ACC 270 FINAL EXAM (2)
spectrum used by most mobile phone firms that does not travel well through solid objects.
Mobile providers can be susceptible to poor coverage indoors as a result of:
compiling.
This process of converting a code into machine-readable form is known as:
applications
When referring to the 'software layer cake' model, Microsoft Office, Angry Birds, and MySQL are all
He lived out of Airbnb rentals full-time
Entrepreneurs are scrappy in their quest to gather market intelligence and understand how customers respond to their offerings. How did Airbnb's CEO gather additional intelligence on how the firm was being used?
cache
A(n) _____ is a temporary storage space used to speed computing tasks.
total cost of ownership.
All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as:
false
As per the chapter, firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment.
firmware
Control programs stored on chips (often used in embedded systems) are sometimes referred to as
information
Data becomes _____ when it is presented in a context so that it can answer a question or support decision making.
market basket analysis
Data mining is leveraged by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as:
Hardware, operating system, application, user
If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order?
true
If eBay and Craigslist are included, some 40 percent of the US and Canadian population have participated in the sharing economy.
data is not efficiently transformed into information.
Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. As a consequence:
using open source software to wean customers away from competitors.
Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle's motivation for this lies in:
a situation when separate ISPs connect their networking equipment together to share traffic.
Peering refers to:
it ensures that the load of requests to their sites do not overwhelm a single computer.
Popular sites like Google and Yahoo! have several computers assigned to their host names because:
true
Social media profiles can also be used to fight online fraud.
Embedded systems
Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as ___________.
Transmission Control Protocol
The Internet Protocol Suite consists of the Internet Protocol and _____.
the service continues functioning even if one nameserver goes down.
The fault-tolerant nature of the DNS ensures that:
wireless spectrum
The frequencies licensed by telecommunication firms to provide wireless service is known as _____.
ability to be easily expanded to manage workload increases.
The scalability of a software product is defined as the:
true
Uber prices services according to demand. This allows the company to increase rates during peak periods in order to attract more potential suppliers into the market to meet demand.
true
Uber's CEO views itself as software platform for shipping and logistics.
Zilok provides inventory provided by participating 'citizen suppliers', Chegg owns its own inventory.
What is the difference between collaborative consumption firms Zilok and Chegg.
The events in the data should reflect current and future trends.
Which of the following conditions is essential for data mining to work?
MS Word
Which of the following is an example of application software?
Apple's purchase of Beats to give new musical artists more exposure.
Which of the following is not an example of larger, conventional firms working with sharing economy startups?
Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.
Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces?
Scalable systems
Which of the following is one of the characteristics of using software as a service model?
Cloud infrastructure is often located in warehouse-style buildings designed for computers, not people.
Which of the following is true about cloud computing?
It refers to software that is made available by a third-party online.
Which of the following is true of software as a service (SaaS)?
Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing.
Which of the following is true of the difference between operating systems and application software?
Platform as a service
Which of the following refers to a variant of utility computing where vendors provide the operating system and supporting software like database management systems but where client firms write their own code?
Terrestrial wireless
Which of the following refers to wireless systems provided by earth-bound stations like cell phone towers?
All of the above
Which of the following should an organization consider when making make/buy/rent decisions for a given software system?
It refers to the language used to create and format Web pages.
Which of the following statements holds true for the term "html"?
Airbnb charges both property owners and guests as part of transactions on their website.
Which of the following statements is true about Airbnb's revenue model?
Firms need to vigilantly manage the moving target of computer security issues
Which of the following statements is true about information systems?
Running analytics against transactional data can bog down a TPS
Why do firms need to create separate data repositories for their reporting and analytics work?
Virtual desktops
_____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and simply deliver an image of what's executing to the remote device.
Packet prioritization
_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.
Artificial intelligence
_____ is a class of computer software that seeks to reproduce or mimic human thought, decision making, or brain functions.
EDI
_____ is a set of standards for exchanging messages containing formatted data between computer applications.
SQL
_____ is by far the most popular language for creating and manipulating databases.
data mining
_____ is the process of using computers to identify hidden patterns in and to build models from large data sets.
Software
_____ refers to a precise set of instructions that tell the computer hardware what to do.
DBMS
_____ refers to software for creating, maintaining, and manipulating data.
Open source software
_____ refers to software that is free and where anyone to look at and potentially modify the code.
Business intelligence
_____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysi