MANG 3778

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

input layer This is an example of _______________.

An Artificial Neural Network Structure

A business uses Excel for data analysis. Excel is written in C++ and C#. Who is the best candidate for the job?

An employee with 10 years experience in data analysis with Excel and good job reviews.

_______________ focused on ease of use and required a small footprint, in terms of computer resources. In addition, early versions of this language were designed to be very forgiving, i.e. the language allowed poor coding practices. As a result, a beginning programmer could write code, and see some result, which could help work to a solution.

BASIC

A blockchain database used to store documents about a product from manufacture, through shipment and storage, until it reaches the end customer ______________.

Both A and B are true

BYOD is an acronym for ______

Bring Your Own Device

The Yelp.com review site is an example of __________________.

C2C e-Commerce

4 wires What type of cable is this?

Cat 5/5e

______________ computer network cables have separators to reduce interference and can carry data at rates exceeding a gigabit per second.

Cat 6

_________________ cables use twisted pairs of copper wires.

Cat 6

The world wide web was first created at the ________________.

Center for Nuclear Research (CERN)

black brown white wire. What type of cable is this?

Coaxial Cable

The Federal Communications Commission was created under the __________________

Communications Act of 1934

_________ is the art of disguising a message and making it unreadable by anyone other than the intended receiver.

Cryptography

The CREATE, DROP, ALTER, and RENAME commands in SQL are ___________ commands.

DDL (Data Definition language)

This is an example of __________________ on a webpage.

DHTML

___________________ creates dynamic web pages with features like drop down menus and calendars.

DHTML

This new technology, currently in its infancy, promises vastly improved data storage capability.

DNA storage

The most recent standard for cable modems is ________________.

DOCSIS 3.0

When a user types www.uno.edu in a browser address bar, the _______________ maps it to an IP addresses.

Domain name system

A business introduces new IT in the enterprise. Employees are trained on the new IT system in a university run two-week program. The following statements are true.

Employee fluency is gained over time and it may take years before all employees are fluent in the IT system.

(looks like an application )This is an example of a distributed database file

False

A business has a unique business model and there is no good software which meets the needs of the organization. The most suitable cloud model for the company is Software as a Service.

False

A music recording is digitized in two formats. Format A uses 22,000 samples per second and 16 bits, while format B uses 44,000 samples per second and 32 bits.

Format B is a better quality recording than format A.

The service step after the customer places the order and makes payment is __________________.

Fulfillment

<li><a This is an example of _____________________

HTML

The ______________________ is a committee of the IETF. It provides architectural oversight of protocols and procedures used on the net and is responsible for editing the RFCs.

IAB (internet architecture board)

The dashboard of an EIS typically displays ________________ for the organization.

Key Performance Indicators

______ is a popular open source operating system

Linux

A ______________ is an attack in which the malicious code waits for a particular event or time before unleashing its malicious action.

Logic Bomb

A business with operations in two buildings a block apart connects computers using wired networks in each building, and the two building networks connected by a microwave link which goes over city streets. This is an example of a _________________.

MAN

MAC address stands for ______ address.

Media Access Control

A large IT project with one year timeline is managed using the SDLC. The project requirements change after six months.

Mid-course corrections are expensive with the SDLC.

If you do not want a page posted on a website to be tracked by search engines, a meta tag for search engine robots is entered with the term _______________.

NOINDEX

SELECT * from Customer where CustID = 10 is an example of __________________.

SQL

The common language used to interact with a RDBMS is called _________________

SQL

Microsoft's Office 360 is an example of __________________.

SaaS

(looks like excel file 2 rows) This is an example of data.

True

A blockchain database can grow very large over time as new blocks are added.

True

A core function of a business plays a major role in the customer's choice.

True

A popular early architecture for the ANN used a three layer architecture.

True

The primary key value for each record (row) in a table is unique.

True

The unique address for a document on the web is called its _____________.

URL

_______ means that an information system is available at all times and at all locations.

Ubiquity

Bluetooth connections are typically made over a distance of a ___________________.

a few meters.

A business has used an ES for many years. The reasons for a business switching from to another ES include _____________

a, b, and c

A local bank with the name NOLABANK has operated in town for many years. You have a bad experience with the bank and set up a blog site to complain about the bank. You do not sell any banking services and it is clear that it is a gripe site. The following sites are legal and do not violate the Anti Cybersquatting Act.

a, b, and c

The CPU performs the ________________________.

a, b, and c

The following are examples of Knowledge Management tools.

a, b, and c

The pitfalls of outsourcing IT are _________________.

a, b, and c

One feature of cloud computing is the ____________________.

ability to quickly adjust the level of resource purchased from the cloud services provider.

As we become more dependent of information systems in the workplace, information systems ________________ becomes more critical to good performance.

accuracy

When a new transaction is conducted, a blockchain database ______________________.

adds a new block of data, stamped with the time and other metadata. Old blocks are never deleted.

Two ANNs can be set up to play chess against each other, or trade stocks with one another, learning from failure/success to get better over time. This type of unsupervised learning is termed a generative ______ network.

adversarial

A computer program can interpret the emotional state of the user using facial expressions and voice analysis. This is termed ____________ computing

affective

A computer system which can capture facial expressions and detect emotional state is called an ______ computing system.

affective

Open source code is free. However there are reasons a business may choose proprietary systems over free open source. These include ___________.

all of the above

3 graphs & 3 circles This is an example of _______________.

an Executive Information System Dashboard

colorful circle This is an example of _______________.

an Executive Information System Dashboard, None of the other choices

This image shows the ________________.

an OLAP cube for business data

The loss of signal power as it travels through a communication channel is termed ______

attenuation

_______________ refers to the identification of the user by the IT system.

authentication

A student using Moodle can only view grades and not change them. This is an example of system ___________________.

authorization

Webvan failed in its e-business model since __________________

automated warehouse technology was very expensive in 2000 and grocery customers were price sensitive.

A clinic's medical records are securely stored. The system is down and users are unable to access the data. This is a problem with system _______________.

availability

A __________________ topology for networks uses one main communications highway to transmit data. The devices are connected to a linear network segment.

bus

The DSS presents options to the decision maker in a decision impelling format during the __________ phase of decision making.

choice.

Bitcoin miners, use powerful ____ to be the first to generate the next new key in the process

computers

Encryption is used to ensure IT system ______________

confidentiality

A small text file with unique ID tags stored in a web browser to customize site visits is termed a ______

cookie

______ is the interference from signals in one wire, impacting signals in another adjacent wire.

crosstalk

One special feature of M-commerce is the use of _________________.

customer location

C2C stands for ______ e-Commerce

customer to customer

The website nissan.com is an example of _____________________.

cyber squatting

The person in charge of the business database is called the

dba

The part of the web that is not indexed by search engines is called the ________________.

deep web

FTP is used to transfer large files on the net. FTP stands for ______ transfer protocol.

file

________________ are very simple DSS models that merely present data in an organized format.

file drawer

The three layer Artificial Neural Network has a input layer, a ______ layer, and a output layer.

hidden

In cell phone networks, each tower's range is a cell and multiple cells create a ____________ network.

honeycomb like

HTML stands for ______ Markup Language.

hypertext

A computer has a DRAM with a capacity of 8 GB. If there is a power loss to the DRAM device for just one second, the data _____________________.

in the DRAM is lost for ever.

One reason for a business to outsource IT is _________________________.

increased costs of operating in-house IT.

A large table with millions of records is ________ for quick data retrieval.

indexed

An expert system has thousands of rules. The ________________ is a tool used by the expert system to work through the rules in a optimal manner and reach a decision.

inference engine

______________ refers to the accuracy of information resources within an organization.

integrity

An EIS primarily support the ______ phase of decision making.

intelligence

A computer has an EPROM with 256 MB capacity. If there is a power loss to the EPROM device for just one second, the data _____________________.

is not deleted because a EPROM does not need electrical power to retain data. It can be read once power is restored

Some of the features of a DBMS are:

it stores, modifies, and extracts data from a database

A language commonly used to create DHTML web pages is ______

javascript

A business establishes a policy to automatically block and delete words and phrases deemed insulting from corporate chat sessions. The policy is clearly communicated to all employees. This policy is ______________

legal and permitted by law

The HTTP protocol is _______________ the HTTPS protocol.

less secure than

One problem with open source software is that open source programs are _____.

less user friendly

The Privacy Act of 1974 _____________________________.

limits data collection by US Federal Government Agencies

A hotel reservation system is expected to handle 20,000 reservations, and changes/cancellations made to all hotel properties managed by the chain each day. A test is performed on the system simulating 20,000 transactions in a 24 hour period. This is a ______ test.

load

Strava, a health and fitness app, published the jogging tracks of device users all over the world. This is a example of ______________.

location awareness

reservation - make - customer This is a example of a __________ .

logical database diagram

The overall team leader for a Scrum software development project is called the scrum ______

master

Fuzzy systems use _____________ and allow the system to be in two states at the same time.

membership function

Data about data is called _________

metadata

M-commerce stands for _______________ commerce.

mobile

Modem is a contraction of two words. Enter either one of the two words in your answer. ______

modulation

One of the benefits of a DSS is __________________.

more alternatives are evaluated and a more effective decision is reached.

the term ______ refers to the circuit board on which all the components of a computer are mounted/connected.

motherboard

One feature of data quality is "completeness". A database which has this feature ___________________.

must contain all the necessary data

The code written in a programming language like C is termed object code.

mysql

The person in charge of the database for a business is called the ____________.

none of the other choices.

An individual in Spain demanded that Google not display data related to an old tax auction in a Google search of his name. This demand to remove old data is related to an individual's right to ________________. (choose the best fit).

obscurity

System feasibility studies evaluate the economic, technical, and ______ feasibility of an IT system.

operational

A major bank is required to comply with new Federal Reserve reporting guidelines for a financial stress test within three months. The IT department estimates it will take six months to develop the necessary software in-house. The project faces problems with _______________.

operational feasibility

Internet backbones use __________________.

optic fibers with capacities in the range of 100's of Gbps.

The code written in a higher-level language is called the ______ code, while the machine code is called the object code.

source

Programmers refer to code that has been modified many times as " ______ code", since the code logic is difficult to trace for later modifications.

spaghetti

______ refers to unsolicited e-mail, typically sent for advertising purposes.

spam

A __________________ topology for networks connects all the devices to a central node, directly. The central node manages communication and sequentially addresses the devices.

star

______ feasibility assessment evaluates the risk to the project from a failure of innovative technology used in the project.

technical

When an employee works at home and connects to the office system through the internet, it is called ______

telecommuting

A clothing store states it will not sell customer data in its business contract. It collects data about customer purchases and clothes sizes. Later, it sells this customer data.

the customer can sue the business for a civil claim for damages

A cookie is stored on _________________

the user's computer

A DSS is poorly designed with little user input. It forces managers to take decisions they do not like. They will ____________.

they will avoid using the DSS or manipulate the inputs to the system to get desired results

US BLS Data shows that e-commerce sales grew in 2018 at _________ the overall retail industry sales.

three times the growth rate

Two business agree to conduct transactions online with exchange of data between their computer systems in a B2B exchange. The document that details the agreement for transactions conducted online is termed the ______ agreement.

trading partner

It is often necessary to transfer data from one system to another. In these scenarios, data is extracted from one database, and re-entered into another database. This process is termed extraction _________ loading (ETL).

transformation

GPT-3 is an AI model capable of understanding and preforming instructions given in natural language. GPT stands for generative pre-trained ______

transformer

Data costs are a component of IT systems cost.

true

Obscurity is not protected by law in the US.

true

The Quality of Service terms in an IT outsourcing contract specify the percentage of time that the IT system should be available for use and defines an acceptable level as 99.999%. This is the ________________ of the system required by the contract.

uptime

A business implements an ES provided by the vendor, without any changes. This is called a ______ implementation.

vanilla

A business VPN's traffic may travel on the same fiber optic backbone as public net traffic, but can be kept separate from public traffic at the ISPs routers, and may even always be routed on the ISPs own backbones, ensuring a trusted delivery network. VPN stands for ______

virtual private network

Nausea and even seizures are one of possible side effects of ________________ technology

virtual reality

VR technologies create a real-world like environment on a computer. VR stands for ______

virtual reality

Server ______ is a technology that enables the software image of a machine to function within another machine.

virtualization

A business needs to build a database for its IT system. The first step in determining the data structure for the business database is deciding ______________

what data business needs to collect.

Economic feasibility considers whether the IT system is financially beneficial. One approach is the payback period, __________________

which is the ratio of the total cost of the IT system to the annual financial benefits from using the IT system.

_____________ are used for penetration testing by a business.

white hat hackers

A WAN is a ______________ network.

wide area

Each TCP packet has a header _______________________.

with the destination IP address and the source IP address.

A ____________ travels from computer to computer in a network and consumes resources but does not usually erase data.

worm

An online ad is displayed 5000 times a day. The ad is clicked 100 times. The CPM rate is $ 10, and the CPC rate is $ 0.10 The charge for this ad for one day is _____________.

$60

An online ad is displayed 6000 times a day. The CPM rate is $ 10. The charge for this ad for one day is _____________.

$60

Compare these options based on security. (i) Data is stored in a small business office and backed up on tapes. (ii) Data is stored by a major SaaS provider in a Tier I data center.

(ii) is more secure than (i)

Match the file types. 1. CustomerID 2. customers > customer ID > ALFKI

1. CVS file 2. XML file

Match the following. 1. Gather the required data for analysis from multiple HDFS nodes and generate data for analysis, for example data in video is extracted by customer sentiment 2. Gathers together similar/related pieces of data, for example all video of product returns to shelf 3. Perform calculations to generate useful information such as proportion of customers replacing items to shelf.

1. map 2. shuffle 3. reduce

Match the following data sizes to the scenario. 1. Data collected by a large organization such as Walmart in its customer database 2. Storage capability of personal use storage device such as a flash drive

1. petabytes 2. gigabytes

The US BLS data shows that in 2018 about ________ percent of retail sales were conducted online.

10%

GPT-3 was trained on over __________________ parameters. Choose the best answer.

175 billion

Moore's Law was first reported in _________________

1965

940 stick figure This sketch shows the Internet in ________________.

1969

An online ad is displayed 10000 times a day. The CPM rate is $ 10. The ad is clicked 200 times. The click through rate is _________________.

2%

By the time the manufacturing process (in 2016) is complete, the CPU may have over ______________ etched one on top of the other, separated by insulating layers.

20 layers

Breaking a cryptography coding scheme with a _________ bit key poses a challenge today, with a single high-end desktop taking about 6.4 quadrillion (that is 6.4 thousand trillion) years of work to break the code.

2048

The technical limit of the total number of bitcoins is __________________.

21 million

The FCC definition of broadband in 2015 is ____________

25 Mbps downstream and 3 Mbps upstream.

CPU manufacturing technology (in 2016) has advanced to the point at which nearly ______ million transistors can be etched on the area about the size of head of a pin.

30

The complete view of a customer's transactions with the business and demographics about the customer is termed the ____________________

360 degree view

The MAC address for a network card has ________________.

48 bits

A digital transmission line has a bandwidth of 50 Gbps. This means it has a speed of ________________.

50 billion bits per second.

A network link is rated at 6 million bits per second. This is written as ___________.

6 Mbps

In 2018, Intel's processor technology made devices that were 14 nanometers in size. About ______________ devices of this size can fit in the width of human hair.

6,000

A DRAM has a capacity of 8GB. This is _________________.

8 billion bytes

Where do you attache the wired computer network cable?

A

When calculating the cost of acquiring an IT system, the following costs must be included to get a true picture of system cost.

A and B

Reasons for implementing a new enterprise system in a business that already has an enterprise system include _______________

A and B are true

Spotify does the following to develop a taste profile for each customer in its collaborative filtering algorithm

A and B only

Device A is described as having a response time of 100 pico seconds. Device B is described as having a response time of 1 nano seconds.

A has a smaller response time than B

The map shows the cables managed by Century Link, a major ISP. The following statements are true.

A, B, and C are all True

When a media file (for example, a book) is digitized, it can be ________________.

A, B, and C are all true

The database used for enterprise systems _________________.

A, B, and C are true

A program compares the value of current inventory (500 units) with the re-order point (750 units) and places a new inventory order if the current inventory is below the re-order point. This comparison is performed in the ________________.

ALU of the CPU

Two numbers are added to get a result. The addition operation is performed by the ____________.

ALU of the CPU

You visit websites from your office computer. Your activities on the internet are recorded in _______________.

All of the above

The ride sharing service Uber can be best classified as _____________ e-Commerce model.

C2C

A business sets up a wired computer network linking 10 computers in an office to a internet router/gateway. The distances between the devices range from 10 to 50 meters. The building attenuates wi-fi signals and wi-fi is not feasible. The office has standard desktop computers. The preferred type of cable for the wired link is __________________.

CAT 5

A major focus of a/an/the _____________ is an immersive experience where the user gets "inside" the environment.

CAVE

______ , designed in 1959, and was the primary programming language for business and government applications. Even today, while new applications are developed in other languages, much of the infrastructure, depends on code written in this language.

COBOL

_____________, is a procedural programming language that is very widely used in business code development. It has been the lingua franca of business computing, and one estimate puts the total code in this computer language worldwide at over 200 billion lines

COBOL

The ________________ is the brain of the computer.

CPU

The ____________ focuses on implementing and managing the technology, and is technically competent in the primary technology areas of business IT.

CTO

Barry Schwartz, in his book "The Paradox of Choice: argues that __________________.

Consumers faced with too many choices faced greater decision anxiety and performed poorly in decision making tasks

______________ refers to the use of automated tools to discover patterns and relationships in large datasets.

Data Mining

_________ is the conversion of data from other formats into a binary format, i.e. a language with two characters.

Digitization

A dashboard with key performance indicators is a common feature of ___________________.

Executive Information System

A business decision is very critical and should not have an error. The best AI technology in this case is ___________________.

Expert System

The inference engine is a part of a/an ____________________

Expert System

Studies have shown that programmers often get stuck on a coding problem and waste a lot of time while working on the stalled line of code. In addition, errors often creep into code leading to problems later on. The use of a second programmer, looking over the primary coder's work, and suggesting improvements, i.e. the use of "a second set of eyes", helps clean up the code and ease the rough patches in program development. Pair programming is used in ___________________.

Extreme Programming (XP)

A business rushes to acquire new technology for data mining since its competitors are in the process of acquiring this technology, before ensuring that it has adequate reliable data. The results do not provide meaningful insight into customer preferences. This is an example of scope and feature creep leading to project failure.

False

A comma separated value (CSV) file is an XML file.

False

A nanometer is a trillionth of a meter.

False

A new trend in business IT use is the decreasing use of personal computing devices, such as smartphones to access business IT systems.

False

An OLAP data cube is recalculated from the source data each time a manager queries the cube.

False

An expert system is designed to work effectively in a wide range of fields of expertise.

False

At present (2016) leading edge computers have CPUs with 8 bit architectures.

False

B2B sites set up independent promoters have been very successful.

False

In 2019, computer chip technology has advanced to the point that leading edge devices from Apple, Qualcomm and AMD use 70 nano-meter technology.

False

It is more difficult to search through digitized data than to search through analog data.

False

One definition of a database is "a collection of information organized in a schema or data hierarchy"

False

One new approach to produce future 7 nanometer computer chips is 5G technology.

False

Quantum computing uses nanos which can be one, a zero, or something else, all at the same time.

False

Since information technology is stable and not improving much, it is important for business to understand how to use IT.

False

The products table has a foreign key for suppliers who supply the product. Each supplier supplies many products. The values in this foreign key column are unique.

False

USB cables have a recommended maximum length of 100 meters due to attenuation in cables.

False

Electronic voting tools are a common part of a _________________.

GDSS

A popular standard to encode and compress video streams for transmission over the net is _______________.

H.264

A business collects different types of data such as alphanumeric data from cash register transactions, text comments from social media, video from store cameras, and location data from cell phone apps. Data form these sources is stored in different formats on separate databases. The __________ distributed file system manages data storage in multiple machines in different formats.

Hadoop

Your business needs to store a Terabyte of data on a backup device. The backup will be retrieved about a dozen times in a year. The recommended storage device is ___________.

Hard drive

____________ costs have decreased significantly (IT price/performance ratio changes), and are a very small part of IT system cost nowadays.

Hardware

The clock speed of a CPU is expressed in _________________.

Hertz

The agency that assigns IP address is _______________.

ICANN

The community of network designers, operators, equipment vendors and researchers who are concerned with Internet technology standards is the _______________.

IETF

Routers read the destination _____________ and direct the packet on the internet.

IP address

172 This is an example of a _________________.

IPv4 Address

2002 This is an example of a _________________.

IPv6 Address

When IT is outsourced, there are benefits when the _______________gains economies of scale.

IT services provider

The following statement is true about artificial neural networks.

If the value of the inputs to a neuron from the inter-connections exceeds the threshold level, it triggers an output to the next level

(colorful pie) What is this? Choose the best answer.

Information

Amazon's EC2 instances are an example of __________________.

Infrastructure as a Service

All the code for an IT project managed using the SDLC has been written. The next phase of the SDLC is ______________.

Integration and Testing

A popular standard to digitize and compress audio signals is _______________.

MP3, H.264

____________ argued that IT may be over-hyped , and it may be possible for most businesses to obtain IT int he manner of a utility (like electric power, water),

None of the above

A washing machine that texts you when the cycle is complete and a milk carton which can monitor the amount of milk in the carton and link to your shopping list app are examples of ____________________

None of the other choices

Click fraud occurs when _______________.

None of the other choices

The _______________ is the bridge between business IT system users and the programmers who write the code for the IT system.

None of the other choices

The data from the U.S. Census bureau shows that in 2015 e-commerce is _________ of total retail sales.

None of the other choices

_______________ is an automated approach to the transfer of data from other formats into a binary format, i.e. a language with two characters.

None of the other choices

All available IPv6 addresses were allocated in ________________

None of these choices

Data warehouses use _______________ to provide fast response to data queries on very large data-sets

OLAP

A/an ______________ pre-calculates and stores summary data, such as sales data for each customer, product, and time unit in a multi-dimensional form.

OLAP cube

Bluetooth is a popular ______________________.

PAN

One feature of ______________ is the enforcement of clear object types, in the code, which ensures that programmers need to consistently define all object types used in the code before they are used, and then use them consistently.

PASCAL

One researcher who contributed to the early development of the internet was _____________.

Paul Baran

When I open my Netflix page, I see a list of recommended movies that is unique and custom designed. This list is based on my movie viewing history and expressed preferences (up/down) votes. This approach is called ______________.

Personalization

A graphical user interface to generate structured query language queries is called __________________.

QBE

Employees in a hospital are unable to access their files since the data has been encrypted and requires a new passkey for decryption. The hospital IT administrator gets an e-mail demanding payment of $ 25,000 in bitcoin to receive the new passkey. This type of attack is termed ______

Ransomware

__________________ wrote a program in 1971 to send e-mail by linking text editor and file transfer programs. He introduced the @ between the username and the computer name, a feature that exists even today in e-mail addresses

Ray Tomlinson

The BIOS are stored in _________________.

Read only memory (often EPROMs or E-EPROMs)

The following are benefits of telecommuting to employees.

Reduced commute time to work

Consider two scenarios. (i) All employees use business owned and managed laptops, with security managed by the IT department. The business provides e-mail and file sharing tools for document exchange. (ii) Many employees use personal devices (iPads, smartphones) to check e-mail and exchange files using cloud services like GMail/Dropbox. In which scenario is the in-house IT department more likely to be outsourced?

Scenario (ii)

Daily meetings of developer teams to review work done the previous day and set the agenda for the day are a part of ____________.

Scrum

Your business need to store 10 Terabytes of data on a backup device. The backup is not likely to be accessed unless there is a legal requirement. The recommended storage device is ___________.

Tape

A health care facility uses EPIC for its enterprise system. The software is loaded on business owned computers in the data center. The most likely payment scenario is the following.

The business agrees to pay an annual license fee based on the number of system users.

A business provides all employees with clear guidelines about office computer use. One of these guidelines is that employees may not visit social networks via office wi-fi, and the penalty is termination from employment. The office firewall records packets to Facebook from local IP addresses, and managers trace it back to the employee.

The business can terminate the employee.

A business implements a new ES. The following statement is most likely to be true. Choose one.

The business does not have the implementation skills in-house. The business teams up with an ES implementation partner who has the necessary skills.

A business implements a new enterprise system. The following statement/s is/are true.

The business pays an annual license fee

The LAN for an office uses a DMZ segment. Which segment of the network in this diagram is the DMZ segment?

The green segment leading to the visiting area wifi

A hospital collects blood test results for patients and stores them in a database. The hospital network is hacked and the database is downloaded by hackers who post the data on a public website. The database was not encrypted by the hospital.

The hospital's action is a violation of HIPAA.

Storage device A has a capacity of 1000 TB. Storage device B has a capacity of 1 Peta Byte.

The two devices have the same storage capacity

In the Ethernet network, what happens when two machines send a signal at the same time?

The two signals collide causing a surge in signal strength and loss of both signals.

An programmer writes code to break encryption in the cable box to permit watching HBO without paying for the service. The programmer does not watch the channel. The programmer posts the code on a website for others to download and use on their cable boxes.

This action violates the DMCA and attracts criminal penalties.

A video is created using copyrighted star wars images and clips from star wars movies interspersed with user created video. This video creator posts it on YouTube for free viewing.

This action violates the DMCA and the video creator gets a take-down notice to remove the video. There are no criminal penalties.

A data driven website is attacked using the SQL injection error. The following statement is true.

This approach is used by script kiddies to attack poorly protected databases.

A business, such as Verizon, which operates its internet backbones is called a ________________ internet provider.

Tier 1

A/An ________________ agreement is the document by which participants in an online B2B exchange agree to honor future online deals.

Trading Partner

Cookies are used by websites to link page requests since HTTP is a stateless protocol in which each request is independent of earlier requests.

True

Digital healthcare records in the US should be strongly encrypted and shared only with authorized individuals.

True

E-commerce fulfillment is simpler for media products than for physical (tangible) products.

True

In a carbon nanotube the atoms of carbon are arranged in a special structure resembling a tube.

True

It is more difficult to retain existing customers in a B2C retail e-commerce site than in a real-world retail store.

True

One of the major goals of service oriented architecture is the re-use of code modules by many IT systems.

True

The code provided to the customer who purchases a copy of MS-Office on DVD is the object code.

True

The network topology refers to the way in which the different elements of a computer network are interconnected

True

The video lecture on Moodle is a digitized media file

True

Among the most well-known versions of the ______ operating system are the popular open-source OS, Linux, and Apple's desktop/laptop OS, OS/X.

UNIX

A trading partner agreement for a shipment has text in two languages, English and Chinese. The ________ coding standard can be used to digitize this document.

Unicode (UTF-16)

In the SWIFT system-Bangladesh national Bank case attackers evaded detection of unauthorized money transfers by ____________________.

Using malware that altered money transfer reports to coverup the transfers

A business needs to connect offices in New Orleans, Baton Rouge, Houston, Dallas, and Atlanta. The computer network required to link these offices is a ________________.

WAN

The ES/ERP implementation at _____________ ran into problems because the business processes in different units were not consistent.

Washington State Community Colleges

________________ provides an insight into the technology culture, and provides an interesting insight into the impact of technology on our lives.

Wired

The __________________ standard is widely used by many different IT systems, and is a universal standard for data transfer using markup tags which create self-describing data files.

XML

Customer ratings of products or movies follow ________________ .

a J shaped curve with few low ratings and many high ratings

ES are customized due to _____________________.

a and b

The following are pitfalls of tele-communting

a and b

The following are pitfalls of tele-communting.

a and b

The weblog file shows ___________________.

a and b

These modules are part of the extensions to an enterprise system

a and b

The following are examples of knowledge management tools

a and b, not c

The following statements are true for an EIS

a and c, not b

data_data. This image shows a ________________.

a star schema for a business database

Users get to see and evaluate the performance of the code in agile development ________________.

after the completion of each phase of the project

A vinyl music album is an ______________ recording.

analog

________________ process the data using a computational process and provide estimates of the outcome of a decision.

analytical models

After data has been gathered for collaborative filtering, it is then _______________________.

analyzed using automated tools to generate user profiles, groups of users having similar preferences and demographics.

A very popular, open-source web server software to operate websites is ______

apache

Enterprise systems have an interface that can be used to change the coded business process. This is called the enterprise system's ______ programming interface (API).

application

One part of the CPU, the ALU performs ______ and logical calculations.

arithmetic

A mnemonic ADD is used for a 32 bit sequence of 1's and 0's instruction to the CPU. This is used in _____________ language.

assembly

A bank uses an ES from SAP, a major ES vendor. The bank customizes processes coded in the ES. The following statements are correct.

b and c only, not a

In James Surowiecki's book, the Wisdom of Crowds, it is argued that high quality decisions can be reached by crowds when certain conditions are met. These conditions include _______________.

b and c, not a

A business would prefer to use open source software in __________________.

back end operations where few staff directly interact with the software

A programming routine built into a system to bypass system security and enter the system is called a/an ___________________.

backdoor

BIOS stands for ______ input-output system and are read when the computer is started.

basic

A newly developed IT system is provided free to select customers who are asked to test it and provide feedback. This is a _______________.

beta test

Many high-end smartphones use a fingerprint scanner to authenticate users. This is an example of ______

biometric

Network bandwidth is expressed in ______ per second.

bits

Individuals with information technology skills who break into systems for malicious purposes such as extortion are termed ____________.

black hat hackers

Intelligent agents capable of reasoning and interacting with other programs and humans are called ______

bot

Attacks on a information system often focus on poorly written code in the system. One common error is a ______ overflow, which occurs when a program mishandles excess data entered by the user and writes it in prohibited areas of computer memory.

buffer

CASE tools are used to speed up and improve the coding process. Features of CASE include _____.

business modeling tools to model business processes

B2C stands for ______ e-commerce

business to consumer

QBE stands for Query _______

by example

The approach used by Java is to split the compilation into two steps. The source code for an application is written by the coder and is translated into a compact format called ______ . The machine has a Java Virtual Machine (JVM), a compiler that reads this code and quickly converts it into compiled machine code.

bytecode

______ cables used in computer networking have separators to reduce interference and can carry data at rates exceeding a Gbps.

cat 6

A laptop is advertised as having an Intel i7 CPU. CPU stands for______ processing unit.

central

Supply ______ management (SCM) software manages product, information, and financial flows between the enterprise and its numerous business partners.

chain

supply ______ management (SCM) software manages product, information, and financial flows between the enterprise and its numerous business partners.

chain

When compared to main memory, auxiliary memory is _______________.

cheaper, slower and not volatile

The Ethernet protocol for communication, popular in bus networks, uses CSMA-CD. This stands for carrier sense multiple access with ______ detection.

collision

A programmer writes code in C. The code is converted to machine language that can run on a windows laptop. This process is termed ________________.

compilation

A ______ is a program that can translate code written in some other language into machine code for the CPU.

compiler

A wired computer network connection is unreliable and signals are not transmitted effectively. The most likely cause of the problem is ____________________.

damage close to the end of the cable or to the network connection socket in the computer

the term ______ , refers to sites that exist on private networks, and which do not use standard internet protocols.

darkweb

Sales transactions completed each day are collected by the PoS system and stored in a database. This is an example of ________________.

data

Computer hardware has seen a rapid improvement in performance accompanied by a steady decline in prices over the past five decades. This progress has been documented in Moore's law. Because of this ongoing improvement, the share of hardware, in the investment required for a business information system, has ________ over time.

decreased

What should an expert system do when it reaches the limits of its knowledge? For example, when a tax expert system reaches the limits of its knowledge it should ______

degrade gracefully

Radio is streamed on iHeart Radio, television is streamed on Hulu, and newspapers like the Wall Street Journal are delivered online through the internet connection.. When all forms of media are delivered over the same channel is is termed ______

digital convergence

City hall lists job openings in a website. People who do not have web-access face difficulties in learning about and applying for jobs. This is an example of the ______

digital divide

The ______ refers to the challenges faced by people who either cannot afford, or lack the skills, to effectively navigate the net-enhanced environment.

digital divide

One major cause of the showrooming problem is ______________

digitization of price and product feature data which makes it easily searchable for customers

The case of the San Francisco network and Terry Childs shows the risk IT systems face from _____________.

disgruntled current employees

Clayton Christenson argues that a ______ technology fundamentally alters the underlying business model and creates new markets and value networks.

disruptive

The _______ database is contained on many files, and the files are not all managed by a single CPU.

distributed

Moore's Law states that the number of transistors per square inch on a microchip ________ every two years.

doubles

DHTML stands for ______ hyper text markup language.

dynamic

__________________ is the digital enabling of transactions and processes within a firm and between partners.

e-Business

__________________ is the digital enabling of commercial transactions.

e-Commerce

HDFS stores data in many machines.

each computer used is called a node, and a collection of nodes to store files is called a cluster.

Obscurity is impacted the most by ________________________.

ease of searching through digitized of data

A bank uses IT to reduce the need for tellers at the counter. This is an example of using IT for ___________.

efficiency

______ systems (ES) are integrated information systems that collect and process data from all parts of an organization.

enterprise

______ refers to the use of B2B technology with a focus on streamlining the purchasing process in a large organization.

eprocurement

Work posture is another issue, and employees who spend the entire workday seated in a fixed position at a desk suffer a variety of problems ranging from neck and back problems to cardiac health issues. Well- designed and positioned monitors, chairs, desks, and designated breaks are part of ______ workplace design.

ergonomic

The ______ protocol for communication is widely used in bus topologies. It is described as a CSMA-CD system.

ethernet

The clearly defined rules, i.e., formal written procedures for business operation are ____________.

explicit knowledge

XML stands for ________ markup language.

extensible

#Fileds : data time action protocol src-ip This is an example of a CSV file.

false

(A-L excel file) his is an example of knowledge.

false

A B2B system is developed to link a retailer with a trucking company making deliveries. User input has been acquired from employees in the retail store (store clerks, managers, warehouse employees). No additional user input is required.

false

A CAVE (cave automatic virtual environment) uses rich video communication to bring a remote site to the user, and take the user to a remote site.

false

A business converts operations from one ES to a different ES. Data transfer is a trivial process since both enterprise systems use a RDBMS.

false

A business creates a website to sell its products. Since the sales are conducted online, the business does not provide any staff for online sales support. This is an effective business model.

false

A business has a project underway to modify the information system. The manager of the business process should understand coding and the overall IT system works and instruct programmers in developing code for the system.

false

A business implements new enterprise systems frequently.

false

A business plans to use software for human resource management to automate employee recruitment and retention programs. In this scenario, business software is typically purchased for a flat, fixed cost with no additional ongoing payments.

false

A business purchases a firewall to protect its network. The business can install it and it automatically protects the network.

false

A business purchases a large list of email addresses and sends an e-mail selling cheap stock in a risky new dot.com venture. The IP address and sender address are correct, and there is an unsubscribe button which works. The header of the email is "Your monthly retirement account statement". The mail is legal under CAN_SPAM.

false

A cable company transmits ten channels of information on a single coaxial cable, with each channel using 25 Mhz. This coaxial cable uses broadband communication based on the technical definition of broadband.

false

A car rental company installs a GPS in its cars. The GPS system is linked to the main office to provide data on vehicle location every five minutes. You rent a vehicle and drive on the Interstate. The GPS location shows the vehicle covered a distance of 7 miles in five minutes, which translates to a speed of 84 miles per hour. The contract states that you will be issued a speeding violation charge of $ 100 if your exceed posted speed limits by ten miles, and the charge applied to your credit card. The charge is added to your credit card each time this violation is recorded, and you realize this only when your card is refused at a gas station. This type of intrusive monitoring is illegal.

false

A carpet manufacturer opens a showroom to display the types of carpets produced. The store is not designed to sell items. This is an example of the showrooming effect in e-commerce.

false

A commodity function of a business should be customized in an enterprise system.

false

A firewall is designed to protect the IT systems of the business in the event of a disaster, such as a fire.

false

A meta tag to prevent search engines from indexing a page on a site will prevent malware from reading the web page.

false

A neural network has an explanation feature that explains why it reached its solution.

false

A promoter has a highly innovative project which uses quantum technology. This is a suitable project for crowdfunding.

false

A provider of IT outsourcing services will find it more difficult to recruit and retain skilled IT staff than a business operating its own IT.

false

A store sets up a website where customers can browse the inventory and purchase products online. The site gathers customer requirements by observing customer behavior on the site and uses it to customize the site for each customer. This is an example of ubiquity in e-commerce.

false

A visit is a user action on one element of the webpage displayed on the user.

false

A web address is written as https://uno.mrooms3.net/course/view.php?id=48696. Moodle uses a LINUX server. The case of the text (upper/lower case) does not matter.

false

A website used CAPTCHA which requires the user to type in the text in an image. CAPTCHA is used to identify the user.

false

All enterprise systems use a common API for making modifications to the system.

false

Amazon is an online retail giant. Its growth is an example of the network effect.

false

An EIS acquires knowledge from experts and runs on autopilot.

false

An IPv6 address is 32 bits long

false

An IS used by an insurance company has accurate data. The company merges with another insurance company. Data is transferred to the IS used by the new business. Since the original data was accurate, we can be confident that the new data is also accurate.

false

An artificial neural network contains about 100 billion biological neurons.

false

An artificial neural network starts out with a perfect system and gracefully degrades as errors creep into the system during the learning/training process

false

An e-prescription system which transfers prescriptions from a doctor's office to the pharmacist is an example of CRM.

false

Apple's iOS is an open source product.

false

As a result of competition from new startups, technological enhancements, demographic changes, and global competition management has even more time to focus on commodity functions.

false

At present there is one dominant blockchain technology in use and most businesses use the standard blockchain technology.

false

B2C e-commerce is a model in which bit-torrent software is widely used.

false

Bitcoin values have been consistent and held value over time. They provide a stable alternate currency for global trade (in 2017).

false

COBOL language coders need to be aware of the registers, ALU, and control unit features of the CPU.

false

Collaborative Filtering starts with skilled staff who filter from a vast array of choices, and present a limited selection to customers.

false

Collaborative Filtering tools are more successful when there are few users.

false

Core functions which are technically simple, and well understood by top management, are good candidates for outsourcing.

false

Corporate data centers have thousands of desktop machines stacked in closely packed racks.

false

Customers visiting e-commerce websites like popups and pop-unders on the website.

false

Data generated from devices which are part of an Internet of Things has little immediate value and only gains value after a long time has elapsed.

false

Data is captured by an automated system. There is one small error in the transaction price. This does not matter because information systems have become better as a result of Moore's Law and can correct the error.

false

Digitization of license place images captured by cameras on highways enhances individual privacy.

false

Due to the changes in performance to price ratio of hardware, described by Moore's law a business manager needs to spend more time on the hardware decision for IT.

false

Enterprise systems for each department function within their functional silos. Data transfer between systems is difficult.

false

Enterprise systems use independent databases for each part of the organization

false

Excel code is developed using computer languages such as C++ and C#(C sharp). A business advertises for an employee with Excel skills. The employee must have competence in C++ and C# (C sharp).

false

GPT-3 is a massive expert systems with billions of rules provided by experts from around the world.

false

Good user training helps protect a business from program backdoor exploits.

false

Groupthink occurs when a group is new, and meets together for the first time.

false

In SDLC projects are developed with short cycles, with the output of each cycle delivered to users for comments. The comments are incorporated into the next design cycle. This iterative process is used in SDLC.

false

In a crowdfunding model, a venture capitalist gathers a pool of investors and recommends an investment.

false

In the Target hacking case of Dec 2013, attackers acquired the data from a stolen laptop.

false

In the dispute (February 2016) between Apple and the FBI, the FBI wants Apple to hand over the password of the cell phone owner, accused of a terror attack.

false

It is easier to train senior managers than to train entry level users in using a new IT system.

false

John works in a job which does not change much. John can do the job on his own, without assistance from others. John's job is not suitable for telecommuting.

false

Low-code development platforms are suitable for developing all types of software including unique and highly customized software.

false

MAC addresses are used globally to identify the machine visiting a website.

false

Managers find it easy to manage tele-commuting employees.

false

Much of the content on the deep web is related to illegal activity.

false

Near field communication is a technology that supports the search and selection step of the e-commerce service cycle.

false

One major problem with enterprise systems is that they often lack state-of-the-art business processes for the organization.

false

One of the first online merchants was Amazon on AOL in 1991

false

One reason for the Y2K problem was that businesses needed to include one additional day for the year 2000

false

Routers read the source IP address and direct the packet on the network.

false

SCM systems scoop up vast troves of data about customer behavior.

false

SDLC is useful in the case of projects which are new and innovative and not clearly understood by the user community.

false

Spyware programs are typically benign and merely present ads for many other sites.

false

The Intrado 911 call center software problem occurred because of enterprise system implementation delays.

false

The WIMP(Windows, Icons, Menus, Pointers) interface is very suitable for portable devices such as smartphones.

false

The click through rate is the number of times an ad is viewed by user who visit the website.

false

The connection weights in an ANN are provided by a human expert.

false

The current (2016 Spring) version of Moodle uses two-factor authentication

false

The difference between a virus and a Trojan attack is that a virus is hidden within another program while the Trojan attack is open and direct.

false

The domain name for a website can only be in ASCII characters.

false

The first graphic user interface web browser was LYNX from the University of Kansas.

false

The hackers who broke into Target's IT systems in Dec 2013 used very sophisticated hacking techniques.

false

The last mile problem is greater for the media B2C model than the retail store B2C model.

false

The major problem in building a successful knowledge management system is the lack of good tools for knowledge management.

false

The massive boom and big bust in e commerce business models in 2000 is a phenomenon that is unique to the e-commerce industry at that time and has not happened earlier and is not likely to be repeated again.

false

The parallel approach to implementation is inexpensive and risky.

false

The silicon in sand is purified in multiple steps to obtain very high purity silicon, typically with around one part per thousand of impurities.

false

The structure of the data is determined after the data is stored in the database.

false

The training process for ANNs uses if-then rules.

false

There are many sensors collecting data about customer behavior. The challenge for a business is to store all the data collected by sensors.

false

There are two IT projects under development in the business. The first deals with an enterprise system update and is a multi-million dollar project. The CIO monitors the project closely and gets daily updates from the project managers. The second deals with website enhancement to work on mobile and wearable devices. This involves a 500 thousand dollar investment. The CIO is not familiar with the project's technology and does not closely monitor the project. The enterprise system update project faces a greater chance of failure than the website enhancement project.

false

Washington State's community college ES implementation failed because of data entry errors when transferring data to the new ES/ERP.

false

Weblog files are XML files.

false

When IT is viewed as a utility that can be purchased on demand, IT becomes a fixed cost.

false

When a business acquires an enterprise system, it pays a fixed, clearly defined charge for the ES.

false

When a business needs an enterprise system it builds the system from the ground-up, in-house.

false

When a computer is turned off (powered down completely) the CPU retains all the instructions to run the system.

false

When you make a purchase at a store using a credit card, the clerk at the counter asks you to sign on the pad at the cash register. This is a digital signature.

false

You open the class sample database using MS-Access and delete a record in the products table. This is front-end access.

false

You purchase a copy of MS-Office and install it on your laptop. You make a full backup of your laptop on a backup drive. This backup has a copy of MS-Office. This is a violation of the Digital Millennium copyright Act of 1998 (DMCA)

false

Your company participates in a trading group which uses dual key encryption to securely transmit documents. Your company sends a purchase order for a million widgets to company A and another purchase order for two million widgets to company B. The private key of your company is used to generate the digital signature for the documents and is the same for both purchase orders. The digital signatures for the two purchase orders are different.

false

https://www.bing.com/search?q=Verisign The query string is bing.com.

false

A/An ______________ acts as a filter between a private network and external networks such as the internet.

firewall

The primary key in one table that appears in other tables to establish a relationship among tables is called the ___________

foreign key

______ generation languages move away from specifying procedural steps to specifying broad action classes. One example such a language is SQL (structured query language).

fourth

In coding using 3GLs, one approach used to prevent programmers from needlessly adding lines of code was to measure ______ points, where features performed by the software were counted and assigned scores.

function

The acronym, GIGO, ______, refers to the fact that bad data produces worthless results.

garbage in garbage out

Open source systems are distributed to users under a GPL. GPL stands for _________________ public license.

general

In an expert system, knowledge is expressed in the form of ______ rules.

if-then

Sales transactions completed each day are organized to help a manager compare sales for previous days (and for the same day in previous weeks), and generate a graph of the daily sales by category and day of week. This is an example of _______________________.

information

The sales of potato chips from a vendor have declined over the past two weeks. The IT system provides a chart of the decline in sales from the PoS data collected from cash registers. This is an example of _______________.

information

______ is summarized data, which is organized in a meaningful format.

information

Boo.com failed in its e-business model since __________________

internet download speeds were much slower in 2000 and the rich visuals for the site did not load quickly.

A /An _____________ looks for suspicious patterns of system access and use.

intrusion detection system

A company plans to capture business quality data in a new IT system. The development team gathers requirements from the company and develops a ______________________ of the database to represent the data used by the business and show the relationships between data items.

logical design

This is a ___________________ database diagram.

logical design

Hard drives store data using _________________.

magnetic fields on the magnetic material coated on the drive surface.

In a bank's IT system, roles such as manager, teller, and depositor are used to ________________.

manage authorization to use resources in an IT system.

Artificial Neural Networks using "deep learning" have ____________ compared to other ANNs.

many hidden layers

Video of customer actions is gathered by a store. This video is analyzed to determine specific customer actions such as "take a product", "replace item in shelf", or "linger near the item". This analysis and classification of data is carried out by the _____________ function of Hadoop.

map

a data ______ is a subset of a data warehouse and is designed to to provide analytics support for a few important problems. It is a smaller version of a data warehouse.

mart

A website for real estate incorporates Google maps and City Crime statistics from an external source in its website. This is an example of a ______

mashup

A __________________ topology is a highly interconnected network with devices linked to many other devices. This can be used to create a resilient network where the failure of a few nodes or links will not destroy the network.

mesh

Data about course registration is gathered in a file. Data about when it was extracted, the source of the data (production, development, or archival), and the application that extracted it is/are _____________.

metadata

The term ________ refers to data about data.

metadata

The Digital ______ Copyright Act of 1998 enforces limitations on circumventing copyright measures for digital products.

millennium

One common location for a firewall is between an internal network (LAN) and an external network such as the ______

net

An expert system is being developed for federal tax calculations. The knowledge engineers developing the expert system will seek the knowledge from __________________.

none of the above

A business backs up all its data on backup tapes.

none of the other choices

A business grows rapidly through many acquisitions. The IT systems are not integrated and are disorganized. As a result, customer addresses are stored in many different files, and often are not consistent. This is called data ___________________.

none of the other choices

A clothing store states "it is not in the business of selling customer data" in its business contract. A business transfer clause states that data about customers is one of the business assets. It collects data about customer purchases and clothes sizes. The business uses this data to market products related to customer purchases.

none of the other choices

A fashion apparel business (in 2018) plans to build a 3-D Augmented Reality website for use with new 3-D devices. This is a highly innovative technology with risks for failure. The project faces problems with _______________.

none of the other choices

A local bank with the name NOLABANK has operated in town for many years. You set up a site to direct traffic to a competing bank. The following sites are legal and do not violate the Anti Cybersquatting Act.

none of the other choices

A security problem is discovered in the code used in a company. The software vendor issues a _________________ to fix the problem.

none of the other choices

A status code of 404 in the weblog file shows that the ___________________

none of the other choices

A/an _____________________ mimics human expertise in a particular field to solve problems in a well-defined, narrow discipline.

none of the other choices

An online ad presented between two pages of a website where the user has to watch the ad (or at least a part of the ad) before proceeding to the next page is called an _______________ ad.

none of the other choices

Mt. Sinai Hospital used 700 thousand patient records to diagnose diseases. The system even predicted the onset of psychiatric disorders, a challenge for even expert doctors. This is an example of a ___________

none of the other choices

One reason for the Y2K problem was that ___________________.

none of the other choices

Sales of a product decline over the past four weeks. A manager knows that one cause is lower prices at competitors, and check competitor prices, and matches them. This is termed _________.

none of the other choices

The ES purchased by a business follows a different process from that used by the business to route sales orders. The following statements are true.

none of the other choices

The _____________________ topology refers to the way in which data flows in the network.

none of the other choices

The first step in the SDLC is ________________.

none of the other choices

The last step in the E-Commerce service cycle is _____________________.

none of the other choices

The primary revenue for B2C retail stores is ________________.

none of the other choices

The read-write head of a hard drive ________________________ surface of the hard drive.

none of the other choices

The tracks on the surface of a hard drive are __________________.

none of the other choices

You create a website for your company with a comment board where customers can post comments about your service. You edit the site to limit post length to 200 words, and use a grammar checker to automatically fix typos and grammar errors, as well as a word filter to remove objectionable terms. A customer praises your service and strongly criticizes service provided by a competitor.

none of the other choices

______________ was developed in the 1950's and has been widely used in engineering and scientific computing. A vast library of code modules have been developed in this language for scientific and engineering purposes, and the language is used for many high performance computing applications which require a lot of computing resources.

none of the other choices

www.uno.edu/Portals/8/Administration/ManagementCurriculum.pdf This is an example of _______________.

none of the other choices

A software project is developed sing Agile-Scrum. The work done by each team member the previous day is evaluated by _______________.

other members of the peer group (other team members)

A business IT system is attacked and hackers enter the system. It is suspected that data may have been stolen and changed by the hackers. The system is shut down and needs to be completely restored. When the business faces such problems _______________.

outside specialists need to be brought in on short notice, and it is expensive to fix the problem.

A hospital has an IT system to transmit test results from the lab to clinicians. The system which currently uses a formatted text file is being updated to use XML data transfer. Any failure of data transfer can be risky and catastrophic. The best approach in this case is ______________ implementation.

parallel

An RFID chip without a built in power source is called an ______.

passive RFID

A neural network is good at __________________.

pattern recognition

P2P stands for ______ e-Commerce

peer to peer

Customer satisfaction expressed in complaints per 1000 customer days is a KPI for a hotel chain. If it rises above 5, the EIS signals an alert. This type of alert is called ______ alert.

performance tracking

PAN stands for _____________ area network.

personal

When updating an e-business site, a company first rolls out a new landing page, waits to see how well it functions, and tests the site's latency and customer response, before rolling out new pages for the shopping cart and payment . This is the _____________ approach to system implementation.

phased

(before 2010) This is a example of a __________ .

physical database diagram

person ---makes payment --- This is a ___________________ database diagram.

physical design

When updating an e-business site, a company rolls out a completely re-designed new site with a new landing page,shopping cart, payment, and support pages to the customer from one city. The business tests the new site on these customers for one month and evaluates site performance. If this is successful, the site is rolled out nationwide. This is the _____________ approach to system implementation.

pilot

The field that uniquely identifies each record of a table in a RDBMS is called the _______

primary key

Program data independence refers to ________________________.

programs use data from a common, independent database

The four major ethical issues are privacy, accuracy, ______, and access.

property

The Buckley Amendment (FERPA) of 1974 _____________________________.

protects privacy of educational data such as college grades

The URL _________________________.

provides each document on the web with a unique identifier.

The two keys in a dual key system are termed the ______ and private keys.

public

The sender uses the receiver's ___________ to encrypt the message

public key

The QoS of IT services defined in an outsourcing contract refers to ______

quality of service

One technology that may provide even smaller devices in the future is ___________________.

quantum technology

RAM stands for ______ access memory.

random

RAD stands for ______ application development

rapid

A small business checks its weblogs and finds that nearly 50% of the online visitors abandon their shopping carts at the payment page. Surveys show that many customers are unwilling to enter credit data on the site. The business teams up with a large and reputed online vendor to streamline the payment process, and limit the data entered by customers to purchase products. This is an example of ________________.

reducing friction in the transaction

The CPU often has ______, which are small data storage locations used to hold intermediate values in computations.

register

The ______________________ database model uses two-dimensional tables of rows and columns of data.

relational

The links between the tables in an RDBMS are called ________________.

relationships

Many distributed database systems use an approach called _______ , where changes in one part of the database are determined periodically, and data updated in other parts of the distributed database.

replication

The knowledge collected from employees is stored in a knowledge ______ , a database containing nuggets of knowledge, organized for easy retrieval

repository

A status code of 200 in the weblog file shows that the ___________________

requested file was successfully sent to the user.

A status code of 301 in the weblog file shows that the ___________________

requested resource has been assigned a new permanent URI (resource location moved permanently)

When customers purchase products online, they may not be satisfied with the product, since they only viewed an image online and did not handle the physical product. The return process can be expensive for the online retailer. A partnership with a real-world retailer with a network of stores can help handle returns. This provides assistance with _______________.

reverse logistics

A business grants privileges on email, accounts, and the website to an employee. The employee is terminated. A ______ process is designed to quickly and efficiently terminate these privileges.

revocation

Search engine programs which scan the web to gather and index documents are called ______

robot

Routers access a small database which lists IP address ranges and where to send the packet. This is called a ______

routing table

The production process (2016) for a computer process begins with ______ (material used).

sand

________ means that the database can grow as needed by the business, without having to start all over with a new system.

scalability

______ control is to limit the project and prevent new features being added to a project before it is completed.

scope

The CSO ______ (Chief Answer Offices) is pro-active in threat deterrence and is in charge of developing the threat matrix for the firm's IT systems.

security

A business manager develops an IT system using MS-Excel and uses it to analyze staff performance for bonuses and promotion. This is an example of ______________.

self-sourcing

The manager should select a new location for a store based on a combination of quantitative (data from real estate data sets) and qualitative (subjective assessment of location aesthetics) data. This is an example of a/an ______________ decision.

semi-structured

The sender generates a hash of the document being sent. The sender signs the document by encrypting the hash using ______________.

sender's private key

______ are machines designed for use in a corporate data center and contain only the essential components. They are designed for continuous 24 by 7 use and high reliability. Servers

server

The SLA in an outsourcing contract is the ______ level agreement.

service

A ____________ cookie is only active until the user closes the browser window.

session

When a thousand customers connect their smartphones to a particular cell tower they ____________________.

share the available bandwidth of the cell tower.

A DBA goes on a two week vacation. The DBA posts this information on her Facebook account prior to departure and provides daily updates of the vacation. This opens up the business to a _________________.

social engineering attack

Salesforce offers its CRM application over the internet. This is an example of SaaS, or ______ as a service.

software

As a result of technology improvements in IT such as access to vast data stores in "big-data" storage and sophisticated analytical tools ____________.

some decisions that were semi-structured have become structured

Software companies selling valuable software retain control over their ______ code and guard it carefully.

source

An inventory manager uses a clearly defined economic order quantity formula to place new inventory orders. This is a an example of a/an ________________ decision

structured

A ____________ cookie is cannot be easily cleared from the user's browser.

super cookie

DSS stands for Decision ______ System.

support

A hotel reservation system is expected to handle 20,000 reservations, and changes/cancellations made to all hotel properties managed by the chain each day. The reservation system completes transactions with partner sites (travelocity, hotels.com) and credit card companies. A test is performed on the system simulating 20,000 transactions in a 24 hour period coming in directly from customers, though infomediary sites, and recording payments with financial service providers. This is a ______ test.

system

______ interact with business managers to develop the best systems requirements, and communicate these requirements to coders.

system analyst

All the business rules are specified, process diagrams developed and verified, and pseudo code may be written for the problem in the ______ step of the SDLC

system design

The three sub-steps of the ___________ phase of the SDLC are acceptance (with sign-offs by administrators), installation of the code, and deployment of the new IT system.

system implementation

An online retailer sells shoes. The retailer has problems with reverse logistics. One solution is to ____________________.

team up with real world stores close to the users.

Many people use Facebook because their friends use Facebook. This is an example of ___________________.

the network effect

Information systems developers need to be concerned with the impact of their systems on privacy because of ________________________.

the rapid proliferation of low-cost data capture tools

The term 360 degree view of a customer refers to _________.

the summary of all the customer's interactions and demographic data presented to the employee interacting with the customer.

Some of the problems with self-sourcing IT include _______.

the time spent by the end-user in IT development is often a hidden cost and not accounted.

Computing devices made from carbon nanotubes can be built in _______________ architectures with many layers, creating very compact, fast computers.

three-dimensional

Most bots are designed to __________________________.

travel on the internet and perform very simple tasks, repeatedly, at a rapid pace

A T3 line used for communication has a bandwidth of 45 Mbps.

true

A bit is a single binary digit (0/1) stored in a computer.

true

A blockchain database provides a public ledger of all transactions.

true

A business purchases a large list of email addresses and sends an e-mail selling cheap stock in a risky new dot.com search engine venture. The IP address and sender address are correct, and there is an unsubscribe button which works. The header of the email is "A chance to make millions in the next Google!". The mail is legal under CAN_SPAM.

true

A business sets up a GDSS room and installs GDSS software on the machines. A team meets in the GDSS room and conducts a meeting. A meeting coordinator is required to facilitate use of the GDSS.

true

A business uses MS-Windows server for its operating system, MS-SQL Server for its database, EPIC for its enterprise system and Sitefinity for its web content management system. Software costs are incurred for each layer of software.

true

A business website experiences a Denial of Service attack. This does not introduce spyware into our website.

true

A company uses RFID tags embedded in employee IDs to track employee location. All employees are made aware of the embedded tag, and the ability to track location accurately. This data is analyzed by the business to determine groups of employees who work together as part of a program to enhance group performance. This is legal under the laws we have discussed in this chapter.

true

A crowdfunding project fails to get sufficient investment. This failure provides useful information about the market.

true

A disgruntled IT employee can cause more damage to the IT system than a competent hacker.

true

A hospital uses RFID tags embedded in employee IDs to track employee location. All employees are made aware of the embedded tag, and the ability to track location accurately. This data is analyzed by the business to determine groups of employees who work together as part of a program to enhance group performance. This is legal under the laws we have discussed in this chapter.

true

A long password is more secure than a short password.

true

A network of light bulbs which can communicate with one another over a network and work with a scheduling system to turn them on or off form an Internet of Things.

true

A poorly written firewall rule can stop all traffic coming into the business network.

true

A small system is developed using Excel with pivot tables and charts to help managers analyze corporate data. This is an example of RAD.

true

A user visits a website and requests a file. The file is sent to the user. The weblog file records the size of the file delivered to the user.

true

A website requires that you upload a photograph in jpeg format. Jpeg is an acronym for joint photographic experts group.

true

A well-designed DSS can result in enhanced employee learning.

true

A well-managed SaaS provider gains economies of scale since it provides its application to many customers.

true

Alpha testing is carried out in a "laboratory" style environment by the employees of the organization.

true

An EIS uses a lot of external data about market conditions and competitor performance.

true

An ES is customized for unique business processes used by a business. A new update to the ES is rolled out a year later. The customization needs to be carefully checked and fixed if changes are needed. This is an expensive process.

true

An expert system should explain the reasoning for its conclusion.

true

B2B is larger and has greater impact than B2C models.

true

Bitcoin is a virtual currency that has presented a new approach to paying for transactions.

true

Broadcast TV signals, Microwave radiation used in ovens, Visible light and X-Rays used in medicine are all electromagnetic radiation but use different frequencies.

true

CRM can be used to deliver a highly personalized experience to each customer.

true

Cat 6 computer network cables have a recommended maximum length of 100 meters.

true

Configurators are needed in a website that allows customers to design their own products/services.

true

Crowd-funding can serve as a promotion platform since potential customers are made aware of the project.

true

Custom IT systems are required for highly innovative business ventures.

true

Customers visiting online retail stores are highly price sensitive and seek the lowest price online.

true

E-commerce fulfillment is simpler for media products than for physical (tangible) products

true

Enterprise systems are developed for a class of businesses, for example, a banking enterprise system for medium-sized regional banks, a clinic management system for dental clinics, or a university registration and payroll system for universities.

true

Enterprise systems use a common enterprise-wide relational database, often containing thousands of tables.

true

Expert systems are often used to train people in a discipline.

true

Extended ASCII coding uses 8 bits to represent letters and other characters.

true

Five offices share space in one building. Each office operates its own wi-fi network. The signals from the five wi-fi networks can interfere with one another.

true

Fuzzy controllers are used in the implementation of decisions taken by intelligent systems. An example is the action of turning an automated vehicle.

true

Good reviews add value to small businesses, and a one-star rating improvement on Yelp has been found to translate to a 5% to 9% revenue growth in restaurants

true

Good security training for users helps control/limit social engineering attacks.

true

Hadoop uses the MapReduce framework for data analysis.

true

Higher frequency electro-magnetic signals are less capable of going through solid objects and limited to line of sight transmission.

true

Images in a web page are separate files linked to the text in a HTML web page.

true

In 1991, three major commercial networks at the time, UUNET, PSINet and CERFnet created the Commercial Internet Exchange. This organization allowed commercial data traffic to be exchanged freely, without the acceptable use restrictions of NSFNET.

true

In Extreme Programming, strict coding standards are enforced to make the code easier to maintain in future.

true

In HDFS the shuffle function gathers together data about all the customers who were initially happy with the product but complained about it two weeks later.

true

In most cases, an IT project developed by an end-user is less reliable than a IT project developed by the IT department.

true

Invisible challenges are used to authenticate the user, during user interaction, rather than at initial authentication

true

It is easier to copy digital data than analog data.

true

It is easier to detect plagiarism with digitized data than with paper documents.

true

It is recommended that business implementing a new enterprise system seek the services of an implementation partner since most businesses typically have little in-house expertise in implementing enterprise systems.

true

Java is a programming language developed for the net, with a write once-run anywhere philosophy

true

MAC addresses are globally unique IDs encoded in the network chip by the manufacturer.

true

Macys.com is the website for the retailer, Macy's. Customers can view items and place orders for home delivery or store pickup. This is an example of B2C e-commerce.

true

Many social engineering attacks use password guessing approaches since users often create passwords based on terms with a personal connection such as a birth date.

true

Multi-core processors are useful in complex tasks, required for parallel processing, such as speech recognition and video editing.

true

Nowadays, many businesses focus on performing only the core component of their service/product in-house and outsource the other functions to partners. This results in a complex supply chain and a need for SCM software to manage the supply chain.

true

Once a product is digitized, it is nearly costless to make a digital duplicate.

true

One benefit of server virtualization is improved utilization of hardware in data centers.

true

One feature of the net is fault-resiliency. If one path connecting computers on the net is unavailable, data travels by another path.

true

One major feature of M-Commerce is the ability to localize the application based on the physical location of the customer.

true

One objection many customers have about CRM is the highly intrusive nature of data collected by the system.

true

One of the features of a data warehouse is a common vocabulary for data collected from different sources.

true

Peer-to-peer technology eliminates the need for a central clearinghouse and links individual computers over the net to create a virtual network.

true

Personal information about employees and customers is a critical information asset of the business.

true

Ports allow internet traffic to be classified and screened as needed. The port commonly used for HTTP traffic is port 80.

true

Privacy is defined as something that is not, by default, exposed to the outside world.

true

Pseudo-code is abbreviated code that specifies the broad outline for the detailed code.

true

Routers direct traffic on the internet and on local area networks which use internet standards.

true

Routing tables need to be updated when new machines are added to the network.

true

SDLC is a time consuming procedure and is useful in the case of large projects that are critical to the business

true

SDLC reduces the failure risk of large IT projects.

true

Self-sourced IT is often lost when the developer moves to another position.

true

Since IT jobs are primarily performed on the computer, IT positions are one of most commonly telecommuted jobs

true

System complexity is a problem when in-house IT systems are closely interlinked to IT systems used by business partners. This can lead to IT system failure.

true

Tapes, like hard disks, use magnetic storage, which makes them sensitive to strong electrical/magnetic fields (EMF). Optical storage is not affected by EMF.

true

The CPU can instantaneously access any part of main memory.

true

The Hadoop Distributed File System stores data in small blocks and uses replication to ensure that each small block is replicated in multiple locations to enhance reliability and availability.

true

The Moodle user browses to a website, logs in, and views the data posted for the class. This is termed front-end access to the Moodle database.

true

The OLAP data cube may not be a cube and may have a different number of values in each dimension.

true

The OS provides a layer of abstraction between the CPU and the program used on the machine. This simplifies writing programs, since they can be written for the OS, and the OS will make the conversions for each specific type of CPU.

true

The RDBMS design makes it easy to ensure the integrity of data collected by the system.

true

The Target Hack shows the need to protect not only internal IT systems but to also ensure that IT systems at partner companies are also secure.

true

The average human brain has about 100 billion neurons.

true

The core enterprise system manages and coordinates accounting, finance, operations, human resources, and marketing processes.

true

The cost of system maintenance after the IT system is fully completed exceeds the cost of building the IT system.

true

The disposal step of the SDLC has guidelines to ensure that valuable data is deleted before old hardware is discarded and to ensure that data is archived before an IT system is shut down.

true

The frequency band used by home wifi devices has a lower frequency than visible light.

true

The hash is a fingerprint of the digital data being sent using the encryption system.

true

The logic for the business process in a legacy system is typically the same as the logic requested by the users.

true

The maximum signal strength of home wifi is limited by FCC regulation.

true

The number of in-links to a web page (other sites linking to the page) is one of the criteria used by search engines to rank a page.

true

The plunge approach is used for small IT systems, and systems that do not have a major impact on the organization.

true

The term cloud computing originated in the use of a cloud shape to refer to the internet in network diagrams.

true

The type of RAM used in computers is called dynamic RAM (DRAM) and the dynamic nature of the device means that an electrical charge must be constantly supplied to the device to hold its data.

true

There are many more script kiddies than white hat hackers.

true

Top management may use a DSS to gain greater operational control over decision making.

true

Torrent software allows users to link up with other torrent sites and share files. There is no central server to store the files. This is an example of P2P e-commerce.

true

UNIX is an operating system.

true

Under Section 230 of the Communications Decency Act of 1996, a social media site (a social network like Facebook or a customer review site like Yelp) is deemed a common carrier of information and is not liable for content posted on the site.

true

VPNs include encryption technology to ensure that business data travels on the public net using high quality encryption

true

Very little or no code is written, and it becomes possible for a developer to assemble an application by connecting the appropriate code modules in low-code development.

true

When I visit the amazon.com website, the webserver log file records my IP address.

true

When a business outsources IT, top management sees a reduction of management effort to manage IT.

true

When a firewall drops a packet it means that the packet has been blocked from entering/leaving the network

true

When employees start using their personal devices, such as smartphones, to access and complete work assignments, corporate IT systems face more security threats than when they use business owned and managed devices.

true

When programs were written in third generation languages, and code ran to hundreds of thousands of lines of code, a method of measuring programmer productivity was to count thousands of lines of code (KLOC).

true

When sending message on the network using a direct coding process there is problem using single-key cryptography since both parties must meet to exchange the code key.

true

Yelp is an online review site where individuals can post reviews of restaurants and other services. Other customers can view the reviews on Yelp to guide their restaurant choice. This is an example of C2C e-commerce.

true

You send out e-mail advertising a new PoBoy shop to every IP address assigned by Cox Communications in the New Orleans area. Your email contains the correct sender address (your email) and the mail header states "The Best Po-Boy in NOLA". You plan to do this only once, the day before your store opens. Since you do not plan to send the mail again, you do not include an unsubscribe option. This is a violation of the CAN-SPAM law.

true

You visit Amazon's website. The site writes a cookie on your machine. By default, this cookie can only be read by Amazon and no other store's website can read this cookie.

true

You write a term paper and submit it electronically. Digitization has made it easier to detect plagiarism.

true

Your purchase a bitcoin on June 1, 2017 and sell it on August 1, 2017. This purchase and sale history is stored in a block chain database.

true

A physician can check patient files at any location, whether at the clinic, at home, or traveling. This is an example of _________________________.

ubiquitous computing

A physician checks patient files from her cellphone at home. This is an example of ______________

ubiquity

A UPS (____________ power supply) provides backup power for computer and networking hardware.

uninterruptible

A database does not have any needlessly repeated data. For example customer addresses are stored in only one location. This is termed database ________________.

uniqueness

A hacker group announces they have discovered a security flaw in a program. Malware writers create code to exploit this hole immediately. This creates a ______ vulnerability.

zeroday


Kaugnay na mga set ng pag-aaral

Les endroits & prépositions avec à

View Set

Ch. 2 - The Solar System Worksheet Lukas Purgar

View Set

NYU Langone Health 100 questions

View Set

Ch 3: Process Choice and Layout Decisions

View Set

Intangible Assets + their Acquisition Costs

View Set