Intro To Informations Systems

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to one estimate, by 2025, over ______ objects will be connected to the Internet.

75 billion

According to IDC, by 2025, _______ of data will be created on IoT devices.

90 zb

By participating in _____, sellers can buy or sell on the same platform using e-commerce.

C2C

_____ is used for drafting and has replaced traditional tools, such as T-squares, triangles, paper, and pencils.

Computer aided design software

In the event of a blackout, which two crucial tasks are performed by UPS?

Continues running the server and safely shuts down the server.

_____ may be used to provide two-way communication and are used for a variety of purposes, such as posting news about product development and providing information for customers.

Corporate Wikis

A creator of a content management platform chooses a license to allow only nonprofit institutions to use the work. This type of license is known as _____.

Creative Commons

A CRM system captures information about _____ for sales personnel and customer service representatives.

Customer interactions

Which cloud-computing risk deals with specific jurisdictions and commitment to local privacy?

Data location

_____ mimics human expertise in a particular field to solve a problem in a well-defined area.

Expert Systems

The hardware component of a computer system consists of programs written in computer languages. T/F

False

In the context of e-mail security, which of the following is not recommended?

Replying to spam senders and requesting they no longer send messages

A successful _____ works with suppliers and other partners to improve procedures for delivering products and services.

SCM

_____ is a more forward-thinking process that uses data and statistical methods to gain insight into the data and provide decision-makers with information they can act on.

Statistical abstraction

In the context of a global information system (GIS), a global network must have _____ to guide packets to their destinations.

Switching nodes

A parts dealer is having difficulty talking on the phone with a customer while looking at the online parts catalog along with the customer. Which technological breakthrough would be best to help the dealer?

Teleprescence

_______ is the amount of data transferred or processed in a specified time, usually one second.

Throughput

Buyer power is high when customers have many choices. T/F

True

Telecommuters often use mobile devices to conduct business outside the office. T/F

True

The _____ model, a widely used business model in e-commerce, refers to generating revenue from more than one source.

mixed

A(n) _____ based on the Wireless Application Protocol is a good solution for making stock trades on the go.

mobile device

The _______usually contains the CPU, basic input/output system (BIOS), memory, storage, interfaces, serial ports, and parallel ports.

motherboard

A decision support system requires three major components, one of which is a(n) ______

optimizer

In object-oriented programming, _____ is used to handle complexity by hiding unnecessary details from the user.

polymorphism

With virtual organizations, _____.

products can be customized more to respond to customers' needs

In Web marketing, with _____, information is sent to users based on their previous inquiries, interests, or specifications.

push technology

A _____ is a software application that hides its presence on the computer, making it nearly undetectable by common antimalware software.

rootkit

According to research published by Cybersecurity Ventures in 2020, cybercrime will cost the world economy $10.5 _____ annually by 2025.

trillion

A database administrator (DBA) is responsible for _____.

designing and implementing information systems

According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____.

discriminate data based on content

Artificial neural networks can learn and perform tasks such as_____.

filtering spam email

Which of the following is considered an operational Global Information System requirement?

global reporting

The end result of the _____ phase of the systems development life cycle (SDLC) model should deliver a fully functional system that has been thoroughly tested.

implementation

Designing a successful information system requires ______.

integrating people, software, and hardware

While a company's website is usually public, its _______ is for internal use by employees.

intranet

What is the disadvantage of automation using robotics that has received the most attention?

job loss

_____ is a disadvantage of a cloud-based enterprise system.

lack of customization

The _____ phase of the systems development life cycle (SDLC) model includes the formation of a help desk.

maintenance

Which is true regarding quantum computing?

Information storage is based on the direction of an electrons spin

In the context of data communication, which of the following is true of e-collaboration?

It improves customer care

Which is true regarding cryptocurrency?

It is monitored peer-to-peer internet protocol

To share knowledge within an organization, companies use a _____,

KMS

Decisions related to _____ are considered semistructured decisions at the operational management level of an organization.

accounts recievable

_____ focuses on setting a minimum number of requirements and turning them into a working product.

agile methodology

As a potential obstacle to the success of a global information system, diverse regulatory practices apply to _____.

business practices and technological use policies

What is one advantage of a database over a flat file system?

can use more sophisticated security measures

A(n) _____ system is a collection of applications that supports decision-makers by providing access to a shared environment and information.

collaboration

In an ethical context, before deploying an AI system which of the following is an issue an organization should examine to reduce risks?

complexity of the problem

Identify the type of threat in which hackers secretly exploit a user's computing power in order to mine cryptocurrency.

cryptojacking

_____ is a disadvantage of a WiMAX system compared with Wi-Fi.

data transfer rate


Ensembles d'études connexes

Chapter 12 Back of the Book Questions

View Set

NCLEX book The client with Acute Respiratory Distress Syndrome (ARDS)

View Set

Chapter 24-Microbe Virulence and Human Resistance

View Set

mastering biology chapter 36 review

View Set

AP EURO Chapter 21 Quizlet of Amahzingness

View Set