Note: This Question is unanswered, help us to find answer for this one
5. ____ involves studying the parts to understand the overall system.
Answer
Correct Answer:
Synthesis
Note: This Question is unanswered, help us to find answer for this one
6. Traditional database application programs are written in object-oriented languages like ________.
Answer
Correct Answer:
Visual Basic
Note: This Question is unanswered, help us to find answer for this one
7. The network effect refers to the notion that the value of a network is dependent on ________.
Answer
Correct Answer:
Increases with the number of users in the network
Note: This Question is unanswered, help us to find answer for this one
8. The most common type of computer security incident is ________.
Answer
Correct Answer:
Malware infection
Note: This Question is unanswered, help us to find answer for this one
9. The more technical an organization, the ________ the social policies.
Answer
Correct Answer:
More lenient.
Note: This Question is unanswered, help us to find answer for this one
10. The internal data sources for an information system include _____.
Answer
Correct Answer:
Personnel records
Note: This Question is unanswered, help us to find answer for this one
11. The frequencies licensed by telecommunication firms to provide wireless service is known as _____.
Answer
Correct Answer:
Wireless spectrum
Note: This Question is unanswered, help us to find answer for this one
12. The _____ of an executive information system (eis) is responsible for managing data access.
Answer
Correct Answer:
Administrative module
Note: This Question is unanswered, help us to find answer for this one
13. Normal processing procedures for operations personnel involve procedures for ________.
Answer
Correct Answer:
Starting, stopping, and operating the system
Note: This Question is unanswered, help us to find answer for this one
14. A(n) ________ capability allows users to view more detailed views of data.
Answer
Correct Answer:
Drill-down
Note: This Question is unanswered, help us to find answer for this one
15. The site that initiates the update in a two-phase commit is known as the ____.
Answer
Correct Answer:
Coordinator.
Note: This Question is unanswered, help us to find answer for this one
16. When work that was formerly done by people has been moved to computers, it is said to be ________.
Answer
Correct Answer:
Automated
Note: This Question is unanswered, help us to find answer for this one
17. Knowing what is expected and when to go into detail is directly related to knowing _____.
Answer
Correct Answer:
WHO your targets are
Note: This Question is unanswered, help us to find answer for this one
18. Giving the ir team the responsibility for ____ is generally not recommended.
Answer
Correct Answer:
Patch management
Note: This Question is unanswered, help us to find answer for this one
19. Following standardized guidelines to calculate sales commissions is an example of a(n) ________.
Answer
Correct Answer:
Structured decision
Note: This Question is unanswered, help us to find answer for this one
20. As explained in this video, an inventory management program is an example of _____.
Answer
Correct Answer:
Application software
Note: This Question is unanswered, help us to find answer for this one
21. A computer making a dns query is known as a dns client, or dns ___________.
Answer
Correct Answer:
Resolver
Note: This Question is unanswered, help us to find answer for this one
22. If you have four tags in each table row, that table has ____ columns.
Answer
Correct Answer:
Four
Note: This Question is unanswered, help us to find answer for this one
23. If voip traffic needs to traverse through a wan with congestion, you need ___________.
Answer
Correct Answer:
Quality of service (QoS)
Note: This Question is unanswered, help us to find answer for this one
24. I2 technologies is a leading __________ vendor.
Answer
Correct Answer:
SCM
Note: This Question is unanswered, help us to find answer for this one
25. Hybrid notebook-tablet computers are also called convertible tablets or ____.
Answer
Correct Answer:
2-in-1 computers
Note: This Question is unanswered, help us to find answer for this one
26. Google customer surveys is a service that publishers can use to ________ from their online content.
Answer
Correct Answer:
Generate revenue
Note: This Question is unanswered, help us to find answer for this one
27. Fourth-generation languages (4gls) are sometimes called ____.
Answer
Correct Answer:
Very-high-level languages
Note: This Question is unanswered, help us to find answer for this one
28. Flexibility is a major component of ergonomic design, mainly because: _______.
Answer
Correct Answer:
all of these answers
Note: This Question is unanswered, help us to find answer for this one
29. Few companies today could realize their full-potential business value without updated ________.
Answer
Correct Answer:
IT infrastructures and services.
Note: This Question is unanswered, help us to find answer for this one
30. Cam and mrp are examples of information systems used in ______.
Answer
Correct Answer:
Manufacturing
Note: This Question is unanswered, help us to find answer for this one
31. By default, web pages are kept in internet explorer history _______.
Answer
Correct Answer:
For 20 days
Note: This Question is unanswered, help us to find answer for this one
32. An internet connectivity plan is also known as a ________ plan.
Answer
Correct Answer:
Data
Note: This Question is unanswered, help us to find answer for this one
33. An emotional health concern related to computer use is ____.
Answer
Correct Answer:
An Internet addiction
Note: This Question is unanswered, help us to find answer for this one
34. All the following are major types of parallel cables except ________?
Answer
Correct Answer:
Monitor
Note: This Question is unanswered, help us to find answer for this one
35. All the following are bus types that video cards use except ________?
Answer
Correct Answer:
SPI
Note: This Question is unanswered, help us to find answer for this one
36. All of the following frequencies are noted in the text as being unlicensed except ____.
Answer
Correct Answer:
300 GHz
Note: This Question is unanswered, help us to find answer for this one
37. Accepting february 29 in only a leap year is a check that is done by a ________ check.
Answer
Correct Answer:
Date
Note: This Question is unanswered, help us to find answer for this one
38. A threat source can be a situation or method that might accidentally trigger a(n) ____________.
Answer
Correct Answer:
Vulnerability
Note: This Question is unanswered, help us to find answer for this one
39. A storage medium is inserted into its corresponding ____ in order to be read from or written to.
Answer
Correct Answer:
Storage device
Note: This Question is unanswered, help us to find answer for this one
40. A global network must have _____ to guide packets to their destinations.
Answer
Correct Answer:
Switching nodes
Note: This Question is unanswered, help us to find answer for this one
41. A fraud or scam carried out through the internet is a form of ____.
Answer
Correct Answer:
Dot con
Note: This Question is unanswered, help us to find answer for this one
42. A diagram that shows the messages between an actor and the system is called a(n) _______.
Answer
Correct Answer:
System Sequence Diagram
Note: This Question is unanswered, help us to find answer for this one
43. A _____ is a security weakness or soft spot.
Answer
Correct Answer:
vulnerability
Note: This Question is unanswered, help us to find answer for this one
44. A _____ is a control used to enter text strings that may include several lines of content.
Answer
Correct Answer:
Text area box
Note: This Question is unanswered, help us to find answer for this one
45. A _____ attribute can be further subdivided to yield additional attributes.
Answer
Correct Answer:
Composite
Note: This Question is unanswered, help us to find answer for this one
46. A ____ is a program advertised as performing one activity but actually does something else.
Answer
Correct Answer:
Trojan
Note: This Question is unanswered, help us to find answer for this one
47. ________ occurs when a hacker looks through your trash to find personal information.
Answer
Correct Answer:
Dumpster diving
Note: This Question is unanswered, help us to find answer for this one
48. In a count-controlled loop, the counter performs ________ action(s).
Answer
Correct Answer:
Three
Note: This Question is unanswered, help us to find answer for this one
49. A _____________ allows for an mtu as high as 9198 bytes.
Answer
Correct Answer:
Jumbo frame
Note: This Question is unanswered, help us to find answer for this one
50. Consumers prefer mobile commerce sites ________.
Answer
Correct Answer:
Offer effective search tools and transaction speeds
Note: This Question is unanswered, help us to find answer for this one
51. Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature.
Answer
Correct Answer:
Drill down
Note: This Question is unanswered, help us to find answer for this one
52. An after-action review refers to ________.
Answer
Correct Answer:
A meeting held after a project has been completed to document what worked well and what did not
Note: This Question is unanswered, help us to find answer for this one
53. A(n) ____ policy controls password characteristics for local user accounts.
Answer
Correct Answer:
Password
Note: This Question is unanswered, help us to find answer for this one
54. A(n) ____ comes into existence as soon as a work is placed into a tangible form.
Answer
Correct Answer:
Copyright
Note: This Question is unanswered, help us to find answer for this one
55. An apple ipad and a samsung galaxy tab are examples of ________ computers.
Answer
Correct Answer:
Tablet
Note: This Question is unanswered, help us to find answer for this one
56. When an incident expands ________________________________.
Answer
Correct Answer:
Only the functions and positions necessary are filled.
Note: This Question is unanswered, help us to find answer for this one
57. 2pac shakur said that when there is hopelessness, people _______.
Answer
Correct Answer:
Revolt
Note: This Question is unanswered, help us to find answer for this one
58. One shortcoming of rapid application development (rad) is _____.
Answer
Correct Answer:
A narrow focus, which might limit future development
Note: This Question is unanswered, help us to find answer for this one
59. Information technologies and ____ play a major role in implementing an scm system.
Answer
Correct Answer:
The internet
Note: This Question is unanswered, help us to find answer for this one
60. In the early 1980s, ____ were invented and computer use increased dramatically.
Answer
Correct Answer:
Microcomputers
Note: This Question is unanswered, help us to find answer for this one
61. Outsourcing has seen a huge increase because of the ________.
Answer
Correct Answer:
Decrease in telecommunication costs.
Note: This Question is unanswered, help us to find answer for this one
62. The cpu stores the results of computations in ________.
Answer
Correct Answer:
Main memory
Note: This Question is unanswered, help us to find answer for this one
63. The dbas ____ role covers activities involving the use of the dbms.
Answer
Correct Answer:
Technical
Note: This Question is unanswered, help us to find answer for this one
64. The central processing unit (cpu) works in conjunction with ________ to perform processing.
Answer
Correct Answer:
Main memory
Note: This Question is unanswered, help us to find answer for this one
65. The bulletin board systems of the 1970s are considered to be the forerunners of _____________.
Answer
Correct Answer:
Content Communitiesb
Note: This Question is unanswered, help us to find answer for this one
66. Overseeing order transmissions are part of the ____ flow in a manufacturing firms scm system.
Answer
Correct Answer:
Finances
Note: This Question is unanswered, help us to find answer for this one
67. Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.
Answer
Correct Answer:
Low, repetitive, difficult
Note: This Question is unanswered, help us to find answer for this one
68. Operational feasibility is also known as behavioral feasibility. _________________________
Answer
Correct Answer:
True.
Note: This Question is unanswered, help us to find answer for this one
69. Online communities, like facebook, utilize ____ as word-of-mouth marketing to spread information.
Answer
Correct Answer:
Viral marketing
Note: This Question is unanswered, help us to find answer for this one
70. The entertainment industry primarily uses sentiment analysis to improve their ______.
Answer
Correct Answer:
Marketing campaigns
Note: This Question is unanswered, help us to find answer for this one
71. It personnel use _____ to produce _____.
Answer
Correct Answer:
IT components, IT services
Note: This Question is unanswered, help us to find answer for this one
72. It is estimated that the revenue generated by u.s. b2b e-commerce is _____ compared to b2c revenue.
Answer
Correct Answer:
Nearly thirteen times larger
Note: This Question is unanswered, help us to find answer for this one
73. In the url http://www.irs.gov, irs is the ________.
Answer
Correct Answer:
Correct domain name
Note: This Question is unanswered, help us to find answer for this one
74. In doe v. holder, the courts ruled that the nsl gag provision violates the _____.
Answer
Correct Answer:
First Amendment
Note: This Question is unanswered, help us to find answer for this one
75. In an n-tiered architecture, the _____ is spread across two or more different sets of servers.
Answer
Correct Answer:
Application logic
Note: This Question is unanswered, help us to find answer for this one
76. In the context of the data component of an information system, internal data sources include _____.
Answer
Correct Answer:
Personnel records
Note: This Question is unanswered, help us to find answer for this one
77. In the __________ process, measured results are compared against expected results.
Answer
Correct Answer:
Negative feedback loop
Note: This Question is unanswered, help us to find answer for this one
78. In recent years, the __________ certification program has added a set of concentration exams.
Answer
Correct Answer:
CISSP
Note: This Question is unanswered, help us to find answer for this one
79. Returning the emergency unit to service is part of the _________.
Answer
Correct Answer:
Termination phase
Note: This Question is unanswered, help us to find answer for this one
80. If your home air conditioner has an ip address, it is part of the ____.
Answer
Correct Answer:
Internet of Things
Note: This Question is unanswered, help us to find answer for this one
81. Sourcing or procurement occurs in the ____________ component of the supply chain.
Answer
Correct Answer:
Upstream
Note: This Question is unanswered, help us to find answer for this one
82. Users interact via avatars in a(n) _____.
Answer
Correct Answer:
Virtual world
Note: This Question is unanswered, help us to find answer for this one
83. A(n) ________ spreadsheet model represents behavior over time.
Answer
Correct Answer:
Dynamic.
Note: This Question is unanswered, help us to find answer for this one
84. The internet is playing an important role in helping organizations reduce expenses, because _____.
Answer
Correct Answer:
Web applications can be used with minimum costs.
Note: This Question is unanswered, help us to find answer for this one
85. A(n) ________ has a microchip in it to hold data.
Answer
Correct Answer:
Smart card
Note: This Question is unanswered, help us to find answer for this one
86. A(n) _____ is the electronic exchange of money or scrip.
Answer
Correct Answer:
Electronic Payment
Note: This Question is unanswered, help us to find answer for this one
87. The gea group implemented a(n) ___________ to address its reporting issues.
Answer
Correct Answer:
ERP system
Note: This Question is unanswered, help us to find answer for this one
88. Google ________ is an online store that can be used for self-publishing books.
Answer
Correct Answer:
Play
Note: This Question is unanswered, help us to find answer for this one
89. The linkedin page for brands is called a _____ page.
Answer
Correct Answer:
Help you make introductions to people with whom you're wanting to connect
Note: This Question is unanswered, help us to find answer for this one
90. In a dataflow diagram (dfd), a(n) ___________ portrays the transformation of data.
Answer
Correct Answer:
Rounded box
Note: This Question is unanswered, help us to find answer for this one
91. In a database, bytes are grouped into __________.
Answer
Correct Answer:
Columns
Note: This Question is unanswered, help us to find answer for this one
92. Having a conversation with someone using a cellular phone is an example of _________ transmission.
Answer
Correct Answer:
Full-duplex
Note: This Question is unanswered, help us to find answer for this one
93. Hardware and software acquisition costs account for about ________ percent of tco.
Answer
Correct Answer:
20
Note: This Question is unanswered, help us to find answer for this one
94. Chevron employed ________ to provided detailed work instructions to its employees.
Answer
Correct Answer:
Nimbus
Note: This Question is unanswered, help us to find answer for this one
95. Checking store inventory is an example of a(n) ________ decision.
Answer
Correct Answer:
Structured
Note: This Question is unanswered, help us to find answer for this one
96. Cheating is ________ common at business schools ____________ tools like turnitin.
Answer
Correct Answer:
More; even with
Note: This Question is unanswered, help us to find answer for this one
97. All of the following software applications are available for apple's smartwatch except ________.
Answer
Correct Answer:
Linux for running web servers
Note: This Question is unanswered, help us to find answer for this one
98. Adjusting the ______ increases or decreases the crispness of objects in the photo.
Answer
Correct Answer:
Sharpness
Note: This Question is unanswered, help us to find answer for this one
99. Activity trackers and smartwatches are two types of ______ devices.
Answer
Correct Answer:
Wearable
Note: This Question is unanswered, help us to find answer for this one
100. Activity diagrams are useful in the development of ______________.
Answer
Correct Answer:
System Sequence Diagrams
Note: This Question is unanswered, help us to find answer for this one
101. Activities within a business process are shown in ________.
Answer
Correct Answer:
Rectangles
Note: This Question is unanswered, help us to find answer for this one
102. According to porter, strategy is fundamentally about being _____.
Answer
Correct Answer:
Different
Note: This Question is unanswered, help us to find answer for this one
103. A secretary assisting management is considered a _________ worker.
Answer
Correct Answer:
Data
Note: This Question is unanswered, help us to find answer for this one
104. In 1972, gordon bell formulated bell's law, which states ________.
Answer
Correct Answer:
A new computer class forms roughly each decade establishing a new industry
Note: This Question is unanswered, help us to find answer for this one
105. If you decide you want to administer a network, you should look for jobs within the ______ area.
Answer
Correct Answer:
Operations
Note: This Question is unanswered, help us to find answer for this one
106. If you are going to print an iron-on t-shirt transfer, you likely will use a(n) ______ printer.
Answer
Correct Answer:
Inkjet
Note: This Question is unanswered, help us to find answer for this one
107. If active cell d12 contains the formula =d10+d11, cells d10 and d11 are _______ cells for d12.
Answer
Correct Answer:
Precedent
Note: This Question is unanswered, help us to find answer for this one
108. Graphics that help a viewer know when one scene ends and another begins are called _____ .
Answer
Correct Answer:
Transitions
Note: This Question is unanswered, help us to find answer for this one
109. Giving a user permissions to use a certain resource is ________.
Answer
Correct Answer:
Authorization
Note: This Question is unanswered, help us to find answer for this one
110. Generally, _____ protect tangible material, such as books and drawings.
Answer
Correct Answer:
Copyright laws
Note: This Question is unanswered, help us to find answer for this one
111. Cd-roms and dvds are examples of _____.
Answer
Correct Answer:
Optical discs
Note: This Question is unanswered, help us to find answer for this one
112. Businesses must respond to and adopt technological changes because ________.
Answer
Correct Answer:
The new technology can affect their business strategy
Note: This Question is unanswered, help us to find answer for this one
113. Bioinformatics is sometimes called _____ biology.
Answer
Correct Answer:
Computational
Note: This Question is unanswered, help us to find answer for this one
114. Behavioral models of management see managers as being ________ than does the classical model.
Answer
Correct Answer:
More informal
Note: This Question is unanswered, help us to find answer for this one
115. Because of _________, the ratio of computing price to performance has fallen drastically.
Answer
Correct Answer:
Moore's Law
Note: This Question is unanswered, help us to find answer for this one
116. Auditing __________ the computer means inputs, outputs, and processing are checked.
Answer
Correct Answer:
Through
Note: This Question is unanswered, help us to find answer for this one
117. Anonymity on the internet enhances the problems associated with _______.
Answer
Correct Answer:
Criminal use of cloud computing
Note: This Question is unanswered, help us to find answer for this one
118. Analytical crm applications are based on data from _____________________.
Answer
Correct Answer:
Operational CRM systems
Note: This Question is unanswered, help us to find answer for this one
119. An often overlooked aspect of an organization's incident response plan is ________.
Answer
Correct Answer:
Practicing the incident response
Note: This Question is unanswered, help us to find answer for this one
120. An application component can be thought of as a(n) __________.
Answer
Correct Answer:
Unit of software
Note: This Question is unanswered, help us to find answer for this one
121. When using a distributed workforce, collaborators are chosen based on ____.
Answer
Correct Answer:
Medical research.
Note: This Question is unanswered, help us to find answer for this one
122. The wired or wireless means of connecting a computer to the internet is called a ________.
Answer
Correct Answer:
Physical connection
Note: This Question is unanswered, help us to find answer for this one
123. A power failure that disrupts a computer system is an example of a(n) ________.
Answer
Correct Answer:
Electromechanical problem
Note: This Question is unanswered, help us to find answer for this one
124. The internet has made intellectual property ________.
Answer
Correct Answer:
Difficult to protect
Note: This Question is unanswered, help us to find answer for this one
125. _____ is a storage technology that is primarily used only for backups.
Answer
Correct Answer:
Magnetic tape
Note: This Question is unanswered, help us to find answer for this one
126. The ____ utility schedules a command to run at a preset time.
Answer
Correct Answer:
Crontab
Note: This Question is unanswered, help us to find answer for this one
127. According to the information presented in this video, an acceptable use policy _____.
Answer
Correct Answer:
Defines acceptable uses of the company's information resources and computing equipment
Note: This Question is unanswered, help us to find answer for this one
128. ________ is most likely to be outsourced to the lowest bidder.
Answer
Correct Answer:
Accounting skills
Note: This Question is unanswered, help us to find answer for this one
129. A website updated daily could be considered _____.
Answer
Correct Answer:
Authoritative
Note: This Question is unanswered, help us to find answer for this one
130. A ____ is one of the tiny dots of light that form a grid on your screen.
Answer
Correct Answer:
Pixel
Note: This Question is unanswered, help us to find answer for this one
131. Ascii defines up to ____ characters.
Answer
Correct Answer:
128
Note: This Question is unanswered, help us to find answer for this one
132. Electronic data interchange sometimes uses private network services called _____ networks.
Answer
Correct Answer:
Value-added
Note: This Question is unanswered, help us to find answer for this one
133. E-readers serve as a ________ assistive technology for students with reading difficulties.
Answer
Correct Answer:
High-tech.
Note: This Question is unanswered, help us to find answer for this one
134. E-procurement is an example of the ____ b2b e-commerce model.
Answer
Correct Answer:
Seller-side marketplace
Note: This Question is unanswered, help us to find answer for this one
135. Digital device ______ is the trend of computers and devices with technologies that overlap.
Answer
Correct Answer:
Convergence
Note: This Question is unanswered, help us to find answer for this one
136. Diane needs to create a work plan for an upcoming systems project. she must first _____.
Answer
Correct Answer:
Identify the tasks and estimate the time needed to complete them
Note: This Question is unanswered, help us to find answer for this one
137. Conversion to an e-commerce or m-commerce system enables organizations to _________.
Answer
Correct Answer:
Improve the level of customer service.
Note: This Question is unanswered, help us to find answer for this one
138. With _____, phone calls are treated as just another kind of data.
Answer
Correct Answer:
Voice over IP
Note: This Question is unanswered, help us to find answer for this one
139. A good example of a useful policy to minimize waste and mistake is ____.
Answer
Correct Answer:
Users should implement proper procedures to ensure correct input data
Note: This Question is unanswered, help us to find answer for this one
140. A firm that provides hardware and services to run web sites of others is known as a(n) _____.
Answer
Correct Answer:
Web hosting service
Note: This Question is unanswered, help us to find answer for this one
141. A disaster recovery plan contains a _____________ that outlines the costs to support the plan.
Answer
Correct Answer:
Disaster recovery cost curve
Note: This Question is unanswered, help us to find answer for this one
142. A database maintains information on ___________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
143. A cylindrical symbol labeled "database" represents ________ because databases are stored on disks.
Answer
Correct Answer:
A computer disk drive
Note: This Question is unanswered, help us to find answer for this one
144. A business process describes a specific set of _____.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
145. A ________ is a plastic card that has a microchip loaded with identifying data.
Answer
Correct Answer:
Smart card
Note: This Question is unanswered, help us to find answer for this one
146. A ________ examines each part of a message and determines whether to let that part pass.
Answer
Correct Answer:
Packet-filtering firewall
Note: This Question is unanswered, help us to find answer for this one
147. A _____ is a formal review of a project after it is up and running.
Answer
Correct Answer:
Postimplementation audit
Note: This Question is unanswered, help us to find answer for this one
148. __________ of lessons learned are designed to improve performance on current and future projects.
Answer
Correct Answer:
Retrospectives
Note: This Question is unanswered, help us to find answer for this one
149. _________ is a single unit of binary data routed through a network.
Answer
Correct Answer:
Packet
Note: This Question is unanswered, help us to find answer for this one
150. _________ converts an audio broadcast to a digital music player.
Answer
Correct Answer:
Podcasting
Note: This Question is unanswered, help us to find answer for this one
151. ________ is the goal of openid, an authentication protocol that works across participating sites.
Answer
Correct Answer:
Identity portability
Note: This Question is unanswered, help us to find answer for this one
152. _____ refers to software that is free and where anyone to look at and potentially modify the code.
Answer
Correct Answer:
Open source software
Note: This Question is unanswered, help us to find answer for this one
153. _____ refers to removing an organization from a firm's distribution channel.
Answer
Correct Answer:
Disintermediation
Note: This Question is unanswered, help us to find answer for this one
154. _____ is an example of an expert system that can be applied to various financial applications.
Answer
Correct Answer:
PortBlue
Note: This Question is unanswered, help us to find answer for this one
155. _____ display ads appear on top of a browser window, blocking the users view.
Answer
Correct Answer:
Pop-up
Note: This Question is unanswered, help us to find answer for this one
156. _____ costs include expenses for items such as supplies, equipment rental, and software leases.
Answer
Correct Answer:
Operational
Note: This Question is unanswered, help us to find answer for this one
157. _____ auctions are the most common auction model for large purchases.
Answer
Correct Answer:
Reverse
Note: This Question is unanswered, help us to find answer for this one
158. _____, which are generated by web server software, record a users actions on a web site.
Answer
Correct Answer:
Log files
Note: This Question is unanswered, help us to find answer for this one
159. A gift card for walmart is an example of a _________________.
Answer
Correct Answer:
Stored-value money card
Note: This Question is unanswered, help us to find answer for this one
160. A computers hardware and ____________ specify its platform.
Answer
Correct Answer:
System software
Note: This Question is unanswered, help us to find answer for this one
161. A ____ might involve maximums for one or more resources.
Answer
Correct Answer:
Constraint
Note: This Question is unanswered, help us to find answer for this one
162. A ____ is considered a telecommunications device that sends and receives signals.
Answer
Correct Answer:
Satellite
Note: This Question is unanswered, help us to find answer for this one
163. A ____ combines commercially available products with specialty hardware or software.
Answer
Correct Answer:
Value-Added Reseller (VAR)
Note: This Question is unanswered, help us to find answer for this one
164. "hidden costs," such as ________ costs, can easily undercut anticipated benefits from outsourcing.
Answer
Correct Answer:
Vendor selection
Note: This Question is unanswered, help us to find answer for this one
165. ____________________ include information and the systems that use, store, and transmit information.
Answer
Correct Answer:
Information assets
Note: This Question is unanswered, help us to find answer for this one
166. _____________ is the most prevalent form of communications wiring.
Answer
Correct Answer:
Twisted-pair wire
Note: This Question is unanswered, help us to find answer for this one
167. ____________ is the practice of hiding data and keeping it away from unauthorized users.
Answer
Correct Answer:
Cryptography
Note: This Question is unanswered, help us to find answer for this one
168. _________ is the most difficult, radical, lengthy, and comprehensive strategy.
Answer
Correct Answer:
BPR
Note: This Question is unanswered, help us to find answer for this one
169. ________ solicits online input such as product ratings from consumers.
Answer
Correct Answer:
Crowdsourcing
Note: This Question is unanswered, help us to find answer for this one
170. ________ is our normal sense of the world around us enhanced with digital information.
Answer
Correct Answer:
Augmentative reality
Note: This Question is unanswered, help us to find answer for this one
171. _____ reports show a greater level of detail than is included in routine reports.
Answer
Correct Answer:
Drill-down
Note: This Question is unanswered, help us to find answer for this one
172. _____ refers to the practical resources needed to develop, purchase, install, or operate a system.
Answer
Correct Answer:
Technical feasibility
Note: This Question is unanswered, help us to find answer for this one
173. _____ occurs when applications cannot access data associated with other applications.
Answer
Correct Answer:
Isolation
Note: This Question is unanswered, help us to find answer for this one
174. _____ issues involve who may obtain information and how much they should pay for this information.
Answer
Correct Answer:
Accessibility
Note: This Question is unanswered, help us to find answer for this one
175. _____ is the standard that enables wireless devices to access web-based information and services.
Answer
Correct Answer:
Wireless Application Protocol
Note: This Question is unanswered, help us to find answer for this one
176. _____ is an example of a popular general purpose software suite for personal computer users.
Answer
Correct Answer:
Corel WordPerfect Office
Note: This Question is unanswered, help us to find answer for this one
177. _____ is a visa program that allows skilled employees from foreign lands into the united states.
Answer
Correct Answer:
H-1B
Note: This Question is unanswered, help us to find answer for this one
178. _____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and mp3 players.
Answer
Correct Answer:
Flash memory
Note: This Question is unanswered, help us to find answer for this one
179. _____ involves more risk than other changeover methods.
Answer
Correct Answer:
Direct cutover
Note: This Question is unanswered, help us to find answer for this one
180. _____ ensures that authorized users have timely and reliable access to necessary information.
Answer
Correct Answer:
Availability
Note: This Question is unanswered, help us to find answer for this one
181. _____ are substances that are capable of enabling as well as inhibiting the flow of electricity.
Answer
Correct Answer:
Semiconductors
Note: This Question is unanswered, help us to find answer for this one
182. Buy-side marketplaces use _______________ auctions and are suitable for ___________.
Answer
Correct Answer:
Reverse; procurement
Note: This Question is unanswered, help us to find answer for this one
183. _____ are links in a blog post that refer readers back to cited sources.
Answer
Correct Answer:
Trackbacks
Note: This Question is unanswered, help us to find answer for this one
184. _____ are considered the first large-scale interactive global system.
Answer
Correct Answer:
Airline reservation systems
Note: This Question is unanswered, help us to find answer for this one
185. ____ take advantage of the human element of security systems.
Answer
Correct Answer:
Social engineering attacks
Note: This Question is unanswered, help us to find answer for this one
186. When you use google drive to work on a document with a classmate, this is considered _________.
Answer
Correct Answer:
Virtual Collaboration
Note: This Question is unanswered, help us to find answer for this one
187. The term _____ refers to all payments less than $10.
Answer
Correct Answer:
Small payments
Note: This Question is unanswered, help us to find answer for this one
188. The process to list assets that you believe support your organization is called ________.
Answer
Correct Answer:
Asset identification
Note: This Question is unanswered, help us to find answer for this one
189. The latest erp solutions are designed with a focus on __________.
Answer
Correct Answer:
Social collaboration and accessibility from mobile devices
Note: This Question is unanswered, help us to find answer for this one
190. The it infrastructure is comprised of _______ and ________.
Answer
Correct Answer:
IT components, IT services
Note: This Question is unanswered, help us to find answer for this one
191. The information necessary for personalizing web pages for individual customers _________.
Answer
Correct Answer:
Is primarily gathered by analyzing users' past transactions on the website
Note: This Question is unanswered, help us to find answer for this one
192. The firewall device must never be accessible directly from the ____________________ network.
Answer
Correct Answer:
Public
Note: This Question is unanswered, help us to find answer for this one
193. The ________ tier acts as the intermediary between the client applications and the database.
Answer
Correct Answer:
Business
Note: This Question is unanswered, help us to find answer for this one
194. The _____ includes the approved project scope statement and its associated wbs and wbs dictionary.
Answer
Correct Answer:
Scope baseline
Note: This Question is unanswered, help us to find answer for this one
195. Sesame uses ____________________ key encryption to distribute secret keys.
Answer
Correct Answer:
Public
Note: This Question is unanswered, help us to find answer for this one
196. One of the biggest roadblocks to ecash and ewallet technologies is _____.
Answer
Correct Answer:
Fear
Note: This Question is unanswered, help us to find answer for this one
197. A unique feature of the semantic web is its ability to ____.
Answer
Correct Answer:
Figure out what the user is looking for
Note: This Question is unanswered, help us to find answer for this one
198. A(n) ____ is an example of an intangible benefit.
Answer
Correct Answer:
User-friendly system that improves employee job satisfaction
Note: This Question is unanswered, help us to find answer for this one
199. A(n) _____ is often used, so remote users have a secure connection to an organizations network.
Answer
Correct Answer:
Virtual Private
Note: This Question is unanswered, help us to find answer for this one
200. The overall rate of online credit card fraud is ________ % of all online card transactions.
Answer
Correct Answer:
Less than 1%
Note: This Question is unanswered, help us to find answer for this one
201. A frame that houses the system unit on a desktop is called a(n) ______.
Answer
Correct Answer:
Tower
Note: This Question is unanswered, help us to find answer for this one
202. To break a deadlock, the dbms chooses one deadlocked user to be the ____.
Answer
Correct Answer:
Victim
Note: This Question is unanswered, help us to find answer for this one
203. Medical robots are built with ____ capabilities to perform sophisticated surgeries.
Answer
Correct Answer:
High-precision
Note: This Question is unanswered, help us to find answer for this one
204. With respect to the definition of data warehouse, ____ means that the data is read-only.
Answer
Correct Answer:
Nonvolatile
Note: This Question is unanswered, help us to find answer for this one
205. When friedman describes globalization 3.0, he discusses 10 forces that ________ the world.
Answer
Correct Answer:
Flattened the World
Note: This Question is unanswered, help us to find answer for this one
206. Using the _____, e-commerce sites sell digital products and services.
Answer
Correct Answer:
Subscription model
Note: This Question is unanswered, help us to find answer for this one
207. The three items that you must specify when using solver are _______.
Answer
Correct Answer:
Variable cell, objective cell, and constraints
Note: This Question is unanswered, help us to find answer for this one
208. The term ________ refers to the process of creating and maintaining information systems.
Answer
Correct Answer:
Systems development
Note: This Question is unanswered, help us to find answer for this one
209. The speed of transmission of a network is determined by the speed of its smallest ________.
Answer
Correct Answer:
Amount of bandwidth
Note: This Question is unanswered, help us to find answer for this one
210. The most important feature of a collaboration information system is ________.
Answer
Correct Answer:
Providing an effective communication facility
Note: This Question is unanswered, help us to find answer for this one
211. Tasks or action steps that come after the task at hand are called __________.
Answer
Correct Answer:
Successors
Note: This Question is unanswered, help us to find answer for this one
212. Netflix can send out any dvd it buys because of a supreme court ruling known as the _____.
Answer
Correct Answer:
Clickwrap agreement
Note: This Question is unanswered, help us to find answer for this one
213. Most business wlans use access points and do not utilize the ____.
Answer
Correct Answer:
ISS
Note: This Question is unanswered, help us to find answer for this one
214. A(n) _____ refers to an internet vandal and mischief-maker.
Answer
Correct Answer:
Troll
Note: This Question is unanswered, help us to find answer for this one
215. A(n) _______________ is a field that contains data unique to a record.
Answer
Correct Answer:
Primary key
Note: This Question is unanswered, help us to find answer for this one
216. The person responsible for the control of the centralized and shared database is the database ____.
Answer
Correct Answer:
Administrator
Note: This Question is unanswered, help us to find answer for this one
217. A(n) ____ test is a test performed to determine whether the system fulfills user requirements.
Answer
Correct Answer:
Acceptance.
Note: This Question is unanswered, help us to find answer for this one
218. A(n) _________ examines and blocks internet traffic in order to protect your private network.
Answer
Correct Answer:
Firewall.
Note: This Question is unanswered, help us to find answer for this one
219. A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.
Answer
Correct Answer:
Network system.
Note: This Question is unanswered, help us to find answer for this one
220. In 1972, the _____ recommended that publicly held organizations establish audit committees.
Answer
Correct Answer:
Securities and Exchange Commission (SEC)
Note: This Question is unanswered, help us to find answer for this one
221. Illuminate live is a lecture program used in schools and is considered a(n) _________ tool.
Answer
Correct Answer:
Web conferencing
Note: This Question is unanswered, help us to find answer for this one
222. ________ is a phenomenon where companies use everyday people as a cheap labor force.
Answer
Correct Answer:
Crowdsourcing
Note: This Question is unanswered, help us to find answer for this one
223. ________ integrates data from various operational systems.
Answer
Correct Answer:
A data warehouse
Note: This Question is unanswered, help us to find answer for this one
224. ____ converts a table that is in third normal form to a table no longer in third normal form.
Answer
Correct Answer:
Denormalization
Note: This Question is unanswered, help us to find answer for this one
225. In a ____ deployment, the system is installed and brought into operation in a series of steps.
Answer
Correct Answer:
Phased
Note: This Question is unanswered, help us to find answer for this one
226. In 2006, _____ introduced a low-cost laptop called the classmate pc.
Answer
Correct Answer:
Intel
Note: This Question is unanswered, help us to find answer for this one
227. In _____, the organization takes concrete actions against risks.
Answer
Correct Answer:
Risk mitigation
Note: This Question is unanswered, help us to find answer for this one
228. In ____ mode, the data within an ip packet is encrypted, but the header information is not.
Answer
Correct Answer:
Transport
Note: This Question is unanswered, help us to find answer for this one
229. In ____ conversion, the old system is stopped and the new system is implemented.
Answer
Correct Answer:
Plunge
Note: This Question is unanswered, help us to find answer for this one
230. ____ invite sellers to submit bids for products and services.
Answer
Correct Answer:
Reverse auctions
Note: This Question is unanswered, help us to find answer for this one
231. During the systems design phase, _____ are used to organize, access, and maintain data structures.
Answer
Correct Answer:
Key
Note: This Question is unanswered, help us to find answer for this one
232. Focused differentiation occurs when ________.
Answer
Correct Answer:
A better product is provided within an industry segment
Note: This Question is unanswered, help us to find answer for this one
233. Focused cost leadership is observed when a product has the lowest cost ________.
Answer
Correct Answer:
Within an industry segment
Note: This Question is unanswered, help us to find answer for this one
234. An example of ________ is when a user
Answer
Correct Answer:
Ongoing sharing
Note: This Question is unanswered, help us to find answer for this one
235. A third-party program, such as adobe flash player, is considered to be a(n) ________.
Answer
Correct Answer:
Plug-in
Note: This Question is unanswered, help us to find answer for this one
236. A market is said to be _____ if it derives most of its value from a single class of users.
Answer
Correct Answer:
One-sided
Note: This Question is unanswered, help us to find answer for this one
237. ________ asks users to write lines of code to answer questions against a database.
Answer
Correct Answer:
Structured query language
Note: This Question is unanswered, help us to find answer for this one
238. ________ are the data that is deemed most important in the operation of a business.
Answer
Correct Answer:
Master data
Note: This Question is unanswered, help us to find answer for this one
239. ________ are performed by the functional areas that process inputs and produce outputs.
Answer
Correct Answer:
Core
Note: This Question is unanswered, help us to find answer for this one
240. The _____ standard can transmit up to 75 mbps and has a range of 31 miles.
Answer
Correct Answer:
WiMAX
Note: This Question is unanswered, help us to find answer for this one
241. In dbms, data are kept separate from the application's programming code. this means that ________.
Answer
Correct Answer:
A database does not need to be changed if a change is made to an application
Note: This Question is unanswered, help us to find answer for this one
242. With _____ outsourcing, an organization chooses an outsourcing company in the same country.
Answer
Correct Answer:
Nearshore
Note: This Question is unanswered, help us to find answer for this one
243. The variety dimension of big data refers to the combination of _____.
Answer
Correct Answer:
Structured data and unstructured data
Note: This Question is unanswered, help us to find answer for this one
244. The first phase in the customer life cycle involves ________.
Answer
Correct Answer:
Sending messages to target audiences to attract customer prospects
Note: This Question is unanswered, help us to find answer for this one
245. User ratings act as _____ for netflix's customers.
Answer
Correct Answer:
Switching costs
Note: This Question is unanswered, help us to find answer for this one
246. Enterprise application integration includes all of the following features except ___________.
Answer
Correct Answer:
Use of inherent processes
Note: This Question is unanswered, help us to find answer for this one
247. Most student teams focus on a single criterion for judging team success, namely, _________.
Answer
Correct Answer:
Achieving a successful outcome
Note: This Question is unanswered, help us to find answer for this one
248. The outermost components of the information systems framework ________.
Answer
Correct Answer:
Can take action
Note: This Question is unanswered, help us to find answer for this one
249. The major benefit of enterprise application integration is that it ________.
Answer
Correct Answer:
Enables organizations to use existing applications
Note: This Question is unanswered, help us to find answer for this one
250. It deployment strategies fall into two broad categories, which are ________:
Answer
Correct Answer:
In-house development and sourcing
Note: This Question is unanswered, help us to find answer for this one
251. In the context of e-government applications, crisis response is categorized as a _____ application.
Answer
Correct Answer:
Government-to-government
Note: This Question is unanswered, help us to find answer for this one
252. _____ reports contain special information not found in routine reports.
Answer
Correct Answer:
Ad hoc
Note: This Question is unanswered, help us to find answer for this one
253. ________ refers to the leasing of hardware with pre-installed operating systems.
Answer
Correct Answer:
Platform as a Service
Note: This Question is unanswered, help us to find answer for this one
254. Scheduling and assigning employees might be handled by a _____.
Answer
Correct Answer:
Personnel information system
Note: This Question is unanswered, help us to find answer for this one
255. Crm software products enable organizations to become more _________.
Answer
Correct Answer:
Customer-centric
Note: This Question is unanswered, help us to find answer for this one
256. The control variable of a counter-controlled loop should be declared as ________to prevent errors.
Answer
Correct Answer:
Int
Note: This Question is unanswered, help us to find answer for this one
257. Enterprise resource planning (erp) was originally used in the ________ domain.
Answer
Correct Answer:
Manufacturing
Note: This Question is unanswered, help us to find answer for this one
258. The first release-level activity in an xp development approach is ____.
Answer
Correct Answer:
Planning a series of iterations
Note: This Question is unanswered, help us to find answer for this one
259. The blogosphere is defined as _________.
Answer
Correct Answer:
Millions of blogs on the Web
Note: This Question is unanswered, help us to find answer for this one
260. The _____ module of an executive information system (eis) is responsible for managing data access.
Answer
Correct Answer:
Administrative
Note: This Question is unanswered, help us to find answer for this one
261. The major advantage of screen output versus printed output is that screen output ____.
Answer
Correct Answer:
Can be updated dynamically
Note: This Question is unanswered, help us to find answer for this one
262. One characteristic of a structured problem is that _____.
Answer
Correct Answer:
It is straightforward, requiring known facts and relationships
Note: This Question is unanswered, help us to find answer for this one
263. The term _____ originally referred to a particularly skilled programmer.
Answer
Correct Answer:
Hacker
Note: This Question is unanswered, help us to find answer for this one
264. The responsibilities of a computer technician include ________.
Answer
Correct Answer:
Installing software and repairing computer equipment and networks
Note: This Question is unanswered, help us to find answer for this one
265. The need for collaboration is greatest for ________ decisions.
Answer
Correct Answer:
Strategic
Note: This Question is unanswered, help us to find answer for this one
266. A ________ monitors, maintains, fixes, and tunes computer networks.
Answer
Correct Answer:
Network administrator
Note: This Question is unanswered, help us to find answer for this one
267. To analzye various alternative scenarios, a manager would use _______.
Answer
Correct Answer:
The spreadsheet's 'what-if' capability
Note: This Question is unanswered, help us to find answer for this one
268. The performance of decision support systems is typically a function of decision quality and _____.
Answer
Correct Answer:
Cost
Note: This Question is unanswered, help us to find answer for this one
269. The last step in the database life cycle (dblc) is _____.
Answer
Correct Answer:
Maintenance and evolution
Note: This Question is unanswered, help us to find answer for this one
270. ___________ is the process of transforming data from cleartext into ciphertext.
Answer
Correct Answer:
Cryptography
Note: This Question is unanswered, help us to find answer for this one
271. _____ are short descriptions written by customers of what they need a scrum system to do for them.
Answer
Correct Answer:
User stories
Note: This Question is unanswered, help us to find answer for this one
272. ________ refers to data and responses to data that are contributed by users and sm sponsors.
Answer
Correct Answer:
Connection
Note: This Question is unanswered, help us to find answer for this one
273. The biggest enemy of most printers is ____.
Answer
Correct Answer:
Printer paper dust
Note: This Question is unanswered, help us to find answer for this one
274. User productivity systems ____.
Answer
Correct Answer:
Include e-mail, voice mail, fax, video and Web conferencing, word processing, automated calendars, database management, spreadsheets, desktop publishing, presentation graphics, company intranets, and integrated mobile computing systems
Note: This Question is unanswered, help us to find answer for this one
275. The problems presented by workgroup information systems can usually be resolved by ________.
Answer
Correct Answer:
The work group itself
Note: This Question is unanswered, help us to find answer for this one
276. Dsl and fttp are examples of wired ______ internet service technologies.
Answer
Correct Answer:
Broadband
Note: This Question is unanswered, help us to find answer for this one
277. _____ are people who work directly with information systems to get results.
Answer
Correct Answer:
End users.
Note: This Question is unanswered, help us to find answer for this one
278. A snapshot of the system settings and configuration is called a ____.
Answer
Correct Answer:
Restore point
Note: This Question is unanswered, help us to find answer for this one
279. Costs of dissatisfaction, repair costs, and warranty costs are elements of cost in the __________.
Answer
Correct Answer:
Taguchi quality loss function
Note: This Question is unanswered, help us to find answer for this one
280. In the ________ phase a prototype of the website will often be created.
Answer
Correct Answer:
Design
Note: This Question is unanswered, help us to find answer for this one
281. According to moore's law, the ________.
Answer
Correct Answer:
Number of transistors per square inch on an integrated chip doubles every 18 months
Note: This Question is unanswered, help us to find answer for this one
282. Decision making is enhanced by a diverse group of ________, such as data mining and fuzzy logic.
Answer
Correct Answer:
Intelligent techniques
Note: This Question is unanswered, help us to find answer for this one
283. A(n) _____ is a temporary storage space used to speed computing tasks.
Answer
Correct Answer:
Cache
Note: This Question is unanswered, help us to find answer for this one
284. Using bpmn, business processes are typically organized into what is called ________.
Answer
Correct Answer:
Swim lane format
Note: This Question is unanswered, help us to find answer for this one
285. In a relational database, every record must be uniquely identified by a__________.
Answer
Correct Answer:
Super key
Note: This Question is unanswered, help us to find answer for this one
286. Decision-support systems (dss) focus on problems ________.
Answer
Correct Answer:
That require supporting more non-routine decision-making.
Note: This Question is unanswered, help us to find answer for this one
287. In ________ installation, the organization shuts off the old system and starts the new system.
Answer
Correct Answer:
Plunge.
Note: This Question is unanswered, help us to find answer for this one
288. A private internet that is used exclusively within an organization is called a(n) ________.
Answer
Correct Answer:
Intranet
Note: This Question is unanswered, help us to find answer for this one
289. ________ is obtaining the opinions of many people on the quality of products.
Answer
Correct Answer:
Crowdsourcing
Note: This Question is unanswered, help us to find answer for this one
290. The inherent processes defined in an erp solution are referred to by some erp vendors as ________.
Answer
Correct Answer:
Process blueprints.
Note: This Question is unanswered, help us to find answer for this one
291. A small and medium-sized enterprise (sme) is a legally independent enterprise with _____ employees.
Answer
Correct Answer:
Up to 500.
Note: This Question is unanswered, help us to find answer for this one
292. The most popular way to access podcasts on the web is through _____ software.
Answer
Correct Answer:
ITunes
Note: This Question is unanswered, help us to find answer for this one
293. In _____, needed services such as temporary help or extra space are traded on an as-needed basis.
Answer
Correct Answer:
Functional exchanges
Note: This Question is unanswered, help us to find answer for this one
294. ____ are designed to withstand much more physical abuse than conventional devices.
Answer
Correct Answer:
Ruggedized devices
Note: This Question is unanswered, help us to find answer for this one
295. The code ____ instructs excel to insert the page number in the header or footer section.
Answer
Correct Answer:
&[Page]
Note: This Question is unanswered, help us to find answer for this one
296. The browser feature where tabs are independent of each other is known as ________.
Answer
Correct Answer:
Tab isolation
Note: This Question is unanswered, help us to find answer for this one
297. The announcement of an operational csirt should minimally include ____.
Answer
Correct Answer:
Contact methods and numbers
Note: This Question is unanswered, help us to find answer for this one
298. The front _____________ connectors lead from the front of the computer case to the motherboard.
Answer
Correct Answer:
Panel REF. PAGE: 55
Note: This Question is unanswered, help us to find answer for this one
299. A(n) ______ test measures the performance of hardware or software.
Answer
Correct Answer:
Benchmark
Note: This Question is unanswered, help us to find answer for this one
300. Ebay employs the _________ auction mechanism.
Answer
Correct Answer:
Forward
Note: This Question is unanswered, help us to find answer for this one
301. A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.
Answer
Correct Answer:
query language
Note: This Question is unanswered, help us to find answer for this one
302. A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
303. A(n) __________ is an undocumented method of accessing a digital device.
Answer
Correct Answer:
Backdoor.
Note: This Question is unanswered, help us to find answer for this one
304. In a _____ system, the distinction blurs between input, output, and the interface itself.
Answer
Correct Answer:
User Centered
Note: This Question is unanswered, help us to find answer for this one
305. Conjunctivitis does not directly affect ______.
Answer
Correct Answer:
The superior palpebra
Note: This Question is unanswered, help us to find answer for this one
306. Personal information systems are most likely to be used by ________.
Answer
Correct Answer:
Drug salespersons.
Note: This Question is unanswered, help us to find answer for this one
307. Data mining is more ________ than olap.
Answer
Correct Answer:
Discovery driven
Note: This Question is unanswered, help us to find answer for this one
308. Data mining complements online analytical processing in that it ________.
Answer
Correct Answer:
Provides capabilities for discovering hidden predictive relationships in the data
Note: This Question is unanswered, help us to find answer for this one
309. Analyzing decision support data to generate information is part of ____.
Answer
Correct Answer:
Business intelligence.
Note: This Question is unanswered, help us to find answer for this one
310. Access and sql server are popular ________ dbms products.
Answer
Correct Answer:
Microsoft
Note: This Question is unanswered, help us to find answer for this one
311. A hyper-social company uses __________ to create value from intellectual capital.
Answer
Correct Answer:
Knowledge management.
Note: This Question is unanswered, help us to find answer for this one
312. The core drivers of the information age include _________. (check all that apply.)
Answer
Correct Answer:
Information Business Intelligence Knowledge Data.
Note: This Question is unanswered, help us to find answer for this one
313. In porter's five forces model, the threat of new entrants concerns the danger of ________.
Answer
Correct Answer:
Customers taking their business elsewhere
Note: This Question is unanswered, help us to find answer for this one
314. Crm allows an organization to accomplish all of the following except __________.
Answer
Correct Answer:
Complicate marketing and sales processes.
Note: This Question is unanswered, help us to find answer for this one
315. A(n) ________ the condition that exists when data are isolated in separated information systems.
Answer
Correct Answer:
Information Silos
Note: This Question is unanswered, help us to find answer for this one
316. A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
Answer
Correct Answer:
Business process
Note: This Question is unanswered, help us to find answer for this one
317. A major problem with data that is purchased from data vendors is ________.
Answer
Correct Answer:
Missing values.
Note: This Question is unanswered, help us to find answer for this one
318. The process of hardening a web site is a ________ safeguard.
Answer
Correct Answer:
Technical.
Note: This Question is unanswered, help us to find answer for this one
319. The problems posed by information silos ultimately lead to ________.
Answer
Correct Answer:
Increased costs for an organization
Note: This Question is unanswered, help us to find answer for this one
320. Identifying competitive advantages can be difficult and explains why they are typically _______.
Answer
Correct Answer:
Temporary
Note: This Question is unanswered, help us to find answer for this one
321. Projects that spend much time ________ are sometimes said to be in analysis paralysis.
Answer
Correct Answer:
Documenting requirements
Note: This Question is unanswered, help us to find answer for this one
322. Porter developed the five forces model to help organizations determine the ________.
Answer
Correct Answer:
Potential profitability of an industry
Note: This Question is unanswered, help us to find answer for this one
323. In most organizations, the ____ department is responsible for output control and security measures.
Answer
Correct Answer:
IT
Note: This Question is unanswered, help us to find answer for this one
324. Bargaining power of customers is likely to be the highest for markets involving ________.
Answer
Correct Answer:
Industrial products
Note: This Question is unanswered, help us to find answer for this one
325. Cbt or wbt for those preparing for certification exams are ____ courses.
Answer
Correct Answer:
Online tutorial
Note: This Question is unanswered, help us to find answer for this one
326. A vendor-specific certification is ____.
Answer
Correct Answer:
Vendor neutral
Note: This Question is unanswered, help us to find answer for this one
327. The ________ determines appropriate use of graphics on the site, creates and edits graphics.
Answer
Correct Answer:
Graphic designer
Note: This Question is unanswered, help us to find answer for this one
328. Each stage of the value chain not only adds value to the product but also ________.
Answer
Correct Answer:
Accumulates costs
Note: This Question is unanswered, help us to find answer for this one
329. The best location for a peripheral, such as a printer, that a user accesses frequently is ____.
Answer
Correct Answer:
Within arm’s reach of the user in a normal working position
Note: This Question is unanswered, help us to find answer for this one
330. The bargaining power of a customer is weak if ________.
Answer
Correct Answer:
The availability of a rival product is limited
Note: This Question is unanswered, help us to find answer for this one
331. The internet was originally created as a communication system for the ________.
Answer
Correct Answer:
Department of Defense
Note: This Question is unanswered, help us to find answer for this one
332. The internet is ________.
Answer
Correct Answer:
A global network of billions of computers and other electronic devices
Note: This Question is unanswered, help us to find answer for this one
333. The internet connects millions of computers connected through millions of ____ worldwide.
Answer
Correct Answer:
Networks
Note: This Question is unanswered, help us to find answer for this one
334. The appropriate software to use for creating research papers is ________ software
Answer
Correct Answer:
Word processing
Note: This Question is unanswered, help us to find answer for this one
335. Plant location is a type of _____ decision at the strategic management level.
Answer
Correct Answer:
Structured
Note: This Question is unanswered, help us to find answer for this one
336. Franchise companies have typically had ________ systems.
Answer
Correct Answer:
Duplicated
Note: This Question is unanswered, help us to find answer for this one
337. According to gartner, the enterprise architecture (ea) needs to start with ________.
Answer
Correct Answer:
The organisations strategic direction
Note: This Question is unanswered, help us to find answer for this one
338. The ________ manager makes tactical decisions to implement the strategic goals of an organization.
Answer
Correct Answer:
Tactical
Note: This Question is unanswered, help us to find answer for this one
339. A database or a relational database is a collection of related tables. _________________________
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
340. _____ is considered a type of interorganizational system (ios).
Answer
Correct Answer:
An Extranet
Note: This Question is unanswered, help us to find answer for this one