MANG 3778
input layer This is an example of _______________.
An Artificial Neural Network Structure
A business uses Excel for data analysis. Excel is written in C++ and C#. Who is the best candidate for the job?
An employee with 10 years experience in data analysis with Excel and good job reviews.
_______________ focused on ease of use and required a small footprint, in terms of computer resources. In addition, early versions of this language were designed to be very forgiving, i.e. the language allowed poor coding practices. As a result, a beginning programmer could write code, and see some result, which could help work to a solution.
BASIC
A blockchain database used to store documents about a product from manufacture, through shipment and storage, until it reaches the end customer ______________.
Both A and B are true
BYOD is an acronym for ______
Bring Your Own Device
The Yelp.com review site is an example of __________________.
C2C e-Commerce
4 wires What type of cable is this?
Cat 5/5e
______________ computer network cables have separators to reduce interference and can carry data at rates exceeding a gigabit per second.
Cat 6
_________________ cables use twisted pairs of copper wires.
Cat 6
The world wide web was first created at the ________________.
Center for Nuclear Research (CERN)
black brown white wire. What type of cable is this?
Coaxial Cable
The Federal Communications Commission was created under the __________________
Communications Act of 1934
_________ is the art of disguising a message and making it unreadable by anyone other than the intended receiver.
Cryptography
The CREATE, DROP, ALTER, and RENAME commands in SQL are ___________ commands.
DDL (Data Definition language)
This is an example of __________________ on a webpage.
DHTML
___________________ creates dynamic web pages with features like drop down menus and calendars.
DHTML
This new technology, currently in its infancy, promises vastly improved data storage capability.
DNA storage
The most recent standard for cable modems is ________________.
DOCSIS 3.0
When a user types www.uno.edu in a browser address bar, the _______________ maps it to an IP addresses.
Domain name system
A business introduces new IT in the enterprise. Employees are trained on the new IT system in a university run two-week program. The following statements are true.
Employee fluency is gained over time and it may take years before all employees are fluent in the IT system.
(looks like an application )This is an example of a distributed database file
False
A business has a unique business model and there is no good software which meets the needs of the organization. The most suitable cloud model for the company is Software as a Service.
False
A music recording is digitized in two formats. Format A uses 22,000 samples per second and 16 bits, while format B uses 44,000 samples per second and 32 bits.
Format B is a better quality recording than format A.
The service step after the customer places the order and makes payment is __________________.
Fulfillment
<li><a This is an example of _____________________
HTML
The ______________________ is a committee of the IETF. It provides architectural oversight of protocols and procedures used on the net and is responsible for editing the RFCs.
IAB (internet architecture board)
The dashboard of an EIS typically displays ________________ for the organization.
Key Performance Indicators
______ is a popular open source operating system
Linux
A ______________ is an attack in which the malicious code waits for a particular event or time before unleashing its malicious action.
Logic Bomb
A business with operations in two buildings a block apart connects computers using wired networks in each building, and the two building networks connected by a microwave link which goes over city streets. This is an example of a _________________.
MAN
MAC address stands for ______ address.
Media Access Control
A large IT project with one year timeline is managed using the SDLC. The project requirements change after six months.
Mid-course corrections are expensive with the SDLC.
If you do not want a page posted on a website to be tracked by search engines, a meta tag for search engine robots is entered with the term _______________.
NOINDEX
SELECT * from Customer where CustID = 10 is an example of __________________.
SQL
The common language used to interact with a RDBMS is called _________________
SQL
Microsoft's Office 360 is an example of __________________.
SaaS
(looks like excel file 2 rows) This is an example of data.
True
A blockchain database can grow very large over time as new blocks are added.
True
A core function of a business plays a major role in the customer's choice.
True
A popular early architecture for the ANN used a three layer architecture.
True
The primary key value for each record (row) in a table is unique.
True
The unique address for a document on the web is called its _____________.
URL
_______ means that an information system is available at all times and at all locations.
Ubiquity
Bluetooth connections are typically made over a distance of a ___________________.
a few meters.
A business has used an ES for many years. The reasons for a business switching from to another ES include _____________
a, b, and c
A local bank with the name NOLABANK has operated in town for many years. You have a bad experience with the bank and set up a blog site to complain about the bank. You do not sell any banking services and it is clear that it is a gripe site. The following sites are legal and do not violate the Anti Cybersquatting Act.
a, b, and c
The CPU performs the ________________________.
a, b, and c
The following are examples of Knowledge Management tools.
a, b, and c
The pitfalls of outsourcing IT are _________________.
a, b, and c
One feature of cloud computing is the ____________________.
ability to quickly adjust the level of resource purchased from the cloud services provider.
As we become more dependent of information systems in the workplace, information systems ________________ becomes more critical to good performance.
accuracy
When a new transaction is conducted, a blockchain database ______________________.
adds a new block of data, stamped with the time and other metadata. Old blocks are never deleted.
Two ANNs can be set up to play chess against each other, or trade stocks with one another, learning from failure/success to get better over time. This type of unsupervised learning is termed a generative ______ network.
adversarial
A computer program can interpret the emotional state of the user using facial expressions and voice analysis. This is termed ____________ computing
affective
A computer system which can capture facial expressions and detect emotional state is called an ______ computing system.
affective
Open source code is free. However there are reasons a business may choose proprietary systems over free open source. These include ___________.
all of the above
3 graphs & 3 circles This is an example of _______________.
an Executive Information System Dashboard
colorful circle This is an example of _______________.
an Executive Information System Dashboard, None of the other choices
This image shows the ________________.
an OLAP cube for business data
The loss of signal power as it travels through a communication channel is termed ______
attenuation
_______________ refers to the identification of the user by the IT system.
authentication
A student using Moodle can only view grades and not change them. This is an example of system ___________________.
authorization
Webvan failed in its e-business model since __________________
automated warehouse technology was very expensive in 2000 and grocery customers were price sensitive.
A clinic's medical records are securely stored. The system is down and users are unable to access the data. This is a problem with system _______________.
availability
A __________________ topology for networks uses one main communications highway to transmit data. The devices are connected to a linear network segment.
bus
The DSS presents options to the decision maker in a decision impelling format during the __________ phase of decision making.
choice.
Bitcoin miners, use powerful ____ to be the first to generate the next new key in the process
computers
Encryption is used to ensure IT system ______________
confidentiality
A small text file with unique ID tags stored in a web browser to customize site visits is termed a ______
cookie
______ is the interference from signals in one wire, impacting signals in another adjacent wire.
crosstalk
One special feature of M-commerce is the use of _________________.
customer location
C2C stands for ______ e-Commerce
customer to customer
The website nissan.com is an example of _____________________.
cyber squatting
The person in charge of the business database is called the
dba
The part of the web that is not indexed by search engines is called the ________________.
deep web
FTP is used to transfer large files on the net. FTP stands for ______ transfer protocol.
file
________________ are very simple DSS models that merely present data in an organized format.
file drawer
The three layer Artificial Neural Network has a input layer, a ______ layer, and a output layer.
hidden
In cell phone networks, each tower's range is a cell and multiple cells create a ____________ network.
honeycomb like
HTML stands for ______ Markup Language.
hypertext
A computer has a DRAM with a capacity of 8 GB. If there is a power loss to the DRAM device for just one second, the data _____________________.
in the DRAM is lost for ever.
One reason for a business to outsource IT is _________________________.
increased costs of operating in-house IT.
A large table with millions of records is ________ for quick data retrieval.
indexed
An expert system has thousands of rules. The ________________ is a tool used by the expert system to work through the rules in a optimal manner and reach a decision.
inference engine
______________ refers to the accuracy of information resources within an organization.
integrity
An EIS primarily support the ______ phase of decision making.
intelligence
A computer has an EPROM with 256 MB capacity. If there is a power loss to the EPROM device for just one second, the data _____________________.
is not deleted because a EPROM does not need electrical power to retain data. It can be read once power is restored
Some of the features of a DBMS are:
it stores, modifies, and extracts data from a database
A language commonly used to create DHTML web pages is ______
javascript
A business establishes a policy to automatically block and delete words and phrases deemed insulting from corporate chat sessions. The policy is clearly communicated to all employees. This policy is ______________
legal and permitted by law
The HTTP protocol is _______________ the HTTPS protocol.
less secure than
One problem with open source software is that open source programs are _____.
less user friendly
The Privacy Act of 1974 _____________________________.
limits data collection by US Federal Government Agencies
A hotel reservation system is expected to handle 20,000 reservations, and changes/cancellations made to all hotel properties managed by the chain each day. A test is performed on the system simulating 20,000 transactions in a 24 hour period. This is a ______ test.
load
Strava, a health and fitness app, published the jogging tracks of device users all over the world. This is a example of ______________.
location awareness
reservation - make - customer This is a example of a __________ .
logical database diagram
The overall team leader for a Scrum software development project is called the scrum ______
master
Fuzzy systems use _____________ and allow the system to be in two states at the same time.
membership function
Data about data is called _________
metadata
M-commerce stands for _______________ commerce.
mobile
Modem is a contraction of two words. Enter either one of the two words in your answer. ______
modulation
One of the benefits of a DSS is __________________.
more alternatives are evaluated and a more effective decision is reached.
the term ______ refers to the circuit board on which all the components of a computer are mounted/connected.
motherboard
One feature of data quality is "completeness". A database which has this feature ___________________.
must contain all the necessary data
The code written in a programming language like C is termed object code.
mysql
The person in charge of the database for a business is called the ____________.
none of the other choices.
An individual in Spain demanded that Google not display data related to an old tax auction in a Google search of his name. This demand to remove old data is related to an individual's right to ________________. (choose the best fit).
obscurity
System feasibility studies evaluate the economic, technical, and ______ feasibility of an IT system.
operational
A major bank is required to comply with new Federal Reserve reporting guidelines for a financial stress test within three months. The IT department estimates it will take six months to develop the necessary software in-house. The project faces problems with _______________.
operational feasibility
Internet backbones use __________________.
optic fibers with capacities in the range of 100's of Gbps.
The code written in a higher-level language is called the ______ code, while the machine code is called the object code.
source
Programmers refer to code that has been modified many times as " ______ code", since the code logic is difficult to trace for later modifications.
spaghetti
______ refers to unsolicited e-mail, typically sent for advertising purposes.
spam
A __________________ topology for networks connects all the devices to a central node, directly. The central node manages communication and sequentially addresses the devices.
star
______ feasibility assessment evaluates the risk to the project from a failure of innovative technology used in the project.
technical
When an employee works at home and connects to the office system through the internet, it is called ______
telecommuting
A clothing store states it will not sell customer data in its business contract. It collects data about customer purchases and clothes sizes. Later, it sells this customer data.
the customer can sue the business for a civil claim for damages
A cookie is stored on _________________
the user's computer
A DSS is poorly designed with little user input. It forces managers to take decisions they do not like. They will ____________.
they will avoid using the DSS or manipulate the inputs to the system to get desired results
US BLS Data shows that e-commerce sales grew in 2018 at _________ the overall retail industry sales.
three times the growth rate
Two business agree to conduct transactions online with exchange of data between their computer systems in a B2B exchange. The document that details the agreement for transactions conducted online is termed the ______ agreement.
trading partner
It is often necessary to transfer data from one system to another. In these scenarios, data is extracted from one database, and re-entered into another database. This process is termed extraction _________ loading (ETL).
transformation
GPT-3 is an AI model capable of understanding and preforming instructions given in natural language. GPT stands for generative pre-trained ______
transformer
Data costs are a component of IT systems cost.
true
Obscurity is not protected by law in the US.
true
The Quality of Service terms in an IT outsourcing contract specify the percentage of time that the IT system should be available for use and defines an acceptable level as 99.999%. This is the ________________ of the system required by the contract.
uptime
A business implements an ES provided by the vendor, without any changes. This is called a ______ implementation.
vanilla
A business VPN's traffic may travel on the same fiber optic backbone as public net traffic, but can be kept separate from public traffic at the ISPs routers, and may even always be routed on the ISPs own backbones, ensuring a trusted delivery network. VPN stands for ______
virtual private network
Nausea and even seizures are one of possible side effects of ________________ technology
virtual reality
VR technologies create a real-world like environment on a computer. VR stands for ______
virtual reality
Server ______ is a technology that enables the software image of a machine to function within another machine.
virtualization
A business needs to build a database for its IT system. The first step in determining the data structure for the business database is deciding ______________
what data business needs to collect.
Economic feasibility considers whether the IT system is financially beneficial. One approach is the payback period, __________________
which is the ratio of the total cost of the IT system to the annual financial benefits from using the IT system.
_____________ are used for penetration testing by a business.
white hat hackers
A WAN is a ______________ network.
wide area
Each TCP packet has a header _______________________.
with the destination IP address and the source IP address.
A ____________ travels from computer to computer in a network and consumes resources but does not usually erase data.
worm
An online ad is displayed 5000 times a day. The ad is clicked 100 times. The CPM rate is $ 10, and the CPC rate is $ 0.10 The charge for this ad for one day is _____________.
$60
An online ad is displayed 6000 times a day. The CPM rate is $ 10. The charge for this ad for one day is _____________.
$60
Compare these options based on security. (i) Data is stored in a small business office and backed up on tapes. (ii) Data is stored by a major SaaS provider in a Tier I data center.
(ii) is more secure than (i)
Match the file types. 1. CustomerID 2. customers > customer ID > ALFKI
1. CVS file 2. XML file
Match the following. 1. Gather the required data for analysis from multiple HDFS nodes and generate data for analysis, for example data in video is extracted by customer sentiment 2. Gathers together similar/related pieces of data, for example all video of product returns to shelf 3. Perform calculations to generate useful information such as proportion of customers replacing items to shelf.
1. map 2. shuffle 3. reduce
Match the following data sizes to the scenario. 1. Data collected by a large organization such as Walmart in its customer database 2. Storage capability of personal use storage device such as a flash drive
1. petabytes 2. gigabytes
The US BLS data shows that in 2018 about ________ percent of retail sales were conducted online.
10%
GPT-3 was trained on over __________________ parameters. Choose the best answer.
175 billion
Moore's Law was first reported in _________________
1965
940 stick figure This sketch shows the Internet in ________________.
1969
An online ad is displayed 10000 times a day. The CPM rate is $ 10. The ad is clicked 200 times. The click through rate is _________________.
2%
By the time the manufacturing process (in 2016) is complete, the CPU may have over ______________ etched one on top of the other, separated by insulating layers.
20 layers
Breaking a cryptography coding scheme with a _________ bit key poses a challenge today, with a single high-end desktop taking about 6.4 quadrillion (that is 6.4 thousand trillion) years of work to break the code.
2048
The technical limit of the total number of bitcoins is __________________.
21 million
The FCC definition of broadband in 2015 is ____________
25 Mbps downstream and 3 Mbps upstream.
CPU manufacturing technology (in 2016) has advanced to the point at which nearly ______ million transistors can be etched on the area about the size of head of a pin.
30
The complete view of a customer's transactions with the business and demographics about the customer is termed the ____________________
360 degree view
The MAC address for a network card has ________________.
48 bits
A digital transmission line has a bandwidth of 50 Gbps. This means it has a speed of ________________.
50 billion bits per second.
A network link is rated at 6 million bits per second. This is written as ___________.
6 Mbps
In 2018, Intel's processor technology made devices that were 14 nanometers in size. About ______________ devices of this size can fit in the width of human hair.
6,000
A DRAM has a capacity of 8GB. This is _________________.
8 billion bytes
Where do you attache the wired computer network cable?
A
When calculating the cost of acquiring an IT system, the following costs must be included to get a true picture of system cost.
A and B
Reasons for implementing a new enterprise system in a business that already has an enterprise system include _______________
A and B are true
Spotify does the following to develop a taste profile for each customer in its collaborative filtering algorithm
A and B only
Device A is described as having a response time of 100 pico seconds. Device B is described as having a response time of 1 nano seconds.
A has a smaller response time than B
The map shows the cables managed by Century Link, a major ISP. The following statements are true.
A, B, and C are all True
When a media file (for example, a book) is digitized, it can be ________________.
A, B, and C are all true
The database used for enterprise systems _________________.
A, B, and C are true
A program compares the value of current inventory (500 units) with the re-order point (750 units) and places a new inventory order if the current inventory is below the re-order point. This comparison is performed in the ________________.
ALU of the CPU
Two numbers are added to get a result. The addition operation is performed by the ____________.
ALU of the CPU
You visit websites from your office computer. Your activities on the internet are recorded in _______________.
All of the above
The ride sharing service Uber can be best classified as _____________ e-Commerce model.
C2C
A business sets up a wired computer network linking 10 computers in an office to a internet router/gateway. The distances between the devices range from 10 to 50 meters. The building attenuates wi-fi signals and wi-fi is not feasible. The office has standard desktop computers. The preferred type of cable for the wired link is __________________.
CAT 5
A major focus of a/an/the _____________ is an immersive experience where the user gets "inside" the environment.
CAVE
______ , designed in 1959, and was the primary programming language for business and government applications. Even today, while new applications are developed in other languages, much of the infrastructure, depends on code written in this language.
COBOL
_____________, is a procedural programming language that is very widely used in business code development. It has been the lingua franca of business computing, and one estimate puts the total code in this computer language worldwide at over 200 billion lines
COBOL
The ________________ is the brain of the computer.
CPU
The ____________ focuses on implementing and managing the technology, and is technically competent in the primary technology areas of business IT.
CTO
Barry Schwartz, in his book "The Paradox of Choice: argues that __________________.
Consumers faced with too many choices faced greater decision anxiety and performed poorly in decision making tasks
______________ refers to the use of automated tools to discover patterns and relationships in large datasets.
Data Mining
_________ is the conversion of data from other formats into a binary format, i.e. a language with two characters.
Digitization
A dashboard with key performance indicators is a common feature of ___________________.
Executive Information System
A business decision is very critical and should not have an error. The best AI technology in this case is ___________________.
Expert System
The inference engine is a part of a/an ____________________
Expert System
Studies have shown that programmers often get stuck on a coding problem and waste a lot of time while working on the stalled line of code. In addition, errors often creep into code leading to problems later on. The use of a second programmer, looking over the primary coder's work, and suggesting improvements, i.e. the use of "a second set of eyes", helps clean up the code and ease the rough patches in program development. Pair programming is used in ___________________.
Extreme Programming (XP)
A business rushes to acquire new technology for data mining since its competitors are in the process of acquiring this technology, before ensuring that it has adequate reliable data. The results do not provide meaningful insight into customer preferences. This is an example of scope and feature creep leading to project failure.
False
A comma separated value (CSV) file is an XML file.
False
A nanometer is a trillionth of a meter.
False
A new trend in business IT use is the decreasing use of personal computing devices, such as smartphones to access business IT systems.
False
An OLAP data cube is recalculated from the source data each time a manager queries the cube.
False
An expert system is designed to work effectively in a wide range of fields of expertise.
False
At present (2016) leading edge computers have CPUs with 8 bit architectures.
False
B2B sites set up independent promoters have been very successful.
False
In 2019, computer chip technology has advanced to the point that leading edge devices from Apple, Qualcomm and AMD use 70 nano-meter technology.
False
It is more difficult to search through digitized data than to search through analog data.
False
One definition of a database is "a collection of information organized in a schema or data hierarchy"
False
One new approach to produce future 7 nanometer computer chips is 5G technology.
False
Quantum computing uses nanos which can be one, a zero, or something else, all at the same time.
False
Since information technology is stable and not improving much, it is important for business to understand how to use IT.
False
The products table has a foreign key for suppliers who supply the product. Each supplier supplies many products. The values in this foreign key column are unique.
False
USB cables have a recommended maximum length of 100 meters due to attenuation in cables.
False
Electronic voting tools are a common part of a _________________.
GDSS
A popular standard to encode and compress video streams for transmission over the net is _______________.
H.264
A business collects different types of data such as alphanumeric data from cash register transactions, text comments from social media, video from store cameras, and location data from cell phone apps. Data form these sources is stored in different formats on separate databases. The __________ distributed file system manages data storage in multiple machines in different formats.
Hadoop
Your business needs to store a Terabyte of data on a backup device. The backup will be retrieved about a dozen times in a year. The recommended storage device is ___________.
Hard drive
____________ costs have decreased significantly (IT price/performance ratio changes), and are a very small part of IT system cost nowadays.
Hardware
The clock speed of a CPU is expressed in _________________.
Hertz
The agency that assigns IP address is _______________.
ICANN
The community of network designers, operators, equipment vendors and researchers who are concerned with Internet technology standards is the _______________.
IETF
Routers read the destination _____________ and direct the packet on the internet.
IP address
172 This is an example of a _________________.
IPv4 Address
2002 This is an example of a _________________.
IPv6 Address
When IT is outsourced, there are benefits when the _______________gains economies of scale.
IT services provider
The following statement is true about artificial neural networks.
If the value of the inputs to a neuron from the inter-connections exceeds the threshold level, it triggers an output to the next level
(colorful pie) What is this? Choose the best answer.
Information
Amazon's EC2 instances are an example of __________________.
Infrastructure as a Service
All the code for an IT project managed using the SDLC has been written. The next phase of the SDLC is ______________.
Integration and Testing
A popular standard to digitize and compress audio signals is _______________.
MP3, H.264
____________ argued that IT may be over-hyped , and it may be possible for most businesses to obtain IT int he manner of a utility (like electric power, water),
None of the above
A washing machine that texts you when the cycle is complete and a milk carton which can monitor the amount of milk in the carton and link to your shopping list app are examples of ____________________
None of the other choices
Click fraud occurs when _______________.
None of the other choices
The _______________ is the bridge between business IT system users and the programmers who write the code for the IT system.
None of the other choices
The data from the U.S. Census bureau shows that in 2015 e-commerce is _________ of total retail sales.
None of the other choices
_______________ is an automated approach to the transfer of data from other formats into a binary format, i.e. a language with two characters.
None of the other choices
All available IPv6 addresses were allocated in ________________
None of these choices
Data warehouses use _______________ to provide fast response to data queries on very large data-sets
OLAP
A/an ______________ pre-calculates and stores summary data, such as sales data for each customer, product, and time unit in a multi-dimensional form.
OLAP cube
Bluetooth is a popular ______________________.
PAN
One feature of ______________ is the enforcement of clear object types, in the code, which ensures that programmers need to consistently define all object types used in the code before they are used, and then use them consistently.
PASCAL
One researcher who contributed to the early development of the internet was _____________.
Paul Baran
When I open my Netflix page, I see a list of recommended movies that is unique and custom designed. This list is based on my movie viewing history and expressed preferences (up/down) votes. This approach is called ______________.
Personalization
A graphical user interface to generate structured query language queries is called __________________.
QBE
Employees in a hospital are unable to access their files since the data has been encrypted and requires a new passkey for decryption. The hospital IT administrator gets an e-mail demanding payment of $ 25,000 in bitcoin to receive the new passkey. This type of attack is termed ______
Ransomware
__________________ wrote a program in 1971 to send e-mail by linking text editor and file transfer programs. He introduced the @ between the username and the computer name, a feature that exists even today in e-mail addresses
Ray Tomlinson
The BIOS are stored in _________________.
Read only memory (often EPROMs or E-EPROMs)
The following are benefits of telecommuting to employees.
Reduced commute time to work
Consider two scenarios. (i) All employees use business owned and managed laptops, with security managed by the IT department. The business provides e-mail and file sharing tools for document exchange. (ii) Many employees use personal devices (iPads, smartphones) to check e-mail and exchange files using cloud services like GMail/Dropbox. In which scenario is the in-house IT department more likely to be outsourced?
Scenario (ii)
Daily meetings of developer teams to review work done the previous day and set the agenda for the day are a part of ____________.
Scrum
Your business need to store 10 Terabytes of data on a backup device. The backup is not likely to be accessed unless there is a legal requirement. The recommended storage device is ___________.
Tape
A health care facility uses EPIC for its enterprise system. The software is loaded on business owned computers in the data center. The most likely payment scenario is the following.
The business agrees to pay an annual license fee based on the number of system users.
A business provides all employees with clear guidelines about office computer use. One of these guidelines is that employees may not visit social networks via office wi-fi, and the penalty is termination from employment. The office firewall records packets to Facebook from local IP addresses, and managers trace it back to the employee.
The business can terminate the employee.
A business implements a new ES. The following statement is most likely to be true. Choose one.
The business does not have the implementation skills in-house. The business teams up with an ES implementation partner who has the necessary skills.
A business implements a new enterprise system. The following statement/s is/are true.
The business pays an annual license fee
The LAN for an office uses a DMZ segment. Which segment of the network in this diagram is the DMZ segment?
The green segment leading to the visiting area wifi
A hospital collects blood test results for patients and stores them in a database. The hospital network is hacked and the database is downloaded by hackers who post the data on a public website. The database was not encrypted by the hospital.
The hospital's action is a violation of HIPAA.
Storage device A has a capacity of 1000 TB. Storage device B has a capacity of 1 Peta Byte.
The two devices have the same storage capacity
In the Ethernet network, what happens when two machines send a signal at the same time?
The two signals collide causing a surge in signal strength and loss of both signals.
An programmer writes code to break encryption in the cable box to permit watching HBO without paying for the service. The programmer does not watch the channel. The programmer posts the code on a website for others to download and use on their cable boxes.
This action violates the DMCA and attracts criminal penalties.
A video is created using copyrighted star wars images and clips from star wars movies interspersed with user created video. This video creator posts it on YouTube for free viewing.
This action violates the DMCA and the video creator gets a take-down notice to remove the video. There are no criminal penalties.
A data driven website is attacked using the SQL injection error. The following statement is true.
This approach is used by script kiddies to attack poorly protected databases.
A business, such as Verizon, which operates its internet backbones is called a ________________ internet provider.
Tier 1
A/An ________________ agreement is the document by which participants in an online B2B exchange agree to honor future online deals.
Trading Partner
Cookies are used by websites to link page requests since HTTP is a stateless protocol in which each request is independent of earlier requests.
True
Digital healthcare records in the US should be strongly encrypted and shared only with authorized individuals.
True
E-commerce fulfillment is simpler for media products than for physical (tangible) products.
True
In a carbon nanotube the atoms of carbon are arranged in a special structure resembling a tube.
True
It is more difficult to retain existing customers in a B2C retail e-commerce site than in a real-world retail store.
True
One of the major goals of service oriented architecture is the re-use of code modules by many IT systems.
True
The code provided to the customer who purchases a copy of MS-Office on DVD is the object code.
True
The network topology refers to the way in which the different elements of a computer network are interconnected
True
The video lecture on Moodle is a digitized media file
True
Among the most well-known versions of the ______ operating system are the popular open-source OS, Linux, and Apple's desktop/laptop OS, OS/X.
UNIX
A trading partner agreement for a shipment has text in two languages, English and Chinese. The ________ coding standard can be used to digitize this document.
Unicode (UTF-16)
In the SWIFT system-Bangladesh national Bank case attackers evaded detection of unauthorized money transfers by ____________________.
Using malware that altered money transfer reports to coverup the transfers
A business needs to connect offices in New Orleans, Baton Rouge, Houston, Dallas, and Atlanta. The computer network required to link these offices is a ________________.
WAN
The ES/ERP implementation at _____________ ran into problems because the business processes in different units were not consistent.
Washington State Community Colleges
________________ provides an insight into the technology culture, and provides an interesting insight into the impact of technology on our lives.
Wired
The __________________ standard is widely used by many different IT systems, and is a universal standard for data transfer using markup tags which create self-describing data files.
XML
Customer ratings of products or movies follow ________________ .
a J shaped curve with few low ratings and many high ratings
ES are customized due to _____________________.
a and b
The following are pitfalls of tele-communting
a and b
The following are pitfalls of tele-communting.
a and b
The weblog file shows ___________________.
a and b
These modules are part of the extensions to an enterprise system
a and b
The following are examples of knowledge management tools
a and b, not c
The following statements are true for an EIS
a and c, not b
data_data. This image shows a ________________.
a star schema for a business database
Users get to see and evaluate the performance of the code in agile development ________________.
after the completion of each phase of the project
A vinyl music album is an ______________ recording.
analog
________________ process the data using a computational process and provide estimates of the outcome of a decision.
analytical models
After data has been gathered for collaborative filtering, it is then _______________________.
analyzed using automated tools to generate user profiles, groups of users having similar preferences and demographics.
A very popular, open-source web server software to operate websites is ______
apache
Enterprise systems have an interface that can be used to change the coded business process. This is called the enterprise system's ______ programming interface (API).
application
One part of the CPU, the ALU performs ______ and logical calculations.
arithmetic
A mnemonic ADD is used for a 32 bit sequence of 1's and 0's instruction to the CPU. This is used in _____________ language.
assembly
A bank uses an ES from SAP, a major ES vendor. The bank customizes processes coded in the ES. The following statements are correct.
b and c only, not a
In James Surowiecki's book, the Wisdom of Crowds, it is argued that high quality decisions can be reached by crowds when certain conditions are met. These conditions include _______________.
b and c, not a
A business would prefer to use open source software in __________________.
back end operations where few staff directly interact with the software
A programming routine built into a system to bypass system security and enter the system is called a/an ___________________.
backdoor
BIOS stands for ______ input-output system and are read when the computer is started.
basic
A newly developed IT system is provided free to select customers who are asked to test it and provide feedback. This is a _______________.
beta test
Many high-end smartphones use a fingerprint scanner to authenticate users. This is an example of ______
biometric
Network bandwidth is expressed in ______ per second.
bits
Individuals with information technology skills who break into systems for malicious purposes such as extortion are termed ____________.
black hat hackers
Intelligent agents capable of reasoning and interacting with other programs and humans are called ______
bot
Attacks on a information system often focus on poorly written code in the system. One common error is a ______ overflow, which occurs when a program mishandles excess data entered by the user and writes it in prohibited areas of computer memory.
buffer
CASE tools are used to speed up and improve the coding process. Features of CASE include _____.
business modeling tools to model business processes
B2C stands for ______ e-commerce
business to consumer
QBE stands for Query _______
by example
The approach used by Java is to split the compilation into two steps. The source code for an application is written by the coder and is translated into a compact format called ______ . The machine has a Java Virtual Machine (JVM), a compiler that reads this code and quickly converts it into compiled machine code.
bytecode
______ cables used in computer networking have separators to reduce interference and can carry data at rates exceeding a Gbps.
cat 6
A laptop is advertised as having an Intel i7 CPU. CPU stands for______ processing unit.
central
Supply ______ management (SCM) software manages product, information, and financial flows between the enterprise and its numerous business partners.
chain
supply ______ management (SCM) software manages product, information, and financial flows between the enterprise and its numerous business partners.
chain
When compared to main memory, auxiliary memory is _______________.
cheaper, slower and not volatile
The Ethernet protocol for communication, popular in bus networks, uses CSMA-CD. This stands for carrier sense multiple access with ______ detection.
collision
A programmer writes code in C. The code is converted to machine language that can run on a windows laptop. This process is termed ________________.
compilation
A ______ is a program that can translate code written in some other language into machine code for the CPU.
compiler
A wired computer network connection is unreliable and signals are not transmitted effectively. The most likely cause of the problem is ____________________.
damage close to the end of the cable or to the network connection socket in the computer
the term ______ , refers to sites that exist on private networks, and which do not use standard internet protocols.
darkweb
Sales transactions completed each day are collected by the PoS system and stored in a database. This is an example of ________________.
data
Computer hardware has seen a rapid improvement in performance accompanied by a steady decline in prices over the past five decades. This progress has been documented in Moore's law. Because of this ongoing improvement, the share of hardware, in the investment required for a business information system, has ________ over time.
decreased
What should an expert system do when it reaches the limits of its knowledge? For example, when a tax expert system reaches the limits of its knowledge it should ______
degrade gracefully
Radio is streamed on iHeart Radio, television is streamed on Hulu, and newspapers like the Wall Street Journal are delivered online through the internet connection.. When all forms of media are delivered over the same channel is is termed ______
digital convergence
City hall lists job openings in a website. People who do not have web-access face difficulties in learning about and applying for jobs. This is an example of the ______
digital divide
The ______ refers to the challenges faced by people who either cannot afford, or lack the skills, to effectively navigate the net-enhanced environment.
digital divide
One major cause of the showrooming problem is ______________
digitization of price and product feature data which makes it easily searchable for customers
The case of the San Francisco network and Terry Childs shows the risk IT systems face from _____________.
disgruntled current employees
Clayton Christenson argues that a ______ technology fundamentally alters the underlying business model and creates new markets and value networks.
disruptive
The _______ database is contained on many files, and the files are not all managed by a single CPU.
distributed
Moore's Law states that the number of transistors per square inch on a microchip ________ every two years.
doubles
DHTML stands for ______ hyper text markup language.
dynamic
__________________ is the digital enabling of transactions and processes within a firm and between partners.
e-Business
__________________ is the digital enabling of commercial transactions.
e-Commerce
HDFS stores data in many machines.
each computer used is called a node, and a collection of nodes to store files is called a cluster.
Obscurity is impacted the most by ________________________.
ease of searching through digitized of data
A bank uses IT to reduce the need for tellers at the counter. This is an example of using IT for ___________.
efficiency
______ systems (ES) are integrated information systems that collect and process data from all parts of an organization.
enterprise
______ refers to the use of B2B technology with a focus on streamlining the purchasing process in a large organization.
eprocurement
Work posture is another issue, and employees who spend the entire workday seated in a fixed position at a desk suffer a variety of problems ranging from neck and back problems to cardiac health issues. Well- designed and positioned monitors, chairs, desks, and designated breaks are part of ______ workplace design.
ergonomic
The ______ protocol for communication is widely used in bus topologies. It is described as a CSMA-CD system.
ethernet
The clearly defined rules, i.e., formal written procedures for business operation are ____________.
explicit knowledge
XML stands for ________ markup language.
extensible
#Fileds : data time action protocol src-ip This is an example of a CSV file.
false
(A-L excel file) his is an example of knowledge.
false
A B2B system is developed to link a retailer with a trucking company making deliveries. User input has been acquired from employees in the retail store (store clerks, managers, warehouse employees). No additional user input is required.
false
A CAVE (cave automatic virtual environment) uses rich video communication to bring a remote site to the user, and take the user to a remote site.
false
A business converts operations from one ES to a different ES. Data transfer is a trivial process since both enterprise systems use a RDBMS.
false
A business creates a website to sell its products. Since the sales are conducted online, the business does not provide any staff for online sales support. This is an effective business model.
false
A business has a project underway to modify the information system. The manager of the business process should understand coding and the overall IT system works and instruct programmers in developing code for the system.
false
A business implements new enterprise systems frequently.
false
A business plans to use software for human resource management to automate employee recruitment and retention programs. In this scenario, business software is typically purchased for a flat, fixed cost with no additional ongoing payments.
false
A business purchases a firewall to protect its network. The business can install it and it automatically protects the network.
false
A business purchases a large list of email addresses and sends an e-mail selling cheap stock in a risky new dot.com venture. The IP address and sender address are correct, and there is an unsubscribe button which works. The header of the email is "Your monthly retirement account statement". The mail is legal under CAN_SPAM.
false
A cable company transmits ten channels of information on a single coaxial cable, with each channel using 25 Mhz. This coaxial cable uses broadband communication based on the technical definition of broadband.
false
A car rental company installs a GPS in its cars. The GPS system is linked to the main office to provide data on vehicle location every five minutes. You rent a vehicle and drive on the Interstate. The GPS location shows the vehicle covered a distance of 7 miles in five minutes, which translates to a speed of 84 miles per hour. The contract states that you will be issued a speeding violation charge of $ 100 if your exceed posted speed limits by ten miles, and the charge applied to your credit card. The charge is added to your credit card each time this violation is recorded, and you realize this only when your card is refused at a gas station. This type of intrusive monitoring is illegal.
false
A carpet manufacturer opens a showroom to display the types of carpets produced. The store is not designed to sell items. This is an example of the showrooming effect in e-commerce.
false
A commodity function of a business should be customized in an enterprise system.
false
A firewall is designed to protect the IT systems of the business in the event of a disaster, such as a fire.
false
A meta tag to prevent search engines from indexing a page on a site will prevent malware from reading the web page.
false
A neural network has an explanation feature that explains why it reached its solution.
false
A promoter has a highly innovative project which uses quantum technology. This is a suitable project for crowdfunding.
false
A provider of IT outsourcing services will find it more difficult to recruit and retain skilled IT staff than a business operating its own IT.
false
A store sets up a website where customers can browse the inventory and purchase products online. The site gathers customer requirements by observing customer behavior on the site and uses it to customize the site for each customer. This is an example of ubiquity in e-commerce.
false
A visit is a user action on one element of the webpage displayed on the user.
false
A web address is written as https://uno.mrooms3.net/course/view.php?id=48696. Moodle uses a LINUX server. The case of the text (upper/lower case) does not matter.
false
A website used CAPTCHA which requires the user to type in the text in an image. CAPTCHA is used to identify the user.
false
All enterprise systems use a common API for making modifications to the system.
false
Amazon is an online retail giant. Its growth is an example of the network effect.
false
An EIS acquires knowledge from experts and runs on autopilot.
false
An IPv6 address is 32 bits long
false
An IS used by an insurance company has accurate data. The company merges with another insurance company. Data is transferred to the IS used by the new business. Since the original data was accurate, we can be confident that the new data is also accurate.
false
An artificial neural network contains about 100 billion biological neurons.
false
An artificial neural network starts out with a perfect system and gracefully degrades as errors creep into the system during the learning/training process
false
An e-prescription system which transfers prescriptions from a doctor's office to the pharmacist is an example of CRM.
false
Apple's iOS is an open source product.
false
As a result of competition from new startups, technological enhancements, demographic changes, and global competition management has even more time to focus on commodity functions.
false
At present there is one dominant blockchain technology in use and most businesses use the standard blockchain technology.
false
B2C e-commerce is a model in which bit-torrent software is widely used.
false
Bitcoin values have been consistent and held value over time. They provide a stable alternate currency for global trade (in 2017).
false
COBOL language coders need to be aware of the registers, ALU, and control unit features of the CPU.
false
Collaborative Filtering starts with skilled staff who filter from a vast array of choices, and present a limited selection to customers.
false
Collaborative Filtering tools are more successful when there are few users.
false
Core functions which are technically simple, and well understood by top management, are good candidates for outsourcing.
false
Corporate data centers have thousands of desktop machines stacked in closely packed racks.
false
Customers visiting e-commerce websites like popups and pop-unders on the website.
false
Data generated from devices which are part of an Internet of Things has little immediate value and only gains value after a long time has elapsed.
false
Data is captured by an automated system. There is one small error in the transaction price. This does not matter because information systems have become better as a result of Moore's Law and can correct the error.
false
Digitization of license place images captured by cameras on highways enhances individual privacy.
false
Due to the changes in performance to price ratio of hardware, described by Moore's law a business manager needs to spend more time on the hardware decision for IT.
false
Enterprise systems for each department function within their functional silos. Data transfer between systems is difficult.
false
Enterprise systems use independent databases for each part of the organization
false
Excel code is developed using computer languages such as C++ and C#(C sharp). A business advertises for an employee with Excel skills. The employee must have competence in C++ and C# (C sharp).
false
GPT-3 is a massive expert systems with billions of rules provided by experts from around the world.
false
Good user training helps protect a business from program backdoor exploits.
false
Groupthink occurs when a group is new, and meets together for the first time.
false
In SDLC projects are developed with short cycles, with the output of each cycle delivered to users for comments. The comments are incorporated into the next design cycle. This iterative process is used in SDLC.
false
In a crowdfunding model, a venture capitalist gathers a pool of investors and recommends an investment.
false
In the Target hacking case of Dec 2013, attackers acquired the data from a stolen laptop.
false
In the dispute (February 2016) between Apple and the FBI, the FBI wants Apple to hand over the password of the cell phone owner, accused of a terror attack.
false
It is easier to train senior managers than to train entry level users in using a new IT system.
false
John works in a job which does not change much. John can do the job on his own, without assistance from others. John's job is not suitable for telecommuting.
false
Low-code development platforms are suitable for developing all types of software including unique and highly customized software.
false
MAC addresses are used globally to identify the machine visiting a website.
false
Managers find it easy to manage tele-commuting employees.
false
Much of the content on the deep web is related to illegal activity.
false
Near field communication is a technology that supports the search and selection step of the e-commerce service cycle.
false
One major problem with enterprise systems is that they often lack state-of-the-art business processes for the organization.
false
One of the first online merchants was Amazon on AOL in 1991
false
One reason for the Y2K problem was that businesses needed to include one additional day for the year 2000
false
Routers read the source IP address and direct the packet on the network.
false
SCM systems scoop up vast troves of data about customer behavior.
false
SDLC is useful in the case of projects which are new and innovative and not clearly understood by the user community.
false
Spyware programs are typically benign and merely present ads for many other sites.
false
The Intrado 911 call center software problem occurred because of enterprise system implementation delays.
false
The WIMP(Windows, Icons, Menus, Pointers) interface is very suitable for portable devices such as smartphones.
false
The click through rate is the number of times an ad is viewed by user who visit the website.
false
The connection weights in an ANN are provided by a human expert.
false
The current (2016 Spring) version of Moodle uses two-factor authentication
false
The difference between a virus and a Trojan attack is that a virus is hidden within another program while the Trojan attack is open and direct.
false
The domain name for a website can only be in ASCII characters.
false
The first graphic user interface web browser was LYNX from the University of Kansas.
false
The hackers who broke into Target's IT systems in Dec 2013 used very sophisticated hacking techniques.
false
The last mile problem is greater for the media B2C model than the retail store B2C model.
false
The major problem in building a successful knowledge management system is the lack of good tools for knowledge management.
false
The massive boom and big bust in e commerce business models in 2000 is a phenomenon that is unique to the e-commerce industry at that time and has not happened earlier and is not likely to be repeated again.
false
The parallel approach to implementation is inexpensive and risky.
false
The silicon in sand is purified in multiple steps to obtain very high purity silicon, typically with around one part per thousand of impurities.
false
The structure of the data is determined after the data is stored in the database.
false
The training process for ANNs uses if-then rules.
false
There are many sensors collecting data about customer behavior. The challenge for a business is to store all the data collected by sensors.
false
There are two IT projects under development in the business. The first deals with an enterprise system update and is a multi-million dollar project. The CIO monitors the project closely and gets daily updates from the project managers. The second deals with website enhancement to work on mobile and wearable devices. This involves a 500 thousand dollar investment. The CIO is not familiar with the project's technology and does not closely monitor the project. The enterprise system update project faces a greater chance of failure than the website enhancement project.
false
Washington State's community college ES implementation failed because of data entry errors when transferring data to the new ES/ERP.
false
Weblog files are XML files.
false
When IT is viewed as a utility that can be purchased on demand, IT becomes a fixed cost.
false
When a business acquires an enterprise system, it pays a fixed, clearly defined charge for the ES.
false
When a business needs an enterprise system it builds the system from the ground-up, in-house.
false
When a computer is turned off (powered down completely) the CPU retains all the instructions to run the system.
false
When you make a purchase at a store using a credit card, the clerk at the counter asks you to sign on the pad at the cash register. This is a digital signature.
false
You open the class sample database using MS-Access and delete a record in the products table. This is front-end access.
false
You purchase a copy of MS-Office and install it on your laptop. You make a full backup of your laptop on a backup drive. This backup has a copy of MS-Office. This is a violation of the Digital Millennium copyright Act of 1998 (DMCA)
false
Your company participates in a trading group which uses dual key encryption to securely transmit documents. Your company sends a purchase order for a million widgets to company A and another purchase order for two million widgets to company B. The private key of your company is used to generate the digital signature for the documents and is the same for both purchase orders. The digital signatures for the two purchase orders are different.
false
https://www.bing.com/search?q=Verisign The query string is bing.com.
false
A/An ______________ acts as a filter between a private network and external networks such as the internet.
firewall
The primary key in one table that appears in other tables to establish a relationship among tables is called the ___________
foreign key
______ generation languages move away from specifying procedural steps to specifying broad action classes. One example such a language is SQL (structured query language).
fourth
In coding using 3GLs, one approach used to prevent programmers from needlessly adding lines of code was to measure ______ points, where features performed by the software were counted and assigned scores.
function
The acronym, GIGO, ______, refers to the fact that bad data produces worthless results.
garbage in garbage out
Open source systems are distributed to users under a GPL. GPL stands for _________________ public license.
general
In an expert system, knowledge is expressed in the form of ______ rules.
if-then
Sales transactions completed each day are organized to help a manager compare sales for previous days (and for the same day in previous weeks), and generate a graph of the daily sales by category and day of week. This is an example of _______________________.
information
The sales of potato chips from a vendor have declined over the past two weeks. The IT system provides a chart of the decline in sales from the PoS data collected from cash registers. This is an example of _______________.
information
______ is summarized data, which is organized in a meaningful format.
information
Boo.com failed in its e-business model since __________________
internet download speeds were much slower in 2000 and the rich visuals for the site did not load quickly.
A /An _____________ looks for suspicious patterns of system access and use.
intrusion detection system
A company plans to capture business quality data in a new IT system. The development team gathers requirements from the company and develops a ______________________ of the database to represent the data used by the business and show the relationships between data items.
logical design
This is a ___________________ database diagram.
logical design
Hard drives store data using _________________.
magnetic fields on the magnetic material coated on the drive surface.
In a bank's IT system, roles such as manager, teller, and depositor are used to ________________.
manage authorization to use resources in an IT system.
Artificial Neural Networks using "deep learning" have ____________ compared to other ANNs.
many hidden layers
Video of customer actions is gathered by a store. This video is analyzed to determine specific customer actions such as "take a product", "replace item in shelf", or "linger near the item". This analysis and classification of data is carried out by the _____________ function of Hadoop.
map
a data ______ is a subset of a data warehouse and is designed to to provide analytics support for a few important problems. It is a smaller version of a data warehouse.
mart
A website for real estate incorporates Google maps and City Crime statistics from an external source in its website. This is an example of a ______
mashup
A __________________ topology is a highly interconnected network with devices linked to many other devices. This can be used to create a resilient network where the failure of a few nodes or links will not destroy the network.
mesh
Data about course registration is gathered in a file. Data about when it was extracted, the source of the data (production, development, or archival), and the application that extracted it is/are _____________.
metadata
The term ________ refers to data about data.
metadata
The Digital ______ Copyright Act of 1998 enforces limitations on circumventing copyright measures for digital products.
millennium
One common location for a firewall is between an internal network (LAN) and an external network such as the ______
net
An expert system is being developed for federal tax calculations. The knowledge engineers developing the expert system will seek the knowledge from __________________.
none of the above
A business backs up all its data on backup tapes.
none of the other choices
A business grows rapidly through many acquisitions. The IT systems are not integrated and are disorganized. As a result, customer addresses are stored in many different files, and often are not consistent. This is called data ___________________.
none of the other choices
A clothing store states "it is not in the business of selling customer data" in its business contract. A business transfer clause states that data about customers is one of the business assets. It collects data about customer purchases and clothes sizes. The business uses this data to market products related to customer purchases.
none of the other choices
A fashion apparel business (in 2018) plans to build a 3-D Augmented Reality website for use with new 3-D devices. This is a highly innovative technology with risks for failure. The project faces problems with _______________.
none of the other choices
A local bank with the name NOLABANK has operated in town for many years. You set up a site to direct traffic to a competing bank. The following sites are legal and do not violate the Anti Cybersquatting Act.
none of the other choices
A security problem is discovered in the code used in a company. The software vendor issues a _________________ to fix the problem.
none of the other choices
A status code of 404 in the weblog file shows that the ___________________
none of the other choices
A/an _____________________ mimics human expertise in a particular field to solve problems in a well-defined, narrow discipline.
none of the other choices
An online ad presented between two pages of a website where the user has to watch the ad (or at least a part of the ad) before proceeding to the next page is called an _______________ ad.
none of the other choices
Mt. Sinai Hospital used 700 thousand patient records to diagnose diseases. The system even predicted the onset of psychiatric disorders, a challenge for even expert doctors. This is an example of a ___________
none of the other choices
One reason for the Y2K problem was that ___________________.
none of the other choices
Sales of a product decline over the past four weeks. A manager knows that one cause is lower prices at competitors, and check competitor prices, and matches them. This is termed _________.
none of the other choices
The ES purchased by a business follows a different process from that used by the business to route sales orders. The following statements are true.
none of the other choices
The _____________________ topology refers to the way in which data flows in the network.
none of the other choices
The first step in the SDLC is ________________.
none of the other choices
The last step in the E-Commerce service cycle is _____________________.
none of the other choices
The primary revenue for B2C retail stores is ________________.
none of the other choices
The read-write head of a hard drive ________________________ surface of the hard drive.
none of the other choices
The tracks on the surface of a hard drive are __________________.
none of the other choices
You create a website for your company with a comment board where customers can post comments about your service. You edit the site to limit post length to 200 words, and use a grammar checker to automatically fix typos and grammar errors, as well as a word filter to remove objectionable terms. A customer praises your service and strongly criticizes service provided by a competitor.
none of the other choices
______________ was developed in the 1950's and has been widely used in engineering and scientific computing. A vast library of code modules have been developed in this language for scientific and engineering purposes, and the language is used for many high performance computing applications which require a lot of computing resources.
none of the other choices
www.uno.edu/Portals/8/Administration/ManagementCurriculum.pdf This is an example of _______________.
none of the other choices
A software project is developed sing Agile-Scrum. The work done by each team member the previous day is evaluated by _______________.
other members of the peer group (other team members)
A business IT system is attacked and hackers enter the system. It is suspected that data may have been stolen and changed by the hackers. The system is shut down and needs to be completely restored. When the business faces such problems _______________.
outside specialists need to be brought in on short notice, and it is expensive to fix the problem.
A hospital has an IT system to transmit test results from the lab to clinicians. The system which currently uses a formatted text file is being updated to use XML data transfer. Any failure of data transfer can be risky and catastrophic. The best approach in this case is ______________ implementation.
parallel
An RFID chip without a built in power source is called an ______.
passive RFID
A neural network is good at __________________.
pattern recognition
P2P stands for ______ e-Commerce
peer to peer
Customer satisfaction expressed in complaints per 1000 customer days is a KPI for a hotel chain. If it rises above 5, the EIS signals an alert. This type of alert is called ______ alert.
performance tracking
PAN stands for _____________ area network.
personal
When updating an e-business site, a company first rolls out a new landing page, waits to see how well it functions, and tests the site's latency and customer response, before rolling out new pages for the shopping cart and payment . This is the _____________ approach to system implementation.
phased
(before 2010) This is a example of a __________ .
physical database diagram
person ---makes payment --- This is a ___________________ database diagram.
physical design
When updating an e-business site, a company rolls out a completely re-designed new site with a new landing page,shopping cart, payment, and support pages to the customer from one city. The business tests the new site on these customers for one month and evaluates site performance. If this is successful, the site is rolled out nationwide. This is the _____________ approach to system implementation.
pilot
The field that uniquely identifies each record of a table in a RDBMS is called the _______
primary key
Program data independence refers to ________________________.
programs use data from a common, independent database
The four major ethical issues are privacy, accuracy, ______, and access.
property
The Buckley Amendment (FERPA) of 1974 _____________________________.
protects privacy of educational data such as college grades
The URL _________________________.
provides each document on the web with a unique identifier.
The two keys in a dual key system are termed the ______ and private keys.
public
The sender uses the receiver's ___________ to encrypt the message
public key
The QoS of IT services defined in an outsourcing contract refers to ______
quality of service
One technology that may provide even smaller devices in the future is ___________________.
quantum technology
RAM stands for ______ access memory.
random
RAD stands for ______ application development
rapid
A small business checks its weblogs and finds that nearly 50% of the online visitors abandon their shopping carts at the payment page. Surveys show that many customers are unwilling to enter credit data on the site. The business teams up with a large and reputed online vendor to streamline the payment process, and limit the data entered by customers to purchase products. This is an example of ________________.
reducing friction in the transaction
The CPU often has ______, which are small data storage locations used to hold intermediate values in computations.
register
The ______________________ database model uses two-dimensional tables of rows and columns of data.
relational
The links between the tables in an RDBMS are called ________________.
relationships
Many distributed database systems use an approach called _______ , where changes in one part of the database are determined periodically, and data updated in other parts of the distributed database.
replication
The knowledge collected from employees is stored in a knowledge ______ , a database containing nuggets of knowledge, organized for easy retrieval
repository
A status code of 200 in the weblog file shows that the ___________________
requested file was successfully sent to the user.
A status code of 301 in the weblog file shows that the ___________________
requested resource has been assigned a new permanent URI (resource location moved permanently)
When customers purchase products online, they may not be satisfied with the product, since they only viewed an image online and did not handle the physical product. The return process can be expensive for the online retailer. A partnership with a real-world retailer with a network of stores can help handle returns. This provides assistance with _______________.
reverse logistics
A business grants privileges on email, accounts, and the website to an employee. The employee is terminated. A ______ process is designed to quickly and efficiently terminate these privileges.
revocation
Search engine programs which scan the web to gather and index documents are called ______
robot
Routers access a small database which lists IP address ranges and where to send the packet. This is called a ______
routing table
The production process (2016) for a computer process begins with ______ (material used).
sand
________ means that the database can grow as needed by the business, without having to start all over with a new system.
scalability
______ control is to limit the project and prevent new features being added to a project before it is completed.
scope
The CSO ______ (Chief Answer Offices) is pro-active in threat deterrence and is in charge of developing the threat matrix for the firm's IT systems.
security
A business manager develops an IT system using MS-Excel and uses it to analyze staff performance for bonuses and promotion. This is an example of ______________.
self-sourcing
The manager should select a new location for a store based on a combination of quantitative (data from real estate data sets) and qualitative (subjective assessment of location aesthetics) data. This is an example of a/an ______________ decision.
semi-structured
The sender generates a hash of the document being sent. The sender signs the document by encrypting the hash using ______________.
sender's private key
______ are machines designed for use in a corporate data center and contain only the essential components. They are designed for continuous 24 by 7 use and high reliability. Servers
server
The SLA in an outsourcing contract is the ______ level agreement.
service
A ____________ cookie is only active until the user closes the browser window.
session
When a thousand customers connect their smartphones to a particular cell tower they ____________________.
share the available bandwidth of the cell tower.
A DBA goes on a two week vacation. The DBA posts this information on her Facebook account prior to departure and provides daily updates of the vacation. This opens up the business to a _________________.
social engineering attack
Salesforce offers its CRM application over the internet. This is an example of SaaS, or ______ as a service.
software
As a result of technology improvements in IT such as access to vast data stores in "big-data" storage and sophisticated analytical tools ____________.
some decisions that were semi-structured have become structured
Software companies selling valuable software retain control over their ______ code and guard it carefully.
source
An inventory manager uses a clearly defined economic order quantity formula to place new inventory orders. This is a an example of a/an ________________ decision
structured
A ____________ cookie is cannot be easily cleared from the user's browser.
super cookie
DSS stands for Decision ______ System.
support
A hotel reservation system is expected to handle 20,000 reservations, and changes/cancellations made to all hotel properties managed by the chain each day. The reservation system completes transactions with partner sites (travelocity, hotels.com) and credit card companies. A test is performed on the system simulating 20,000 transactions in a 24 hour period coming in directly from customers, though infomediary sites, and recording payments with financial service providers. This is a ______ test.
system
______ interact with business managers to develop the best systems requirements, and communicate these requirements to coders.
system analyst
All the business rules are specified, process diagrams developed and verified, and pseudo code may be written for the problem in the ______ step of the SDLC
system design
The three sub-steps of the ___________ phase of the SDLC are acceptance (with sign-offs by administrators), installation of the code, and deployment of the new IT system.
system implementation
An online retailer sells shoes. The retailer has problems with reverse logistics. One solution is to ____________________.
team up with real world stores close to the users.
Many people use Facebook because their friends use Facebook. This is an example of ___________________.
the network effect
Information systems developers need to be concerned with the impact of their systems on privacy because of ________________________.
the rapid proliferation of low-cost data capture tools
The term 360 degree view of a customer refers to _________.
the summary of all the customer's interactions and demographic data presented to the employee interacting with the customer.
Some of the problems with self-sourcing IT include _______.
the time spent by the end-user in IT development is often a hidden cost and not accounted.
Computing devices made from carbon nanotubes can be built in _______________ architectures with many layers, creating very compact, fast computers.
three-dimensional
Most bots are designed to __________________________.
travel on the internet and perform very simple tasks, repeatedly, at a rapid pace
A T3 line used for communication has a bandwidth of 45 Mbps.
true
A bit is a single binary digit (0/1) stored in a computer.
true
A blockchain database provides a public ledger of all transactions.
true
A business purchases a large list of email addresses and sends an e-mail selling cheap stock in a risky new dot.com search engine venture. The IP address and sender address are correct, and there is an unsubscribe button which works. The header of the email is "A chance to make millions in the next Google!". The mail is legal under CAN_SPAM.
true
A business sets up a GDSS room and installs GDSS software on the machines. A team meets in the GDSS room and conducts a meeting. A meeting coordinator is required to facilitate use of the GDSS.
true
A business uses MS-Windows server for its operating system, MS-SQL Server for its database, EPIC for its enterprise system and Sitefinity for its web content management system. Software costs are incurred for each layer of software.
true
A business website experiences a Denial of Service attack. This does not introduce spyware into our website.
true
A company uses RFID tags embedded in employee IDs to track employee location. All employees are made aware of the embedded tag, and the ability to track location accurately. This data is analyzed by the business to determine groups of employees who work together as part of a program to enhance group performance. This is legal under the laws we have discussed in this chapter.
true
A crowdfunding project fails to get sufficient investment. This failure provides useful information about the market.
true
A disgruntled IT employee can cause more damage to the IT system than a competent hacker.
true
A hospital uses RFID tags embedded in employee IDs to track employee location. All employees are made aware of the embedded tag, and the ability to track location accurately. This data is analyzed by the business to determine groups of employees who work together as part of a program to enhance group performance. This is legal under the laws we have discussed in this chapter.
true
A long password is more secure than a short password.
true
A network of light bulbs which can communicate with one another over a network and work with a scheduling system to turn them on or off form an Internet of Things.
true
A poorly written firewall rule can stop all traffic coming into the business network.
true
A small system is developed using Excel with pivot tables and charts to help managers analyze corporate data. This is an example of RAD.
true
A user visits a website and requests a file. The file is sent to the user. The weblog file records the size of the file delivered to the user.
true
A website requires that you upload a photograph in jpeg format. Jpeg is an acronym for joint photographic experts group.
true
A well-designed DSS can result in enhanced employee learning.
true
A well-managed SaaS provider gains economies of scale since it provides its application to many customers.
true
Alpha testing is carried out in a "laboratory" style environment by the employees of the organization.
true
An EIS uses a lot of external data about market conditions and competitor performance.
true
An ES is customized for unique business processes used by a business. A new update to the ES is rolled out a year later. The customization needs to be carefully checked and fixed if changes are needed. This is an expensive process.
true
An expert system should explain the reasoning for its conclusion.
true
B2B is larger and has greater impact than B2C models.
true
Bitcoin is a virtual currency that has presented a new approach to paying for transactions.
true
Broadcast TV signals, Microwave radiation used in ovens, Visible light and X-Rays used in medicine are all electromagnetic radiation but use different frequencies.
true
CRM can be used to deliver a highly personalized experience to each customer.
true
Cat 6 computer network cables have a recommended maximum length of 100 meters.
true
Configurators are needed in a website that allows customers to design their own products/services.
true
Crowd-funding can serve as a promotion platform since potential customers are made aware of the project.
true
Custom IT systems are required for highly innovative business ventures.
true
Customers visiting online retail stores are highly price sensitive and seek the lowest price online.
true
E-commerce fulfillment is simpler for media products than for physical (tangible) products
true
Enterprise systems are developed for a class of businesses, for example, a banking enterprise system for medium-sized regional banks, a clinic management system for dental clinics, or a university registration and payroll system for universities.
true
Enterprise systems use a common enterprise-wide relational database, often containing thousands of tables.
true
Expert systems are often used to train people in a discipline.
true
Extended ASCII coding uses 8 bits to represent letters and other characters.
true
Five offices share space in one building. Each office operates its own wi-fi network. The signals from the five wi-fi networks can interfere with one another.
true
Fuzzy controllers are used in the implementation of decisions taken by intelligent systems. An example is the action of turning an automated vehicle.
true
Good reviews add value to small businesses, and a one-star rating improvement on Yelp has been found to translate to a 5% to 9% revenue growth in restaurants
true
Good security training for users helps control/limit social engineering attacks.
true
Hadoop uses the MapReduce framework for data analysis.
true
Higher frequency electro-magnetic signals are less capable of going through solid objects and limited to line of sight transmission.
true
Images in a web page are separate files linked to the text in a HTML web page.
true
In 1991, three major commercial networks at the time, UUNET, PSINet and CERFnet created the Commercial Internet Exchange. This organization allowed commercial data traffic to be exchanged freely, without the acceptable use restrictions of NSFNET.
true
In Extreme Programming, strict coding standards are enforced to make the code easier to maintain in future.
true
In HDFS the shuffle function gathers together data about all the customers who were initially happy with the product but complained about it two weeks later.
true
In most cases, an IT project developed by an end-user is less reliable than a IT project developed by the IT department.
true
Invisible challenges are used to authenticate the user, during user interaction, rather than at initial authentication
true
It is easier to copy digital data than analog data.
true
It is easier to detect plagiarism with digitized data than with paper documents.
true
It is recommended that business implementing a new enterprise system seek the services of an implementation partner since most businesses typically have little in-house expertise in implementing enterprise systems.
true
Java is a programming language developed for the net, with a write once-run anywhere philosophy
true
MAC addresses are globally unique IDs encoded in the network chip by the manufacturer.
true
Macys.com is the website for the retailer, Macy's. Customers can view items and place orders for home delivery or store pickup. This is an example of B2C e-commerce.
true
Many social engineering attacks use password guessing approaches since users often create passwords based on terms with a personal connection such as a birth date.
true
Multi-core processors are useful in complex tasks, required for parallel processing, such as speech recognition and video editing.
true
Nowadays, many businesses focus on performing only the core component of their service/product in-house and outsource the other functions to partners. This results in a complex supply chain and a need for SCM software to manage the supply chain.
true
Once a product is digitized, it is nearly costless to make a digital duplicate.
true
One benefit of server virtualization is improved utilization of hardware in data centers.
true
One feature of the net is fault-resiliency. If one path connecting computers on the net is unavailable, data travels by another path.
true
One major feature of M-Commerce is the ability to localize the application based on the physical location of the customer.
true
One objection many customers have about CRM is the highly intrusive nature of data collected by the system.
true
One of the features of a data warehouse is a common vocabulary for data collected from different sources.
true
Peer-to-peer technology eliminates the need for a central clearinghouse and links individual computers over the net to create a virtual network.
true
Personal information about employees and customers is a critical information asset of the business.
true
Ports allow internet traffic to be classified and screened as needed. The port commonly used for HTTP traffic is port 80.
true
Privacy is defined as something that is not, by default, exposed to the outside world.
true
Pseudo-code is abbreviated code that specifies the broad outline for the detailed code.
true
Routers direct traffic on the internet and on local area networks which use internet standards.
true
Routing tables need to be updated when new machines are added to the network.
true
SDLC is a time consuming procedure and is useful in the case of large projects that are critical to the business
true
SDLC reduces the failure risk of large IT projects.
true
Self-sourced IT is often lost when the developer moves to another position.
true
Since IT jobs are primarily performed on the computer, IT positions are one of most commonly telecommuted jobs
true
System complexity is a problem when in-house IT systems are closely interlinked to IT systems used by business partners. This can lead to IT system failure.
true
Tapes, like hard disks, use magnetic storage, which makes them sensitive to strong electrical/magnetic fields (EMF). Optical storage is not affected by EMF.
true
The CPU can instantaneously access any part of main memory.
true
The Hadoop Distributed File System stores data in small blocks and uses replication to ensure that each small block is replicated in multiple locations to enhance reliability and availability.
true
The Moodle user browses to a website, logs in, and views the data posted for the class. This is termed front-end access to the Moodle database.
true
The OLAP data cube may not be a cube and may have a different number of values in each dimension.
true
The OS provides a layer of abstraction between the CPU and the program used on the machine. This simplifies writing programs, since they can be written for the OS, and the OS will make the conversions for each specific type of CPU.
true
The RDBMS design makes it easy to ensure the integrity of data collected by the system.
true
The Target Hack shows the need to protect not only internal IT systems but to also ensure that IT systems at partner companies are also secure.
true
The average human brain has about 100 billion neurons.
true
The core enterprise system manages and coordinates accounting, finance, operations, human resources, and marketing processes.
true
The cost of system maintenance after the IT system is fully completed exceeds the cost of building the IT system.
true
The disposal step of the SDLC has guidelines to ensure that valuable data is deleted before old hardware is discarded and to ensure that data is archived before an IT system is shut down.
true
The frequency band used by home wifi devices has a lower frequency than visible light.
true
The hash is a fingerprint of the digital data being sent using the encryption system.
true
The logic for the business process in a legacy system is typically the same as the logic requested by the users.
true
The maximum signal strength of home wifi is limited by FCC regulation.
true
The number of in-links to a web page (other sites linking to the page) is one of the criteria used by search engines to rank a page.
true
The plunge approach is used for small IT systems, and systems that do not have a major impact on the organization.
true
The term cloud computing originated in the use of a cloud shape to refer to the internet in network diagrams.
true
The type of RAM used in computers is called dynamic RAM (DRAM) and the dynamic nature of the device means that an electrical charge must be constantly supplied to the device to hold its data.
true
There are many more script kiddies than white hat hackers.
true
Top management may use a DSS to gain greater operational control over decision making.
true
Torrent software allows users to link up with other torrent sites and share files. There is no central server to store the files. This is an example of P2P e-commerce.
true
UNIX is an operating system.
true
Under Section 230 of the Communications Decency Act of 1996, a social media site (a social network like Facebook or a customer review site like Yelp) is deemed a common carrier of information and is not liable for content posted on the site.
true
VPNs include encryption technology to ensure that business data travels on the public net using high quality encryption
true
Very little or no code is written, and it becomes possible for a developer to assemble an application by connecting the appropriate code modules in low-code development.
true
When I visit the amazon.com website, the webserver log file records my IP address.
true
When a business outsources IT, top management sees a reduction of management effort to manage IT.
true
When a firewall drops a packet it means that the packet has been blocked from entering/leaving the network
true
When employees start using their personal devices, such as smartphones, to access and complete work assignments, corporate IT systems face more security threats than when they use business owned and managed devices.
true
When programs were written in third generation languages, and code ran to hundreds of thousands of lines of code, a method of measuring programmer productivity was to count thousands of lines of code (KLOC).
true
When sending message on the network using a direct coding process there is problem using single-key cryptography since both parties must meet to exchange the code key.
true
Yelp is an online review site where individuals can post reviews of restaurants and other services. Other customers can view the reviews on Yelp to guide their restaurant choice. This is an example of C2C e-commerce.
true
You send out e-mail advertising a new PoBoy shop to every IP address assigned by Cox Communications in the New Orleans area. Your email contains the correct sender address (your email) and the mail header states "The Best Po-Boy in NOLA". You plan to do this only once, the day before your store opens. Since you do not plan to send the mail again, you do not include an unsubscribe option. This is a violation of the CAN-SPAM law.
true
You visit Amazon's website. The site writes a cookie on your machine. By default, this cookie can only be read by Amazon and no other store's website can read this cookie.
true
You write a term paper and submit it electronically. Digitization has made it easier to detect plagiarism.
true
Your purchase a bitcoin on June 1, 2017 and sell it on August 1, 2017. This purchase and sale history is stored in a block chain database.
true
A physician can check patient files at any location, whether at the clinic, at home, or traveling. This is an example of _________________________.
ubiquitous computing
A physician checks patient files from her cellphone at home. This is an example of ______________
ubiquity
A UPS (____________ power supply) provides backup power for computer and networking hardware.
uninterruptible
A database does not have any needlessly repeated data. For example customer addresses are stored in only one location. This is termed database ________________.
uniqueness
A hacker group announces they have discovered a security flaw in a program. Malware writers create code to exploit this hole immediately. This creates a ______ vulnerability.
zeroday