K201 post lecture quizes for Ch 6,8,9,10,12

¡Supera tus tareas y exámenes ahora con Quizwiz!

The net neutrality principle renders the Internet as a service which provides (serves) data or information to users.

False

Which of the following is a characteristic of an inter-enterprise information system?

Its problem solutions affect multiple organizations.

A(n) ________ is the hierarchy of the tasks required to complete a project.

Work Breakdown Structure (WBS)

Success metrics are also known as ________.

key performance indicators (KPI)

What are BPM activities?

model, design, implement, and assess

Both adware and spyware ________.

observe user behavior without the user's permission

Which of the following statements is TRUE about a VPN?

A VPN connection utilizes private networks instead of the public network.

One of the problems of the SDLC involves ________ which signifies once a phase is completed you go to the next phase and do not go back.

Ambiguous Requirements

Physical security is an example of a ______

Data safeguard

Which of the following best characterizes IUanyWare?

IaaS

If you use your smart phone as a hotspot to connect to the Internet on your tablet you are using a ________.

Personal Area Network (PAN)

A scheduling information system used by a receptionist at a doctor's office is an example of how an information system improves the quality of a process by ________.

augmenting human activity

A computer hacker trying different combinations of characters to crack a password is a ________.

brute force attack

A ________ is an application program that obtains product data from a database, manages the items in a shopping cart, and coordinates the checkout process.

commerce server

In a BPMN process diagram, dotted arrows depict the flow of ________ in the process.

data

________ refers to an organization-wide function that oversees the development and the enforcement of data policies and data standards.

data administration

UrToy's market share doubled after it embedded artificial intelligence into its exclusive line of smart teddy bears. This is an example of the company's ________.

effectiveness

Process ________ is a measure of the ratio of process outputs to inputs and is usually associated with the cost-leadership strategy.

efficiency

Social media (SM) providers host the SM presence using ________ in the cloud.

elastic servers

Stan illegally ________ the employee database and downloaded all of the records in the company's employee information table.

hacked

Data, isolated in separate functional systems, is characteristic of a(n) ________.

information silo

The ________ phase is the most important step in the SDLC process.

requirements

Taking time to foster genuine connections with your professors, classmates, etc. now, with hopes of it leading to opportunities in the future, is an example of investing in your __________.

social capital

While social capital can depreciate over time, just like traditional forms of capital, social capital can also increase in value over time.

true

A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.

viral hook


Conjuntos de estudio relacionados

7 Habits of Highly Effective People

View Set

Chapter 29- Nonmalignant Hematologic Disorders

View Set

Chapter 11 Statement of cash flows

View Set

Chapter 46: Acute Kidney Injury and Chronic Kidney Disease Question 1 of 21

View Set

Assessment and Management of Patients With Hepatic Disorders

View Set

Survey of the Old and New Testament 2

View Set

CTS1168C: Installing and Configuring Win 10. CHPT 1: Installing Win 10

View Set

ch 7 insurance practice quiz Annuities

View Set