. A ____ combines commercially available products with specialty hardware or software.

Answer

Correct Answer: Value-Added Reseller (VAR)

Note: This Question is unanswered, help us to find answer for this one

164. "hidden costs," such as ________ costs, can easily undercut anticipated benefits from outsourcing.

Answer

Correct Answer: Vendor selection

Note: This Question is unanswered, help us to find answer for this one

165. ____________________ include information and the systems that use, store, and transmit information.

Answer

Correct Answer: Information assets

Note: This Question is unanswered, help us to find answer for this one

166. _____________ is the most prevalent form of communications wiring.

Answer

Correct Answer: Twisted-pair wire

Note: This Question is unanswered, help us to find answer for this one

167. ____________ is the practice of hiding data and keeping it away from unauthorized users.

Answer

Correct Answer: Cryptography

Note: This Question is unanswered, help us to find answer for this one

168. _________ is the most difficult, radical, lengthy, and comprehensive strategy.

Answer

Correct Answer: BPR

Note: This Question is unanswered, help us to find answer for this one

169. ________ solicits online input such as product ratings from consumers.

Answer

Correct Answer: Crowdsourcing

Note: This Question is unanswered, help us to find answer for this one

170. ________ is our normal sense of the world around us enhanced with digital information.

Answer

Correct Answer: Augmentative reality

Note: This Question is unanswered, help us to find answer for this one

171. _____ reports show a greater level of detail than is included in routine reports.

Answer

Correct Answer: Drill-down

Note: This Question is unanswered, help us to find answer for this one

172. _____ refers to the practical resources needed to develop, purchase, install, or operate a system.

Answer

Correct Answer: Technical feasibility

Note: This Question is unanswered, help us to find answer for this one

173. _____ occurs when applications cannot access data associated with other applications.

Answer

Correct Answer: Isolation

Note: This Question is unanswered, help us to find answer for this one

174. _____ issues involve who may obtain information and how much they should pay for this information.

Answer

Correct Answer: Accessibility

Note: This Question is unanswered, help us to find answer for this one

175. _____ is the standard that enables wireless devices to access web-based information and services.

Answer

Correct Answer: Wireless Application Protocol

Note: This Question is unanswered, help us to find answer for this one

176. _____ is an example of a popular general purpose software suite for personal computer users.

Answer

Correct Answer: Corel WordPerfect Office

Note: This Question is unanswered, help us to find answer for this one

177. _____ is a visa program that allows skilled employees from foreign lands into the united states.

Answer

Correct Answer: H-1B

Note: This Question is unanswered, help us to find answer for this one

178. _____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and mp3 players.

Answer

Correct Answer: Flash memory

Note: This Question is unanswered, help us to find answer for this one

179. _____ involves more risk than other changeover methods.

Answer

Correct Answer: Direct cutover

Note: This Question is unanswered, help us to find answer for this one

180. _____ ensures that authorized users have timely and reliable access to necessary information.

Answer

Correct Answer: Availability

Note: This Question is unanswered, help us to find answer for this one

181. _____ are substances that are capable of enabling as well as inhibiting the flow of electricity.

Answer

Correct Answer: Semiconductors

Note: This Question is unanswered, help us to find answer for this one

182. Buy-side marketplaces use _______________ auctions and are suitable for ___________.

Answer

Correct Answer: Reverse; procurement

Note: This Question is unanswered, help us to find answer for this one

183. _____ are links in a blog post that refer readers back to cited sources.

Answer

Correct Answer: Trackbacks

Note: This Question is unanswered, help us to find answer for this one

184. _____ are considered the first large-scale interactive global system.

Answer

Correct Answer: Airline reservation systems

Note: This Question is unanswered, help us to find answer for this one

185. ____ take advantage of the human element of security systems.

Answer

Correct Answer: Social engineering attacks

Note: This Question is unanswered, help us to find answer for this one

186. When you use google drive to work on a document with a classmate, this is considered _________.

Answer

Correct Answer: Virtual Collaboration

Note: This Question is unanswered, help us to find answer for this one

187. The term _____ refers to all payments less than $10.

Answer

Correct Answer: Small payments

Note: This Question is unanswered, help us to find answer for this one

188. The process to list assets that you believe support your organization is called ________.

Answer

Correct Answer: Asset identification

Note: This Question is unanswered, help us to find answer for this one

189. The latest erp solutions are designed with a focus on __________.

Answer

Correct Answer: Social collaboration and accessibility from mobile devices

Note: This Question is unanswered, help us to find answer for this one

190. The it infrastructure is comprised of _______ and ________.

Answer

Correct Answer: IT components, IT services

Note: This Question is unanswered, help us to find answer for this one

191. The information necessary for personalizing web pages for individual customers _________.

Answer

Correct Answer: Is primarily gathered by analyzing users' past transactions on the website

Note: This Question is unanswered, help us to find answer for this one

192. The firewall device must never be accessible directly from the ____________________ network.

Answer

Correct Answer: Public

Note: This Question is unanswered, help us to find answer for this one

193. The ________ tier acts as the intermediary between the client applications and the database.

Answer

Correct Answer: Business

Note: This Question is unanswered, help us to find answer for this one

194. The _____ includes the approved project scope statement and its associated wbs and wbs dictionary.

Answer

Correct Answer: Scope baseline

Note: This Question is unanswered, help us to find answer for this one

195. Sesame uses ____________________ key encryption to distribute secret keys.

Answer

Correct Answer: Public

Note: This Question is unanswered, help us to find answer for this one

196. One of the biggest roadblocks to ecash and ewallet technologies is _____.

Answer

Correct Answer: Fear

Note: This Question is unanswered, help us to find answer for this one

197. A unique feature of the semantic web is its ability to ____.

Answer

Correct Answer: Figure out what the user is looking for

Note: This Question is unanswered, help us to find answer for this one

198. A(n) ____ is an example of an intangible benefit.

Answer

Correct Answer: User-friendly system that improves employee job satisfaction

Note: This Question is unanswered, help us to find answer for this one

199. A(n) _____ is often used, so remote users have a secure connection to an organizations network.

Answer

Correct Answer: Virtual Private

Note: This Question is unanswered, help us to find answer for this one

200. The overall rate of online credit card fraud is ________ % of all online card transactions.

Answer

Correct Answer: Less than 1%

Note: This Question is unanswered, help us to find answer for this one

201. A frame that houses the system unit on a desktop is called a(n) ______.

Answer

Correct Answer: Tower

Note: This Question is unanswered, help us to find answer for this one

202. To break a deadlock, the dbms chooses one deadlocked user to be the ____.

Answer

Correct Answer: Victim

Note: This Question is unanswered, help us to find answer for this one

203. Medical robots are built with ____ capabilities to perform sophisticated surgeries.

Answer

Correct Answer: High-precision

Note: This Question is unanswered, help us to find answer for this one

204. With respect to the definition of data warehouse, ____ means that the data is read-only.

Answer

Correct Answer: Nonvolatile

Note: This Question is unanswered, help us to find answer for this one

205. When friedman describes globalization 3.0, he discusses 10 forces that ________ the world.

Answer

Correct Answer: Flattened the World

Note: This Question is unanswered, help us to find answer for this one

206. Using the _____, e-commerce sites sell digital products and services.

Answer

Correct Answer: Subscription model

Note: This Question is unanswered, help us to find answer for this one

207. The three items that you must specify when using solver are _______.

Answer

Correct Answer: Variable cell, objective cell, and constraints

Note: This Question is unanswered, help us to find answer for this one

208. The term ________ refers to the process of creating and maintaining information systems.

Answer

Correct Answer: Systems development

Note: This Question is unanswered, help us to find answer for this one

209. The speed of transmission of a network is determined by the speed of its smallest ________.

Answer

Correct Answer: Amount of bandwidth

Note: This Question is unanswered, help us to find answer for this one

210. The most important feature of a collaboration information system is ________.

Answer

Correct Answer: Providing an effective communication facility

Note: This Question is unanswered, help us to find answer for this one

211. Tasks or action steps that come after the task at hand are called __________.

Answer

Correct Answer: Successors

Note: This Question is unanswered, help us to find answer for this one

212. Netflix can send out any dvd it buys because of a supreme court ruling known as the _____.

Answer

Correct Answer: Clickwrap agreement

Note: This Question is unanswered, help us to find answer for this one

213. Most business wlans use access points and do not utilize the ____.

Answer

Correct Answer: ISS

Note: This Question is unanswered, help us to find answer for this one

214. A(n) _____ refers to an internet vandal and mischief-maker.

Answer

Correct Answer: Troll

Note: This Question is unanswered, help us to find answer for this one

215. A(n) _______________ is a field that contains data unique to a record.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

216. The person responsible for the control of the centralized and shared database is the database ____.

Answer

Correct Answer: Administrator

Note: This Question is unanswered, help us to find answer for this one

217. A(n) ____ test is a test performed to determine whether the system fulfills user requirements.

Answer

Correct Answer: Acceptance.

Note: This Question is unanswered, help us to find answer for this one

218. A(n) _________ examines and blocks internet traffic in order to protect your private network.

Answer

Correct Answer: Firewall.

Note: This Question is unanswered, help us to find answer for this one

219. A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.

Answer

Correct Answer: Network system.

Note: This Question is unanswered, help us to find answer for this one

220. In 1972, the _____ recommended that publicly held organizations establish audit committees.

Answer

Correct Answer: Securities and Exchange Commission (SEC)

Note: This Question is unanswered, help us to find answer for this one

221. Illuminate live is a lecture program used in schools and is considered a(n) _________ tool.

Answer

Correct Answer: Web conferencing

Note: This Question is unanswered, help us to find answer for this one

222. ________ is a phenomenon where companies use everyday people as a cheap labor force.

Answer

Correct Answer: Crowdsourcing

Note: This Question is unanswered, help us to find answer for this one

223. ________ integrates data from various operational systems.

Answer

Correct Answer: A data warehouse

Note: This Question is unanswered, help us to find answer for this one

224. ____ converts a table that is in third normal form to a table no longer in third normal form.

Answer

Correct Answer: Denormalization

Note: This Question is unanswered, help us to find answer for this one

225. In a ____ deployment, the system is installed and brought into operation in a series of steps.

Answer

Correct Answer: Phased

Note: This Question is unanswered, help us to find answer for this one

226. In 2006, _____ introduced a low-cost laptop called the classmate pc.

Answer

Correct Answer: Intel

Note: This Question is unanswered, help us to find answer for this one

227. In _____, the organization takes concrete actions against risks.

Answer

Correct Answer: Risk mitigation

Note: This Question is unanswered, help us to find answer for this one

228. In ____ mode, the data within an ip packet is encrypted, but the header information is not.

Answer

Correct Answer: Transport

Note: This Question is unanswered, help us to find answer for this one

229. In ____ conversion, the old system is stopped and the new system is implemented.

Answer

Correct Answer: Plunge

Note: This Question is unanswered, help us to find answer for this one

230. ____ invite sellers to submit bids for products and services.

Answer

Correct Answer: Reverse auctions

Note: This Question is unanswered, help us to find answer for this one

231. During the systems design phase, _____ are used to organize, access, and maintain data structures.

Answer

Correct Answer: Key

Note: This Question is unanswered, help us to find answer for this one

232. Focused differentiation occurs when ________.

Answer

Correct Answer: A better product is provided within an industry segment

Note: This Question is unanswered, help us to find answer for this one

233. Focused cost leadership is observed when a product has the lowest cost ________.

Answer

Correct Answer: Within an industry segment

Note: This Question is unanswered, help us to find answer for this one

234. An example of ________ is when a user

Answer

Correct Answer: Ongoing sharing

Note: This Question is unanswered, help us to find answer for this one

235. A third-party program, such as adobe flash player, is considered to be a(n) ________.

Answer

Correct Answer: Plug-in

Note: This Question is unanswered, help us to find answer for this one

236. A market is said to be _____ if it derives most of its value from a single class of users.

Answer

Correct Answer: One-sided

Note: This Question is unanswered, help us to find answer for this one

237. ________ asks users to write lines of code to answer questions against a database.

Answer

Correct Answer: Structured query language

Note: This Question is unanswered, help us to find answer for this one

238. ________ are the data that is deemed most important in the operation of a business.

Answer

Correct Answer: Master data

Note: This Question is unanswered, help us to find answer for this one

239. ________ are performed by the functional areas that process inputs and produce outputs.

Answer

Correct Answer: Core

Note: This Question is unanswered, help us to find answer for this one

240. The _____ standard can transmit up to 75 mbps and has a range of 31 miles.

Answer

Correct Answer: WiMAX

Note: This Question is unanswered, help us to find answer for this one

241. In dbms, data are kept separate from the application's programming code. this means that ________.

Answer

Correct Answer: A database does not need to be changed if a change is made to an application

Note: This Question is unanswered, help us to find answer for this one

242. With _____ outsourcing, an organization chooses an outsourcing company in the same country.

Answer

Correct Answer: Nearshore

Note: This Question is unanswered, help us to find answer for this one

243. The variety dimension of big data refers to the combination of _____.

Answer

Correct Answer: Structured data and unstructured data

Note: This Question is unanswered, help us to find answer for this one

244. The first phase in the customer life cycle involves ________.

Answer

Correct Answer: Sending messages to target audiences to attract customer prospects

Note: This Question is unanswered, help us to find answer for this one

245. User ratings act as _____ for netflix's customers.

Answer

Correct Answer: Switching costs

Note: This Question is unanswered, help us to find answer for this one

246. Enterprise application integration includes all of the following features except ___________.

Answer

Correct Answer: Use of inherent processes

Note: This Question is unanswered, help us to find answer for this one

247. Most student teams focus on a single criterion for judging team success, namely, _________.

Answer

Correct Answer: Achieving a successful outcome

Note: This Question is unanswered, help us to find answer for this one

248. The outermost components of the information systems framework ________.

Answer

Correct Answer: Can take action

Note: This Question is unanswered, help us to find answer for this one

249. The major benefit of enterprise application integration is that it ________.

Answer

Correct Answer: Enables organizations to use existing applications

Note: This Question is unanswered, help us to find answer for this one

250. It deployment strategies fall into two broad categories, which are ________:

Answer

Correct Answer: In-house development and sourcing

Note: This Question is unanswered, help us to find answer for this one

251. In the context of e-government applications, crisis response is categorized as a _____ application.

Answer

Correct Answer: Government-to-government

Note: This Question is unanswered, help us to find answer for this one

252. _____ reports contain special information not found in routine reports.

Answer

Correct Answer: Ad hoc

Note: This Question is unanswered, help us to find answer for this one

253. ________ refers to the leasing of hardware with pre-installed operating systems.

Answer

Correct Answer: Platform as a Service

Note: This Question is unanswered, help us to find answer for this one

254. Scheduling and assigning employees might be handled by a _____.

Answer

Correct Answer: Personnel information system

Note: This Question is unanswered, help us to find answer for this one

255. Crm software products enable organizations to become more _________.

Answer

Correct Answer: Customer-centric

Note: This Question is unanswered, help us to find answer for this one

256. The control variable of a counter-controlled loop should be declared as ________to prevent errors.

Answer

Correct Answer: Int

Note: This Question is unanswered, help us to find answer for this one

257. Enterprise resource planning (erp) was originally used in the ________ domain.

Answer

Correct Answer: Manufacturing

Note: This Question is unanswered, help us to find answer for this one

258. The first release-level activity in an xp development approach is ____.

Answer

Correct Answer: Planning a series of iterations

Note: This Question is unanswered, help us to find answer for this one

259. The blogosphere is defined as _________.

Answer

Correct Answer: Millions of blogs on the Web

Note: This Question is unanswered, help us to find answer for this one

260. The _____ module of an executive information system (eis) is responsible for managing data access.

Answer

Correct Answer: Administrative

Note: This Question is unanswered, help us to find answer for this one

261. The major advantage of screen output versus printed output is that screen output ____.

Answer

Correct Answer: Can be updated dynamically

Note: This Question is unanswered, help us to find answer for this one

262. One characteristic of a structured problem is that _____.

Answer

Correct Answer: It is straightforward, requiring known facts and relationships

Note: This Question is unanswered, help us to find answer for this one

263. The term _____ originally referred to a particularly skilled programmer.

Answer

Correct Answer: Hacker

Note: This Question is unanswered, help us to find answer for this one

264. The responsibilities of a computer technician include ________.

Answer

Correct Answer: Installing software and repairing computer equipment and networks

Note: This Question is unanswered, help us to find answer for this one

265. The need for collaboration is greatest for ________ decisions.

Answer

Correct Answer: Strategic

Note: This Question is unanswered, help us to find answer for this one

266. A ________ monitors, maintains, fixes, and tunes computer networks.

Answer

Correct Answer: Network administrator

Note: This Question is unanswered, help us to find answer for this one

267. To analzye various alternative scenarios, a manager would use _______.

Answer

Correct Answer: The spreadsheet's 'what-if' capability

Note: This Question is unanswered, help us to find answer for this one

268. The performance of decision support systems is typically a function of decision quality and _____.

Answer

Correct Answer: Cost

Note: This Question is unanswered, help us to find answer for this one

269. The last step in the database life cycle (dblc) is _____.

Answer

Correct Answer: Maintenance and evolution

Note: This Question is unanswered, help us to find answer for this one

270. ___________ is the process of transforming data from cleartext into ciphertext.

Answer

Correct Answer: Cryptography

Note: This Question is unanswered, help us to find answer for this one

271. _____ are short descriptions written by customers of what they need a scrum system to do for them.

Answer

Correct Answer: User stories

Note: This Question is unanswered, help us to find answer for this one

272. ________ refers to data and responses to data that are contributed by users and sm sponsors.

Answer

Correct Answer: Connection

Note: This Question is unanswered, help us to find answer for this one

273. The biggest enemy of most printers is ____.

Answer

Correct Answer: Printer paper dust

Note: This Question is unanswered, help us to find answer for this one

274. User productivity systems ____.

Answer

Correct Answer: Include e-mail, voice mail, fax, video and Web conferencing, word processing, automated calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and integrated mobile computing systems

Note: This Question is unanswered, help us to find answer for this one

275. The problems presented by workgroup information systems can usually be resolved by ________.

Answer

Correct Answer: The work group itself

Note: This Question is unanswered, help us to find answer for this one

276. Dsl and fttp are examples of wired ______ internet service technologies.

Answer

Correct Answer: Broadband

Note: This Question is unanswered, help us to find answer for this one

277. _____ are people who work directly with information systems to get results.

Answer

Correct Answer: End users.

Note: This Question is unanswered, help us to find answer for this one

278. A snapshot of the system settings and configuration is called a ____.

Answer

Correct Answer: Restore point

Note: This Question is unanswered, help us to find answer for this one

279. Costs of dissatisfaction, repair costs, and warranty costs are elements of cost in the __________.

Answer

Correct Answer: Taguchi quality loss function

Note: This Question is unanswered, help us to find answer for this one

280. In the ________ phase a prototype of the website will often be created.

Answer

Correct Answer: Design

Note: This Question is unanswered, help us to find answer for this one

281. According to moore's law, the ________.

Answer

Correct Answer: Number of transistors per square inch on an integrated chip doubles every 18 months

Note: This Question is unanswered, help us to find answer for this one

282. Decision making is enhanced by a diverse group of ________, such as data mining and fuzzy logic.

Answer

Correct Answer: Intelligent techniques

Note: This Question is unanswered, help us to find answer for this one

283. A(n) _____ is a temporary storage space used to speed computing tasks.

Answer

Correct Answer: Cache

Note: This Question is unanswered, help us to find answer for this one

284. Using bpmn, business processes are typically organized into what is called ________.

Answer

Correct Answer: Swim lane format

Note: This Question is unanswered, help us to find answer for this one

285. In a relational database, every record must be uniquely identified by a__________.

Answer

Correct Answer: Super key

Note: This Question is unanswered, help us to find answer for this one

286. Decision-support systems (dss) focus on problems ________.

Answer

Correct Answer: That require supporting more non-routine decision-making.

Note: This Question is unanswered, help us to find answer for this one

287. In ________ installation, the organization shuts off the old system and starts the new system.

Answer

Correct Answer: Plunge.

Note: This Question is unanswered, help us to find answer for this one

288. A private internet that is used exclusively within an organization is called a(n) ________.

Answer

Correct Answer: Intranet

Note: This Question is unanswered, help us to find answer for this one

289. ________ is obtaining the opinions of many people on the quality of products.

Answer

Correct Answer: Crowdsourcing

Note: This Question is unanswered, help us to find answer for this one

290. The inherent processes defined in an erp solution are referred to by some erp vendors as ________.

Answer

Correct Answer: Process blueprints.

Note: This Question is unanswered, help us to find answer for this one

291. A small and medium-sized enterprise (sme) is a legally independent enterprise with _____ employees.

Answer

Correct Answer: Up to 500.

Note: This Question is unanswered, help us to find answer for this one

292. The most popular way to access podcasts on the web is through _____ software.

Answer

Correct Answer: ITunes

Note: This Question is unanswered, help us to find answer for this one

293. In _____, needed services such as temporary help or extra space are traded on an as-needed basis.

Answer

Correct Answer: Functional exchanges

Note: This Question is unanswered, help us to find answer for this one

294. ____ are designed to withstand much more physical abuse than conventional devices.

Answer

Correct Answer: Ruggedized devices

Note: This Question is unanswered, help us to find answer for this one

295. The code ____ instructs excel to insert the page number in the header or footer section.

Answer

Correct Answer: &[Page]

Note: This Question is unanswered, help us to find answer for this one

296. The browser feature where tabs are independent of each other is known as ________.

Answer

Correct Answer: Tab isolation

Note: This Question is unanswered, help us to find answer for this one

297. The announcement of an operational csirt should minimally include ____.

Answer

Correct Answer: Contact methods and numbers

Note: This Question is unanswered, help us to find answer for this one

298. The front _____________ connectors lead from the front of the computer case to the motherboard.

Answer

Correct Answer: Panel REF. PAGE: 55

Note: This Question is unanswered, help us to find answer for this one

299. A(n) ______ test measures the performance of hardware or software.

Answer

Correct Answer: Benchmark

Note: This Question is unanswered, help us to find answer for this one

300. Ebay employs the _________ auction mechanism.

Answer

Correct Answer: Forward

Note: This Question is unanswered, help us to find answer for this one

301. A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.

Answer

Correct Answer: ​query language

Note: This Question is unanswered, help us to find answer for this one

302. A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.

Answer

Correct Answer: Information

Note: This Question is unanswered, help us to find answer for this one

303. A(n) __________ is an undocumented method of accessing a digital device.

Answer

Correct Answer: Backdoor.

Note: This Question is unanswered, help us to find answer for this one

304. In a _____ system, the distinction blurs between input, output, and the interface itself.

Answer

Correct Answer: User Centered

Note: This Question is unanswered, help us to find answer for this one

305. Conjunctivitis does not directly affect ______.

Answer

Correct Answer: The superior palpebra

Note: This Question is unanswered, help us to find answer for this one

306. Personal information systems are most likely to be used by ________.

Answer

Correct Answer: Drug salespersons.

Note: This Question is unanswered, help us to find answer for this one

307. Data mining is more ________ than olap.

Answer

Correct Answer: Discovery driven

Note: This Question is unanswered, help us to find answer for this one

308. Data mining complements online analytical processing in that it ________.

Answer

Correct Answer: Provides capabilities for discovering hidden predictive relationships in the data

Note: This Question is unanswered, help us to find answer for this one

309. Analyzing decision support data to generate information is part of ____.

Answer

Correct Answer: Business intelligence.

Note: This Question is unanswered, help us to find answer for this one

310. Access and sql server are popular ________ dbms products.

Answer

Correct Answer: Microsoft

Note: This Question is unanswered, help us to find answer for this one

311. A hyper-social company uses __________ to create value from intellectual capital.

Answer

Correct Answer: Knowledge management.

Note: This Question is unanswered, help us to find answer for this one

312. The core drivers of the information age include _________. (check all that apply.)

Answer

Correct Answer: Information Business Intelligence Knowledge Data.

Note: This Question is unanswered, help us to find answer for this one

313. In porter's five forces model, the threat of new entrants concerns the danger of ________.

Answer

Correct Answer: Customers taking their business elsewhere

Note: This Question is unanswered, help us to find answer for this one

314. Crm allows an organization to accomplish all of the following except __________.

Answer

Correct Answer: Complicate marketing and sales processes.

Note: This Question is unanswered, help us to find answer for this one

315. A(n) ________ the condition that exists when data are isolated in separated information systems.

Answer

Correct Answer: Information Silos

Note: This Question is unanswered, help us to find answer for this one

316. A(n) ________ is a network of activities that generate value by transforming inputs into outputs.

Answer

Correct Answer: Business process

Note: This Question is unanswered, help us to find answer for this one

317. A major problem with data that is purchased from data vendors is ________.

Answer

Correct Answer: Missing values.

Note: This Question is unanswered, help us to find answer for this one

318. The process of hardening a web site is a ________ safeguard.

Answer

Correct Answer: Technical.

Note: This Question is unanswered, help us to find answer for this one

319. The problems posed by information silos ultimately lead to ________.

Answer

Correct Answer: Increased costs for an organization

Note: This Question is unanswered, help us to find answer for this one

320. Identifying competitive advantages can be difficult and explains why they are typically _______.

Answer

Correct Answer: Temporary

Note: This Question is unanswered, help us to find answer for this one

321. Projects that spend much time ________ are sometimes said to be in analysis paralysis.

Answer

Correct Answer: Documenting requirements

Note: This Question is unanswered, help us to find answer for this one

322. Porter developed the five forces model to help organizations determine the ________.

Answer

Correct Answer: Potential profitability of an industry

Note: This Question is unanswered, help us to find answer for this one

323. In most organizations, the ____ department is responsible for output control and security measures.

Answer

Correct Answer: IT

Note: This Question is unanswered, help us to find answer for this one

324. Bargaining power of customers is likely to be the highest for markets involving ________.

Answer

Correct Answer: Industrial products

Note: This Question is unanswered, help us to find answer for this one

325. Cbt or wbt for those preparing for certification exams are ____ courses.

Answer

Correct Answer: Online tutorial

Note: This Question is unanswered, help us to find answer for this one

326. A vendor-specific certification is ____.

Answer

Correct Answer: Vendor neutral

Note: This Question is unanswered, help us to find answer for this one

327. The ________ determines appropriate use of graphics on the site, creates and edits graphics.

Answer

Correct Answer: Graphic designer

Note: This Question is unanswered, help us to find answer for this one

328. Each stage of the value chain not only adds value to the product but also ________.

Answer

Correct Answer: Accumulates costs

Note: This Question is unanswered, help us to find answer for this one

329. The best location for a peripheral, such as a printer, that a user accesses frequently is ____.

Answer

Correct Answer: Within arm’s reach of the user in a normal working position

Note: This Question is unanswered, help us to find answer for this one

330. The bargaining power of a customer is weak if ________.

Answer

Correct Answer: The availability of a rival product is limited

Note: This Question is unanswered, help us to find answer for this one

331. The internet was originally created as a communication system for the ________.

Answer

Correct Answer: Department of Defense

Note: This Question is unanswered, help us to find answer for this one

332. The internet is ________.

Answer

Correct Answer: A global network of billions of computers and other electronic devices

Note: This Question is unanswered, help us to find answer for this one

333. The internet connects millions of computers connected through millions of ____ worldwide.

Answer

Correct Answer: Networks

Note: This Question is unanswered, help us to find answer for this one

334. The appropriate software to use for creating research papers is ________ software

Answer

Correct Answer: Word processing

Note: This Question is unanswered, help us to find answer for this one

335. Plant location is a type of _____ decision at the strategic management level.

Answer

Correct Answer: Structured

Note: This Question is unanswered, help us to find answer for this one

336. Franchise companies have typically had ________ systems.

Answer

Correct Answer: Duplicated

Note: This Question is unanswered, help us to find answer for this one

337. According to gartner, the enterprise architecture (ea) needs to start with ________.

Answer

Correct Answer: The organisations strategic direction

Note: This Question is unanswered, help us to find answer for this one

338. The ________ manager makes tactical decisions to implement the strategic goals of an organization.

Answer

Correct Answer: Tactical

Note: This Question is unanswered, help us to find answer for this one

339. A database or a relational database is a collection of related tables. _________________________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

340. _____ is considered a type of interorganizational system (ios).

Answer

Correct Answer: An Extranet

Note: This Question is unanswered, help us to find answer for this one

search