BSIS

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

When using NIC teaming with Windows Server 2012 R2 virtual machines, which of the following tasks must be completed? (Choose two answers.)

-Configure a NIC team virtual network adapter. -Create a team virtual switch.

Which of the following features are supported by the NIC team with Hyper-V virtual machines running in Windows Server 2012 R2?

-Redundancy - Aggregated bandwidth

Which of the following indicates the top-level domain for the universal resource locator (URL) http://www.csub.edu?

.edu

Which of the following is a country code top-level domain?

.fr

The generic top-level domain (gTLD) for the United Nations is _____.

.int

_____ is a generic top-level domain (TLD) name used for backbone, regional, and commercial networks.

.net

In the uniform resource locator (URL) http://www.csub.edu/~hbidgoli/books.html, _____ represents the name of the directory in which files are stored.

/~hbidgoli

After creating a VM, how many virtual adapters are included by default?

1

An American Standard Code for Information Interchange (ASCII) file defines up to _____ character

128

An American Standard Code for Information Interchange (ASCII) file defines up to _____ characters.

128

What is an example of a valid IPv4 address?

192.29.1.42

What is the maximum number of NICs used in NIC teaming for Hyper-V virtual machines?

2

What is an example of a valid IPv6 address?

21cd:0053:0000:0000:e8bb:04f2:003c:c394

Certain IPv6 addresses can be contracted. Which of the following answers is the contracted form of 21cd:0053:0000:0000/64?

21cd:53::/64

A petabyte is equal to _____ bytes.

250

An Extended ASCII data code allows representation of maximum _____ characters

256

An Extended ASCII data code allows representation of maximum _____ characters.

256

How many MAC addresses are available for virtual network adapters, created by Hyper-V?

256

In the context of virtual reality (VR) technology, the main technology used in an exocentric environment is _____.

3D graphics

What is the technology intended to help transition IPv4 networks to IPv6, by expressing IPv4 addresses in IPv6 format?

6 to 4

The word computer consists of 64 bits, which is equivalent to _____ bytes.

8

Which of the following is an example of an input device?

A barcode reader

Which of the following security measures uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?

A biometric security measure

Which of the following systems' goal is to improve services offered to clients and use client contact information for targeted marketing?

A customer relationship management system

Which of the following types of databases is not limited by the data's physical location?

A distributed database

Which of the following is an outcome of the design phase of the systems development life cycle (SDLC)?

A document with exact specifications for executing the system, including procedures, hardware and software, and networking components

Identify a topology used by traditional mainframe networks.

A hierarchical topology

Which of the following is a disadvantage of a request for proposal (RFP)?

A lengthy time frame makes an RFP less appealing.

Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?

A logic bomb

Identify an advantage of a mouse over a trackball

A mouse is more precise in positioning the pointer than a trackball.

Identify an advantage of a mouse over a trackball.

A mouse is more precise in positioning the pointer than a trackball.

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?

A private cloud

In the context of information systems, which of the following is a disadvantage of prototyping?

A prototype might not reflect the final system's actual operation and, therefore, could be misleading.

Wytes Pharmaceuticals wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would offer the highest cost savings and would require the least amount of involvement by IT managers. Which of the following cloud computing options would be the most suitable for Wytes Pharmaceuticals?

A public cloud

_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.

A public key infrastructure

_____ allows data to be stored in multiple places to improve a system's reliability.

A redundant array of independent disks

Which of the following statements is true of extreme programming (XP)?

A system's quality is improved by addressing major issues that have not been examined before.

Which of the following paths of the given network is the critical path?

A → C → F → H → I

When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.

AND operator

_____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.

Active

What is the primary reason IPv6 has not completely replaced IPv4?

Administrators are hesitant and reluctant to change.

is an incremental development process that focuses on setting a minimum number of requirements and turning them into a working product.

Agile methodology

is an incremental development process that has less emphasis on team coding and more emphasis on limiting a project's scope.

Agile methodology

_____ are considered the first large-scale interactive global system.

Airline reservation systems

Creating a new virtual switch automatically connects the host operating system with the child partition VMs by default. What setting can be changed during virtual switch creation to disconnect the host OS?

Allow management operating system to share this network adapter

In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.

American Standard Code for Information Interchange (ASCII)

Which of the following is an example of an e-marketplace?

An e-distributor

Which of the following is a type of interorganizational system?

An extranet

Which of the following components of an expert system uses forward and backward chaining to manipulate a series of rules?

An inference engine

What is the difference between an external virtual switch and an internal virtual switch?

An internal switch doesn't allow child partition VMs to access the external network, but they can on an external switch.

Which of the following statements is true of the types of client/server architectures?

An n-tier architecture helps improve network performance.

What does a differencing disk offer administrators?

An opportunity to experiment with no changes committed to the parent image

_____ is an example of a secondary memory device.

An optical disc

The _____ of the Open Systems Interconnection (OSI) model provides services that support users' tasks, such as file transfers, database access, and e-mail.

Application layer

A(n) _______ is a type of server that stores computer software, which users can access from their workstations.

Application server

Which of the following geographic objects of a geographic information system (GIS) is most likely used to show a particular zip code or a large tourist attraction?

Areas

consists of related technologies that try to simulate and reproduce human thought behavior, including thinking, speaking, feeling, and reasoning.

Artificial intelligence

are used when data is fuzzy and uncertainty is involved.

Artificial neural networks

In the context of intellectual property, which of the following is categorized as copyrighted material?

Artistic works

Which of the following Digital Subscriber Line (DSL) services has a lower transmission rate upstream than downstream?

Asymmetric DSL

_____ uses a public key known to everyone and a private key known only to the recipient.

Asymmetric encryption

In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps.

Asynchronous Transfer Mode

_____ is the amount of data that can be transferred from one point to another in one second.

Bandwidth

_____ is a short-range wireless communication technology that acts as a supporting technology for mobile commerce (m-commerce) applications.

Bluetooth

Which of the following is a similarity between agile methodology and extreme programming (XP)?

Both focus on an incremental development process.

Which of the following is a similarity between the Internet and an intranet?

Both use similar languages for developing applications.

_____ involves semistructured decisions.

Budget preparation

_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

Business continuity planning

What is a subnetting method that enables you to place the division between the network bits and the host bits anywhere in the address, not just between octets?

CIDR

_____ is an expert system used for monitoring what consumers are saying in blogs, comment sections, message boards, and Web-based articles.

COGITO

The layout and appearance of a Hypertext Markup Language (HTML) document should be handled by

Cascading Style Sheets

is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it.

Case-based reasoning

What is the captured image of the state, data, and hardware configuration of a VM at a particular moment in time?

Checkpoint

is an executive position created for overseeing knowledge management within an organization.

Chief knowledge officer

As defined by the original Internet Protocol standard, what are the three classes of IP addresses used for networks, and what differentiates them?

Class A, B, C, differing by how many bits distinguish the networks from the hosts

is a mix of traditional commerce and e-commerce.

Click-and-brick e-commerce

_____ incorporates many recent technologies under one platform, including the software as a service (SaaS) model, Web 2.0, grid computing, and utility computing.

Cloud computing

_____, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties.

Cloud storage

____ are conducted media that can be used for both data and voice transmissions.

Coaxial cables

_____ are conducted media that can be used for both data and voice transmissions.

Coaxial cables

_____ is a search for specific information or patterns using input from multiple business partners and data sources.

Collaborative filtering

Which of the following is an operational requirement for a global information system (GIS)?

Communication between headquarters and subsidiaries

is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.

Computer fraud

_____ is used for drafting and has replaced traditional tools, such as T-squares, triangles, paper, and pencils.

Computer-aided design software

is an operational requirement of a global information system (GIS) that includes accounting and financial data, manufacturing updates, inventory, and so forth.

Consolidated global reporting

_____ refers to widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals.

Context aware computing

_____ refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, where we are, and whom we are with-offer recommendations.

Contextual computing

Which of the following is a commonly used technology for data collection?

Cookies

make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.

Cookies

laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.

Copyright

Which of the following protects contents of an HTML code that can be printed or saved on a storage device?

Copyright laws

_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.

Corner bolts

_____ check to see what links are on the user's Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page.

Crawlers

_____, software used by search engines, can go through the other pages that are part of your Web site, as long as there are links to those pages.

Crawlers

In the context of multinational corporations (MNCs), which of the following is one of the four factors in a global environment?

Cultural

consists of the processes a company uses to track and organize its contacts with consumers.

Customer relationship management

allows customers to modify the standard offering, such as selecting a different home page to be displayed each time you open your Web browser.

Customization

_____ was the first expert system developed to determine the chemical structure of molecules.

DENDRAL

The component of a decision support system (DSS) that manages and coordinates the other major components is the _____.

DSS engine

Identify a true statement about decision support systems (DSSs).

DSSs facilitate improvements but do not necessarily cause them.

is one of the most popular password managers.

Dashlane

_____ is the electronic transfer of data from one location to another.

Data communication

Which of the following is a cloud-computing risk that deals with specific jurisdictions and commitment to local privacy?

Data location

Which of the following statements is true of data marts and data warehouses?

Data marts usually perform the same types of analysis as data warehouses.

_____ is a cloud-computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.

Data segregation

is used to discover patterns and relationships.

Data-mining analysis

In a customer relationship management (CRM) system, which of the following is effective in tracking and analyzing customers' buying patterns?

Data-mining tools

_____ can be described as using an organization's database of customers and potential customers in order to promote products or services that an organization offers.

Database marketing

Which of the following is a type of artificial neural network (ANN) that includes many layers to deal with complex problems that may have very large data sets?

Deep learning

is a feature of electronic meeting systems that combines the advantages of video teleconferencing and real-time computer conferencing.

Desktop conferencing

Identify a characteristic of electronic meeting systems.

Desktop conferencing enables participants to have multiple video windows open at one time.

Which of the following decisions is supported by a financial information system (FIS)?

Determining portfolio structures

What type of disk enables you to preserve an existing virtual disk image file in its original state, while mounting it in an OS and even modifying its contents?

Differencing disk

_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.

Digital subscriber line

_____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.

Discussion groups

In manufacturing, which of the following is one of the major links in the supply chain?

Distribution centers

_____ are unique identifiers of computer or network addresses on the Internet.

Domain names

encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies.

E-business

_____ help businesses maintain a competitive edge in the supply chain by solving time-constraint problems for international trade and making it possible to conduct business around the clock.

E-marketplaces

__________bits equal one byte

Eight

bits equal one byte.

Eight

Collaborative planning, forecasting, and replenishment

Electronic data interchange

_____ enable decision makers in different locations to participate in a group decision-making process.

Electronic meeting systems

Which of the two types of virtual network adapters, synthetic or emulated, is called the legacy adapter and why?

Emulated is called the legacy adapter because it is a standard network adapter driver and communicates more slowly.

is an integrated system that collects and processes data and manages and coordinates resources, information, and functions throughout an organization.

Enterprise resource planning

_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).

Ethernet cables

In Hyper-V terminology, what do you call a virtual switch configured to provide connections external to the Hyper-V environment?

External network switch

_____ is a method for developing software applications and information system projects in which a project is divided into smaller functions and developers cannot go on to the next phase until the current phase is finished.

Extreme programming

A byte is a single value of 0 or 1.

False

A computer with a 32-bit processor can perform calculations with larger numbers better than a 64-bit system.

False

A server is a set of programs for controlling and managing computer hardware and software.

False

An expert system is not a good choice when a lot of human expertise is needed to tackle a problem.

False

An object code must be translated into source code for a computer to read and execute it.

False

Businesses find attracting new customers less expensive than maintaining current customers.

False

Fourth-generation languages (4GLs) are also called procedural languages.

False

In network-attached storage (NAS), as the number of users increases, its performance increases.

False

Spreadsheet software is more powerful than financial planning software.

False

The arithmetic logic unit and the control unit are part of the Basic Input/Output System

False

The arithmetic logic unit and the control unit are part of the Basic Input/Output System.

False

The focus of a top-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs.

False

The hardware component of a computer system consists of programs written in computer languages.

False

The main difference between an intranet and the Internet is that intranets are public and the Internet is private.

False

Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers.

False

Which of the following is an example of a third-party exchange?

Farms.com

According to Peter G. Keen, a former MIT professor, which of the following is a benefit of a decision support system (DSS)?

Fast response to unexpected situations

_____ are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.

Fiber-optic cables

_____ have the highest bandwidth of any communication medium.

Fiber-optic cables

__________include gallium arsenide chips that run at higher speeds and consume less power than silicon chips and optical technologies.

Fifth-generation computers

include gallium arsenide chips that run at higher speeds and consume less power than silicon chips and optical technologies.

Fifth-generation computers

In a manufacturing firm's supply chain management (SCM) system, which of the following areas handles credit terms and payment schedules?

Finances flow

Which of the following is a task performed by a geographic information system (GIS)?

Finding zip codes of areas with high population

A(n) _____ lists the completion time of a project on the x-axis and all the activities on the y-axis, which allows the systems analyst to monitor the progress of the project and detect any delay in the daily operation of the project.

Gantt chart

_____ are used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems.

Genetic algorithms

mimic the process of natural evolution to generate solutions to optimization and search problems.

Genetic algorithms

_____ is an operational requirement for a global information system (GIS).

Global data access

, which are products or services that have been standardized for all markets, are becoming increasingly important in international marketing efforts.

Global products

_____ uses the geographic information system (GIS) application to dispatch personnel and equipment to crime and fire locations.

Government

involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

Green computing

is software that helps a team of decision makers work with the same application, regardless of their locations.

Groupware

Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?

Hand geometry

_____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments.

Heuristics

In supply chain management (SCM) related to manufacturing, which of the following is considered a key decision about inventory?

How much should be ordered?

_____ is a supporting activity in Michael Porter's value chain.

Human resource management

What Server Manager tool allows you to create a new virtual hard disk?

Hyper-V Manager

How does a SAN work with VMs in Windows Server 2012 R2?

Hyper-V virtualizes the SAN and makes the WWNNs and WWPNs available to the VM.

Which of the following can be used in domain names in uniform resource locators (URLs)?

Hyphens

When configuring Storage Quality of Service in Windows Server 2012 R2, which of the following options ensures that one system does not consume input/output capacity of a physical disk?

IOPS

What is a tunneling protocol that emulates an IPv6 link using an IPv4 network, primarily for Windows workstation operating systems?

ISATAP

What is Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)?

ISATAP emulates an IPv6 link for use on an IPv4 network.

For virtual network adapters, Hyper-V assigns a value up to 256 to create individual MAC addresses. What happens if this is not sufficient?

If more than 256 adapters are needed, an administrator can modify the MAC address pool to be larger.

Which of the following statements is true of offshore outsourcing?

Improved telecommunication systems have increased its attractiveness.

In the context of defining the objectives and benefits of a management support system (MSS), which of the following is an intangible benefit?

Improving customer service

Which of the following statements is true of distributed databases?

In distributed databases, local storage of data increases communication costs.

Which of the following is categorized as a tangible benefit of an information system?

Increased company profits

Which of the following can help offset the digital divide?

Increasing the number of computers in public places

Which of the following countries was among the top Asia Pacific offshore locations for outsourcing in 2016?

India

In a manufacturing firm's supply chain management (SCM) system, which of the following areas oversees order transmission

Information flow

In a manufacturing firm's supply chain management (SCM) system, which of the following areas oversees order transmission?

Information flow

_____ is the first activity involved in a typical business-to-consumer (B2C) cycle.

Information sharing

is the approach where an organization's team develops an information system internally.

Insourcing

is an Internet service for communicating with others via a private "chat room" on the Internet.

Instant messaging

_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods.

Integrity rules

is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.

Intellectual property

_____ are programs that carry out repetitive tasks and can be programmed to make decisions based on specified conditions.

Intelligent agents

Which of the following is a common cost-effectiveness analysis method?

Internal rate of return

_____ are employees who will use an information system regularly and can offer important feedback on the system's strengths and weaknesses.

Internal users

_____ is responsible for packet forwarding.

Internet Protocol

is used to encrypt the data sent through a virtual private network (VPN).

Internet Protocol Security

James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the Internet Corporation for Assigned Names and Numbers (ICANN) to his computer system is 115.248.178.233. This numerical code is referred to as a(n) _____.

Internet Protocol address

is an Internet service that enables users in chat rooms to exchange text messages with people in other locations in real time.

Internet Relay Chat

is a service that uses the Internet rather than the telephone network to exchange spoken conversations.

Internet telephony

_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.

Intrusion detection systems

In the context of Internet-enabled supply chain management (SCM), which of the following SCM activities involves providing real-time stock information and replenishing stock efficiently?

Inventory management

Which of the following statements is true of integrating an expert system into the database component of a decision support system (DSS)?

It adds the capability to handle uncertainty and fuzzy data.

Which of the following statements is true of collaborative planning, forecasting, and replenishment (CPFR)?

It aims to improve operational efficiency and manage inventory.

Which of the following statements is true of a database?

It allows more than one program to use the same data.

Which of the following statements is true of an intranet in an organization?

It can be used by trusted business partners with a password.

Identify a true statement about a Web-based group support system (GSS).

It can be used on any operating system.

Which of the following is a characteristic of joint application design (JAD)?

It centers on a structured workshop in which users and system professionals come together to develop an application.

Which of the following is true of a cave automatic virtual environment (CAVE)?

It consists of a cube-shaped room in which the walls are rear-projection screens.

Which of the following is true of the supervisor program of an operating system (OS)?

It controls compilers in the OS.

Which of the following statements is true of Critical Path Method (CPM)?

It determines the critical path for the completion of a series of interrelated activities.

Which of the following statements is true of telemedicine?

It enables medical professionals to conduct remote consultation.

Identify a true statement about virtual medicine on the Internet.

It enables specialists at major hospitals to operate on patients remotely.

In the context of using information technologies for a competitive advantage, which of the following statements is true of a top-line strategy?

It focuses on generating new revenue by offering new products and services.

In the context of using information technology for a competitive advantage, identify a true statement about top-line strategy.

It focuses on generating new revenue by offering new products and services.

Identify a true statement about information and communications technology (ICT).

It generates approximately two percent of the world's carbon dioxide emissions.

Which of the following is true of the control program of an operating system (OS)?

It generates checksums to verify that data is not corrupted.

In the context of a GIS, which of the following is true of high coordination?

It gives flexibility in responding to competitors in different markets.

Identify an advantage of the bus topology.

It handles steady traffic well.

Identify a true statement about information technology.

It has cut down production costs

Identify an advantage of centralized processing.

It helps in exercising tight control over system operations and applications.

In the context of data communication, which of the following media is based on "line of sight"?

It improves customer service.

Which of the following is an advantage of the joint application design (JAD) approach?

It incorporates varying viewpoints from different functional areas of an organization to help ensure that collected requirements for an application is not too narrow or one-dimensional in focus.

In the context of data communication, which of the following is true of e-collaboration?

It increases the cost involved in data communication.

Which of the following statements is true of phishing?

It involves sending fraudulent e-mails that seem to come from legitimate sources.

Which of the following best defines an operating system (OS)?

It is a set of programs for controlling and managing computer hardware and software.

Which of the following statements is true of symmetric encryption?

It is difficult to share a key over the Internet in symmetric encryption.

In the context of information systems, identify an advantage of prototyping.

It is easier to modify a prototype than a complete system.

Which of the following statements is true of the Internet?

It is less secure than an intranet.

Which of the following statements is true of electronic data interchange (EDI)?

It is more beneficial when there are more companies in its network.

In the context of information privacy, which of the following is true of spam?

It is sent in bulk using automated mailing software.

Which of the following statements best describes spyware?

It is software that secretly gathers information about users while they browse the Web.

Which of the following statements is true of big data?

It is the result of the exponential growth of data in both public and private organizations.

Which of the following statements is true of Hypertext Markup Language (HTML)?

It is used to define a Web page's layout and appearance.

Which of the following statements is true of database marketing?

It makes an organization responsive to the needs of its customers.

In the context of trading partner agreements, identify a true statement about electronic business Extensible Markup Language (ebXML).

It makes searches more efficient.

Which of the following statements is true of case-based reasoning (CBR)?

It matches a new problem with a previously solved problem and its solution.

Which of the following statements is true of an e-marketplace?

It reduces marketing costs more than traditional sales channels.

Which of the following is true of a group support system (GSS)?

It reduces stress levels of decision makers.

Which of the following statements is true of Web-based electronic data interchange (Open EDI)?

It reduces the cost of transmitting documents.

Which of the following statements is true of asymmetric encryption?

It requires a large amount of processing power.

In the context of data communication, which of the following is true of convergence?

It requires major network upgrades, because video requires much more bandwidth.

Which of the following is true of magnetic tape?

It stores data sequentially.

Which of the following is true of push technology?

It streamlines the process of users getting software updates.

In the context of the common intentional security threats, which of the following statements best describes a worm?

It travels from computer to computer in a network, but it does not usually erase data.

Which of the following statements is true of a high-quality inkjet printer?

It uses multicolor ink cartridges to print digital photographs.

Which of the following statements is true of an inkjet printer?

It uses multicolor ink cartridges to print digital photographs.

In the context of information technology in workplaces, which of the following allows adding new tasks to employees' responsibilities?

Job upgrading

_____ ensures that key decision makers are involved in designing a management support system (MSS).

Keeping lines of communication open

Which of the following is an important factor in designing a management support system (MSS)?

Keeping the interface simple

monitor and record the keys pressed on a keyboard and can be software or hardware devices.

Keystroke loggers

Which of the following techniques is used to improve customer relationship management (CRM) systems by identifying, storing, and disseminating facts about how to perform tasks?

Knowledge management

Which of the following is a potential drawback of telecommuting?

Lack of necessary supplies or equipment

Which of the following problems is resolved by distributed processing?

Lack of responsiveness in centralized processing

Data sent through a virtual private network (VPN) can be encrypted using the _____.

Layer Two Tunneling Protocol

_____ is concerned with issues such as political repercussions of using an information system and meeting the requirements of the Information Privacy Act.

Legal feasibility

Which of the following geographic objects of a geographic information system (GIS) is most likely used to show a street or a river?

Lines

Which of the following is considered a key decision in supply chain management (SCM) related to manufacturing?

Location

_____, which are generated by Web server software, record a user's actions on a Web site

Log files

Virtual network adapters in Windows Server 2012 R2 can support some hardware acceleration features. Select which one they do NOT support.

MAC address caching

Which of the following statements is true of multinational corporations (MNCs)?

MNCs deliver products and services across national borders.

_____ consists of a series of 0s and 1s representing data or instructions.

Machine language

__________are compatible with the IBM System/360 line introduced in 1965.

Mainframe computers

Which of the following is a strategic requirement for a global information system (GIS)?

Management of global tax risks

In the context of the planning phase of the systems development life cycle (SDLC), which of the following is an example of an internally identified problem in information systems?

Management voicing concern about the organization's lack of a competitive edge in the marketplace

What system is used for forecasting sales?

Marketing information system (MKIS)

The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.

McCumber cube

Every network adapter has a hardware address. What is the common name for it and how long is it?

Media Access Control (MAC) address, 6 bytes

_____ is a method for advertisers to pay for cost per view or cost per click, which is typically one-tenth of a cent.

Micropayment

Which of the following is an example of a client-based e-mail program?

Mozilla Thunderbird

is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.

Narrowband

_____ was developed so that users could communicate with computers in human language.

Natural-language processing

Which of the following principles states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?

Net neutrality

Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model.

Network layer

Select the PowerShell cmdlet with basic syntax if you want to create a private network switch called HalifaxLAN and connect it to your VM's adapter named NSNet1.

New-VMSwitch "HalifaxLAN" -NetAdapterName "NSNet1" -SwitchType Private

In the context of the operators used in a query by example (QBE) form, the _____ is used when only one of the conditions in the QBE form must be met.

OR operator

In the context of customer relationship management (CRM) applications, which of the following approaches is chosen by organizations with an established IT infrastructure?

On-premises CRM

tools are capable of "drilling up," proceeding from the smallest unit of data to higher levels.

Online analytical processing

After creating a private virtual switch, what servers can communicate to each other?

Only VMs on the child partitions can communicate with each other only.

The _____ is a seven-layer architecture for defining how data is transmitted from computer to computer in a network.

Open Systems Interconnection model

_____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.

Operational feasibility

In the context of a global information system (GIS), which of the following kinds of managerial support involves day-to-day activities?

Operational support

Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?

Operations

The following PowerShell cmdlets are all valid for executing functions related to VHDs. Which cmdlet is used for compacting dynamic or differencing disks?

Optimize-VHD

You are using differencing disks for multiple virtual machines (VMs) to preserve the parent image from changes. Now you want to combine the two images together. What PowerShell cmdlet allows you to do this?

Optimize-VHD

_____ is a database management system (DBMS) that is suitable for a large organization.

Oracle

In the context of Internet-enabled supply chain management (SCM), which of the following SCM activities involves handling returned goods and out-of-stock notifications to customers?

Order processing

_____ is a primary activity in a value chain that involves moving and storing products, from the end of the production line to end users or distribution centers.

Outbound logistics

What type of virtual disk points to a physical disk drive, rather than an area of space on a physical disk?

Pass-through disk

_____ radio frequency identification (RFID) tags have no internal power supply.

Passive

_____ is a popular online payment system used on many online auction sites.

PayPal

_____ are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations.

Peer-to-peer e-commerce platforms

Which of the following healthcare systems can make interactive medical tools available to the public?

Personal health information systems

A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model's _____ layers.

Physical and Data Link

The _____ of the Open Systems Interconnection (OSI) model specifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network.

Physical layer

_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.

Physical security measures

Joey, a businessman, designs cases and covers for cell phones. He wishes to showcase his products so that more people know about his work. Which of the following will help Joey promote his products?

Pinterest

are usually collected by an "aggregator" such as iTunes.

Podcasts

Which of the following geographic objects of a geographic information system (GIS) is most likely used to show the location of an airport?

Points

In the context of Internet services, which of the following protocols is used for retrieving messages?

Post Office Protocol

The _____ of the Open Systems Interconnection (OSI) model formats message packets.

Presentation layer

_____, in e-commerce, means all market participants can trade at the same price.

Price transparency

What is the difference between a private virtual switch and an internal virtual switch?

Private switch allows communication between child partition VMs only, whereas an internal includes the parent partition.

Which of the following functions is coordinated by a supply chain management (SCM) system?

Procuring materials and transforming them into intermediate and finished products or services

is a set of rules that governs data communication, including error detection, message length, and transmission speed.

Protocol

are small-scale versions of information systems, which are built before building the entire system, and are used to illustrate the system's benefits and allow users to offer feedback.

Prototypes

_____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.

Public

In the context of Internet-enabled supply chain management (SCM), which of the following SCM activities involves bargaining and renegotiating prices and term agreements?

Purchasing/procurement

Which of the following is a difference between read-only memory (ROM) and random access memory (RAM)?

ROM is nonvolatile memory, whereas RAM is volatile memory.

Which of the following is a factor to consider when determining the best communication media to meet global performance and traffic needs?

Range

_____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users.

Rapid application development

aggregate customers' opinions related to products or services that they have purchased and then suggest them to others with the same interest.

Recommendation Web sites

Jacob, a data analyst, is working on a project from home and needs to download some data from his office network. Which of the following server platforms will best serve Jacob's purpose?

Remote access servers

_____ is an area that involves unstructured decisions.

Research and development

_____ refers to using a cellular phone outside of a carrier's limited service area.

Roaming

Which of the following vendors offers comprehensive solutions for organizations that do not have in-house resources to develop a supply chain management (SCM) system?

SAP

is an example of antispyware software.

STOPzilla

_____ is a computer crime that involves destroying or disrupting computer services.

Sabotage

Which of the following is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?

Safeguarding patients' billing information

Which of the following features of a customer relationship management (CRM) application assists with tasks such as controlling inventory and processing orders?

Salesforce automation

_____ is concerned with whether a new system can be completed on time.

Scheduling feasibility

_____ is a method for improving the volume or quality of traffic to a Web site.

Search engine optimization

_____ holds data when the computer is off or during the course of a program's operation.

Secondary memory

In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.

Secure Sockets Layer

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

Secure Sockets Layer

How does an administrator set up a new virtual network adapter to communicate on a network VLAN?

Select Enable virtual LAN identification and enter a VLAN identifier to associate the network adapter to the VLAN.

Which of the following decisions is supported by a logistics information system (LIS)?

Selecting the best modes of transportation

_____ helps reduce the backlog in producing information systems and improve flexibility in responding to users' information needs.

Self-sourcing

prototypes are used to market a proposed system to users and management by showing some of its features and demonstrating how beneficial it could be to the organization.

Selling

_____ are vaguely defined by standard operating procedures but include a structured aspect that benefits from information retrieval, analytical models, and information systems technology.

Semistructured decisions

_____ is a primary activity in Michael Porter's value chain.

Service

In real estate firms, which of the following is considered one of the major links in the supply chain?

Service providers

_____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.

Service-oriented architecture

Which of the following is a biometric security measure?

Signature analysis

A common way to index and link databases is by using

Social Security numbers

_____ refers to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.

Social networking

is a model in which application service providers (ASPs) deliver software to users for a fee.

Software as a service

_____ are not allowed in domain names.

Spaces

is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

Spoofing

_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.

Spyware

Rather than manually assign IPv6 addresses to computers, how can administrators ensure each Windows computer receives a link-local unicast address upon starting?

Stateless IPv6 Address Autoconfiguration

____ means saving data in computer memory.

Storage

Which of the following is considered a core function of a global information system (GIS)?

Strategic planning

focuses on regionalizing resources more effectively and responding to rapid environmental changes, such as increased political and foreign exchange risks and global competition.

Strategic planning support

_____ of a global information system (GIS) involves broad and long-term goals.

Strategic support

of a global information system (GIS) involves broad and long-term goals.

Strategic support

_____ can be automated because a well-defined standard operating procedure exists for these types of decisions.

Structured decisions

Identify the type of computers that has the highest price.

Supercomputers

Identify the type of computers that has the highest storage capability.

Supercomputers

How do virtual network adapters running on a child partition communicate with the parent partition?

Synthetic adapters communicate by using the VMBus; emulated adapters communicate by making calls to the hypervisor.

_____ of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving long-term goals.

Tactical support

How do you give a VM exclusive access to a physical hard disk?

Taking the disk offline in the parent OS, and then selecting the physical disk in the VM.

In the context of the types of data in a database, which of the following is a source of external data?

Tax records

Which of the following is a supporting activity in a value chain?

Technological development

also known as virtual work, has enabled some people to perform their jobs from home.

Telecommuting

What encapsulates IPv6 packets within User Datagram Protocol (UDP) datagrams between two registered IPv4 nodes in order to traverse IPv4 networks?

Teredo

Which IPv4-to-IPv6 transition technology works through NAT IPv4 routers by establishing tunnel endpoints behind non-IPv6 routers that encapsulate IPv6 packets with UDP datagrams?

Teredo

is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.

Terminal resource security

_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.

The Fair Use Doctrine

In the context of electronic exchange of information, which of the following is used by companies to improve the efficiency and effectiveness of the supply chain process?

The Internet and established Web protocols

refers to the physical objects that are connected to the Internet and, therefore, to all the other physical objects.

The Internet of Things

Which of the following is a smart device that can tell the user's heart rate and lung capacity?

The Under Armour Armour39 shirt

Which of the following components of an enterprise resource planning (ERP) system tracks financial information, such as budget allocations and debits and credits?

The accounting component

Which of the following approaches to set up a distributed database management system (DDBMS) combines the fragmentation approach and the replication approach?

The allocation approach

Which of the following components of a database management system (DBMS) is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages?

The application generation component

Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.

The brokerage model

In the context of Internet services, which of the following is a drawback of Internet telephony?

The call quality is not as good as it is with regular phone lines.

Identify the component of a virtual reality (VR) system that generates and manipulates high-quality graphics.

The central coordinating processor and software system

Which of the following is true of memory devices?

The contents of programmable read-only memory cannot be reprogrammed.

Which of the following is true of memory devices?

The contents of programmable read-only memory cannot be reprogrammed..

Which of the following components of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval?

The database engine

Which of the following components of an enterprise resource planning (ERP) system provides business-to-consumer (B2C) information related to order status and business-to-business (B2B) information related to suppliers and business partners?

The e-commerce

When creating a checkpoint file using Hyper-V Manager, what is the file format and where is it stored?

The file has an AVHD or AVHDX extension, stored in the same folder as the virtual hard disk file.

Which of the following components of an enterprise resource planning (ERP) system provides information on assessing job candidates?

The human resources

Which of the following file structures is similar to a book index that lists page numbers where certain topics can be found?

The indexed sequential access method

Which of the following statements is true of auctions?

The organization hosting an auction collects transaction fees for the service.

What is an example of Automatic Private IP Addressing (APIPA) in IPv4?

The process of discovering, offering, requesting, and acknowledging an IP address from a DHCP server

Which of the following components of an enterprise resource planning (ERP) system provides information related to e-procurement?

The purchasing component

Which of the following components of an enterprise resource planning (ERP) system provides information on marketing?

The sales component

Regarding the benefits of a SAN, what happens during a serverless backup?

The server initiates the backup, but the server is not involved during the backup.

Which of the following events takes place in the most basic client/server configuration?

The user creates a query by running client software.

In the context of decision makers using information technology, which of the following decision-making analyses is available in spreadsheet programs, such as Microsoft Excel?

The what-if analysis

Identify a true statement about unstructured decisions.

They are heavily influenced by the decision maker's intuitions.

Which of the following is true of fourth-generation languages (4GLs)?

They are the easiest computer languages to use.

Which of the following statements is true of geographic top-level domains (TLDs)?

They are used to promote business and tourism.

Which of the following is true of biometrics?

They can enhance Web page security and reduce defacing.

Which of the following is an advantage of application service providers (ASPs)?

They ensure that software is kept up to date, based on users' requests.

Which of the following statements is true of personal robots?

They have limited mobility.

Which of the following is true of semistructured decisions?

They involve multiple criteria.

Which of the following is true of virtual organizations?

They let independent suppliers share skills and have access to each other's markets via information technologies.

In the context of economic feasibility, which of the following statements is true of opportunity costs?

They measure what an individual would miss by not having an information system or feature.

Which of the following statements is true of quick response (QR) codes?

They offer a larger storage capacity than conventional barcodes.

Which of the following statements is true of firewalls?

They protect against external access, but they leave networks unprotected from internal intrusions.

Identify a true statement about copyright laws.

They protect tangible material, such as books.

In the context of information privacy, which of the following is true of cookies?

They provide information about users' location.

Which of the following statements is true of gallium arsenide chips?

They run at higher speeds than silicon chips.

Which of the following is true of fifth-generation languages (5GLs)?

They use artificial intelligence technologies, such as knowledge-based systems.

Which of the following statements is true of laser printers?

They use toners to create high-quality outputs.

Identify a true statement about the different forms of sender and receiver devices.

Thin clients have no processing power.

In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.

Time Division Multiple Access

Why is a differencing disk beneficial?

To maintain the parent image with no changes written to it.

In the context of intellectual property, which of the following is categorized as industrial property?

Trademarks

restricts what type of data can be captured and transmitted in foreign countries.

Transborder data flow

_____ allows the linking of devices running on many different platforms.

Transmission Control Protocol/Internet Protocol

_____, a recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.

Transport Layer Security

contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.

Trojan program

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

Trojan programs

Augmented reality users are immersed in the virtual world while interacting with objects.

True

Collaborative filtering is one of the IT tools that can be used to implement a personalization system.

True

ENIAC is an example of a first-generation computer.

True

Inkjet printers produce characters by projecting onto paper electrically charged droplets of ink that create an image.

True

Rivalry among existing competitors is high when many competitors occupy the same marketplace position.

True

The most common personal digital assistant (PDA) is a smartphone.

True

The quality of information is determined by its usefulness to management information system (MIS) users.

True

is a popular blogging tool that allows users to post anything from their browsers, phones, desktops, e-mail programs, and so forth.

Tumblr

How many network interfaces does Microsoft recommend be installed in a Hyper-V server?

Two physical adapters; one adapter servicing the parent partition and the other to the child partitions

Which of the following statements is true of pair programming?

Two programmers work on the same code at one workstation.

is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.

URL hijacking

Which of the following is a difference between information systems and artificial intelligence (AI) technologies?

Unlike AI technologies, information systems are concerned with capturing and storing data.

When creating a virtual switch by Hyper-V, how many virtualized ports are available?

Unlimited

Identify a disadvantage of group support systems (GSSs).

Unnecessary meetings

How many virtual network adapters can be created on a Hyper-V server?

Up to 12 network adapters-8 synthetic and 4 emulated

is a practice where a store sends coupons to a customer, who has already bought a product from the store, for a more expensive brand of the same product, in the hope that the customer would prefer the expensive brand.

Upselling

What tool can you use to modify a virtual hard disk?

Use Edit Virtual Hard Disk Wizard in Hyper-V Manager in Server Manager

Which of the following statements is true of information systems?

Using information systems on a global scale is more challenging than doing so on a local scale.

If your company uses Hyper-V on Windows Server 2012 R2 and the older Virtual Server, what virtual image file format can you use on both hypervisor products?

VHD

When choosing between disk types in the New Virtual Hard Disk Wizard, what type permits an image size up to 2 TB?

VHD

In Windows Server 2012 R2, what virtual image file provides for the largest size?

VHDX files, up to 64 TB

are private multipoint networks managed by a third party and used by organizations on a subscription basis.

Value-added networks

What type of disk is simply part of the space on a physical disk and appears to the VM as a physical hard disk drive?

Virtual hard disk

What is the key benefit for creating a virtual switch?

Virtual switches have unlimited ports, so there's no need to connect physical switches by uplinks or crossover circuits.

Hyper-V created virtual switches reside in the parent partition and are part of a component called the network ______.

Virtualization Service Provider (VSP)

a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.

Voice recognition

relies on text-to-speech technologies.

Voice-based e-commerce

The goal of _____ is to tailor online searching and requests to users' specific search patterns, preferences, and needs.

Web 3.0

Which of the following is also known as "the Semantic Web"?

Web 3.0

The Internet is playing an important role in helping organizations reduce expenses, because _____.

Web applications can be used with minimum costs

Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____.

Web browsers

Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____.

Web browsers

In the context of e-commerce, which of the following is used to provide product information?

Web sites

enables a user to access his or her e-mail account from any computer and, in some cases, store the e-mails on a Web server.

Web-based e-mail

Which of the following tools is used to create virtual instructional environments?

WebEx

In the context of the roles in the decision support system (DSS) environment, which of the following questions does a managerial designer address?

What should the balance between aggregated and disaggregated data be?

is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.

Wi-Fi Protected Access

Your company environment includes Windows Server versions 2003, 2008 (including R2) and 2012 (including R2). Desktops range from Windows XP and Vista. To transition to IPv6, what versions have IPv6 support running by default?

Windows Server 2003 and Windows XP both include support for IPv6, but they do not install it by default.

In which version of Windows was NIC teaming allowed for Hyper-V virtual machines?

Windows Server 2012 R2

Mobile commerce (m-commerce) is based on the _____.

Wireless Application Protocol

support m-commerce applications.

Wireless wide area networks

You intend to create a new virtual hard disk, specifying a 700 GB VHDX image file with a logical sector size of 4 KB. How do you proceed?

With PowerShell, use the New-VHD cmdlet with appropriate parameters.

Which of the following statements is true of the different forms of sender and receiver devices?

Workstations serve as stand-alone systems.

In the context of supply chain management (SCM) systems, which of the following markup languages has helped organizations use the Internet and Open electronic data interchange (EDI) perform the same function as that of traditional EDI?

XML

Which of the following statements is true of Extensible Markup Language (XML)?

XML tags represent the kind of content being posted and transmitted.

Do VMs ever directly access a physical hard disk?

Yes, virtual hard disks associate directly to the physical hard disks.

Can you modify an existing virtual hard disk (VHD) file?

Yes, you can even modify it without mounting it to a VM.

When creating a new virtual hard disk, what feature does Windows PowerShell offer that the graphical interface does not?

You can specify the block size and the logical sector size.

You need to build a virtual environment with several groups of identical OS installs. How do you accomplish this using minimal disk space?

You clone VMs using differencing disks, pointing multiple VMs to the same parent image.

In the context of Web and network privacy issues, new employees in an organization have to sign a(n) ______ before they access the network.

acceptable use policy

To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n)

acceptable use policy

In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

accountability

Decisions related to _____ are considered semistructured decisions at the operational management level of an organization.

accounts receivable

In a value chain, service involves _____.

activities to support customers after the sale of products

In the context of Web marketing, the term _____ refers to one user viewing one ad.

ad impression

The _____ characteristic of an intelligent agent demonstrates its ability to learn from previous knowledge and go beyond information given previously.

adaptability

The computers in a local area network (LAN) are usually connected to the network via a hardware component called a(n) _____.

adapter card

The _____ of an executive information system (EIS) is responsible for managing data access.

administrative module

The ______ of e-commerce is an extension of traditional marketing media, such as radio and television.

advertising model

Spoofing happens when:

an illegitimate program poses as a legitimate one.

What IPv6 address type functions to identify the routers within a given address scope and send traffic to the nearest router, as determined by the local routing protocols?

anycast address

A(n) ______ is a type of server that stores computer software, which users can access from their workstations.

application server

A(n)__________is a type of server that stores computer software, which users can access from their workstations.

application server

In the context of computer operations, division is a(n) _____.

arithmetic operation

Codes written for one type of computer using _____ do not work on another type of computer.

assembly language

ROM is nonvolatile memory, whereas RAM is volatile memory

assembly language

In a relational database model, the columns are called _____.

attributes

In the context of customer relationship management, ____ is used to manage call centers and help desks.

automated customer service

In the context of customer relationship management, _____ is used to manage call centers and help desks.

automated customer service

In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.

availability

In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.

availability

In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.

back-end systems

A _____ is a type of an intentional computer and network threat.

backdoor

In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

backdoor

Every character, number, or symbol on the keyboard is represented as a(n) _____ in computer memory.

binary number

Bandwidth is often expressed as _____.

bits per second

In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

blended threat

According to the 1980 revisions to the Copyright Act of 1976, _____.

both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs

Intelligent agents are also known as _____.

bots

In the context of data models, relationships among records in a hierarchical model are called _____.

branches

In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.

broadband

An online auction is based on the _____, which brings buyers and sellers together in a virtual marketplace.

brokerage business model

The _____ of an executive information system (EIS) is used by developers to configure data mapping and screen sequencing.

builder module

A _____ is a link between devices connected to a computer.

bus

Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of _____ e-commerce transactions.

business-to-business

Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of ________ e-commerce transactions.

business-to-business

A _____ is initiated by a group of consumers and enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products.

buyer-side marketplace

Large corporations (such as General Electric or Boeing) as well as consortiums of large companies use the _____ model.

buyer-side marketplace

By participating in _____, sellers can automate the fulfillment function of business-to-business (B2B) e-commerce.

buyer-side marketplaces

In the context of storage measurements, a _____ is the size of a character.

byte

Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:

cannot emit light and has speed limitations.

In design and implementation of any _____ application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

case-based reasoning

A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.

cave automatic virtual environment

According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____.

cease charging different rates on data

The__________is the heart of a computer.

central processing unit (CPU)

The control dimension of a global information system requires a(n) _____ architecture for data.

centralized

In the early days of computer technology, a(n) ____ system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.

centralized processing

In the early days of computer technology, a(n) _____ system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.

centralized processing

one node is in charge of selecting the path for all packets.

centralized routing

Initially, offshore outsourcing was used mostly in manufacturing to find _____.

cheap labor

During the _________ of the decision-making process, the best and most effective course of action is selected.

choice phase

In designing a management information system (MIS), the first task is to _____.

clearly define the system's objectives

In the context of Web marketing, the _____ is computed by dividing the number of clicks an ad gets by the total impressions bought.

click-through rate

Microsoft Outlook is an example of a _____.

client-based e-mail program

Computers requesting hypermedia documents on the Internet are called

clients

To minimize the invasion of privacy, organizations should:

collect only the data that is necessary for the stated purpose.

In a technological conference, all the participating IT firms agreed to transfer the data pertaining to their human resources to a cloud. The objective behind this is to improve talent acquisition process and communication among HR professionals around the globe. The cloud referred to in this scenario is a _____ cloud.

community

A(n) ______ is the enclosure containing the computer's main components. CONTINUE

computer chassis

A(n)__________is the enclosure containing the computer's main components.

computer chassis

A similarity between e-commerce and traditional commerce is that both:

concentrate on selling products to generate profit.

A _____ is a tool used in the structured systems analysis and design (SSAD) model for data analysis.

conceptual data model

In the design phase of the systems development life cycle (SDLC), the _____ is an overview of the system and does not include hardware or software choices.

conceptual design

In the context of communication media, _____ provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.

conducted media

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

confidentiality

Online auction sites that involve business transactions between users of products and services are categorized as _____ e-commerce.

consumer-to-consumer

Ryan, an employee of Widget Corp., makes and sells customized paper notebooks. He uses the company's intranet to advertise the notebooks and sell them to the employees of the company. This is an example of _____ e-commerce.

consumer-to-consumer

In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that shows a process at a more general level and is helpful for showing top management and the task force how a process works.

context diagram

In the context of a global information system (GIS), _____ refers to the use of managerial power to ensure adherence to the organization's goals.

control

The ____ tells the computer what to do, such as instructing the computer which device to read or send output to.

control unit

The__________tells the computer what to do, such as instructing the computer which device to read or send output to.

control unit

In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.

convergence

E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.

cookies

are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

cookies

make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.

cookies

In the context of a global information system (GIS), _____ is the process of managing the interaction among activities in different, specialized parts of an organization.

coordination

The trade-off between the amount of control needed and the amount of ______ needed, which are the two dimensions of a global information system (GIS), defines an organization's globalization strategy.

coordination

In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.

copyrights

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

corporate network

Intranets are also called _____.

corporate portals

Online auctions are:

cost-effective for selling excessive inventory.

When a Web page changes, _____ update their indexes and databases automatically to reflect the change.

crawler-based directories

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____

create, read, update, and delete

The _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.

data administration

Computers and communication systems use _____ to represent information between computers and network systems.

data codes

The _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.

data definition

The _____ stores data types for fields, default values for fields, and validation rules for data in each field.

data dictionary

In the context of structured systems analysis and design (SSAD) models, a _____ is a modeling tool that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.

data flow diagram

A _____ is the structure and organization of data, which involves fields, records, and files.

data hierarchy

The _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.

data manipulation

A _____ is usually a smaller version of a data warehouse, used by a single department or function.

data mart

The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained.

data model

A _____ is an input device.

data tablet

A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

data warehouse

Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.

data warehouse

A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.

data-driven Web site

The _____ component of a decision support system (DSS) enables the DSS to perform analysis operations on the information stored in the system.

database

In large organizations, database design and management is handled by a

database administrator

A ____ converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS).

database engine

A ____ is software for creating, storing, maintaining, and accessing database files.

database management system

Microsoft Access is an example of a(n) _____.

database management system

Microsoft Access, which is used to create and manage a series of integrated files, is a(n) _____.

database management system

A natural-language processing (NLP) system provides a question-and-answer setting that is particularly useful with _____.

databases

Coordination in a global information system requires a(n) _____ architecture for data, standardization within departments.

decentralized

In _____, each department has its own computer for performing and controlling processing tasks.

decentralized processing

After a global network is in place, a company must _____.

decide which types of information-sharing technology it will be using

A(n) _____ is an interactive information system consisting of hardware, software, data, and models (mathematical and statistical) designed to assist strategy makers in an organization.

decision support system

A(n) _____, used in the choice phase, helps sort through possible solutions to choose the best one for an organization.

decision support system

Adding deductive reasoning to traditional database management system (DBMS) functions is a benefit of integrating an expert system into the database component of a(n) _____.

decision support system

Structuring the data component, in a management information system, to define what type of data is collected and in what form is usually easy if the organization has ______.

defined its strategic goals, objectives, and critical factors

In the context of segmentation of customers in database marketing, _____ is a variable that includes gender, age, income, and marital status.

demographic information

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

denial-of-service attack

Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).

design phase

During the _____ of the systems development life cycle (SDLC), analysts choose the solution that is the most realistic and offers the highest payoff for the organization.

design phase

A database administrator (DBA) is responsible for _____.

developing recovery procedures in case data is lost or corrupted

Designing and implementing a global database is a technical challenge, mainly because of the _____.

different character sets used for the names of people and places

Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.

digital divide

In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.

disaster recovery plan

A _____ is a peripheral device for recording, storing, and retrieving information.

disk drive

One of the major disadvantages of application service providers (ASPs) is that they:

do not guarantee that applications will fully meet an organization's needs.

Service and support are more important in e-commerce than in traditional commerce because e-commerce companies _____.

do not have a physical location to help maintain current customers

A(n) _____ is a network connection device that can build tables that identify addresses on each network.

dynamic router

By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities.

e-business

Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment.

e-cash

A(n) ______ is the electronic version of a paper check and offers security, speed, and convenience for online transactions.

e-check

A(n) _______ is the electronic version of a paper check and offers security, speed, and convenience for online transactions.

e-check

In a customer relationship management (CRM) system, e-commerce sites use _____ to send notifications on new products and services.

e-mail

An ____ is a third-party exchange that provides a platform for buyers and sellers to interact with each other and trade more efficiently online.

e-marketplace

In the context of the seller-side marketplace model, _____ prevents purchases from suppliers that are not on the approved list of sellers.

e-procurement

In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.

e-wallets

In the context of trading partner agreements, which of the following is true of electronic business Extensible Markup Language (ebXML)?

ebXML allows Web browsers to select only the data requested in a search.

In the planning phase of the systems development life cycle (SDLC), _____ assesses an information system's costs and benefits.

economic feasibility

In a(n) ______ , a user is totally immersed in the virtual reality (VR) world.

egocentric environment

In supply chain management (SCM), many companies substitute _____ for printing, mailing, and faxing paper documents, such as purchase orders, invoices, and shipping notices.

electronic data interchange

In the context of supply chain management (SCM) technologies, _____ enables business partners to send and receive information on business transactions.

electronic data interchange

A(n) _____ is the electronic exchange of money or scrip.

electronic payment

As a physical security measure, _____.

electronic trackers are attached to a computer at the power outlet

Virtual SANs allow you to _______.

eliminate the physical disks

Sometimes called a legacy adapter, the _______ is a standard network adapter driver that communicates with the parent partition by making calls directly to the hypervisor.

emulated network adapter

For a business that is properly designing and using a social media information system (SMIS), the SMIS would most likely:

enable it to share new and dynamic contents with customers in real time.

In object-oriented databases, grouping objects along with their attributes and methods into a class is called

encapsulation

In the context of the input component of a data warehouse, _____ collect, integrate, and process data that can be used by all functional areas in an organization.

enterprise resource planning systems

A(n) _____ is an application used in all the functions of a business and supports decision making throughout the organization.

enterprise system

In the context of collaborative planning, forecasting, and replenishment (CPFR), handling unforeseen problems is called _____.

exception management

The ____ feature of a decision support system (DSS) pinpoints the region that generated the highest total sales.

exception reporting analysis

The _____ feature of a decision support system (DSS) pinpoints the region that generated the highest total sales.

exception reporting analysis

A(n) ____ is a branch of decision support systems (DSSs) that gives managers easy access to internal and external data and typically includes drill-down features and a digital dashboard for examining and analyzing information.

executive information system

For a(n) _____ to be useful, it should collect data related to an organization's critical success factors-issues that make or break a business.

executive information system

Job deskilling occurs when:

experienced labor is eliminated by high technology.

A(n) _____ consists of programs that mimic human thought behavior in a specific area that human specialists have solved successfully.

expert system

Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.

expert system

An ____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

explanation facility

In an examination evaluation expert system, the _____ component of the expert system is responsible for stating why a candidate passed or failed in an examination.

explanation facility

In a data warehouse, _____ is the process of collecting data from a variety of sources and converting it into a format that can be used in transformation processing.

extraction

A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.

extranet

A T3 line uses two pairs of copper wires to carry up to 24 simultaneous conversations and has a transmission rate of 1.544 Mbps.

false

A byte is a single value of 0 or 1.

false

A global information system (GIS) can be defined along two dimensions: customization and communication.

false

A global information system (GIS) remains unaffected irrespective of a company's size and business needs.

false

A key decision in supply chain management (SCM) related to manufacturing is pricing.

false

A network model is similar to a hierarchical data model because in both data models records are organized in the same way.

false

A patent protects product names and identifying marks.

false

A quick response (QR) code offers a smaller storage capacity compared to standard universal product codes (UPC) barcodes.

false

A radio frequency identification (RFID) tag provides a generic identification for a credit or debit card carrying the tag.

false

A ring topology needs more cables to connect the nodes within a network than a star topology.

false

A select operation pares down a table in a relational database by eliminating columns according to certain criteria.

false

A user interface enables a decision support system (DSS) to analyze information.

false

A virtual organization needs an organizational hierarchy for participants to contribute their expertise.

false

An expert system should be used when well-structured numerical problems are involved.

false

Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a client.

false

Application-filtering firewalls are less expensive than packet-filtering firewalls.

false

As a knowledge worker, while making a work-related decision, it is unnecessary to check if the decision complies with the organization's values.

false

Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

false

Auctions help determine the price of goods and services when the original set price is too high in the marketplace.

false

Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment.

false

Bluetooth has line-of-sight limitations.

false

Client-based e-mail enables a user to access his or her e-mail account from any computer.

false

Companies with a transnational structure have decreased efficiency in production costs because production is spread across more locations.

false

Computers cannot store massive amounts of data in small spaces.

false

Computers perform all tasks using a combination of arithmetic and logical operations.

false

Consolidating information from different departments or functional areas is easier in data marts than in data warehouses.

false

Contextual computing lacks the ability to tailor a course of action to a user in a particular situation and environment based on what it knows about the user.

false

Creating a help desk to support users is an important task in the implementation phase of the systems development life cycle (SDLC).

false

Data communication systems increase inventory costs.

false

Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions.

false

Decision makers use the "what-is" analysis to monitor the effect of a change in one or more variables.

false

Decision support systems (DSS) are focused on efficiency rather than effectiveness.

false

Disks are sequential access devices, whereas tapes are random access devices.

false

Distributed processing maintains decentralized control and centralized operations.

false

During the planning phase of the systems development life cycle (SDLC), a systems designer must define the symptoms rather than the underlying problem.

false

E-business excludes transactions that generate demand for goods and services.

false

E-commerce is a subset of social commerce.

false

E-commerce provides product acknowledgements through phone calls and faxes.

false

E-wallets and smart cards increase the risks of exposing consumers' information on the Web.

false

Establishing evaluation criteria often gives rise to subjectivity issues during the systems development life cycle (SDLC) process.

false

Extended ASCII is a data code that allows the representation of 1024 characters

false

Extended ASCII is a data code that allows the representation of 1024 characters.

false

External users are normally part of a company's task force.

false

Government and nonbusiness organizations are prohibited from using e-commerce applications.

false

Groupware is software that helps a group of decision makers work with the same application, provided they work in the same location.

false

In a decision support system (DSS), the user interface manages and coordinates the database and model base.

false

In a multinational structure, financial management is decentralized.

false

In an exocentric environment of virtual reality (VR), users can interact with objects.

false

In an organization with a global structure, the headquarters has the responsibility of selling, marketing, and tailoring products to the requirements and tastes of the countries of its subsidiaries.

false

In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.

false

In network-attached storage (NAS), as the number of users increases, its performance increases.

false

In phased-in-phased-out conversion of the implementation phase of the systems development life cycle (SDLC), an analyst introduces a new information system in only a limited area of an organization.

false

In the context of directories on the Web, Open Directory is an example of an automated directory.

false

In the context of directories on the Web, a human-powered directory uses crawlers to collect data.

false

In the context of intentional computer and network threats, social engineers protects the integrity of information resources.

false

In the context of knowledge management, tacit knowledge can be captured easily in data repositories.

false

In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).

false

In the context of supply chain management technologies, using the Internet and Web protocols for electronic data interchange (EDI) increases the cost of transmitting documents.

false

In the intelligence phase of the decision-making process, a decision maker defines criteria and generates alternatives to meet the criteria.

false

Information management is broader in scope than knowledge management because the latter tends to focus on just explicit knowledge.

false

Labor and population statistics are examples of sources for internal data that are accessed by a database.

false

Mobile commerce (m-commerce) predominantly relies on voice recognition and text-to-speech technologies.

false

Normally, a task force for the planning phase of the systems development life cycle (SDLC) includes only representatives from the IT department and the top management.

false

One of the advantages of prototyping is that modifying a prototype is easier than modifying a complete system.

false

One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices.

false

One of the drawbacks of a well-designed enterprise resource planning (ERP) system is that it tends to increase the cost of inventories.

false

One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.

false

Online degree programs adversely affect colleges and universities that are facing an enrollment decline.

false

Outbound logistics, a primary activity in Michael Porter's value chain, includes tasks associated with receiving, storing, and converting raw materials to finished goods.

false

Protocols are devices that connect users to the Internet.

false

Pull technology is adequate for marketing certain products and services and for providing customized information.

false

Real-time computer conferencing used in electronic meeting systems includes video capability.

false

Service and support are more important in traditional commerce than in e-commerce.

false

Social engineering is an attack that takes advantage of the backdoors in security systems.

false

Spreadsheet software is more powerful than financial planning software.

false

Static Web sites are useful for e-commerce sites that need frequent updates.

false

Terrestrial microwave systems use radio control transmitters and receivers for transmitting data.

false

The Internet complicates communication and restricts opportunities for consumers.

false

The Internet is owned by the Advanced Research Projects Agency Network (ARPANET).

false

The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology.

false

The buyer-side marketplace offers suppliers a direct channel of communication to buyers through online storefronts.

false

The cost of setting up a virtual private network (VPN) is usually high.

false

The creation of a system specifications document indicates the beginning of the analysis phase of the systems development life cycle (SDLC).

false

The data transfer speeds of local area networks (LANs) are typically below 100 Mbps.

false

The increase in direct buyer-seller communication through e-business has eliminated the opportunities for intermediaries.

false

The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.

false

The object-oriented approach to the analysis and design of information systems treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design.

false

The systems development life cycle (SDLC) model is appropriate in situations when the problem under investigation is not well defined.

false

The third-party exchange marketplace model is controlled by sellers and buyers.

false

The use of e-wallets is restricted to nonportable devices.

false

The use of the OR operator in a query form, when using query by example (QBE), means that all conditions must be met.

false

Transmitting documents across the Internet involves lower security risks than traditional electronic data interchange (EDI).

false

Unstructured decisions are often used in computer configuration.

false

Users and top management should not be included in the construction phase of a prototype because construction is purely a technical matter.

false

Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers.

false

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

false

While using PERT (Program Evaluation Review Technique) and CPM (Critical Path Method) techniques, activities that are on the critical path are more flexible than those activities which are not on the critical path.

false

With asynchronous transmission, both parties on a network must be connected at the same time.

false

With the indexed sequential access method (ISAM), records cannot be accessed randomly.

false

With the popularity of the Internet, the use of value-added networks has increased.

false

When planning a comprehensive security system, the first step is designing ____ , which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

fault-tolerant systems

The Internet backbone is a foundation network linked with _____ that can support very high bandwidth.

fiber-optic cables

is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

firewall

In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.

flowchart

In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.

focuses on a specific area

In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.

foreign key

Structured query language (SQL) is an example of a(n) _____.

fourth-generation language

In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the:

freedom of speech provisions of the First Amendment.

A level 1 security system is used to protect _____ against unauthorized access.

front-end servers

In the context of virtual reality (VR), ______ refers to allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices.

full-body immersion

If a company uses multimedia applications in addition to normal file and database sharing, _____ is more efficient.

full-duplex transmission

GeneHunter is a hybrid product that combines artificial intelligence (AI) technologies using _____.

genetic algorithms

A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).

geographic information system

A(n) ______ captures, stores, processes, and displays information in a topographical context, such as showing the location of all streetlights on a map.

geographic information system

A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function is the exchange of Internet2 (I2) traffic with a specified bandwidth.

gigapop

Social networking sites can reduce organizations' costs by _____.

giving customers more access to all sorts of data

is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

global information system

An organization with a(n) _______ , sometimes called a "franchiser," uses highly centralized information systems.

global structure

One of the issues with a _____ is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation.

global structure

In the IPv6 space, what is the equivalent of a registered IPv4 address, routable worldwide and unique on the Internet?

global unicast address

In _____, a geographic information system (GIS) is used to make the best use of personnel and equipment while dealing with a tight budget and maintaining crime statistics.

government

Tax filing and payments; completing, submitting, and downloading forms; and requests for records are all categorized as ______ e-government applications.

government-to-citizen

With ____ , users can make use of other computers' resources within an organization to solve problems involving large-scale, complex calculations, such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.

grid computing

With _______ ,users can make use of other computers' resources within an organization to solve problems involving large-scale, complex calculations, such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.

grid computing

Buyline is an e-commerce Web site. It has come up with a promotional offer where buyers get a 60 percent discount on refrigerators if a minimum of 100 buyers agree to buy the product within 24 hours of the offer being announced. In this case, it is evident that BuyLine is a _____.

group buying platform

A ____ is the most commonly used device that enables users to navigate in the virtual reality (VR) environment and manually control various objects.

head-mounted display

In a global information system (GIS), high coordination:

helps maintain control of market needs around the world.

In a _____ , the relationships among records form a treelike structure.

hierarchical model

In a(n) _____, nodes with the same parents are called twins or siblings.

hierarchical model

Java and C++ are examples of ___

high-level languages

Java and C++ are examples of _____.

high-level languages

In the context of Web marketing, any element of a Web page that is clicked counts as a _____ to a server.

hit

A _____ concentrates on a specific function or business process and automates this function or process for different industries.

horizontal market

A company can purchase a maintenance, repair, and operation (MRO) package that might include services from different vendors, but an e-distributor coordinates them into one package for customers. This packaging is an example of a _____.

horizontal market

In the context of e-marketplaces, a _____ concentrates on coordinating a business process or function involving multiple vendors.

horizontal market

In the third-party exchange marketplace model, media buying is an example of a _____.

horizontal market

A group support system (GSS), with the help of a(n) _____, enhances decision making by providing a clear focus for group discussion and focusing attention on critical issues.

human facilitator

A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

hybrid

The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.

hypermedia

In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.

if

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.

illegal and unethical

Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____.

illegal, but ethical

Diverse regulatory practices _____ the integration process of a global information system (GIS).

impede

During the _____ of the decision-making process, ideas are converted into actions.

implementation phase

One of the advantages of e-commerce is that it:

improves customer service.

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

in spear phishing, the attack is targeted toward a specific person or a group.

In the context of an organization's information system, external users _____.

include customers, contractors, and suppliers

A knowledge management system should help an organization:

increase revenue by reducing the delivery time for products and services.

The advantage of the _______ is that both sequential and random access can be used to access records, depending on the number being accessed.

indexed sequential access method

In the context of intellectual property, inventions are categorized as _____ properties.

industrial

In the context of the components of an expert system, a(n) _____ is similar to the model base component of a decision support system.

inference engine

E-commerce sites that use the _____ collect data on consumers and businesses and then sell this data to other companies for marketing purposes.

infomediary model

Symbic Technologies offers cloud computing services to several data centers around the world. It provides servers, networking elements, and storage. Symbic Technologies owns the equipment and is in charge of housing, functioning, and maintaining it. In the context of cloud computing services, it is evident that Symbic Technologies provides _____.

infrastructure as a service

Third-generation computers operated on _____.

integrated circuits

A(n) _____ for global control over an organization's resources is the foundation of any global information system (GIS).

integrated network

In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.

integrity

In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.

integrity

In the _____ of the decision-making process, data is collected from internal and external sources and processed.

intelligence phase

A(n) _____ is an artificial intelligence application that can be used for Web marketing

intelligent agent

A(n) _____ is an artificial intelligence application that can be used for Web marketing.

intelligent agent

In a virtual reality (VR) environment, enabling users to act on objects, such as using a data glove to pick up and move objects, is known as _____.

interaction

A(n) _____ enables communication between a video card and memory.

internal bus

An organization with a(n) _____ operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions.

international structure

The _____ aspect of a group support system (GSS) reduces communication barriers and introduces order and efficiency into situations that are inherently unsystematic and inefficient.

intervention

E-commerce activities that take place within an organization's data communication network are part of _____.

intrabusiness e-commerce

Unstructured decisions are often used in _____.

introducing a new product

Gallium arsenide _____ than silicon.

is more fragile

For each database, there:

is only one physical view of data.

The data transfer speed of a wide area network (WAN) depends on the speed of _____.

its interconnections

In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.

job upgrading

The supervisor program in an operating system (OS) is also known as the _____.

kernel

Housed at server farms, search engines use _____ to index data coming in from crawlers.

keywords

In the context of computer literacy and information literacy, to be competitive in a workplace, knowledge workers should _____.

know how and why data is collected

To be competitive in a workplace, in terms of computer and information literacy, a knowledge worker should _____.

know how and why data is collected

In a natural-language processing (NLP) system, the ____ activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content.

knowledge acquisition

In the context of the components of a typical expert system, a _____ is a software package with manual or automated methods for acquiring and incorporating new rules and facts so that the expert system is capable of growth.

knowledge acquisition facility

A(n) _____ is a common output device for hard copy.

laser printer

Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.

legal and ethical

Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____.

legal but unethical

A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____

legal, but unethical

Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.

legal, but unethical

In the IPv6 space, what kind of network address do systems automatically assign themselves, similarly to an APIPA address in IPv4?

link-local unicast address

A(n) _____ is a common output device for soft copy.

liquid crystal display

is typically used to connect workstations and peripheral devices that are in close proximity.

local area network

Some companies create separate Web sites for each country in which they do business. This is called _____ of a Web site.

localization

In the design phase of the systems development life cycle (SDLC), the _____ indicates hardware and software, such as specifying Linux servers and Windows clients.

logical design

To begin designing a relational database, you must define the _____ by defining each table and the fields in it.

logical structure

The ____ of a database involves how information appears to users and how it can be organized and retrieved.

logical view

In the context of intellectual property, _____ are categorized as industrial property.

logos

In a customer relationship management (CRM) system, marketing strategies focus on:

long-term relationships with customers.

A(n) _____ , made of Mylar, is used for random-access processing of data in a computer.

magnetic disk

A(n)__________, made of Mylar, is used for random-access processing of data in a computer.

magnetic disk

During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.

maintenance phase

During the _______ of the systems development life cycle (SDLC), a team assesses how a system is working and takes steps to keep the system up and running.

maintenance phase

The different types of information systems that have been developed to support certain aspects and types of decisions are collectively called

management support systems

The four Ms of resources in information systems are _____.

manpower, machinery, materials, and money

The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet.

merchant model

The _______ is an HTML tag that provides information on the keywords that represent the contents of a Web page.

meta tag

In the context of the knowledge base component of an expert system, _____ enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution.

meta-knowledge

In data warehouses, _____ is information about data-its content, quality, condition, origin, and other characteristics.

metadata

A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.

metropolitan area network

is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.

metropolitan area network

The _____ , a widely used business model in e-commerce, refers to generating revenue from more than one source.

mixed model

A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.

mobile network

The _____ characteristic of an intelligent agent demonstrates the agent's ability to migrate from one platform to another with a minimum of human intervention.

mobility

The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information

model base

The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.

model base

A(n) ____ is a system that performs tasks similar to a database management system (DBMS).

model base management system

In a decision support system (DSS) environment, a _____ is the liaison between users and designers.

model builder

A(n) _____ is a device that connects a user to the Internet.

modem

A ____ is an input device for computers.

mouse

A__________is an input device for computers.

mouse

is an organization with assets and operations in at least one country other than its home country.

multinational corporation

In a(n) _____, a company's subsidiaries operate autonomously but regularly report to the parent company.

multinational structure

In a(n) _____, production, sales, and marketing are decentralized and financial management remains the parent company's responsibility.

multinational structure

A _____ is a hardware device that allows several nodes to share one communication channel.

multiplexer

A ____ provides an easier way for people to communicate with a computer than a graphical user interface (GUI).

natural-language processing system

A _____ provides an easier way for people to communicate with a computer than a graphical user interface (GUI).

natural-language processing system

The size and complexity of the human language has made developing _____ difficult.

natural-language processing systems

With the _____ approach, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico.

nearshore outsourcing

Given the IPv6 address: 21cd:001b:0000:0000/8, what does the "/8" at the end signify?

network bits

Given the IPv6 address: 21cd:0053:0000:0000/64, what does the "slash 64" at the end signify?

network bits

In a(n) _____, each record can have multiple parent and child records.

network model

A _____ represents a network's physical layout.

network topology

In the context of grid computing, each participant in a grid is referred to as a(n) _____.

node

A routing table lists _____.

nodes on a network

In the context of determining the best communication media to meet global performance, the _____ factor involves how immune a communication medium is to outside electronic interference.

noise

In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.

nonrepudiation

What is the primary benefit of the IPv6 address space over the IPv4 address space?

number of possible hosts and networks

To make a computer understand a program, the source code must be first translated into ______ code.

object

To make a computer understand a program, the source code must be first translated into__________code.

object

Trackballs are ideal for notebook computers because they _____.

occupy less space than a mouse

Compared with a star topology, a hierarchical topology:

offers a great deal of network control and lower cost.

With an ______ approach, an organization chooses an outsourcing firm in another country that can provide needed services and products.

offshore outsourcing

In the context of machine learning, an artificial neural network (ANN) is most likely used for:

oil and gas exploration.

With the _____ approach, an organization chooses an outsourcing company in the same country.

onshore outsourcing

UNIX is a type of _____.

operating system

A(n) ___ , a memory device, uses laser beams to access and store data.

optical disc

A(n)__________, a memory device, uses laser beams to access and store data.

optical disc

In the context of storage devices, CD-ROMs and DVDs are examples of _____.

optical discs

A(n) _____ is an input device used to grade multiple-choice and true/false tests.

optical mark recognition system

A write once, read many (WORM) disc is a common type of _____.

optical storage

is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network.

packet

In the extreme programming environment, _____ allows programmers to detect and correct programming mistakes as they go, which is faster than correcting them after an entire program has been written.

pair programming

In the extreme programming environment, ______ allows programmers to detect and correct programming mistakes as they go, which is faster than correcting them after an entire program has been written.

pair programming

In _____ of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simultaneously for a short time to ensure the new system works correctly.

parallel conversion

A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.

parallel port

In grid computing, when a large complex task is split into smaller tasks that run simultaneously on several nodes, it is known as

parallel processing

is an intellectual property that protects new processes.

patent

Decisions related to _____ are considered structured decisions at the operational management level of an organization.

payroll

In general terms, there are three ways a computer receives an IPv4 or IPv6 address. Which of the following is NOT one of them?

peer allocation

A _____ can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.

personal agent

Bluetooth can be used to create a _____ for communication among computerized devices.

personal area network

In the context of customer relationship management (CRM), _____ requires gathering a lot of information about customers' preferences and shopping patterns.

personalization

The internal data sources for an information system include _____.

personnel records

Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

pharming

In _____ of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, the corresponding part of an old system is retired.

phased-in-phased-out conversion

During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.

physical design

In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.

physical view

During the _____ of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem.

planning phase

During the _____ of the systems development life cycle (SDLC), analysts investigate a proposed solution's feasibility and determine how best to present the solution to management to obtain funding.

planning phase

The end result of the _______ of the systems development life cycle (SDLC) model should give users and top management a clear view of what the problem is and how the information system will solve the problem.

planning phase

In the context of cloud computing, _____ automates the configuration, deployment, and ongoing management of applications in the cloud.

platform as a service

A _____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or their computers.

podcast

Syndication feeds are one way of announcing the availability of a _____.

podcast

In the context of Web marketing, _____ are display ads that appear on top of a browser window, blocking the user's view.

pop-up ads

Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on.

predictive modeling

Microsoft PowerPoint is the most commonly used _______ software.

presentation

Microsoft PowerPoint is the most commonly used__________software.

presentation

In a relational database, every record must be uniquely identified by a

primary key

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

private

The purpose of an information system's _____ component is generating the most useful type of information for making decisions.

process

To be useful, information systems should _____.

produce information in different formats

In the context of a manufacturing firm's supply chain management (SCM) system, the ____ area manages the movement of goods all the way from suppliers to customers, including customer service and support.

product flow

In the context of a manufacturing firm's supply chain management (SCM) system, the ______ area manages the movement of goods all the way from suppliers to customers, including customer service and support.

product flow

Considering the entire organization's operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market.

production and marketing

With virtual organizations, _____.

products can be customized more to respond to customers' needs

In the context of the requirement of skilled analysts for implementing a global information system (GIS), there is a severe shortage of qualified information systems:

professionals in the United States.

A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.

program

In a relational database model, a(n) _____ pares down a table by eliminating columns according to certain criteria.

project operation

In the context of prototyping during the design phase of the systems development life cycle (SDLC), a _____ shows users how a particular task that was not technically feasible or appears to be unfeasible can be done.

proof-of-concept prototype

The final task in designing a management information system (MIS) is _____.

providing information in a useful format for decision-making purposes

In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.

proxy server

Alconac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments. Given this information, it can be concluded that Alconac Systems uses _____ to access information from different departments.

pull technology

BuyStore Inc., an online retail store, sells all of its products through its Web site, buystore.com, and through an application on cell phones. BuyStore Inc. is an example of a _____.

pure-play company

In Web marketing, with _____, information is sent to users based on their previous inquiries, interests, or specifications.

push technology

With _____, a Web server delivers information to users, who have signed up for the service, instead of waiting for them to request the information be sent to them.

push technology

A(n) _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.

quick response code

Communication media that use an antenna for transmitting data through air or water are called

radiated media

Transmission of data across satellites is an example of data communication through _____.

radiated media

A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.

radio frequency identification tag

Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the _____ as the communication medium.

radio frequency spectrum

In a(n) _____ , records can be accessed in any order, regardless of their physical locations in storage media.

random access file structure

The Clipboard's contents are typically stored in _____.

random access memory

Intelligent agents demonstrate _____, which is the ability to select problems or situations that need attention and act on them.

reactivity

A potential benefit of telecommuting is that it _____.

reduces employee turnover

In the context of a global information system, consolidated global reporting is a crucial tool for managing overseas subsidiaries because it:

reduces the difficulties caused by the differences in accounting procedures.

Aton Motors, an automobile manufacturer, establishes its manufacturing units in Argentina because of the low cost of the metal used to make automobile frames. In this scenario, Aton Motors has _____ its operations.

regionalized

A manufacturer moving operations to another country because of the advantages available in that country is involved in _____ the operations.

regionalizing

In the _____ of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it.

requirements-gathering and analysis phase

Nanomaterials, if added to golf balls, increase the _____ of the golf balls.

responsiveness

In a(n) _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.

ring topology

In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

robots

The process of deciding which path data takes on a network is called _____.

routing

The _____ module of an executive information system (EIS) is responsible for using the system.

runtime

The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:

safeguarding health insurers' credit information.

In the context of customer relationship management, ____ assists with tasks such as tracking customer interactions and analyzing sales forecasts.

salesforce automation

In the context of data communication, a _____ is based on "line of sight."

satellite

The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.

scanning tunneling microscope

A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

search engine

Companies exclusively using business-to-consumer (B2C) applications:

sell directly to consumers.

A popular application of the _____ , which is a major business-to-business (B2B) e-commerce model, is e-procurement.

seller-side marketplace model

In a typical organization, _____ are often used in capital acquisition analysis.

semistructured decisions

In the context of the features of a decision support system (DSS), _____ enables you to apply different variables in decision making.

sensitivity analysis

In a(n) ______ , records in files are organized and processed in numerical order.

sequential access file structure

A(n) _____ is a communication interface through which information is transferred one bit at a time.

serial port

Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a _____.

server

The fundamental principle behind ______ is that the self-contained blocks of codes can be reused in a variety of different applications, allowing new business processes to be created from a pool of existing services.

service-oriented architecture

Twitter is an example of _____.

short-message service

To design a successful global information system (GIS), management of a company:

should not assume that customers' preferences will not change.

The most common type of main memory is a semiconductor memory chip made of

silicon

The most common type of main memory is a semiconductor memory chip made of__________.

silicon

In a virtual reality (VR) environment, giving objects texture and shading for a three-dimensional (3D) appearance is known as _____.

simulation

The cost of hiring additional employees in virtual organizations is reduced because:

skills are shared among the participating companies.

A _____ is about the size of a credit card and contains an embedded microprocessor chip for storing important financial and personal information.

smart card

The process of capturing and recording network traffic is referred to as _____.

sniffing

In the context of security, _____ is an attack that takes advantage of the human element of security systems.

social engineering

Equi Technologies offers cloud computing services to several data centers around the world. It hosts services in the cloud, which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies. In the context of cloud computing services, it is evident that Equi Technologies provides _____.

software as a service

Hosting services are now available for supply chain management (SCM) systems. This trend is called

software as a service

With the _____, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software.

software as a service model

When a computer is infected by a virus, _____.

some programs suddenly increase in size

In the context of information privacy, junk e-mail is also known as _____.

spam

A geographic information system (GIS) with analytical capabilities evaluates the impact of decisions by interpreting _____.

spatial data

The Web page displayed when a user first visits a site is called a(n) _____.

splash screen

John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.

spoofing

Search engines and directories offer space that companies can purchase for advertising purposes. This process is called

spot leasing

Managers use executive information systems (EISs) to:

spot trends..

Corel Quattro Pro is an example of_________

spreadsheet software

The coordination dimension of a global information system (GIS) requires _____.

standardization within departments

While deciding the type of information-sharing technology that a company will be using for its global network, the company's information system manager should keep in mind that:

standardized software and hardware are not always feasible.

In comparison with a flat file system, _____ in a database.

storage space is reduced

Data warehouses are sometimes called hypercubes because they _____.

store multidimensional data

Record keeping, payroll, and simple inventory problems are examples of _____ tasks.

structured

In the context of organizational decisions at the strategic management level, _____ are often used in deciding the plant location of an organization.

structured decisions

The ____ approach treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design of information systems.

structured systems analysis and design

The _____ approach treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design of information systems.

structured systems analysis and design

How does Classless Inter-Domain Routing help reduce waste of IP addresses?

subnetting method that divides between network bits and host bits anywhere, not only between octets

Using the _____, e-commerce sites sell digital products and services

subscription model

Using the _____, e-commerce sites sell digital products and services.

subscription model

In a manufacturing firm's supply chain, raw materials flow from _____ to manufacturers, where they are transformed into finished goods.

suppliers

is an integrated network consisting of an organization, its vendors, transportation companies, and brokers used to deliver goods and services to customers.

supply chain

With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.

synchronous

A(n) ______ is a virtual device that communicates with the parent partition by using a high-speed conduit called the VMBus.

synthetic network adapter

The synthetic network adapter in the child partition is a(n) ________.

synthetic network adapter

Personal or informal knowledge is referred to as _____.

tacit knowledge

Groupware is intended mainly for _____.

teamwork

In a decision support system (DSS), decisions about the type of file structure to be used are taken by the _____.

technical designer

In the decision support system (DSS) environment, the _____ focuses on how a DSS is implemented and usually addresses questions about data storage, user access, response time, and security measures.

technical designer

Before adding a global information system (GIS), international companies must take into consideration the _____ infrastructures of the countries where its subsidiaries are located.

telecommunication

A ____ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web.

teleimmersion system

In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal.

terminator

One shortcoming of rapid application development (RAD) is _____.

that it has a narrow focus, which might limit future development

Saving data on the application service provider's (ASP's) servers instead of on users' own workstations might cause:

the data to be exposed to theft by attackers.

In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:

the person using a credit card number is the card's legitimate owner.

In the two-tier architecture of the client/server model, _____.

the presentation logic is always on the client

During the implementation phase of the systems development life cycle (SDLC), _____.

the proposed solution is transferred from paper to action, and a team configures the system and procures components for it

Control in a global information system requires _____.

the use of defined behaviors for different processes

In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the _____ part, and backtracks to find the right solution.

then

The _____ model generates revenue from the fees charged for matching buyers and sellers.

third-party exchange marketplace

To be useful, information must have the quality of _____.

timeliness

Organizations can benefit from patents as they can use patents:

to keep competitors from entering certain market segments.

The _____ denotes the type of organization or country the address of a document or site on the Internet specifies.

top-level domain

Second-generation computers used _____.

transistors

An organization with a(n) _____ might have several regional divisions that share authority and responsibility, but in general, it does not have its headquarters in a particular country.

transnational structure

Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support a(n) _____.

transnational structure

In an organization with a(n) _____ , the parent company and all the subsidiaries work together in designing policies, procedures, and logistics for delivering products and services to the right market.

transnational structure

In the context of the types of organizations that do business across national borders, the architecture of the global information system (GIS) in a(n) _____ requires a higher level of standardization and uniformity for global efficiency, and yet it must maintain local responsiveness.

transnational structure

A hierarchical topology is also called a _____.

tree topology

A database engine converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS).

true

A database is a critical component of information systems because any type of analysis that is done is based on data available in the database.

true

A geographic information system (GIS) can integrate maps and database data with queries.

true

A grocery store offering loyalty cards with discounts to its customers is an example of how transaction data can be used in a customer relationship management (CRM) system.

true

According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.

true

According to the guidelines for designing a management support system, when benefits are intangible, the design team should associate the benefits with a measurable factor, such as increased sales.

true

Active radio frequency identification (RFID) tags have internal power supply.

true

Although a database can consist of only a single file, it is usually a group of files.

true

An access point (AP) is the part of a wireless local area network (WLAN) that connects it to other networks.

true

An intranet is an application or service that uses an organization's computer network.

true

An intrusion detection system (IDS) can protect networks against both external and internal access.

true

An organization's structure usually determines the architecture of its global information system (GIS).

true

Any packet-switching network can handle multimedia data.

true

Artificial intelligence (AI) applications and technologies are more intelligent than traditional information systems.

true

As e-business matures and more companies conduct business online, consumers can engage in comparison shopping more easily.

true

Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling.

true

Copyright laws cover online materials that can be printed or saved on a storage device.

true

Criteria are goals and objectives that decision makers establish to achieve certain performance levels.

true

Currency conversion is a challenge in global database development.

true

Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.

true

E-commerce is part of e-business.

true

Effective design and implementation of an executive information system (EIS) requires top management support and user involvement.

true

Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).

true

Even if there are more than one smart object on an individual's body, they would not be aware of each other's existence.

true

Executive information systems (EISs) are used for reporting exceptions.

true

Fuzzy logic is used in refrigerators that set defrosting and cooling times based on usage patterns.

true

Green computing helps an organization save on energy costs.

true

If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.

true

In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.

true

Information system projects are often an extension of existing systems or involve replacing an old technology with a new one.

true

Intelligent agents are used for virtual catalogs.

true

Intranets are typically set up behind a firewall.

true

It is important to project an organization's growth rate when designing information systems.

true

Knowledge management draws on concepts of organizational learning and organizational culture.

true

Lack of standardization can impede the development of a cohesive global information system (GIS) that is capable of sharing information resources across borders.

true

Local hardware and software vendors influence which applications a multinational company chooses.

true

One method of conducting voice-based e-commerce is using e-wallets.

true

Organizations sometimes pay external agencies for additional data about their potential customers.

true

Problems involving a combination of the five senses, such as taste and smell, are not suitable for expert systems.

true

Robots can be used in environments that are hazardous to humans.

true

Service-oriented architecture (SOA) advocates that core business functions and the dynamic functions that change all the time should be decoupled.

true

Some robots have limited vision that is useful for locating and picking up objects, as long as the objects are isolated from other objects.

true

Supply chains exist in both service and manufacturing organizations.

true

Telepresence surgery allows surgeons to operate all over the world without physically traveling anywhere.

true

The World Wide Web changed the Internet by introducing a graphical interface to the largely text-based Internet.

true

The best way to gather tacit knowledge is interactively, such as asking an employee specific questions about how he or she would handle an issue.

true

The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.

true

Universities are an example of nonbusiness organizations that use e-commerce applications.

true

Viruses can be transmitted through a network or through e-mail attachments.

true

Voice over Internet Protocol (VoIP) is used to route traffic starting and ending at conventional public switched telephone network phones.

true

When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.

true

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

true

When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.

true

Wireless network traffic can be captured with sniffers.

true

With a global information system (GIS) in place, a company can efficiently track production schedules.

true

In a relational database model, the rows are called _____.

tuples

In the ____ , the application logic is usually on the client side.

two-tier architecture

In the ______ , the application logic is usually on the client side.

two-tier architecture

When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.

typosquatting

The _____ component of an enterprise resource planning (ERP) system collects and analyzes relevant internal and external information needed by other functions.

unified database

A(n) _____ identifies a Web page and is the address of a document or site on the Internet.

uniform resource locator

In the IPv6 space, what are the equivalent of the 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 private network addresses in IPv4?

unique local unicast address

In the context of organizational decisions at the tactical management level, _____ are often used in resolving conflicts between two divisions.

unstructured decisions

In the context of organizational decisions at the tactical management level, _____ are often used in setting queue priorities.

unstructured decisions

To minimize the invasion of privacy, users and organizations should:

use verification procedures to ensure data accuracy.

Unlike data in databases, data in data warehouses is:

used for analytical purposes.

With Voice over Internet Protocol (VoIP), _____.

users can have calls forwarded from anywhere in the world

To minimize the invasion of privacy, _____.

users should be able to review their records and correct any inaccuracies

Green computing can be achieved by:

using video conferencing, electronic meeting systems, and groupware.

Beginning in the 1940s, first-generation computers used _____.

vacuum tube technology

The _____ concept introduced by Michael Porter consists of a series of activities designed to meet business needs by adding cost in each phase of the e-commerce process.

value chain

In the context of a global information system (GIS), _____ offer electronic data interchange standards, encryption, secure e-mail, data synchronization, and other services to conduct international business.

value-added networks

In the context of executive information systems (EISs), _____ allows managers to flag data that is unusual or out of normal boundaries.

variance reporting

In the third-party exchange marketplace model, a ____ concentrates on a specific industry or market.

vertical market

In the third-party exchange marketplace model, a ________ concentrates on a specific industry or market.

vertical market

In the third-party exchange marketplace model, the sale of medical products is an example of a _____.

vertical market

A(n) _____ is often used so that remote users have a secure connection to an organization's network.

virtual private network

A _______, like its physical counterpart, is a device that functions at layer 2 of the Open Systems Interconnect (OSI) reference model.

virtual switch

A(n) _____ is a simulated environment designed for users to interact via avatars.

virtual world

consists of self-propagating program code that is triggered by a specified time or event.

virus

The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes.

volume

The systems development life cycle (SDLC) is also known as the _____.

waterfall model

In the context of the types of decision-making analyses, the ____ is commonly used in transaction-processing systems and management information systems.

what-is analysis

In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.

why the buyer buys a product or service

A _____ is a type of Web site that allows users to add, delete, and sometimes modify content.

wiki

Worldwide Interoperability for Microwave Access (WiMAX) is designed for _____.

wireless metropolitan area networks

Code Red, Melissa, and Sasser are examples of

worms


संबंधित स्टडी सेट्स

Sheep and Goat management exam 1

View Set