ISM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the function of a router in a computer network?

A router sends data packs from one computer to another.

Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication? Technical terms Acronyms Action-specific verbs

Action-specific verbs Written communication should have short paragraphs and use action-specific words.

adds new capabilities to an existing system.

Adaptive maintenance

Every organization, big or small, must establish policies and procedures to secure and control their information assets. Security policies are output from an organization's risk assessment process. What do security policies cover?

An organization's need for various levels of security. Security policies are developed from an organization's risk assessment process, and they describe the policies and procedures that must be implemented to protect the organization's data resources from harm at various levels.

Why is it not good practice to perform analytics on an online transaction processing database?

Analytics would affect the database performance. OTP databases should be streamlined and used for supporting business operations; performing analytics on an operational database could hurt performance.

Which of the following best describes business performance management (BPM)?

BPM is collection of analytics and processes that enable organizations achieve goals and objectives.

_____________ is learning and targeting best practices - requires contacting users and teams that have successfully implements a similar system in order to gather best practices.

Benchmarking

How do small businesses and large enterprises protect themselves from network intrusions?

Both small and large use firewalls to prevent intrusion. Firewalls come in different sizes and prices. Large enterprises use powerful hardware and software tools, while small businesses use embedded software tools.

What user interface is becoming standard in computer applications?

Browser user interface

There are six analytical functions used by business intelligence systems, including production reports, parameterized reports, and _______________

Dashboards Dashboards and scorecards are one of six analytical functions. The other functions include production reports, parameterized reports, ad hoc reports, drill down capabilities, and forecasts.

Which of the following is the best reason to implement a database for a growing business?

Data access. As a business grows, there are more customers and less time to respond to customer inquiries. A database allows quick access to customer and business data.

What occurs during the transformation step in ETL?

Data cleansing

The traditional file environment is not usually as efficient as a database management system. What is typically NOT a challenge when using the traditional file environment? Data complexity Data inconsistency Data redundancy

Data complexity. Traditional file systems are typically very simple and not complex because they are usually smaller in size and have a lot less computer requirements than a DBMS.

______________ is what happens when the same attribute has different values because the data is stored in more than one location.

Data inconsistency

As a student is taking classes, imagine if your name was misspelled in one class, but not in the other, and the impact this would have on your student record. If the same attribute in related data files has different values, what is this an example of?

Data inconsistency. DI is what happens when the same attribute has different values because the data is stored in more than one location.

If you receive two copies of the same catalog from a clothing company in your mailbox with a little variation in the first name on the address label, this would be a violation of what rule?

Data integrity. Data integrity ensures that all data values are correct, accurate, and consistent.

A database schema can be represented by which model?

ERD. Entity relationship models describe the data and map processes to data requirements.

True or False. System-level security maintains the quality of the software and protects the system from events and processes that can exploit or violate the system.

False "System-level security maintains the security, not the quality, that protects systems from events and processes that can exploit or violate the system."

What was the first computer language developed in the 1940s and 50s, which continues to be used today?

Fortran

The converged communications structure is based on what?

Internet, audio communications and the PSTN - resulting in VoIP and smartphone applications.

What is another term used to describe data mining?

Knowledge discovery

Which of the following are important for mobile business users in order to connect to their mobile device?

Network card and wireless adapter

Which of the following is an example of a big data analytics application? Structural design and analysis Sales history of an enterprise New drug discovery

New drug discovery. Big data is used to find something NEW

reduces data complexity and eliminates data redundancy.

Normalization

During the database design process, _________ takes place to eliminate data redundancy.

Normalization. Normalization does two things: reduces data complexity and eliminates data redundancy.

________________ risk analysis involves performing an analysis of the risks and conditions in order to prioritize the effects on a project.

Qualitative risk analysis involves looking at conditions that can affect the project.

stipulates that duties and access are to be disseminated among multiple people, so that the possibility of abuse and fraud are reduced or eliminated.

Separation of duties concept. Correct. By separating the duties and access, the possibility of abuse and fraud are reduced or eliminated.

TCO takes into account the total costs over time, including all of the following, except: Maintenance and service contract costs Shipping and transportation costs Fixed and ongoing operating costs Deployment and network infrastructure costs

Shipping and transportation costs.

______software is an example of vertical application software.

Simulation and accounting

What is the purpose of a general MIS evaluation?

To analyze system performance. A company's general evaluation of their MIS is to analyze the system performance against outlined objectives.

What are the three CASE software classifications?

Tools, workbench, and environment

Man made interfaces that will replace keyboard and mouse

Voice and gesture

What does WSN stand for?

Wireless Sensor Networks WSN stands for Wireless Sensor Networks which are used for monitoring environmental conditions.

Systems design models typically consist of diagrams, charts, and ____________

maps

_____________ CASE tools support development activities, such as design, testing, debugging, and maintenance.

Lower

True or False. The MIS decision component referred to as hardware consists of input/output devices, CPU, operating system, and media devices.

True

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?

25 and 1 In a class B IP address, the first two bytes are assigned to and managed by the ISP, while the last two bytes are assigned to and managed by the client. In this case, the last two byte-25 and 1-are assigned to the client.

How many layers are in the standard OSI model?

7- physical, data, network, transport, session, presentation, application

A server can best be described as ________________.

A computer that provides services to multiple users.

How does business innovation and the decrease in cost of storage technology help businesses?

Enables them to save more data and create more information for better business decision making

Big Data database style is considered in the ______ level.

Petabyte

What is the typical data size of big data?

Petabytes.

What is the definition of decision making in the context of DSS?

The process of identifying and selecting an alternative based on the values and preferences of the decision maker.

What is the typical broadband data speed of a 4G network?

100,000 kbps Current generation 4G networks can carry data at 100,000 kbps enabling converged data, voice and video transmission.

What is the primary difference between 1G cellular networks and the current 4G network?

1G enabled mobile voice telecommunication while 4G offers voice, data and video. 1G has a slow data transmission rate and only allowed voice traffic. Faster 4G enables converged technology traffic.

What is the difference between a LAN and WAN?

A LAN connects computer systems locally and a WAN connects systems over a long distance. LAN stands for Local Area Network and typically connects computer systems of an organization or a floor of a building in a localized environment. WAN stands for Wide Area Network and typically connects business campuses consisting of computer systems together across large broad distances or distributed environments.

Organizations can exchange data and files through cloud computing or a VPN. Which of the following is an advantage of a VPN, but not an advantage of cloud computing?

A VPN provides more secure access than cloud computing. A VPN provides users with a more secured access connection to the company's internal servers than cloud computing does.

What role should a change agent play when implementing a new information system?

A change agent identifies positive improvements and helps train and motivate users. A systems analyst can play the role of a change agent, helping improve operations through systems and getting users to adopt the new environment.

What is a denial of service attack?

A hacker attempt to tie up network host resources making them unavailable. A denial of service attack typically targets business or government websites to render them unavailable.

Which of the following best defines a work breakdown structure (WBS)?

A list of broken down project deliverables.

What is the function of a network bridge?

A network bridge links two network LANs together. Bridges in network topologies are used to connect or link separate networks together.

Which of the following is a definition of a software patch?

A patch is a code that fixes a software defect.

What is a database schema?

A schema is a planned design structure of the database, with unique characteristics to eliminate confusion and create integrity and sometimes involves creating the definitions behind the tables and data constraints.

A reliable intranet connection provides organizations and their suppliers and vendors with _________________.

A secure platform for internal use. A secured intranet is mainly for internal use; it does not provide a platform for organizations to conduct business activities.

What is a radio frequency survey?

A signal strength detection process to identify the best wireless access point locations. When deploying wireless networks, the access point locations are determined by conducting a radio frequency survey of the site.

Unified modeling language (UML) is a general-purpose modeling language designed to provide what?

A standard method to represent the design of a system UML is a language that helps visualize systems through diagrams.

Which of the following best describes a telecommunications network? A system of nodes and links The internet A telephone system

A system of nodes and links. A telecommunications network enables the exchange of information (sending and receiving) between end users across nodes and links.

Which of the following is NOT a data model used when mapping business processes, relationships, and data requirements? Physical data model Conceptual data model Abstract data model

Abstract; conceptual, logical and physical are the three models used in an entity relationship diagram. An abstract data model is not used in mapping relationships.

What is the most important aspect of the critical path method (CPM) in project management?

CPM defines the critical and noncritical tasks. CPM identifies the critical and noncritical tasks, which helps avoid delays or schedule changes.

Choose components found on a computer's motherboard: CPU Memory Hard drive

CPU & memory

The term "generations" is used to describe which type of technology?

Cellular wireless standards. Generations is the term used to describe mobile wireless technology. The generations indicate the type of services and data transfer speeds. The next generation of wireless will be 5G. New generations have been introduced approximately every ten years.

What are the two management models that have influenced our understanding of the decision-making process in organizational management?

Classical and behavioral.

You were hired by a company to administer survey questionnaires to customers entering a major shopping mall. The data mining software is capable of sorting the respondents into _____________ based on their age, gender, education level, and household income.

Classification. Classification, also known as categorization, looks for patterns that indicate customers' shopping behavior in order to target marketing efforts.

________________ is a series of human or user Web visitor page requests.

Clickstream. A clickstream is an application that records the location on the screen in which a user clicks while browsing the Internet.

I asynchronous communications, two people in separate locations can communicate with each other during difference times of the day. Which is an example of AC? Synchronous communication in different places Asynchronous communication at the same time Collaboration among participants via online message boards

Collab among participants via online message boards. Asynchronous communication occurs at different times and usually in different places, where data is transmitted intermittently and not at regular intervals.

What is a benefit of telecom services convergence for business?

Combining data, voice and video into one platform means having only one network to service and maintain. Deploying a converged telecom network means that only one network is used for all services, making maintenance easier.

one of the three goals of information security and ensures that only authorized personnel are admitted access to information.

Confidentiality

The CIA triad is a model that guides information security policy. what do the letters in CIA stand for?

Confidentiality, integrity and availability. According to the CIA triad, data should be available to all users that the data owners deem necessary. The other two key points of the CIA triad are integrity and confidentiality.

What are peer to peer network topologies?

Connect each user in a network directly. Peer-to-peer networks are used in small businesses in which each user is connected to other users directly. Tasks can be distributed amongst peers or users.

Which of the following is not an effective telecommunication medium?

Copper building wire. Copper building wire is used for electricity, but is not practical for telecommunications, especially with the advent of wireless.

The proper techniques for developing an internet search strategy include reviewing information requirements, using proper search techniques and tools, evaluating the results, and determining _____________.

Copyright and data integrity issues. Information obtained on the Internet could be protected by copyright or contain inaccurate data.

Which of the following is NOT an element of a decision tree? Payoff Events Criteria Acts

Criteria. Criteria are important in decision making, but they are not displayed on a decision tree. Criteria are issues or components that a decision maker wants to include for each alternative. For example, perhaps the decision maker is buying a car. The criteria might be that the car has to be red and get good gas mileage. This would influence the selection of alternatives.

What type of data is included in executive support systems (ESS)?

ESS data includes internal enterprise data, as well as external data from financial, industry, and trade databases.

In online analytical processing applications, which of the following is not a basic analytical operation? Slicing and dicing Consolidation Cut and paste Drilling down

Cut & paste

Data quality audits and data cleansing are important for managing data resources. What data below should be scrubbed so that they are consistent with the design of the database?

Corrupted. Corrupted data are incomplete, duplicated, incorrect, or improperly formatted; therefore, they have to be scrubbed to remove any of the errors before they can be consistent with the design of the database.

What application does one use to query and administer databases?

DBMS. Used to access and perform admin tasks to databases.

Which of the following is not a telecommunications network protocol? PPP TCP/IP FTP DOS

DOS. DOS is an operating system.

____________________ means that the data is accurate and consistent through its use and application time.

Data integrity. In database terminology, data integrity means data is accurate and consistent.

What is the best description of how a packet switched network works?

Data is digitized, enclosed in packets and transmitted.

One of the capabilities of a database management system is that it allows users to easily modify the data using which of the following?

Data manipulation language. Data manipulation language is a language that users and programmers used to add, delete, and change data in a database.

Which of the following best describes the process of data mining?

Data mining is the process of analyzing data to gain insight or intelligence. Businesses gather data and deposit it in databases. These data are subsequently mined to gain insight into trends that can lead to better business practices.

What can be described as a difference between "data mining" and "big data"?

Data mining is used to analyze business databases, while big data analyzes big data sets. Data mining can be thought of as a single business activity looking at its data to improve its performance, while big data is much more complicated, looking at unstructured data and uses computer learning or artificial intelligence algorithms.

Financial institutions perform _______________ on visitors' data they collect on their websites to detect and create a list of potential customers whom they will send invitations to apply for credit cards or line of equity loans.

Data mining. Data mining is a technique that companies use on their business data to find hidden relationships in customer data; they use this information to develop more effective marketing strategies.

For a DBMS to be efficient and more functional, data redundancy needs to be eliminated. This can be accomplished by creating smaller tables, with stable data structures, using what process?

Data normalization. Normalization breaks down a big and complex table into several smaller, but stable, tables with flexible data structures to minimize data redundancy and maintain data integrity.

What is another name for a network host?

Data terminal equipment.

What is the relationship between business intelligence and a data warehouse?

Data warehouse analysis leads to business intelligence. A data warehouse can be thought of as the foundation for a business to derive business intelligence from its operational data.

Why are data warehouses beneficial to business managers?

Data warehouses can be mined or analyzed for trends or patterns. It's the key benefit to managers.

Maintaining the integrity of a company's database is the responsibility of which person below? Data auditor Database administrator Information policy administrator Data administrator

Database admin. The database administrator is responsible for the creation and management of the entire database management system. Therefore, s/he is also responsible for maintaining the integrity of the database.

How can database applications help managers respond to changing market conditions?

Database applications enable businesses to store and analyze essential sales data. Businesses that have implemented information systems store critical data and use that data to gather business intelligence in order to respond to changing market conditions.

What are the benefits of partitioning when maintaining a data warehouse database?

Database manageability. Partitioning leads to easier loading during the ETL phase and increases database response and performance.

Business use databases for many reasons, so it is important to understand their basic fundamentals. Select one of the following answers about databases that is NOT correct. Businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. Databases help businesses compile competitive transactional information, enabling management to react to changing market conditions and be more competitive. A database of company transactional and supply chain data, when combined with market, economics, and other government regulations, can lead to business intelligence.

Databases help businesses compile competitive transactional information, enabling management to react to changing market conditions and be more competitive. It is not possible to get access to this type of competitive data unless illegally hacking into competitor information systems.

What is meant by an unstructured decision-making process?

Decision maker provides the necessary insight, judgment, and evaluation. In unstructured decision making, a decision maker uses perception and insight to reach decision.

VoIP technology is currently a very popular form of communications because it ______________________.

Delivers voice information in digital format using packet switching. Using the Internet, VoIP technology delivers audio (and sometimes video) information in digital form using the packet switching technique.

The implementation of a new system consists of many steps, including acquisition, development, training, and testing, and is also referred to as what?

Delivery System implementation can also be referred to as system delivery, since it is the final phase of implementation.

PERT stands for Program Evaluation and Review Technique. Which of the following is true about PERT? It was developed by the U.S. Defense Department. It was developed by Microsoft. It was developed by IBM.

Developed by the US Dept of Defense. Program Evaluation and Review Technique was created and developed in 1957 by the U.S. Department of Defense.

What adoption is a method of system transfer in which the old system is replaced when the new system is implemented?

Direct Direct implementation is a method of system transfer in which the old system is replaced as soon as the new system is implemented.

What is the process of transferring data that does not need to be transformed to the data warehouse?

Direct move

What is the most common form of secondary storage?

Disk drives

Which of the following application provided by the Internet allows a business to transfer documents automatically without human intervention?

EDI Electronic Data Interchange (EDI) is the electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention.

There is a higher chance of failure in Information system projects if _______________ do not use and leverage the system on behalf of their organization.

Employees

SAP is an example of a large-scale ___________ vendor that provides an integrated software system to manage the primary functions of a business.

Enterprise software.

Which kind of risk factor is simplest for an organization to mitigate?

Environmental factors are the simplest (but not necessarily the easiest) for organization's to mitigate risk. These risks can be mitigated by duplicating or moving equipment or facilities to low-risk areas in order to minimize the potential damage that might occur.

Which of the following is a disadvantage of using a VPN? Flexible Expensive Secure

Expensive. VPNs requires a higher level of security, resulting in more expenses for the organizations.

To facilitate efficient and effective business, corporations utilize the ______________ for communications with suppliers and vendors.

Extranet. The extranet is a secure and reliable connection setup for organizations and their business partners, such as vendors and suppliers, with which they are able to conduct business.

Internet Protocol version 4 (IPv4) was created and standardized in the 1970s by the original ARPANET group to __________________________.

Facilitate communications. The original TCP/IP was created by the ARPANET group in the 1970s to facilitate communications. The Internet Protocol version 4 (IPv4) was standardized in 1981 from the original TCP/IP by the Internet Engineering Task Force (IETF).

True or False. A model is an image of an item, system, or process that we code in order to imitate, follow, or duplicate whatever the model represents.

False. A model is not coded; it is diagrammed.

[True/False] The five largest business intelligence technology vendors are IBM, Apple, Oracle, SAP, and SAS.

False. Apple is not a large business intelligence vendor.

True or False. Business performance management (BPM) is a management action to optimize organizational or business processes.

False. BPM is business process management, a collection of analytics and processes that enable organizations to achieve goals and objectives.

[True/False] The virtual layer is the seventh layer of the OSI model.

False. The OSI layers are - physical, data, network, transport, session, presentation, and application.

True or False. A facilitator in a GDSS meeting designs the meeting structure, moderates the process, and leads the team. (Group Decision Support Systems)

False. The facilitator performs a critical role in ensuring meeting productivity by designing meeting structure and moderating process.

Why do computers require fans?

Fans are needed to cool the CPU

[True/False] The programming stage in the waterfall method of software development focuses on development and testing.

False. The programming stage focuses on software development, proving, and integration.

[True/False] The prototyping software development method consists of three steps.

False. The prototyping method is a four-step process: user basic requirements, development of prototype, using prototype, and revising prototype.

[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone.

False. The telegraph technology led to the innovation of the telephone, which provides society with a richer form of communication than mere text or analog signal.

[True/False] Coaxial cable is the required medium for telecommunication transmissions.

False. There are many other mediums for communications including fiber optics, ethernet and radio frequency.

[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals.

False. Wireless uses radio waves over the radio spectrum.

[True/False] When installing a wireless LAN, the access points must be configured to TCP/IP and 4G protocols.

False. Access points are configured to TCP/IP protocol. Most wireless LANs are based on IEEE 802.11 standards and use the IP address scheme.

[True/False] A Geographic Information Systems (GIS) is a system developed to collect, process, analyze, and store all types of data.

False. A GIS does not store all types of data. Examples of data that are not stored in a GIS includes business data such as products and customers.

[True/False] Among all the administrators' roles (the database administrator, the data administrator, the information policy administrator, and the data auditor) the database administrator is the most important role since s/he is in charge of designing the physical database for the organization.

False. All the roles mentioned are equally important in an organization since each role performs different functions vital to the survival of the organization.

[True/False] An information repository allows a business to store important information and documents that are accessed remotely by its stakeholders for free.

False. An information repository allows businesses to store important information and documents that can be accessed remotely by its stakeholders, but it may not be free because some businesses charge a fee for the service.

[True/False] Healthcare companies and hospitals cannot destroy their patients' records; they must keep their data forever, just in case they need to retrieve information for potential malpractice lawsuits from their patients.

False. Companies do not have to keep their data forever. For instance, they may keep their financial, accounting, and medical information for 7 years, or according to law. Other information, such as procedures and other intellectual property, as well as legal documentation, may be kept for much longer.

DRAM is memory used to access the most frequently used instructions or data files. T or F

False. DRAM is meant for large amounts of RAM; typically system memory

[True/False] Organizational information policy stipulates that all printed documents in an organization should be destroyed immediately.

False. Destruction of printed material is typically not immediate, although organizations must have an information policy dictating how long they need to keep certain documents and when and how these documents should be systematically and periodically destroyed.

[True/False] With security measures already implemented in the network systems, it is not necessary for telecommuters to use a secured connection, such as the Virtual Private Network (VPN), to gain remote access to their work servers.

False. Employees are strongly encouraged (and often required) to use a secured connection, such as VPN, to gain remote access to their company's server, regardless of the network system's security.

[True/False] Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP addresses into the URL. All domain names must have four parts, regardless of where the websites are located. Each part is written as a set of octets and is separated by a period.

False. IP addresses have 4 parts, not domain names.

[True/False] Cloud computing allows users to mix and match software components to create a customized application.

False. Mashup is the correct terminology when mixing software to create a customized app.

When purchasing hardware, do not purchase more than the minimum required by the software.

False. Plan for the future and do not try to get just the bare minimum you will need today; make sure the system meets the recommended requirements, if not more.

[True/False] The Open System Interconnection model consists of five layers.

False. The Open System Interconnection is a standard architecture of computer networking consisting of seven layers.

[True/False] When a retailer acquires another retail store, the two companies' databases can be easily merged into one database without any problem after performing a data quality audit, since they are both in the same industry.

False. The data and data structure of the two separate databases might not be compatible with each other; therefore, the combined database might need to be cleansed and normalized; data auditing alone may not be sufficient.

[True/False] The local Amish furniture store in a small country town uses a traditional file system to keep track of their sales. This is a good way to store their sales records and inventory since this is a small business, and therefore, it is more cost-effective for the store owner.

False. The traditional file system, whether paper or digital, often results in data inaccuracy and data inconsistency. The DBMS might be more expensive to develop, but the store owner can easily create a database using Microsoft Access or WordPerfect Paradox. In the long run, it could be more cost-effective with a DBMS.

Touch screen monitors and laser printers are the most common input devices that deliver information to the user : True or False

False. They keyboard and mouse are common, touchscreens are becoming more popular. Printer is an output device.

[True/False] HTML is a software language used to manage relational databases.

False; HTML is not associated with management of database, but with Internet website design.

[True/False] Predictive analytics uses current and future data to better understand customers and other business entities in order to define areas of opportunity or areas of risk.

False; Predictive analytics looks for patterns in past data to predict the future, thereby positioning businesses for opportunities or to avoid risks.

[True/False] The behavioral model of management recognizes that actual management behavior is more systematic and predictable.

False; behavioral models deal with less predictable circumstances.

[True/False] A desktop processor is designed to meet the needs of one person, whereas a server meets the needs of many people. Server processors are designed for speed and reliability, so they always use a quad-core processor.

False; server can have dual or quad-core processor

T or F: One disadvantage of cloud computing is that it requires the company to make an upfront investment in additional hardware.

False; the cloud stores data and software so users need limited hardware.

Each generation of programming languages provides a higher level of analysis, making the language more powerful and programmer-friendly than the previous generation. ______________ is an example of a third generation programming language.

Fortran, COBOL, C, C++, C#, JAVA

The balanced scorecard measures outcomes on how many organizational dimensions?

Four; The balanced scorecard measures outcomes on four dimensions: finance, process, customer, and growth.

When building a logical model of the system, you use a functional flow diagram. What is the purpose of the functional flow diagram phase in modeling systems?

Functional flow diagrams emphasize element behavior, function, and flow. There are many ways to diagram and show the elements, behavior, function, and flow of a system; the functional flow diagrams provide a visual model.

What kind of controls manage the arrangement, operation, and security of systems software, as well as the protection of data files throughout an organization's IT infrastructure?

General controls are a type of control that manages the arrangement, operation, and security of systems software, and protects the data files throughout an organization's IT infrastructure.

What are the three primary activities associated with business performance management?

Goal selection, attainment measurement, and achievement intervention

The difference between _______ and memory is that the former is a series of magnetic discs that can hold several gigabytes of data while memory consists of microchips used to store running programs.

Hard drives

You are working on a project and hear the word "sensitive" referred to with regard to the work schedule. What is meant by a project schedule being sensitive?

Has more than one critical path. When a project is determined to have multiple critical activities leading to multiple critical paths, the schedule is sensitive.

The information system should assist management in decision-making by doing what?

Helping them use structured processes for decision making The information system should assist management by helping them use structured processes for decision making.

Application software can either be horizontal or vertical. Microsoft Excel is an example of __________ application software.

Horizontal

What is meant by the political aspect of a feasibility evaluation?

How stakeholders will respond to system changes. New systems change how information is shared and how decisions are made. Stakeholders can either support or derail the initiative, depending on their perspective and how they think the system will impact them.

An expensive application used by large businesses to improve computer network performance without having to physically change the network.

Hypervisor

What is the difference between ICR and OCR?

ICR is an intelligent or advanced form of OCR. ICR stands for intelligent character recognition and is more accurate than optical character recognition (OCR).

Which of the following is not a circuit switching protocol? Frame Relay ATM IP

IP. IP is a packet based protocol.

What is the most critical step in systems analysis?

Identifying information requirements.

What is meant by informal user support when a system comes into production?

Informal user support provides assistance with user acceptance and change management.

______________ also known as knowledge centers, provide helpful information to remote suppliers, partners, employees, and customers for free or as a revenue-generating service.

Information repositories

Which of the following application provided by the internet allows a business to store helpful documents to be accessed by its stakeholders, either for free or for a fee?

Information repositories. Information repositories, also known as knowledge centers, provide helpful information to remote suppliers, partners, employees, and customers for free or as a revenue-generating service.

What are the basic activities of information management?

Input, processing of data and output

What are the four phases of the decision-making process with respect to decision support in organizations?

Intelligence, design, choice, and implementation

Why are good communication skills necessary for systems analysts?

Interact with internal and external resources. Systems analysts must have strong communication skills because they work heavily with external and internal resources and participate in and document analysis, design, and implementation of systems.

Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following is a benefit of an extranet? Interact with employees Interact with suppliers Interact with customers Store and share information

Interact with suppliers. An extranet is a network connection developed for organizations to communicate with external entities such as suppliers and vendors, often via an SCM.

What type of data and information do executive support systems display?

Internal data from enterprise applications, external data from financial, industry, and data from trade databases

To facilitate efficient and effective business, corporations utilize the ______ to communicate with their customers.

Internet. The Internet is a network infrastructure connecting millions of computers and servers around the world together so that they can communicate with one another, globally.

To facilitate efficient and effective business, corporations utilize the _______ to manage employees' affairs.

Intranet. The intranet is an internal connection within the organization to facilitate internal business affairs, such as employee payroll or training.

What tasks does the analytics services element of business intelligence perform?

It creates analytical databases that help expedite custom queries.

Which of the following statement about the IP version 4 (IPv4) addressing scheme is true? It allows for four different classes of addresses. The first two bytes of the IP address are assigned to and managed by the client. The last two bytes of the IP address are assigned to and managed by the ISP. It has 4 bytes, which is equivalent to 32 bits.

It has 4 bytes, which is equivalent to 32 bits.

Which of the following is an accurate example of why a business should use predictive analytics? Mary is using historical data so she can know what will happen in her business next year. Joe is extracting information from existing data to better understand his customers and identify potential risks.

Joe. Predictive analysis can be used to predict future outcomes or trends, but it does not tell you what will happen in the future.

A network bridge links two network _______ together.

LANs

OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database?

Lengthy ETL load phase. Processing the data during ETL can be complex, leading to lengthy loading and updating.

A decision tree tool is not viable when data contains a different number of ___________

Levels. For data containing different number of levels, information gained in decision trees may become biased.

Due to the lack of portability between computers, low level programming languages evolved into high level languages. What do we mean by low level programming language?

Machine language

When looking at the evolution of software, databases have grown in features and popularity. What do database management system (DBMS) applications do for business?

Manage incoming data and catalog data.

Which of the following is not a component of a feasibility study? Economic Managerial Technical

Managerial

Social networks must be targeted by businesses since social networking is a ________ channel.

Marketing.

What is meant by master data in entity-relationship modeling?

Master data are objects shared across the enterprise

What is the Internet of Things? (IoT)

Means connectivity to all devices to enable service automation. The term Internet of Things means that in the future, all devices, including appliances, cars, networks, systems, etc., will be connected to the Internet, which will facilitate servicing automation.

When it comes to identifying and evaluating alternative solutions prior to acquiring a new information system, which of the following is NOT correct? Mistakes can be very costly to businesses. When embarking on a strategic complex initiative, various solutions should be evaluated. Before deciding on a solution, several alternatives should be evaluated. Mistakes can be easily corrected when identified.

Mistakes can be easily corrected when identified. Mistakes may indicate a lack of understanding by a variety of stakeholders or the need for material rework, each of which may not be easily corrected.

Internet access via __________ devices is growing exponentially, surpassing Internet access by fixed, desktop computers.

Mobile

What is a key trend in mobile communications that a business must be aware of?

Mobile access to the internet is growing exponentially. Businesses must be aware that Internet access via mobile, smart devices is growing exponentially and has surpassed desktop Internet access.

What are three reasons that more businesses are deploying wireless networks?

Mobility, cost and scalability. More businesses are deploying wireless networks to increase productivity by having mobile users access information from anywhere. They are less costly to maintain, and are more scalable than wired networks.

Which of the following is not an element in decision theory? Model Acts Payoffs

Model

What is meant by Systen on a Chip or SoC?

Modern microprocessor

Which of the following describes how the modular design process description tool works?

Modular design uses building blocks to represent a system. Modular design uses a combination of sequence, selection, and looping as building blocks to represent a system.

Which of the following is NOT a method for gathering user requirements? Analyze existing system Monitor users Interview users

Monitoring users. Monitoring users is not a method for gathering user requirements. Rather, this can be achieved with hands-on interviewing and by discussing the processes

The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?

More complexity due to the need for more systems and better improvements in their processing capabilities. As the demand for more powerful systems increases, so is the increase in the complexity of designing and building these systems.

Are hypervisors or hypervisor applications necessary in small businesses with simple networks?

No, a hypervisor is a computer software that enables network virtualization and is not necessary. A hypervisor is an expensive application used by large businesses to improve computer network performance without having to physically change the network.

What does OLTP stand for?

OLTP stands for online transaction processing, and it is a database design used for browsing and manipulating business transaction activity.

_______ is the foundation for data communication protocols.

OSI; Open System Interconnection

What is the difference between an object-oriented database model and a relational model?

Object oriented are designed to store audio or mixed media, while relational link tables of records.

The advent of the Internet has revolutionized our lives, becoming a vast resource for information, utility, and productivity. Which statement below about the Internet is false? Once you upload your data to the Internet, it will be available to the public. The Internet was founded in 1967 as an experimental scientific network. The Internet can function as a repository for users to store data. The Internet is an interconnected computer system that uses a client/server configuration.

Once you upload your data to the Internet, it will be available to the public. When you upload your data to the Internet, it may or may not be available to the public, depending on the kind of permissions for those who are allowed access.

Newsletters are often Internet-published bulletins that are distributed to users and typically cover what?

One general or specific topic of interest

What does OSI stand for?

Open System Interconnection OSI stands for Open System Interconnection and is the foundation for data communication protocols.

Which of the following best describes oral communication? Oral communication is conducted via reports. Oral communication is the transfer of information via verbal and visual content. Oral communication involves using body language.

Oral communication is the transfer of information via verbal and visual content. Correct. Oral communication is verbal and can include the use of visual aids.

What is information system output?

Output is the act of transferring processed data to users. Output can have many formats and is the transfer or display of processed information to appropriate users.

Which of the following is not a wireless telecommunication networking protocol? POP Bluetooth Wi-Fi

POP. Post Office Protocol (POP); application layer of the internet standard protocol.

What is the public switch telephone network (PSTN)?

PSTN is the wire line infrastructure.

What does PDSN stand for?

Packet switched data networks. Current telecommunication networks are packet switched data networks. Data travels as digital signals encapsulated in packets.

Breaks down data to be transmitted between devices and places it in discrete packets that are sent via the computer network.

Packet switching

Data is broken up, not sent as a whole, and reassembled at the destination.

Packet switching

What is a benefit of package switching?

Packet switching does not need a dedicated network connection.

What are the two fundamental protocols that can describe modern telecom networks?

Packet transmission and TCP/IP

What is the definition of a partition in database concepts?

Partitioning means dividing a database for manageability. Relational databases use tables and index partitioning. Partition means dividing the database into more manageable segments, which improves performance.

What is the advantage of RFID passive tags?

Passive tags leverage energy from radio signals. Passive tags are small and inexpensive because they have no internal power source.

What info can be gained by sniffing a wireless network?

Passwords and login IDs Hackers use wireless interceptors to sniff wireless traffic in order to gain network access information.

What is used to show the relationship between data fields and tables in entity-relationship models?

Pointers

The systems analyst is required to do which job? Prepare documentation for others to create reports and share with the teams Prepare reports and let others disseminate updates and information Prepare and explain written reports and keep stakeholders updated

Prepare documentation for others to create reports and share with the teams

What is the difference between a primary key and a foreign key in a relational database?

Primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables. Each table in a database uses a primary key to define columns that enable linkage to other table in the database, while foreign keys are used to create relationships between two tables.

RFID technology helps companies to be more ___________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.

Productive

What are three levels of risks associated with system design and implementation?

Project structure, size and, team technical background

What are the classifications of cloud computing?

Public, private, and hybrid

Which of the following best describes the RAD methodology?

RAD focuses on software development with limited emphasis on planning. RAD methodology allows for frequent prototypes in lieu of pre-determined specifications.

Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered?

RFID. RFID technology is used to track inventory, assets and people. Tags can be read hundreds at a time and can be read even if covered.

The network address translation (NAT) technology allows private users to _____________________.

Redefine network addresses to assign their own addresses. Network address translation (NAT) was introduced to allow private users to redefine network addresses to assign their own addresses, even within complex networks.

What is the primary goal of information security?

Reduce losses related to losses in confidentiality, availability and integrity.

It is good practice to ________ data that is backed up on a regular basis.

Reduce. Data in a database, such as historical data, does not change. Therefore, it is good practice to reduce or back up this historical database on a regular basis.

What is not a benefit of database normalization? Consistency Redundancy Flexibility Organization

Redundancy. Normalization eliminates redundancy.

Why did relational database models replace hierarchical database models in business applications?

Relational databases have simpler table relationships than hierarchical databases. Hierarchical databases were difficult to search since the entire tree structure (roots and branches) had to be queried, whereas a relational database does not have to search all data when running a query.

Which of the following best describes referential integrity? Referential integrity applies only in hierarchical database. Referential integrity is the process of building relationships between tables based on keys. Referential integrity is the relationship between primary keys.

Referential integrity is the process of building relationships between tables based on keys. Tables in databases form relationships using keys, and referential integrity means that for an entity or object to exist in a table, an equal value must exist in referenced table.

What is a key benefit to business organizations for using a relational database?

Relational databases allow easy access to information. The more information available across the enterprise, the more effective and productive business organizations become. Relational databases give businesses a competitive advantage because of easy access to customer, product, and supplier information.

Spoofing is effective to hackers because it solicits a network ___________________.

Response. Spoofing a network solicits a network response that can be used to extract network packet encapsulation information.

What is a network management application?

Retrieves and analyzes network traffic data to ensure that network performance is optimized.

The scope of a project defines the elements of cost, time, quality, and ___________.

Risk

Which of the following is not a type of relationship in a relational database model? Row-to-column One to-many One- to-one

Row to column

Walmart uses _______________ software to plan and distribute products from the warehouses to the local stores.

SCM Supply Chain Management Data collected from the supply chain channels are analyzed and to assist executives in making ordering, pricing, and inventories decision.

Why should a business have a social media strategy?

Social media is an ubiquitous marketing channel. There are a lot of potential customers.

Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day? Telnet SMTP DDNS URL

SMTP SMTP stands for Simple Mail Transfer Protocol, and is one of the several popular e-mail protocols used today. Other popular mail protocols include IMAP and POP3.

Each generation of programming language provides a higher level of analysis, making the language more powerful and programmer friendly than the previous generation. Which of the following is an example of 4th gen programming language? COBOL JAVA SQL

SQL

What computer language is used with relational database applications?

SQL, structured query language . Practically all relational database applications only work with structured query language.

What is meant by wireless networks being scalable?

Scalability refers the the ability to grow user base and data services with ease, built into the infrastructure.

The ability of a network to to grow user and services without forklift upgrades.

Scalability. Wireless networks are more scalable than wired networks, and can easily add access points or increase user number.

_________________ feasibility assessment is very important for projects that have long implementation time frames.

Schedule

The _________ method can address unexpected changes or challenges that cannot be addressed effectively with SDLC.

Scrum The scrum method is designed to better handle unexpected changes.

What is the most prevalent hacker attack on wireless networks?

Sniffing In wireless networks, sniffing is most common because signals travel through the air.

What are three risks to wireless networks?

Sniffing, spoofing and probing.

A microchip that performs more functions than a CPU and has other devices embedded in it is called what?

SoC; system on a chip

A prewritten set of software programs that performs a specific business function, such as accounting or order management.

Software package

According to the Henry Mintzberg model, a manager in an informational role acts as which of the following?

Spokesperson

What does the behavioral model hope to accomplish in management decision making?

Support the unpredictable and less systematic aspects of decision-making

Why is system modeling referred to as an iterative process?

System modeling is used to implement findings and start over to ensure the system is understood. When going through all the steps in system modeling, the review process will identify faults or missing requirements that involve the redesign of the model.

What are the components of system-level security?

System-level security consists of the architecture, policy, and process levels.

What does SDLC stand for?

Systems Development Life Cycle

______________ is a universal telecommunication network protocol that most operating systems can recognize.

TCP/IP TCP/IP is the standard internet protocol that is widely used and has replaced most other network protocols.

The Internet standard defines how computers and devices route communications traffic from one network to another over the Internet. What is this Internet standard known as?

TCP/IP TCP/IP stands for transmission control protocol or Internet protocol. It is the Internet standard created in the 1970s by the original ARPANET group.

Which of the following two portable devices combines the functionality of phone technology with the computing of a desktop or laptop? Tablet Netbook Smartphone iPod

Tablet and smartphone Smartphones and tablets combine the functionality of a phone with the capabilities of a computer.

An important downside to a converged computer network is that when it goes down, _______ is disabled.

Telephone service. When converging voice, data, and video in a network, the business loses its old telephone network.

After analyzing management behavior, Henry Mintzberg identified _______ roles performed by organizational managers.

Ten; Mintzberg identified ten roles and categorized them into interpersonal, decisional, and informational.

The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture? The client has control over the applications residing on the server. The client sends messages requesting services from the server on the network. All the applications reside on the server. The client/server architecture maximizes traffic on the network.

The client has control over the applications residing on the server. In a client/server configuration, the server, not the client, has control over the applications residing on the server.

What is the function of the data integration service in business intelligence?

The data integration service serves as the depository of all extracted data for the load function of the data warehouse.

What is the best description of a flat file database?

The flat file design is a single table database. Flat file databases are composed of a single table.

Ethical principles often form the foundation for legal regulations. Governmental agencies create these legal regulations to define which of the following?

The fundamental tenets of responsibility, accountability, and liability for all businesses and its citizens to follow.

What is the critical path?

The longest path through the network diagram, indicating the shortest amount of time in which a project can be completed. The critical path is the path with the longest time duration and represents the shortest amount of time a project can be completed.

Among all the connections - Internet, intranet, and extranet - the Internet is __________________________.

The most widely used channel for business. Almost every organization has an Internet presence, but not all companies have intranet and extranet capabilities.

The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity. This resulted in more complexity due to __________________.

The need for more systems and better processing capabilities. As the demand for more powerful systems increases, the complexity of designing and building these systems also increases.

How many methods are there to increase user adoption and lower the cost of a system, post implementation?

There are six methods, including benchmarking, usability testing, user communication, internal user groups, planning, and leveraging existing resources.

How many types of CASE tools are there?

There are six types of CASE tools and they include business, graphic modeling, development, verification and validation, metrics, project management, and configuration.

How are management's interpersonal roles supported by information systems?

They are behavioral in nature and require minimal information system support as they deal with unstructured and less systematic issues.

Which of the following is a characteristic of a legacy or old analog network? They carried continuous electronic waveforms. They require packet switched networks. They did not have capacity or bandwidth limitations.

They carried continuous electronic waveforms. Old networks were analog or 'circuit' and carried a continuous signal.

Which of the following is correct about virtual networks? They function through network virtualization. They are a conceptual design. The connect virtual hosts together.

They function through network virtualization.

How many types of decision-making processes in decision support systems are there?

Three Structured, semi-structured, and unstructured.

How many types of management information system evaluations are there?

Three. The three types of evaluations are system oriented, function oriented, and strategy oriented.

What might a local government agency use a business intelligence geographic information system (GIS) application for?

To analyze traffic accidents and citation data

As an IT professional, you are conducting a feasibility study for a project. What is the overall objective of a feasibility study?

To determine if the outcome is possible and desirable. The end objective of a feasibility study is to determine if the outcome of the development project is possible and desirable; that is, if it will have a return on investment.

The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?

To increase the number of unique IP addresses. The IPv4 structure provides 4.29 billion unique IP addresses, but it was still not enough to accommodate the increasing number of hosts connected to the Internet. The IPv6 standard was created to help solve this problem.

How does business intelligence reduce irrelevant information and information bottlenecks?

Trained users can generate individualized reports without support from IT. Information bottlenecks and irrelevant information are overcome with business intelligence capabilities because users can access and generate custom reports.

Decision support systems (DSS) enable business performance management by __________ organizational strategies into operational targets.

Translating

[True/False] Business intelligence enables flexible, deep data investigative capabilities.

True

[True/False] There are four systems used by corporations to provide decision support. These systems are MIS, DSS, ESS, and GDSS.

True

True or False. The operational feasibility study objective is to understand if the proposed system is compatible with existing or proposed organization operation objectives

True One type of feasibility study is operational and is used to determine if a new system is compatible with the organization.

True or False. When managing systems implementation, the primary concerns with reliability are inconsistent output, system failure, and system unresponsiveness.

True Reliability is concerned with quality of output and system performance over time.

[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises.

True Wireless LANs allow visitors - customers or suppliers - to access the internet and their information systems for collaboration and decision making.

[True/False] 4G networks provide IP based voice, data, and multimedia traffic.

True. 4G networks carry voice, data and video, compared to 1G networks which were only capable of voice traffic.

[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider.

True. A VPN is a secure tunnel through the Internet using a public infrastructure. It provides a secure and encrypted connection for employees to have remote access to their work servers.

[True/False] The internet of Things (IoT) will enable automated, just in time e-commerce transactions.

True. The internet of things will have all devices connected to the internet with sensors to be automatically re-filled or serviced when needed.

[True/False] Businesses can integrate both Supply Chain Management (SCM) and Customer Relationship Management (CRM) into their organizations to merge, mine, organize, and manage their data. For instance, point-of-sale (POS) orders from the CRM can immediately trigger a restock request in the SCM.

True. Both the SCM and CRM perform different functions and yield different benefits. However, they can both be integrated into the organization's infrastructure to harness and optimize sales performance by channeling the customer data from the CRM into the SCM.

[True/False] In many organizations, employees are allowed different levels of access to the data in the database. Database access rights can be assigned based on their seniority, duties, and responsibilities.

True. Companies can assign employees with different levels of access rights, which include the rights to read, write (save), delete, or modify the data in the database. Usually, employees are given the access rights to fulfill their duties and job responsibilities.

[True/False] An Energy Management System (EMS) can help to manage energy usage and reduce operating costs in an organization. Google's Nest Labs automatic thermostat is an example of an EMS.

True. Many corporations, small business owners, and individuals use EMS to manage, monitor, and control their energy usage and facilitate both manual and automatic climate changes. Google's Nest Labs Nest is a programming, automatic thermostat that helps to manage and monitor room temperature.

[True/False] Open-source software has been found to contain fewer defects than proprietary software.

True. Open-source software has fewer defects because it is accessible to many software developers.

[True/False] In a healthcare organization, policies concerning data governance of clients' information would include creating information policy, planning for the types and quantities of data, designing the database, and predicting or monitoring how users utilize the data.

True. Procedures concerned with the proper governance in a healthcare organization would include creating information policy, planning for the types and quantities of data, designing the database, and predicting or monitoring how users utilize the data.

[True/False] RFID technology enables companies to monitor and track inventory using wireless handheld devices.

True. RFID is a wireless radio spectrum signal used to track inventory.

[True/False] Software applications have a life cycle because of hardware technological advances described by Moore's Law.

True. Software applications need to keep up and leverage the increasing processing power of the computer.

[True/False] Engineers tasked with designing complex systems typically require workstations as their computer systems.

True. Workstations are considered powerful computer systems that can handle intensive mathematical operations.

True or False. Decisive analytics use visual analytics that reflect human reasoning in order to support management decisions.

True; it's an analytical model that reflects human reasoning.

One software issue facing contemporary organizations is the impact of rapidly changing technology. According to Moore's law, the number of transistors on a computer chip doubles ever ________, increasing the amnt of data that can be processed by software.

Two years.

What is UML?

UML is a general purpose modeling language. UML (unified modeling language) is a general purpose, standard software development modeling language used to model and help visualize systems.

You are testing a new system implementation. What are the three elements of the testing phase?

Unit, system and acceptance testing.

Upper CASE tools are important to analysts in the project planning phase. What is meant by Upper CASE tools?

Upper CASE tools support software modeling and analysis.

What is the role of repeaters in telecommunications networks?

Used to amplify signals as they travel in a network.

What is QoS?

Used to measure performance of data communications. Used to ensure voice or circuit switched communication quality.

What is the purpose of a network sniffer?

Used to monitor network traffic. Monitors and troubleshoots network traffic.

System implementation success depends on a number of factors, but true system success is measure by which factor below?

User acceptance and adoption rates

A decision support system (DSS) consists of four components, including data management, model management, knowledge management, and __________.

User interface management The user interface management component allows you to communicate with the decision support system.

In asynchronous communication, participant communication is not concurrent. Why is this an advantage of email?

Users can send or reply to messages on their own schedule. Asynchronous communication occurs at different times and usually in different places. One of the advantages of asynchronous communication is that participants do not have to be on the computer in real-time; they can send or reply to messages at a time that is convenient for them.

Why is WPA critical to wireless networks?

WPA is a tunneling encryption protocol that secures wireless data transmissions. WPA is a wireless (tunneling) encryption protocol that provides secure data transmission over an insecure network.

________________ are located in strategic locations and used to monitor physical or environmental conditions.

WSNs WSNs are wireless sensor networks that are used to monitor conditions.

The internet was initially developed using a telephone connection. Which of the following is an innovative application provided by the internet? Ticker tape device Web enabled storefront Fax machine

Web enabled storefront. One of the most important benefits of the Internet is the creation of a web storefront for retailers to conduct business online and beyond geographical boundaries.

Which of the following application provided by the Internet allows an online retailer to conduct business? Electronic communications Fax machine Web enabled storefront Web forms

Web enabled storefront. The Internet allows the creation of a web enabled storefront, whereby online retailers can advertise and sell their products online to anyone, located anywhere, and around the clock at 24/7.

______________ creates databases, which are mined to understand customer behavior and improve customer intimacy.

Web mining

Web data mining helps businesses gather intelligence data and make important decisions. Which of the following statements is TRUE regarding web mining?

Web mining uses clickstream applications to analyze the data collected from the Internet.

When would client computers using TCP/IP in a client/server network not be able to communicate with each other?

When a client computer is offline and not connected to the internet. Access to the network and Internet is necessary for client computers using TCP/IP in a client/server network to communicate.

What is a data mart?

data warehouse subset; A data mart is a subset database from a data warehouse, but it is focused on a single area or function.

A GDSS differs from traditional DSS in what way?

With GDSS, users can meet in one location, but collaboration can happen remotely.

What category of CASE does Microsoft Visual Basic fall under?

Workbench

True or False. CASE workbenches are classified with the same six categories as CASE tools.

Workbench CASE tools are classified with the same categories as CASE tools.

Financial, business process, customer, and learning and growth are organizational dimensions of:

a balanced scorecard

The reporting service element of a successful business intelligence system creates ____________ databases that help expedite custom queries.

analytical

Maintaining historical records allows managers to analyze the data to help improve their business. Data collected from all internal and external sources are extracted, transformed, and then loaded into a data warehouse for additional _____________

analysis. Data are collected, extracted, transformed, and loaded into a data warehouse so that they can be further analyzed to help managers make informed decisions.

Software applications benefit businesses because they enable process ________

automation

one of the three goals of information security. It ensures that access to appropriate resources is unimpeded.

availability

What is meant by "core router"?

hey collapse the network into a backbone for high bandwidth communication. In large businesses or in telecom networks, core routers are powerful routers that gather, link, and 'collapse' the network into a backbone or route data from a business campus and aggregate it to optimize high bandwidth communication transmission.

The learning and growth perspective measures the ability of the organization to ___________ in order to continue to add value to the organization.

innovate

one of the three goals of information security and ensures that data is produced and modified in the correct way.

integrity

The Henry Mintzberg model identified ten roles performed by organizational managers. Interpersonal roles include figurehead, leader, and ____________

liason

A decision tree analysis tool presents a _______________

isual flowchart representation of the decision and outcomes but does NOT use roots in the model.

Predictive analytics is predictive modeling that utilizes statistical and _____________ learning techniques.

machine

There are multiple methods of data capture and they can be categorized as __________________

manual or automated

Wireless LAN networks are ____________________

more scalable than wired networks

____________ involves correctly defining keys, tables, columns and relationships.

normalization

All computer systems are composed of hardware components and software components and require a CPU and a(n) _______________________ to function.

operating system

There are three popular methods of system implementation: direct, prototyping, and __________

parallel

a measure of system consistency over time.

reliability

User adoption and management support during the implementation phase is required because of change ___________.

resistance

Business intelligence is defined as the infrastructure, data, and ______________ tools to help mine collected data.

software

Metrics and measurement tools are used to analyze ________________

software codes

Software as a service is a cloud-based service designed for providing access to ___________ remotely over the Internet.

software; Software as a service (SaS) aka on-demand software, is a software model in which software s centrally located and is licensed by a subscription.

System development life cycle (SDLC) consists of seven stages. The sixth stage in SDLC is ______________

testing and maintenance


Set pelajaran terkait

patho 2 final exam possible questions

View Set

ART 100 Ch 15: Christianity and the Formation of Europe

View Set

Lesson 12 Eos, Helios and Selene (pp. 80-89)

View Set

Law 2 - Chapter 16 Practice Quiz

View Set

Midterm Exam Practice for Mr.Fowler

View Set