C724 Preassessment

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What business strategy relies heavily on efficient and secure software implementations? Web sales Vendor selection High-quality products IS staff training

Web sales

An architect needs to create a multidimensional model on a computer of a proposed construction project in order to demonstrate the functionality and aesthetics of the building. Which hardware components is required to accomplish this tasks? 3-D projector 3-D printer 3-D scanner 3-D monitor

3-D printer

A company needs to allow multiple computers to have access to a shared printer. Which type of computer is required to manage the print requests to a shared printer? A client computer A server computer A supercomputer A laptop computer

A server computer

Match the description of business functions supported by information systems to its corresponding department name. An employee process accounts payable using proprietary software. Accounting department Human Resources department Production and Operations department Sales and Marketing department

Accounting department

An auto parts manufacturer is creating a new relational database to more accurately identify their customers and vendors. The relational database records shown below are examples from the new database. Which three attributes are required to make the "Vendor" record accurate? Address_city Address_block Address_zone Address_number Address_grouping Address_state

Address_city Address_number Address_state

A new software project has needs for a rapidly evolving deliverable, constant collaboration with cross-functional development teams, and close guidance and feedback from clients and experts. Which developmental methodology would a development architect select? Waterfall development Agile development End-user development Spiral development

Agile development

What are three primary components of information technology? Choose 3 answers Supply chain process An Android-based software A host computer operating system A network router A data entry clerk An order fulfillment flowchart

An Android-based software A host computer operating system A network router

Which type of database allows users to view multiple dimensions of the same static data in business intelligence examples, such as comparative or multi-year inventory levels and sales performance? Hierarchical database Flatfile database Object-oriented database Analytical database

Analytical database

In developing a new information system, a certain organization is experiencing considerable tension between the design department which wants to incorporate all types of fancy added features into the system and the finance department which projects that such actions would make the cost of the system exceed its allotted budget. What role does a system analyst play in this dispute? Supporting expert Change agent Problem modeler Arbitrator

Arbitrator

A company is concerned about risks that might hinder its ability to conduct business. The company will analyze their critical processes to understand which elements need to be prioritized and maintained during a crisis. What concept requires this type of analysis? Principle of least privilege Business continuity plan Enterprise risk management High availability plan

Business continuity plan

A marketing research firm is planning a study involving consumer preferences toward new coffee flavors. The company needs to analyze coffee data from the coffee manufacturer, as well as preference data from consumers in order to discover whether certain flavors are more or less popular among certain segments of the population. Which database technology would help the company conduct this research project? Business intelligence system utilizing data mining technology Multi-user transactional database that integrates data from various sources Data reporting tool capable of generating ad hoc managerial reports Non-relational analytical platform that can quickly process a large amount of data

Business intelligence system utilizing data mining technology

A police department ordered office supplies from Company A. Company A ships the office supplies to the police department each month. What is the e-commerce model of Company A? Business to Business (B2B) Business to Consumer (B2C) Consumer to Consumer (c2C) Business to Government (B2G)

Business to Government (B2G)

A corporation is using the encryption illustrated in the diagram below to protect business-sensitive information. What type of encryption is the corporation using? Character ordering Word substitution Exclusive bit shifting Character shifting

Character shifting

An automobile manufacturer is considering equipping the engines of its new models with the capability of detecting early symptoms of an imminent mechanical or electric failure, automatically transmitting that warning to the dealership from which the customer purchased the car, and the dealership automatically contacting the customer to schedule a repair appointment. It is facing the challenge of whether all this is technically feasible and operationally viable. Who needs to address this challenge of value creation through technology use? Web administrator Chief Technology Officer Database administrator Chief Information Officer

Chief Technology Officer

A marketing manager would like to study customer behavior and how it relates to customer's purchase products from its online store. Specifically, she would like to know which website page the majority of customers spent the most time on, when and where they decided to abandon the shopping cart, and how long (on average) a customer takes to complete a sales transaction. Which database technology supports this study? Data mining Smart Grid service Clickstream analysis Cloud-based database

Clickstream analysis

A business requires large amounts of data that are processed into information and used to maintain a competitive advantage over their competitors. As the business grows, the data storage and processing capabilities are becoming extremely challenging and costly. What external technological environment can be used to help address these issues? Parallel processing Cloud computing Service-oriented architecture RAID storage

Cloud computing

Examplebrewerybase.com provides resources that allow craft brewers to learn about their market, gain valuable insights and advice on beer production, join or form guilds, and post openings for skilled laborers. Which category describes Examplebrewerybase.com? Private industrial network Community provider net marketplace Market creator

Community provider

Which tactic defeats a war driver by barring access to your secured wireless network? Configuring the access point to hide the SSID Regularly resetting the router password using an appropriate security solution, such as WEP or PGP Configuring the access point to accept only specific MAC addresses

Configuring the access point to accept only specific MAC addresses

A new job candidate has experience creating specialized web-developed applications. What can this job candidate do to enhance the job search process? Create a portfolio on a social media site to showcase skills Create a profile and like pages from businesses that look interesting Enable a profile to be viewed by other organizations Make connections with friends who have the same interests

Create a portfolio on a social media site to showcase skills

Database management systems have evolved over time to include user-friendly command interfaces. What issues does a healthcare organization risk experiencing when deploying user-friendly interface tools to access complex data? Choose 2 answers Network congestion Data corruption Minimized CPU utilization Inaccurate search results

Data corruption Inaccurate search results

What issue is the Securities and Exchange Commission (SEC) authorized to address when it legally requests banking records from an organization? Data in use may be inaccurate Data in motion are stable Data at rest are current Data in use are accurate

Data in use may be inaccurate

A company has many separate department that focus on different aspects and uses data warehouse subsets to hold data specific to each individual department. The company started a new department and created a new subset. What is this new subset called? Data tuple Secondary data Data mart Primary data

Data mart

A professional sports team would like to increase interactions with audiences who watch live broadcast games on television. The marketing team has created a game at home to log in and interact with other fans through the game website. The marketing team can learn about the fans' activities and preferences, among other things, from the information collected from the website in real-time. Which two database technologies may be used to support this type of activity? Choose 2 answers Data mining Clickstream analysis Data warehouse Smart grid service

Data mining Clickstream analysis

A small company that is growing quickly into a medium-sized company is facing the challenge of consolidating and storing information received from multiple sources from the ground up in order to ensure that operations run efficiently. The company needs to hire an expert who will, in addition to the above, maintain security and apply upgrades as needed. Which IT professional does the company need to hire in order to address this challenge? Web developer Chief Technology Officer Database administrator Computer programmer

Database administrator

Which two benefits can a business realize by using social media to connect to customers? Choose 2 answers. Detailed marketing research Technology deployment schedules Stagnant marketing costs Targeted sales promotions

Detailed marketing reseearch Targeted sales promotions

The manufacturer of a popular mouthwash liquid brand is losing sales to a competitor who has been able to use bulk purchasing of its main ingredients from its wholesales to receive a substantial price break in materials. Which IT management challenge is addressed in this scenario? Improve decision-making Achieve operational excellence Develop strong relationships with suppliers Develop new products and services

Develop strong relationships with suppliers

A regional manager has received an important financial document seemingly sent by a branch manager, but he doubts whether the report was actually sent by that manager. Which technology could be used to verify that the report was indeed sent by the branch manager. Anti hack Firewall Virtual private network Digital signature

Digital signature

A global chain of coffee shops has rolled out an app that allows customers who have signed up in advance to place an order remotely, pick up the items, and be charged automatically. However, the orders are received by stores often poorly formatted, leading to misunderstandings and customer dissatisfaction. Analysts who are assigned to handle this issue have difficulty finding the original design diagrams. Which phase of systems development was missing in this scenario? Analysis Documentation Evaluation Support

Documentation

A medium-sized legal services firm is facing an uncertain future as its larger competitors have managed to outsource their legal transcriptions services to virtual companies, thereby substantially reducing their internal secretarial pool. Which IT management challenge does the medium-sized legal services firm face in this scenario? Ensure long-term survival Achieve economies of scale Attain customer intimacy and service Improve decision-making

Ensure long-term survival

A bowling center has implemented a new expensive system in hopes of increasing its clientele. The system stores and tracks patrons' bowling performance over time and displays for them the extent to which their performance has been improving over time. However, this new system has failed to attract more patrons. During which phase of systems development is this failure discovered? Evaluation Analysis Support Documentation

Evaluation

An organization is planning its yearly budgeting cycle. Management has requested the information systems team to validate current hardware and software performance. Which type of evaluation can the team use to perform this validation? System-oriented Strategic-oriented Function-oriented Object-oriented

Function-oriented

Match the description of business functions supported by information systems to its corresponding department name. An employee processes monthly payroll checks and benefits using an open-source software. Accounting department Human Resources department Production and Operations department Sales and Marketing department

Human Resources department

Interactions between buyers and sellers are often more effective when sellers intimately understand the needs of their customers and when customers have more information to make important decisions. Thanks to the variety of beneficial resources, information, and services made possible by the internet, such interactions may be highly individualized, and tailored to the buyer's purchasing capacity, and relative influence. What is another important advantage of a digital market over a traditional market, from a buyer's perspective? Improved transparency Less price discrimination Information asymmetry Increased search costs

Improved transparency

An investment banking corporation utilized employee passwords do as data privacy measure to secure sensitive data. The IT security team has been tasked with ensuring the data is produced and modified in the correct way. Which data privacy goal is the IT security team tasked with accomplishing in this scenario? Confidentiality Integrity Availability Duplication

Integrity

A large online retail store needs a computer system that can quickly process sales orders, inventory, payment, and shipping. Which computer system is required to accomplish these tasks? Handheld computer Mainframe computer Personal computer Supercomputer

Mainframe computer

Which database management function can ensure that in university settings, only academic advisors and registrars can view (but not modify) students' grades for all classes? Limiting the risks to destruction of the data Enforcing specific formatting rules Maintaining explicit access control policies Implementing SQL injection

Maintaining explicit access control policies

After the introduction of the 10th version of the International Classification of Diseases (ICD-10), systems analysts were asked to update their system to the new standard. Which phase of the systems development life cycle does this scenario illustrate? Maintenance Design Requirement analysis Development

Maintenance

Sasha is an IT engineer at a large physician's practice, where 35 employees carry laptops and print to the wireless printer. Several wireless access points are installed in the ceiling at appropriate points throughout the office space, though they share the same Service Set Identifier (SSID). In fact, an employee can start a large download, and then carry her laptop from one end of the office space to the other without losing her connection. Which network topology configuration supports this scenario? Mesh topology Star topology Token ring topology Bus topology

Mesh topology

Customers wish to have the capability of performing tasks anytime, anywhere, without being tethered to a desktop computer. Which term describes computer programs designed specifically for this purpose? Mobile apps Shopping cart Smart phones Search engine

Mobile apps

A company is developing requirements for the construction of a network, including devices and processes to protect the company's assets. The requirements include an integrated networking device that supports application awareness, and is capable of filtering and routing traffic and blocking inappropriate access to internal sites as well as improper content from external sites. Which device will meet these requirements Next-generation firewall Intrusion prevention system Integrated smart switch Wireless controller

Next-generation firewall

A company is investigating the purchase of land for a warehouse expansion project. The land in question has been in the public domain for several years. What business intelligence tool could be used to evaluate information regarding the land? Online analytical processing Online object request broker Address recognition tool Online transaction recognition

Online analytical processing

A corporation wishes to modify its current distribution system. The management team asks the information systems (IS) team to analyze the proposed distribution change. Upon approval of the proposed IS project, the IS team must choose the project implementation method. Which method allows the old system to operate while the new system is developed and tested? Parallel adoption Direct implementation Indirect implementation Prototyping

Parallel adoption

There are six major components of a computer-based information system, four of which are also in the information technology component. Which two components are only parts of the information system? Data Software Hardware networks People Processes

People Processes

An auto parts manufacturer is creating a new relational database to more accurately identify their customers and vendors. The manufacturer's database design team decided to use "vendorID" to link a given vendor to a specific product as illustrated: (no diagram) What type of attribute is "vendorID"? Primary key in record "Product" Master key in record "Product" Primary key in record "Vendor" Foreign key in record "Vendor"

Primary key in record "Vendor"

Large established businesses often have networks of other businesses within their supply chains in order to maintain the flow of information and materials. Company A is an organization that hosts its own marketplace of suppliers in order to facilitate the pursuit of its own interests. Which network describes Company A's example of e-commerce? Public exchange Net marketplace Private industrial Direct marketplace

Private industrial

A company is exploring the possibility of a merger with another company and decides to create a system model of the merged companies. In which step of the model will the company create a functional flow diagram? Testing Enterprise Architectural Process

Process

What business function benefits from both wireless networks and cellular technologies? Evaluating technology trends Corporate hiring standards Consideration of product retirement Product sales support

Product sales support

Match the description of business functions supported by information systems to its corresponding department name. An employee reviews daily inventory reports using an inventory management software. Accounting department Human Resources department Production and Operations department Sales and Marketing department

Production and Operations department

Which feature of social media websites can a job seeker use to convince prospective employers that the job seeker's talents are real and are already valued by a number of other individuals and organizations? Profile recommendation Update-me Profile creation Talent update

Profile recommendation

A retail organization has implemented a data warehouse. The organization has also recently implemented a customer relationship management system. What benefit will the functional integration of these two systems provide for this business? Manage deliverability for high-demand goods Provide a competitive advantage based on business intelligence Create an integrated real-time inventory system Enable up-to-the-minute historical data on transactions

Provide a competitive advantage based on business intelligence

An organization has recently implemented an enterprise resource planning system. What competitive advantage will this system provide to the business? Analyzing customer relationships with other vendors minimizing a need for a value chain Providing cost savings to customers Providing real-time assessment of organizational choices

Providing real-time assessment of organizational choices

A company has issued smartphones to its employees with a policy that the devices may not be used off of the company's campus. An IT analyst has been tasked with finding a way to enforce this policy. Which solution provides a fitting solution to this problem? Cell phone storage lockers near building exits Proximity authentication access control A man trap with a metal detector Vigilant training and auditing procedures

Proximity authentication access control

Which tool is appropriate for use in the design phase of information systems development to specify the detailed logic of a business process in narrative form in a manner easily translatable into any programming language? Pseudocode Flowchart Unified modeling language Work breakdown structure

Pseudocode

Which telecommunication medium is used to transmit data wirelessly? Fiber optics Category 5 Coaxial cable Radio frequency

Radio frequency

Which approach to systems development has a limited emphasis on the planning process and uses prototypes in lieu of predetermined specifications? Rapid application development Joint application design Computer-assisted software engineering Traditional software development life cycle

Rapid application development

In a keyless entry system, an eavesdropper records a transmission and replays it at a later time to cause the receiver to unlock. Which technology can prevent this from happening? Rolling Code Biometrics Encryption Normalization

Rolling Code

Match the description of business functions supported by information systems to its corresponding department name. An employee verifies a customer's credit status using a credit check software. Accounting department Human Resources department Production and Operations department Sales and Marketing department

Sales and Marketing department

GreenIT is an IT consulting agency contracted to provide network and telecommunications to 62 isolated forest fire watchtowers in several mountainous western states. The U.S. Forest Service has contracted GreenIT to provide broadband internet service with minimal impact to the environment and small installation, maintenance, and subscription costs. Beyond available solar power and gasoline power generators, very few of the watchtowers have any sort of utility services already installed, and few other services exist for many miles around most of the installations. Which technology can GreenIT implement to meet the requirements of the U.S. Forest Service in this scenario? Microwave communications installation Coaxial cable installation DSL installation Satellite dish installation

Satellite dish installation

To help facilitate business in areas without traditional infrastructure, some companies offer devices that allow businesses to accept credit cards with their tablets and cell phones. Which business model category do these companies fall in? Service provider market creator Brokerage Community

Service provider

A company is using extract, transform, load (ETL) techniques to collect large volumes of medical encounters. Its purpose is to build models that can determine whether a certain patient is a risk of death. Which techniques enable this company to achieve its goal? Supervised learning, predictive analytics Supervised learning, descriptive analytics Unsupervised learning, predictive analytics Unsupervised learning, descriptive analytics

Supervised learning, predictive analytics

With modern logistics systems, tracking technology (such as RFID and bar codes), and data analytics-aided immensely by the internet-retail managers and staff recognize changes to consumer demand and inventory levels that vastly improves efficiency and workflow in their stores. Which enterprise system is focused on this improvement? Human resource management Supply chain management Customer relationship management Material requirements planning

Supply chain management

An international company is facing the challenge of its software development team working on a specific application spread across the globe in 16 countries in 12 different time zones. Flying them to the same location once a week or even once a month for coordination purposes would be prohibitively expensive. Moreover, the issues that arise tend to be urgent and in need of almost immediate resolution in communication with team members in other countries. Which communication style is necessary to resolve the issues in the given scenario? Multichronous Dyschronous Synchronous Asynchronous

Synchronous

The traditional systems development lifecycle (SDLC) consists of six formal phases. Which phase of the SDLC involves developing the plan for capturing data and producing the output? System conversion System design System analysis System maintenance

System design

What would be feasible ethical statement of a company that generated a technology-based code of ethics? Technologists should minimize computer protections Technologists should be honest with others Technology should increase productivity Technology should reflect executive rank

Technologists should be honest with others

The information systems support team is asked to perform an analysis of corporate privacy measures regarding a centralized relational database. The database is interconnected to several business groups via the internal data network that also supports connectivity to outside organizations. Which ethical risk is identified after a secondary analysis? The financial system is poorly designed and implemented The financial system introduces unwanted liabilities The financial system is unavailable to all users The financial system requires additional storage space

The financial system introduces unwanted liabilities

With technology trends such as the Internet of Things (IoT), Big Data, Cloud Computing, eCommerce, and M-commerce, the internet has become a very important and useful aspect of society. To prepare for these trends and aid in technology evolution a necessary and critical change in telecommunications was the conversion from IPv4 to IPv6. What was the primary reason to convert to IPv6? to enable the internet to operate at a higher bandwidth To complete the conversion from analog networking to digital networking To enable the support of Web 3.0 To increase the number of available IP addresses

To increase the number of available IP addresses

Which technology is an example of technology convergence that integrates instant messaging. Voice over IP (VoIP) telephones, mobile devices, video teleconferencing, file collaboration, and desktop sharing? Personal Computer (PC) Unified Communications (UC) VoIP Teleconferencing (VTC) Fixed-mobile convergence (FMC)

Unified Communications (UC)

A car dealership has been receiving complaints from its customers about its inflexible repair system in which customers who drop off their cars the previous evening are not properly placed in the queue and tend to be placed behind those who drop off their cars the morning of the scheduled repair. It needs technical staff members who understand the scheduling/drop-off operation so it can determine and articulate precise customer needs to the programmers who would then build the code behind the system. What type of challenge is this? User requirements Coding Security Project risk

User requirements

Amanda has been asked to regularly extract and process databases from many sources into a data warehouse, which will be used by several divisions within the company. Which data type should Amanda recognize is prevented by her data warehouse design? External Historical Static Variable

Variable

Broadband has enabled data, voice, and video to be combined and transmitted over one network. What is the name of the standard that allows this convergence between voice and data networks? VoIP Bluetooth IEEE 802.11 TCP/IP

VoIP

A large and established client gives your company an inflexible list of requirement and expects a formal, systematic, and structured methodology to develop a large-scale and completed deliverable for a fixed price and with a scope that will not change appreciable or quickly. Which approach or methodology would be most appropriate? Component-based development Iterative approach joint application design Waterfall approach

Waterfall approach

Which telecommunications protocol is used to connect devices in a wireless local area network (LAN) Wi-Fi Ethernet Bluetooth Token ring

Wi-Fi

Which two network devices boost Wi-Fi strength for wireless devices in areas of low signal quality? Choose 2 answers. Wireless access point Wireless bridge Wireless repeater Access point client

Wireless bridge Wireless repeater

A company would like to protect its network from cybersecurity attacks by implementing a system that can monitor and report on attacks. Which device is designed to meet this need? Intrusion Protection System Secure Web Gateway System Intrusion Detection System Endpoint Security System

intrusion Detection System

Although a company was well into their tenth year as an e-commerce firm, social changes have forced the company to restructure its e-business model. Typical e-business models include Business to Business (B2b), Business to Consumer (B2C), and Consumer to Consumer (C2C). What type of relationship will the company need to make with business partners, if the company wanted to include a B2B model with its current B2C model? Non-compete relationships Short-term relationships Net marketplace relationships Private data relationships

net marketplace relationships


Kaugnay na mga set ng pag-aaral

U.S. History 1 Chapter 11, Section 2, The Politics Of War The Americans

View Set

Teaching Reading: Elementary (5205)

View Set

Article 250 - Grounding and Bonding (Quarter 4)

View Set

Chapter 17 Preoperative Nursing Practice Questions

View Set

Med Surg prepu, lower respiratory & chest

View Set

Final Test: Unit 1 Test Cog Psych, Exam 5 (Ch. 12-13), Exam 5 Psych, Chapter 12, Cog Psych Chapter 13, coglabs, Chapter 7 Quiz - Long-term Memory: Encoding, Retrieval, & Consolidation, CHAPTER 6 QUIZ, Chapter 6, PSYC231: Cognitive Psychology (Chapter...

View Set

Astronomy: Chapter 4 Spectroscopy (T/F)

View Set

Cardiac Arrest in Pregnancy In-Hospital ACLS Algorithm

View Set

Excel, Linking and Embedding (Lesson 6-WWS)

View Set