SU 14

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Big data analytic tools __________ complete missing pieces. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

d. are able to

When using _______________ encryption, the communicating parties agree on a single (private) key. a. increases b. decreases c. private key d. public key e. keys f. symmetric g. strength h. security i. length

f. symmetric

Which of the following is considered to be a server in a local area network (LAN)? a. The cabling that physically interconnects the nodes of the LAN. b. A device that stores program and data files for users of the LAN. c. A device that connects the LAN to other networks. d. A workstation that is dedicated to a single user on the LAN.

b. A device that stores program and data files for users of the LAN.

The best approach for minimizing the likelihood of software incompatibilities leading to unintelligible messages is for a company and its customers to a. Acquire their software from the same software vendor. b. Agree to synchronize their updating of EDI-related software. c. Agree to use the same software in the same ways indefinitely. d. Each write their own version of the EDI-related software.

b. Agree to synchronize their updating of EDI-related software.

Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment? a. Elimination of the need to continually update antivirus software. b. Assurance of the thoroughness of transaction data because of standardized controls. c. Automatic protection of information that has electronically left the entity. d. Elimination of the need to verify the receipt of goods before making payment.

b. Assurance of the thoroughness of transaction data because of standardized controls.

All of the following are correct statements regarding big data except a. Big data is an evolving term that describes any voluminous amount of structured, semi-structured, and unstructured data that has the potential to be mined for information. b. Big data includes information collected from social media, data from Internet-enabled devices, machine data, video, and voice recordings. The information collected is converted from high-density data into low-density data. c. Big data is often characterized by the "4 Vs" - volume, variety, velocity, and veracity. d. Big data processes data with analytic and algorithmic tools to reveal meaningful information.

b. Big data includes information collected from social media, data from Internet-enabled devices, machine data, video, and voice recordings. The information collected is converted from high-density data into low-density data.

Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment? a. A compressed business cycle with lower year-end receivables balances. b. A reduced need to test computer controls related to sales and collections transactions. c. An increased opportunity to apply statistical sampling techniques to account balances. d. No need to rely on third-party service providers to ensure security.

a. A compressed business cycle with lower year-end receivables balances.

Which improvement in IT control specifically addresses the authentication issue? a. A digital certificate. b. A firewall. c. An intelligent router. d Encryption.

a. A digital certificate.

A control that a company can use to detect forged EDI messages is to a. Acknowledge all messages initiated externally with confirming messages. b. Permit only authorized employees to have access to transmission facilities. c. Delay action on orders until a second order is received for the same goods. d. Write all incoming messages to a write-once/read-many device for archiving.

a. Acknowledge all messages initiated externally with confirming messages.

What is a major disadvantage to using a private key to encrypt data? a. Both sender and receiver must have the private key before this encryption method will work. b. The private key cannot be broken into fragments and distributed to the receiver. c. The private key is used by the sender for encryption but not by the receiver for decryption. d. The private key is used by the receiver for decryption but not by the sender for encryption.

a. Both sender and receiver must have the private key before this encryption method will work.

A local area network (LAN) is best described as a(n) a. Computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity. b. System to allow computer users to meet and share ideas and information. c. Electronic library containing millions of items of data that can be reviewed, retrieved, and analyzed. d. Method to offer specialized software, hardware, and data-handling techniques that improve effectiveness and reduce costs.

a. Computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity.

Most client-server applications operate on a three-tiered architecture consisting of which of the following layers? a. Desktop client, application, and database. b. Desktop client, software, and hardware. c. Desktop server, application, and database. d. Desktop server, software, and hardware.

a. Desktop client, application, and database.

An employee uses her company-issued ID and password to log into her employer's human resources system from home and change her choices of benefits. This is an example of a. E-business. b. Data warehouse. c. Transmission protocol. d. Extensible markup language.

a. E-business.

Which of the following characteristics distinguishes electronic data interchange (EDI) from other forms of electronic commerce? a. EDI transactions are formatted using standards that are uniform worldwide. b. EDI transactions need not comply with GAAP. c. EDI transactions cannot be processed without the Internet. d. EDI transactions are usually recorded without security and privacy concerns.

a. EDI transactions are formatted using standards that are uniform worldwide.

Which of the following best defines electronic data interchange (EDI) transactions? a. Electronic business information is exchanged between two or more businesses. b. Customers' funds-related transactions are electronically transmitted and processed. c. Entered sales data are electronically transmitted via a centralized network to a central processor. d. Products sold on central web servers can be accessed by users anytime.

a. Electronic business information is exchanged between two or more businesses.

Before sending or receiving electronic data interchange (EDI) messages, a company should a. Execute a trading partner agreement with each of its customers and suppliers. b. Reduce inventory levels in anticipation of receiving shipments. c. Demand that all its suppliers implement EDI capabilities. d. Evaluate the effectiveness of its use of EDI transmissions.

a. Execute a trading partner agreement with each of its customers and suppliers.

The Internet consists of a series of networks that include a. Gateways to allow networks to connect to each other. b. Bridges to direct messages through the optimum data path. c. Repeaters to physically connect separate local area networks (LANs). d. Routers to strengthen data signals between distant computers.

a. Gateways to allow networks to connect to each other.

To ensure privacy in a public-key encryption system, knowledge of which of the following keys is required to decode the received message? I. Private II. Public a. I only. b. II only. c. Both I and II. d. Neither I nor II.

a. I only.

Which one of the following is likely to be a concern in performing an assessment of an electronic data interchange (EDI) purchasing system? a. Increased turnover of the information technology staff. b. Increased transaction volume. c. Increased competition in the market. d. Decreased competition in the market.

a. Increased turnover of the information technology staff.

An organization has made available the company newsletter and job openings on the network such that only employees of the organization may view them. The organization is using a(n) a. Intranet. b. Extranet. c. Firewall. d. Client-server architecture.

a. Intranet.

Which of the following is a correct statement regarding Hadoop? a. It is open source software framework that stores large amounts of data and runs applications on clusters of commodity hardware. b. It analyzes data from system memory instead of hard drives. c. It is a technology that uses data, statistical algorithms, and machine-learning techniques to identify the likelihood of future outcomes based on historical data. d. It analyzes text data from the web, comment fields, books, and other text-based sources through the use of machine learning or natural language processing technology.

a. It is open source software framework that stores large amounts of data and runs applications on clusters of commodity hardware.

A distributed processing environment is most beneficial in which of the following situations? a. Large volumes of data are generated at many locations and fast access is required. b. Large volumes of data are generated centrally and fast access is not required. c. Small volumes of data are generated at many locations, fast access is required, and summaries of the data are needed promptly at a central cite. d. Small volumes of data are generated centrally, fast access is required, and summaries are needed monthly at many locations.

a. Large volumes of data are generated at many locations and fast access is required.

Electronic data interchange (EDI) offers significant benefits to organizations, but it is not without certain major obstacles. Successful EDI implementation begins with which of the following? a. Mapping the work processes and flows that support the organization's goals. b. Purchasing new hardware for the EDI system. c. Selecting reliable vendors for translation and communication software. d. Standardizing transaction formats and data.

a. Mapping the work processes and flows that support the organization's goals.

In building an electronic data interchange (EDI) system, what process is used to determine which elements in the entity's computer system correspond to the standard data elements? a. Mapping. b. Translation. c. Encryption. d. Decoding.

a. Mapping.

Which of the following are essential elements of the audit trail in an electronic data interchange (EDI) system? a. Network and sender/recipient acknowledgments. b. Message directories and header segments. c. Contingency and disaster recovery plans. d. Trading partner security and mailbox codes.

a. Network and sender/recipient acknowledgments.

Which of the following statements is true concerning internal control in an electronic data interchange (EDI) system? a. Preventive controls generally are more important than detective controls in EDI systems. b. Control objectives for EDI systems generally are different from the objectives for other information systems. c. Internal controls in EDI systems rarely permit control risk to be assessed at below the maximum. d. Internal controls related to the segregation of duties generally are the most important controls in EDI systems.

a. Preventive controls generally are more important than detective controls in EDI systems.

A value-added network (VAN) is a privately owned network that performs which of the following functions? a. Route data transactions between trading partners. b. Route data within a company's multiple networks. c. Provide additional accuracy for data transmissions. d. Provide services to send marketing data to customers.

a. Route data transactions between trading partners.

Suppose a major supplier responded to a company's request to implement electronic data interchange (EDI) by asking the company to share raw materials usage data so it could smooth its production. The most effective response to this request would be for the company to send the supplier a. The requested data daily via EDI. b. Usage data via weekly reports. c. Monthly production reports. d. No data at all because it is confidential.

a. The requested data daily via EDI.

Securing client-server systems is a complex task because of all of the following factors except a. The use of relational databases. b. The number of access points. c. Concurrent operation of multiple-user sessions. d. Widespread data access and update capabilities.

a. The use of relational databases.

Which one of the following is not a reason for a company to use EFT with an EDI system? a. To take advantage of the time lag associated with negotiable instruments. b. To allow the company to negotiate discounts with EDI vendors based upon prompt payment. c. To improve its cash management program. d. To reduce input time and input errors.

a. To take advantage of the time lag associated with negotiable instruments.

A digital signature is used primarily to determine that a message is a. Unaltered in transmission. b. Not intercepted en route. c. Received by the intended recipient. d. Sent to the correct address.

a. Unaltered in transmission.

The emergence of electronic data interchange (EDI) as standard operating practice increases the risk of a. Unauthorized third-party access to systems. b. Systematic programming errors. c. Inadequate knowledge bases. d. Unsuccessful system use.

a. Unauthorized third-party access to systems.

The use of encryption _____________________ system overhead. a. increases b. decreases c. private key d. public key e. keys f. symmetric g. strength h. security i. length

a. increases

Relational databases work best with ____________ data. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

a. structured

A company has abandoned the large array of dedicated servers it formerly used to store and provide access to its database. The company has entered into a contract with a provider who will guarantee storage of the database at its own location along with access over the Internet. This arrangement is an example of a. Distributed computing. b. Cloud computing. c. Wide area network. d. Ethernet.

b. Cloud computing.

A manufacturing company that wanted to be able to place material orders more efficiently most likely would utilize which of the following? a. Electronic check presentment. b. Electronic data interchange (EDI). c. Automated clearinghouse (ACH). d. Electronic funds transfer (EFT).

b. Electronic data interchange (EDI).

Which of the following statements is true concerning the security of messages in an electronic data interchange (EDI) system? a. When confidentiality of data is the primary risk, message authentication is the preferred control rather than encryption. b. Encryption performed by physically secure hardware devices is more secure than encryption performed by software. c. Message authentication in EDI systems performs the same function as segregation of duties in other information systems. d. Security in the transaction phase of EDI systems is not necessary because problems at that level will usually be identified by the service provider.

b. Encryption performed by physically secure hardware devices is more secure than encryption performed by software.

Which of the following is likely to be a benefit of electronic data interchange (EDI)? a. Increased transmission speed of actual documents. b. Improved business relationships with trading partners. c. Decreased liability related to protection of proprietary business data. d. Decreased requirements for backup and contingency planning.

b. Improved business relationships with trading partners.

Appropriate uses of an organization's internal communications network, or intranet, include all of the following except a. Making the human resources policy manual available to employees. b. Informing potential investors about company operations and financial results. c. Providing senior management with access to the executive support system. d. Enabling a project team that crosses departments to collaborate.

b. Informing potential investors about company operations and financial results.

Which of the following is a correct statement regarding in-memory analytics? a. It is an open source software framework that stores large amounts of data and runs applications on clusters of commodity hardware. b. It analyzes data from system memory instead of hard drives. c. It is a technology that uses data, statistical algorithms, and machine-learning techniques to identify the likelihood of future outcomes based on historical data. d. It examines large amounts of data to discover patterns in the data.

b. It analyzes data from system memory instead of hard drives.

Kelly Corporation needs an internal communication network that provides high speed communication among nodes. Which of the following is appropriate for Kelly? a. Wide area network (WAN). b. Local area network (LAN). c. File server. d. Value-added network (VAN).

b. Local area network (LAN).

Which of the following networks provides the least secure means of data transmission? a. Value-added. b. Public-switched. c. Local area. d. Private.

b. Public-switched.

Which of the following is not an advantage of business-to-business (B2B)? a. Reduced purchasing costs. b. Reduced information technology costs. c. Increased market efficiency. d. Decreased inventory levels.

b. Reduced information technology costs.

Which of the following is not a layer of the three-tiered architecture of the client-server model? a. Client. b. Server. c. Database. d. Application.

b. Server.

A company using EDI made it a practice to track the functional acknowledgments from trading partners and to issue warning messages if acknowledgments did not occur within a reasonable length of time. What risk was the company attempting to address by this practice? a. Transactions that have not originated from a legitimate trading partner may be inserted into the EDI network. b. Transmission of EDI transactions to trading partners may sometimes fail. c. There may be disagreement between the parties as to whether the EDI transactions form a legal contract. d. EDI data may not be accurately and completely processed by the EDI software.

b. Transmission of EDI transactions to trading partners may sometimes fail.

Which of the following is a risk that is higher when an electronic funds transfer (EFT) system is used? a. Improper change control procedures. b. Unauthorized access and activity. c. Insufficient online edit checks. d. Inadequate backups and disaster recovery procedures.

b. Unauthorized access and activity.

Which of the following IT developments poses the least risk to organizational security? a. Adoption of wireless technology. b. Use of public-key encryption. c. Outsourcing of the IT infrastructure. d. Enterprise-wide integration of functions.

b. Use of public-key encryption.

__________ data does not conform to the formal structure of data models associated with relational databases or other forms of data tables. However, markers exist to enforce hierarchies of records and fields within the data. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

b. semi-structured

A company uses big data analytics in marketing. Which of the following is a limitation of using big data? a. The company can use big data to predict customer behaviors. b. Data results cannot be visualized to identify and forecast customer trends. c. Big data often cannot explain why customers behave in certain ways. d. Data collected only represent untapped customers but not tapped customers.

c. Big data often cannot explain why customers behave in certain ways.

The most distinguishing feature of the use of a client-server processing model over an old mainframe configuration is a. Digital processing over analog. b. Less need for data backup. c. Decentralization over centralization. d. Ability to connect remote locations.

c. Decentralization over centralization.

Companies now can use electronic transfers to conduct regular business transactions. Which of the following terms best describes a system in which an agreement is made between two or more parties to electronically transfer purchase orders, sales orders, invoices, and/or other financial documents? a. Electronic mail (email). b. Electronic funds transfer (EFT). c. Electronic data interchange (EDI). d. Electronic data processing (EDP).

c. Electronic data interchange (EDI).

A system that permits suppliers and buyers to have direct access to portions of each others' databases, including inventory data, to enhance service and deliveries is a. Electronic mail. b. Interactive processing. c. Electronic data interchange. d. Distributed processing.

c. Electronic data interchange.

Which of the following statements is true regarding Transmission Control Protocol and Internet Protocol (TCP/IP)? a. Every TCP/IP-supported transmission is an exchange of funds. b. TCP/IP networks are limited to large mainframe computers. c. Every site connected to a TCP/IP network has a unique address. d. The actual physical connections among the various networks are limited to TCP/IP ports.

c. Every site connected to a TCP/IP network has a unique address.

Which of the following risks is not greater in an electronic funds transfer (EFT) environment than in a manual system using paper transactions? a. Unauthorized access and activity. b. Duplicate transaction processing. c. High cost per transaction. d. Inadequate backup and recovery capabilities.

c. High cost per transaction.

The use of message encryption software a. Guarantees the secrecy of data. b. Requires manual distribution of keys. c. Increases system overhead. d. Reduces the need for periodic password changes.

c. Increases system overhead.

Large organizations often have their own telecommunications networks for transmitting and receiving voice, data, and images. Small organizations, however, also can have remote locations that need to communicate. Such organizations are more likely to use a. Public-switched lines. b. Fast packet switches. c. Intranet. d. A WAN.

c. Intranet.

Wade Co. is signing an agreement with a cloud computing service provider for its new payroll system. The service provider, according to the agreement, will provide Wade Co. with the operating system, the database, and the web server for the development of the system. What is the type of cloud service provided? a. Infrastructure-as-a-Service (IaaS). b. Hardware-as-a-Service (HaaS). c. Platform-as-a-Service (PaaS). d. Software-as-a-Service (SaaS).

c. Platform-as-a-Service (PaaS).

Which of the following statements regarding the client-server model is false? a. Individual users initiate client processes that request services from centrally maintained servers. b. Servers perform more specialized functions. c. Security for client-server systems is less difficult than in a highly centralized system. d. Client-server systems are often assembled with equipment from multiple vendors.

c. Security for client-server systems is less difficult than in a highly centralized system.

Primary cloud services do not include a. Infrastructure-as-a-Service. b. Platform-as-a-Service. c. System-as-a-Service. d. Software-as-a-Service.

c. System-as-a-Service.

Which of the following is a correct statement regarding volume-based value? a. The faster businesses can inject data into their data and analytics platform, the more time they will have to ask the right questions and seek answers. b. Rapid analysis capabilities provide businesses with the right decision in time to achieve their customer relationship management objectives. c. The more data businesses have on the customers, both recent and historical, the greater the insights. d. In the digital era, capability to acquire and analyze varied data is extremely valuable.

c. The more data businesses have on the customers, both recent and historical, the greater the insights.

Which of the following statements represents an additional cost of transmitting business transactions by means of electronic data interchange (EDI) rather than in a traditional paper environment? a. Redundant data checks are needed to verify that individual EDI transactions are not recorded twice. b. Internal audit work is needed because the potential for random data entry errors is increased. c. Translation software is needed to convert transactions from the entity's internal format to a standard EDI format. d. More supervisory personnel are needed because the amount of data entry is greater in an EDI system.

c. Translation software is needed to convert transactions from the entity's internal format to a standard EDI format.

After a company implements electronic data interchange (EDI) to communicate with its customers, an appropriate control for ensuring authenticity of the electronic orders it receives is to a. Encrypt sensitive messages such as electronic payments for raw materials received. b. Perform reasonableness checks on quantities ordered before filling orders. c. Verify the identity of senders and determine whether orders correspond to contract terms. d. Acknowledge receipt of electronic payments with a confirming message.

c. Verify the identity of senders and determine whether orders correspond to contract terms.

Which one of the following network configurations is distinguished by the possibility of spreading the cost of ownership among multiple organizations? a. Value-added network. b. Baseband network. c. Wide area network. d. Local area network.

c. Wide area network.

A digital signature is a means of authenticating an electronic document such as a purchase order, acceptance of a contract, or financial information. The sender uses its _________ to encode all or part of the message. a. increases b. decreases c. private key d. public key e. keys f. symmetric g. strength h. security i. length

c. private key

An entity doing business on the Internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except a. Password management. b. Data encryption. c. Digital certificates. d. Batch processing.

d. Batch processing.

All of the following are correct statements regarding big data except a. Big data needs to be transformed to "Smart Data." Collecting large amounts of statistics and numbers translates into minimal benefit if there is no layer of added intelligence. b. Big data uses inductive statistics and concepts from nonlinear system identification (e.g., output is not directly proportional to the input) to infer laws from large sets of data to reveal relationships and dependencies, or to perform predictions of outcomes and behaviors. c. Big data analytic tools complete missing pieces through data fusion, which is the process of integration of multiple data and knowledge representing the same real-world object into a consistent, accurate, and useful representation. d. Big data is an evolving term that describes any voluminous amount of structured data that has the potential to be mined for information.

d. Big data is an evolving term that describes any voluminous amount of structured data that has the potential to be mined for information.

Which of the following best describes a characteristic of big data? a. Collected data often provides straightforward answers to users. b. Data collected are free from useless information or incorrect variables. c. Big data is in a visual context, such as a graph or chart, rather than a text format. d. Data of untapped markets is often not collected.

d. Data of untapped markets is often not collected.

Which of the following is not an advantage of using cloud computing? a. Faster access to software. b. Reduced IT costs. c. Companies can choose to pay for services as needed. d. Decreased risk of data exposure.

d. Decreased risk of data exposure.

Which of the following is an encryption feature that can be used to authenticate the originator of a document and ensure that the message is intact and has not been tampered with? a. Heuristic terminal. b. Perimeter switch. c. Default settings. d. Digital signatures.

d. Digital signatures.

A company is transferring its processing tasks from its central computer(s) to the local computers of its different branches, such that the burden on the central computer(s) and the amount of communications traffic can be reduced. This is an example of a. Outsourcing. b. Cloud computing. c. Local area network (LAN). d. Distributed processing.

d. Distributed processing.

A customer places an order for a sweater over the Internet using a mobile phone. This is an example of a. Authentication. b. Business intelligence. c. Electronic funds transfer. d. E-commerce.

d. E-commerce.

Which of the following characteristics distinguishes electronic data interchange (EDI) from other forms of electronic commerce? a. The cost of sending EDI transactions using a value-added network (VAN) is less than the cost of using the Internet. b. Software maintenance contracts are unnecessary because translation software for EDI transactions need not be updated. c. EDI commerce is ordinarily conducted without establishing legally binding contracts between trading partners. d. EDI transactions are formatted using strict standards that have been agreed to worldwide.

d. EDI transactions are formatted using strict standards that have been agreed to worldwide.

A research-based firm in the medical field could use each of the following Internet-based tools for collaboration except a. An e-mail application. b. Videoconferencing. c. Groupware systems. d. Electronic data interchange.

d. Electronic data interchange.

Suppose a company begins bar coding raw materials and production, implements electronic data interchange (EDI) with suppliers and customers, and invests in new automated equipment for production. A risk associated with these changes is that a. The company will be less able to respond to customers' inquiries about their orders. b. Having less raw materials inventory will increase the likelihood of stock-outs. c. The company will be less responsive to customers because it has less finished goods inventory. d. Employees may fail to modify their efforts consistent with the new approaches.

d. Employees may fail to modify their efforts consistent with the new approaches.

Which of the following is not an appropriate use of a company's intranet? a. Allowing employees remotely working on the same project to share files across different departments. b. Making the company directory available to employees. c. Informing employees about policy changes at the corporate level. d. Enabling customers to submit inquiries about company services.

d. Enabling customers to submit inquiries about company services.

A client communicates sensitive data across the Internet. Which of the following controls will be most effective to prevent the use of the information if it were intercepted by an unauthorized party? a. A firewall. b. An access log. c. Passwords. d. Encryption.

d. Encryption.

Which of the following statements is(are) true regarding the Internet as a commercially viable network? I. Organizations must use firewalls if they wish to maintain security over internal data. II. Companies must apply to the Internet to gain permission to create a home page to engage in electronic commerce. III. Companies that wish to engage in electronic commerce on the Internet must meet required security standards established by the coalition of Internet providers. a. I only. b. II only. c. III only. d. I and III.

d. I and III.

Which of the following are key technologies of big data? I. In-memory analytics II. Data mining III. Text mining a. I only. b. II only. c. I and III only. d. I, II, and III.

d. I, II, and III.

Which of the following areas experienced an increase in risk as personal computers replaced mainframe environments? I. Backup and recovery II. System incompatibility III. Copyright violations a. I only. b. II only. c. II and III. d. I, II, and III.

d. I, II, and III.

Which of the following significantly encouraged the development of electronic funds transfer (EFT) systems?I. Response to competition II. Cost containment III. Advances in information technology a. I and II. b. I and III. c. II only. d. I, II, and III.

d. I, II, and III.

Which of the following represents the greatest exposure to the integrity of electronic funds transfer data transmitted from a remote terminal? a. Poor physical access controls over the data center. b. Network viruses. c. Poor system documentation. d. Leased telephone circuits.

d. Leased telephone circuits.

A company is considering a move to a Software-as-a-Service (SaaS) offering instead of a traditional in-house application. Which of the following concerns is unique to SaaS? a. Disaster recovery capabilities and documented recovery procedures. b. User credential setup and control over the actions that employees can perform. c. Allocation of software expenses and overhead charged to departments. d. Ownership of processed data and costs of data migrations.

d. Ownership of processed data and costs of data migrations.

Which of the following is an accepted example of electronic data interchange (EDI)? a. Request for an airline reservation by a travel agent. b. Withdrawal of cash from an automated teller by a bank's customer. c. Transfer of summary data from a local area network to a centralized mainframe. d. Placement of order entry transactions from a customer to its supplier.

d. Placement of order entry transactions from a customer to its supplier.

Organizations that move to implement EDI often use value-added networks (VANs). Which of the following would not normally be performed by a VAN? a. Store electronic purchase orders of one organization to be accessed by another organization. b. Provide common interfaces across organizations thereby eliminating the need for one organization to establish direct computer communication with a trading partner. c. Maintain a log of all transactions of an organization with its trading partner. d. Provide translations from clients' computer applications to a standard protocol used for EDI communication.

d. Provide translations from clients' computer applications to a standard protocol used for EDI communication.

A value-added network (VAN) adds value by a. Reducing the cost of data transmission. b. Providing the secure transmission of data over the Internet. c. Routing data through a shared, low-cost Internet. d. Providing error detection and correction services.

d. Providing error detection and correction services.

Engaging in traditional electronic data interchange (EDI) provides which of the following benefits? a. Enhanced audit trails. b. Guaranteed payments from customers. c. Added flexibility to entice new partners. d. Reduced likelihood of stock-out costs.

d. Reduced likelihood of stock-out costs.

Which of the following statements about personal and notebook computers and servers is true? a. Personal and notebook computers usually cost more than servers but less than mainframes. b. Because of the increased use of personal and notebook computers, there will be little need for servers in the near future. c. Servers must be programmed directly in machine language while personal and notebook computers use higher-level language. d. The cost per transaction to process on each type of computer has decreased in recent years.

d. The cost per transaction to process on each type of computer has decreased in recent years.

All of the following are correct statements regarding velocity-based value except a. The faster businesses can inject data into their data and analytics platform, the more time they will have to ask the right questions and seek answers. b. Rapid analysis capabilities provide businesses with the right decision in time to achieve their customer relationship management objectives. c. The computing power required to quickly process huge volumes and varieties of data can overwhelm a single server or multiple servers. Organizations must apply adequate computer power to big data tasks to achieve the desired velocity. d. The more data businesses have on the customers, both recent and historical, the greater the insights.

d. The more data businesses have on the customers, both recent and historical, the greater the insights.

Each of the following represents a characteristic of big data except a. Size. b. Mixture. c. Speed. d. Uniformity.

d. Uniformity.

A national retailer required more detailed data to help stock its stores with the right products and to increase its turnover. Such data amounted to several gigabytes per day from each store. A new high-speed company-wide network was needed to transmit and analyze the data. The company wanted the features, functionality, and control of a sophisticated voice and data network without the cost of the components or the staff to maintain it. Which of the following options would be most suitable? a. Private wide-area network b. Local area network c. Value-added network d. Virtual private network.

d. Virtual private network.

Which of the following solutions creates an encrypted communication tunnel across the Internet for the purpose of allowing a remote user secure access into the network? a. Packet-switched network. b. Digital encryption. c. Authority certificate. d. Virtual private network.

d. Virtual private network.

Which of the following statements is most accurate regarding the differences between LANs and WANs? a. LANs experience more congestion than WANs. b. WANs are easier to maintain than LANs. c. Organizations that use WANs will incur lower setup costs than those that use LANs. d. WANs are more difficult to secure than LANs.

d. WANs are more difficult to secure than LANs.

Digital certificates are data files created by trusted third parties called certificate authorities (e.g., VeriSign, Thawte, GoDaddy). The certificate authority then creates a coded electronic certificate that contains its _____________. a. increases b. decreases c. private key d. public key e. keys f. symmetric g. strength h. security i. length

d. public key

The public-key infrastructure relieves both parties from the need to establish their own pairs of _____ when they want to communicate securely. a. increases b. decreases c. private key d. public key e. keys f. symmetric g. strength h. security i. length

e. keys

___________ mining analyzes data from the web, comment fields, books, and other sources through the use of machine learning or natural language processing technology. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

f. text

___________ mining technology permits examination of large amounts of data to discover patterns in the data. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

g. data

Data management consists of the establishment of a master data management program and _________ processes. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

h. repeatable

Symmetric encryption's strength comes from the ____ of the keys. a. increases b. decreases c. private key d. public key e. keys f. symmetric g. strength h. security i. length

i. length

Big data is relatively __________ to implement. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

k. expensive

More and more businesses are using big data because of the _______ of the information resulting from the culmination of analyzing large information flows and identifying opportunities for improvement. a. structured b. semi-structured c. unstructured d. are able to e. is not able to f. text g. data h. repeatable i. non-repeatable j. inexpensive k. expensive l. cost m. value

m. value


Ensembles d'études connexes

Intro To Computers Exam 1 Review

View Set

ACCT 292 Chapter 6: Concept Videos

View Set

anatomy exam 2 brain and spinal cord/spinal nerves

View Set