it midterm review
Automated minibars can generate the following reports:
All of the choices
Which of the following is a wake-up system offered in hotels?
All of the choices
What type of energy management system requires occupancy sensors and is interfaced to the PMS?
Body-heat and Motion Detector EMS
"While table management systems can capture valuable information about customers, this information can not be used for marketing programs."
False
A Local Area Network involves the linkage of computers via telecommunication links.
False
A WAN links computers in a specific geographical area (usually within an office or building) such as in hotels, restaurants, or country clubs.
False
A bus topology permits workstations to be connected to each other forming a closed loop and requires less cable than a star network.
False
A central reservation system is an example of a LAN.
False
A common application task is the running of antiviral software.
False
A pet name makes for a good password.
False
A proxy server holds and distributes files.
False
A slow CPU does not affect the speed at which computer tasks are performed.
False
A surge protector has a battery providing continuous power to the computer system during a commercial power outage.
False
Bluetooth is a wireless standard for exchanging data over long distances.
False
Cable modem is the one of the broadband Internet technologies using telephone copper lines.
False
Data files for a restaurant or hotel must be backed up at least once a week.
False
Devices that share their resources are called clients.
False
Drill-down sorts comments into complaint categories or clusters.
False
File fragmentation cannot be corrected.
False
For new networks, it is better to use the most advanced cable (i.e., Cat 7) because as the category level decreases, the quality and speed of the data that the cable transmits increases.
False
If an Information technology manager is doing a good job, system utilization is low and system acceptance is high.
False
Interfaced or best of breed systems involve one vendor.
False
Not being PCI compliant will have minor consequences for hospitality organizations.
False
RAM capacity depends on the program and data space requirements.
False
RAM is an example of secondary storage.
False
SSL prevents any unauthorized connection to and from the Internet.
False
The amount of RAM need depends on the storage space (expressed in bytes) required by each software application (e.g., word processing, spreadsheet, front office, accounting, food cost) and any foreseeable applications that may be added.
False
The continuum organizing principle is appropriate for tracking sales by menu item.
False
The cost of a printer exceeds the amount spent on supplies over the lifetime of the printer.
False
The first step in data mining is to extract information from the large amounts of data collected.
False
The output information system processing phase involves the sorting of data.
False
Thermal printers are only used in hotels.
False
Wi-Fi and Li-Fi both use radio technology to transmit data.
False
Which of the following is not an advantage of a POS system over a standard cash register?
Identification of Most Economical Products Adhering to Purchase Specifications
What is the most widely deployed keycard?
Magnetic Stripe
What system is a network of cashier and server terminals?
Point of Sale
Which of the following tasks is not performed by an inventory control system?
Purchase Orders
"In a 1000-room full-service hotel, there are typically around 5 systems."
True
"In a Cloud-based POS network, restaurant POS terminals will continue to function if the Internet connection is lost."
True
"The current generation of wireless handheld devices, ruggedized and restaurant hardened, have overcome most perception and technical problems and are becoming easier to use."
True
"When a hostess selects a waiting party, the table management software can automatically notify guests through pagers, a video messaging center, or mobile phones."
True
"When choosing a POS, it is important to clearly define selection criteria to differentiate POS products."
True
"When servers use wireless handhelds, they typically have more time for servicing guests and suggestive selling resulting in higher tips and satisfied guests and a lower table turnover rate."
True
A Bidding Module helps management identify the most economical products adhering to purchase specifications.
True
A QR code is a type of bar code.
True
A RFID tag is an example of an input device
True
A bandwidth cap limits the bandwidth available to any one guest to prevent bandwidth hogging.
True
A business intelligence system enables comparative statistics, revenues and expenses:
True
A call accounting system can provide reports on user activity and calls by department.
True
A computer network refers to a collection of computers and network hardware interconnected by communication channels that allow sharing of resources and information such as printers, applications, and databases (i.e., hotel central reservation system).
True
A hotel data warehouse is capable of storing consolidated data across multiple brands.
True
A key advantage of a cloud-based network is interconnectivity with customer mobile devices.
True
A key disadvantage of a two-way electronic locking system is expense and recoding the key when a guest changes rooms.
True
A router is a networking device that forwards data packets between computer networks or an origin or destination on the Internet.
True
A server can automatically logon to a server terminal when equipped with a finger print reader.
True
A software bug is a logic error in the programming.
True
A table management system can help to evenly distribute server workloads, which is important in maintaining the desired service quality and throughput."
True
A thermal printer is ideal for printing food orders.
True
An ELS is most effective in reducing internal theft.
True
An advantage of computerized information processing is improved labor productivity.
True
An advantage of fiber-optic cables compared to coaxial and twisted-pair cables is increased bandwidth and capacity.
True
An automated minibar system identifies which rooms need refilling and the specific items that have been consumed.
True
An example of a mobile POS device is a tablet PC.
True
An in-room entertainment system can provide high-speed Internet.
True
As a CPU is pushed to full capacity, there will be a degradation in response time to user requests.
True
Backup storage media should be replaced at least once a year using a different tape or set of tapes or hard drives for each day of the week.
True
Bandwidth refers to the amount of data that can be transmitted in a fixed amount of time.
True
Biometrics cannot be used in the hospitality industry.
True
Broadband or high-speed connections to the Internet are either shared or dedicated. DSL, a communications medium used to transfer digital signals over standard telephone lines, and a Cable Modem Network, a communications medium used to transfer digital signals over coaxial cables, fall into the shared category.
True
CAS least cost routing detects where the call (extension) originated in the hotel.
True
Chili's table kiosk and digital signage use LCD technology.
True
Controlled access to a POS system is not important.
True
Course firing is a particularly helpful in placing hotel room service breakfasts.
True
Data communications facilitates centralized management and decentralized operations (e.g., restaurant chain).
True
Data communications is a combination of telecommunications and data processing.
True
Data redundancy can be achieved through data mirroring and RAIDs.
True
Dining tables can be equipped with tablet PCs enabling customers to self-order and pay.
True
Each network interface card has a unique address called Media Access Control (MAC) address, which is used in switches to recognize the workstations attached to a network.
True
For a restaurant, a mission-critical system is Point-of-Sale system (POS).
True
Google Docs is an example of integrated software.
True
Guest check control using a POS system is problematic.
True
Hackers and organized crime syndicates are targeting hotels and restaurants for valuable data of all types.
True
Hospitality businesses may find cloud computing more cost effective than managing their own PCs, servers, and applications.
True
If programs take longer than normal to load or intermittent or unusual error messages are being displayed, the computer may have a virus.
True
In order for a restaurateur to easily discern fast and slow moving menu items requires the selection of a system that identifies every menu item sold.
True
Information is processed data.
True
It is imperative that you run antivirus software and keep the definitions current, preferably with a program that automatically updates them for you.
True
It is possible for restaurants customers to pay with their smartphones.
True
Keeping computer equipment clean can help reduce failures.
True
Magnetic tapes are capable of storing and backing up large amounts of data.
True
Middleware creates an interface between a high level application and physical hardware (e.g., mobile device screen).
True
Mobile apps are used to streamline service processes.
True
Most hotel organizations have three networks to manage: a property or local area network for front and back office applications, a wide area network for telephone, central reservations, credit card processing, corporate data, and Internet connectivity, and a guestroom network.
True
Most restaurants require multiple kitchen printers.
True
POS keys need to be grouped according to industry standards, such as liquor cost divided by food and beverage sales.
True
Passwords lose effectiveness with time.
True
Power failures and lightning can cause potent surges capable of frying circuits instantly.
True
Reputation software helps reduce the visibility of negative search results.
True
Restaurants and hotels must worry about ransomware.
True
Restaurants with POS systems are not vulnerable to credit and debit card theft.
True
Restaurants with frequent menu changes would find touchscreens easier to manage.
True
Security management entails user authentication and authorization, encryption techniques, antivirus measures, and physical security.
True
Spyware can change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs.
True
Terminal placement and the number of terminals needed is based solely on the average length of the transaction.
True
The Internet of Things refers to objects or devices that are connected to the internet and/or to each other for exchanging data.
True
The hotel type, size, layout, construction, and geographical location all affect the cost and complexity of a Wi-Fi network.
True
The network operating system runs the networked computers, providing the ability to share files, printers, and other devices across the network.
True
VoIP carries human voice on an Internet network
True
When data is encrypted it is scrambled to make it unreadable once it is accessed.
True
While POS terminal design varies, only a keyboard can be used for entering orders."
True
The main advantage of an electronic guest room status system is that it:
provides information to housekeeping personnel when the room is available for cleaning
With a fault-tolerant system the moment a failure is detected, a backup system is immediately brought online.
True