Informatics 109 IVYT

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Microservices to one another using agreed upon interfaces called ________.

Application Programming Interfaces (API)

________ is process for testing skills and knowledge.

Certification

When an end user, application program, or other software needs data from the database, it requests the data through the ________; this is the process of data retrieval. In a relational database, the schema defines the tables, the attributes in each table, and the relationships between attributes and tables, which are used to develop user views; however, in this case, an application rather than a user is requesting data.

DBMS

Tonya is excited because she just upgraded her personal laptop. The component of her new computer system that controls the hardware and acts as an interface with application software is called an application programming interface. True or false?

False

When Tonya enters an order for several cases of ice cream, the application she uses must request data about the prices and availability of the ice cream flavors from the supplier's database. The function the database management system (DBMS) performs in this situation is to provide a user view. True or false?

False

LAN

Local Area Network

MAN

Metropolitan Area Network

________ communicate to one another using agreed upon interfaces called application programming interfaces (API).

Microservices

________ is a set of programs that controls a computer's hardware and acts as an interface with application software?

Operating System (OS)

________ is set of steps that need to be followed to achieve a specific end result, such as entering a customer order, paying a supplier invoice, or requesting a current inventory report.

Procedure

5G networks offer three advantages over 4G networks: increased bandwidth, lower latency, and support for many more devices simultaneously. True or false?

True

WAN

Wide Area Network

Developing a safety-critical software system is more time consuming and expensive than developing a non-safety-critical but high-quality system because it requires extreme measures for identifying and removing defects; a great deal of effort to identify and mitigate risks; and _____. a. a division of responsibilities between software developers and systems engineers b. a totally different sequence of software development tasks c. a development team composed of highly trained and experienced professionals d. an end product that is easy to learn and use, performs well, and meets users' needs

c

If one uses common knowledge (George Washington was our first President), does one need to credit a source?

no

________ is an information system that improves the productivity of individual users in performing stand-alone tasks.

personal information system

Which software solution enables an enterprise business strategy that creates a common repository of product information and processes to facilitate the collaborative creation, management, dissemination, and use of product and packaging definition information?

product lifecycle management

What are the steps of the multistage model for e-commerce?

search and identification, selection and negotiation, purchasing, product and service delivery, after-sales service

If you turn in the same paper (which you wrote) for your History class and your English class, this is called _________.

self-plagiarism

Identify four benefits of creating a strategic plan.

1. A framework and a clearly defined direction to guide decision making at all levels and across all organizational units 2. The most effective use of the organization's resources by focusing those resources on agreed-on key priorities 3. The ability of the organization to be proactive and to take advantage of opportunities and trends, rather than passively reacting to them 4. Improved communication among management, employees, the board of directors, shareholders, and other interested parties

A computer system that can recognize and act on patterns or trends that it detects in large sets of data by filtering the data through networked connections that have a value associated with them is called a(n) _____.

Artificial Neural Network

________ focuses on the transformation of data and information into knowledge that we can use to improve our lives and the world around us. Data and information are stored and delivered at the hardware level and we interact with that data and information at the software level to turn that information into knowledge. This is when we apply that knowledge to areas such as healthcare, agriculture, security, and business.

Informatics

________ harnesses the power and possibility of technology to transform data and information into knowledge that people use every day. This strong focus on the human use of computing helps people to interact with technology in the best and most efficient way possible.

Informatics

________ includes physical and logical constructs such as wired and wireless networks, the Internet and Cloud systems, mobile devices, computers and servers, instruments that collect data including the Internet of Things (IoT).

Infrastructure

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

Intranet

________ is a model that states an organization's information systems operate within a context of people, technology infrastructure, processes, and structure.

Leavitt's Diamond

PAN

Personal Area Network

________ is a structured set of related activities that takes input, adds value, and creates an output for the customer of that process.

Process

________ includes applications such as productivity software (i.e. Microsoft Office suite), UI/UX (User Interface/User Experience), a variety of programming and scripting languages, and back-end database server systems. Privacy and security issues permeate through all aspects of Informatics, as well as legal and ethical issues.

Software

________ is a definition of the relationships among the members of an organization including their roles, responsibilities, and lines of authority necessary to complete various activities.

Structure

Which component of the Internet is a device that keeps a record of the MAC address of all the devices connected to it and uses this information to determine to which port a frame of data should be directed?

Switch

Holly needs to restock some medical supplies for the lab where she works. She visits a preferred supplier's online product catalog, locates the needed items, and completes a request-for-quotation form. When she hears back from the supplier, she will begin the next sales stage, which is selection and negotiation. True or false?

True

Jerome uses several types of information systems to perform his daily duties. When he works together effectively with colleagues by using instant messaging or electronic conferencing software, he is using a workgroup information system. True or false?

True

One of the five key characteristics associated with big data is its quality—its accuracy, completeness, and currency—which is referred to as __________.

Veracity

________ supports teamwork and enables people to work together effectively, whether team members are in the same location or dispersed around the world? Examples include instant messaging software, electronic conferencing software, and collaboration software used to move groups through the steps of a process toward their goals.

Workgroup Information System

One of Jerome's friends says, "I have noticed a lot of news stories about cybercrime lately. Why are computer incidents so prevalent?" Jerome explains that one reason is that _____. a. many businesses have implemented BYOD policies b. the computing environment is becoming less complex and less diverse c. computer troublemakers are more likely to work independently than in the past d. zero-day attacks have become more frequent than attacks exploiting known software vulnerabilities

a

What is the primary difference between business intelligence (BI) and analytics? a. analytics employs algorithms to predict what will happen in the future b. analytics is not used directly to support decision making c. BI employs algorithms to predict what will happen in the future d. BI is not used directly to support decision making

a

________ forces teamwork and lots of interaction between users and stakeholders.

agile development

Which tool for data analysis can be leveraged by organizations with an ERP and a centralized database to identify unique patterns and correlations that can help guide business decisions?

artificial intelligence

For e-commerce systems, the software it must run and the volume of e-commerce transactions that must be processed primarily determine the __________. a. router's connection speed and latency b. Web server's required storage capacity and computing power c. server operating system's analytics requirements d. organization's e-commerce strategy

b

Holly advocates for transitioning to cloud computing at her organization by discussing its benefits. She correctly states that __________. a. using a public cloud guarantees more consistent performance over time and less downtime than using on-premises solutions b. with cloud computing, her organization can request the type and capacity of resources they need, reducing costs c. moving to the cloud eliminates any data security concerns, since the cloud service provider becomes responsible for compliance with regulations d. once her organization moves to the cloud, it will be easy to change cloud service providers frequently to find the best pricing and performance

b

Jerome, a manager, must ensure that his department's information systems are implemented in a way that _____. a. emphasizes the organization's technology infrastructure more than its role structure, procedures, or personnel management b. helps his organization gain a competitive advantage, and thus generate more sales or achieve superior profit margins c. does not rely on predefined steps that system users can follow to achieve desired end results d. never alters the roles and responsibilities of the system's end users, managers, developers, or maintenance coordinators

b

What is true about the software as a service (SaaS) distribution model? a. SaaS applications are secure because they can only be accessed using organization-owned devices b. users of SaaS applications never have to download or install patches to keep them up to date c. SaaS application upgrades are usually more expensive than those for traditional software licenses d. SaaS subscribers must actively adjust their hardware and communications capacities as needed

b

5G networks will have three advantages over the current 4G networks. 1. they will have the ________ to transmit more data (on the order of 20 Gbps). 2. they will have ________—less than 1 ms compared to 10 ms. 3. 5G networks will have the ability to ________ (thousands) at one time.

bandwidth, lower latency, support many more devices

How will a business using the strategic planning pyramid begin the direction-setting phase of strategic planning?

by creating a vision/mission statement

Which of the following statements about software as a service (SaaS) is true? a. SaaS must be licensed for each computer rather than for a number of users. b. Security is not a serious concern with SaaS since data is not shared with SaaS providers. c. One advantage of SaaS is the technical support typically offered. d. Upgrades to SaaS are not included in the standard contract and must be purchased individually.

c

A colleague asks Tonya why their organization has made an arrangement to store their database on Amazon's servers and access it over the Internet rather than hosting it on their own servers. What reason does Tonya give for this decision? a. It provides greater flexibility in querying and manipulating data. b. It eliminates the need for data cleansing or data normalization. c. It allows the organization greater control over data security measures. d. It lowers hardware, software, and labor costs to the organization.

d

Which of the following would one avoid because it might pose a risk to their privacy? a. insisting that her doctor's office obtain written consent before sharing her records b. calling the major credit bureaus to ask for a free credit report annually c. requesting a single-use credit card number for an online purchase d. paying bills online through a bank's Web site while on a public Wi-Fi network

d

Why do many organizations consider project management to be a core competency? a. Information system-related projects are almost always completely successful. b. A project is a continuous endeavor undertaken over the life of an organization. c. Projects require management of just two parameters: cost and time. d. Better project management can help an organization achieve a competitive edge and deliver greater value to its customers.

d

What is metadata?

data about data

________ is an information system that an organization uses to define structured interactions among its own employees and/or with external customers, suppliers, government agencies, and other business partners.

enterprise information system

Which approach allows organizations to enjoy scalability and flexibility for applications with less sensitive security requirements while maintaining greater security in an on-premises computing environment for those with more consistent capacity needs?

hybrid cloud computing

________ is a set of interrelated components that work together to support fundamental business operations, data reporting and visualization, data analysis, decision making, communications, and coordination within an organization.

information system

________ is an information system that enables sharing of information and conducting business electronically across organizational boundaries.

interorganizational IS

What part of machine learning allows computers to understand, analyze, manipulate, and generate natural human speech, either spoken or written?

natural language processing

________ is the information systems and solutions built and deployed by departments other than the information systems department.

shadow IT

________ is a process that helps managers identify desired outcomes and formulate feasible plans to achieve their objectives by using available resources and capabilities.

strategic planning

________ is a key value chain whose primary processes include inbound logistics, operations, outbound logistics, marketing and sales, and service.

supply chain

________ is all the hardware, software, databases, networks, facilities, and services used to develop, test, deliver, control, or support the information technology applications and services an organization requires to meet the needs of its customers, suppliers, key business partners, regulatory agencies, and employees.

technology infrastructure

________ is a series (or chain) of activities that an organization performs to transform inputs into outputs in such a way that the value of the input is increased.

value chain

________ is a system that supports teamwork and enable people to work together effectively, whether team members are in the same location or dispersed around the world.

workgroup information system

If I take information from a source and restate it in my own words (paraphrase), do I need to credit the source?

yes


Set pelajaran terkait

Inflammatory Bowel Disease (case study)

View Set

Comfort, Rest, Sleep, and Pain quiz

View Set

Chapter 16 - Cardiovascular Emergencies

View Set

2-2 Properties of Quadratic Functions in Standard Form

View Set