Jake's homemade Kentucky fried chicken

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Computers and communication systems use _____ to represent information between computers and network systems. a. nanotubes b. servers c. source codes d. data codes

Data codes

Which decision is supported by a financial information system (FIS) a. Improving routing and delivery schedules b. Analyzing sales personnel c. Choosing the best job candidate d. Determining portfolio structures

Determining portfolio structures

A network model is similar to a hierarchical data model because in both data models' records are organized in the same way. True or false.

False

A patent protects product names and identifying marks. True or false.

False

An effective financial information system should provide timely, accurate, and integrated information about the marketing mix-4Ps: price, promotion, place, and product. True or false.

False

Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment. True or false.

False

Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions. True or false.

False

E-wallets and smart cards increase the risks of exposing consumers' information on the Web. True or false.

False

In network-attached storage (NAS), as the number of users increases, its performance increases. True or false.

False

One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings. True or false.

False

Spreadsheet software is more powerful than financial planning software. True or false.

False

The threat of new entrants into the marketplace is high when duplicating a company's product or service is difficult. True or false.

False

Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers. True or false.

False

According to Michael Porter, which strategy can be followed by an organization to successfully compete in the marketplace? a. Groupthink b. Simulation c. Brainstorming d. Focus

Focus

Transaction-processing systems a. require extensive managerial judgment b. involve operations that are repetitive c. require maximum human involvement d. involve low volumes of data

* involve operations that are repetitive*

Identify an advantage of a mouse over a trackball. a. A mouse processes more information than a trackball. b. A mouse is more precise in positioning the pointer than a trackball. c. A mouse occupies less space than a trackball. d. A mouse is stationary, whereas a trackball has to be moved around.

A mouse is more precise in positioning the pointer than a trackball.

When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met. a. NOR operator b. NOT operator c. AND operator d. OR operator

AND operator

The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management. a. definition b. manipulation c. administration d. generation

Administration

In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number. a. Extended ASCII b. Unicode c. American Standard Code for Information Interchange (ASCII) d. Extended Binary Code Decimal Interchange Code (EBCDIC)

American Standard Code for Information Interchange (ASCII)

_____ are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive. a. Kernels b. Applets c. Firewalls d. Cookies

Cookies

_____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases. a. Kernels b. Applets c. Cookies d. Trojans

Cookies

Which protects contents of an HTML code? a. Copyright laws b. Industrial property laws c. Laws governing trademarks d. Patent laws

Copyright laws

The _____ component of an information system consists of raw facts and by itself is difficult to use for making decisions. a. cache b. data c. process d. kernel

Data

The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained. a. data dictionary b. data mart c. data warehouse d. data model

Data Model

Information technologies have decreased the ease of access to information for hackers as well as for legitimate organizations.

false

involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment. a. Mobile computing b. Cloud computing c. Green computing d. Natural computing

Green computing

A data _____ is the structure and organization of data, which involves fields, records, and files. a. mart b. mine c. hierarchy d. warehouse

Hierarchy

Java and C++ are examples of a. machine language b. compiler languages c. High level languages d. assembly language

High level languages

Which can help offset the digital divide? a. Increasing the number of computers in public places b. Reducing the Internet bandwidth for the information poor c. Increasing the speed of the Internet for the information rich d. Reducing the number of computer equipment at schools

Increasing the number of computers in public places

In the context of using information technologies for a competitive advantage, which statement is true of a bottom-line strategy? a. It focuses on helping different market segments achieve a cost advantage. b. It focuses on improving efficiency by reducing overall costs. c. It focuses on enhancing rivalry among existing competitors. d. It focuses on generating new revenue by offering new products and services.

It focuses on improving efficiency by reducing overall costs.

Identify a true statement about information and communications technology (ICT). a. It helps organizations save energy costs. b. It generates approximately six percent of the world's greenhouse gases. c. It generates approximately two percent of the world's carbon dioxide emissions. d. It improves the quality of the environment in which you work.

It generates approximately two percent of the world's carbon dioxide emissions.

Identify a true statement about information technology. a. It has cut down production costs. b. It has eliminated more jobs than it has created. c. It has reduced consumers' purchasing power. d. It has increased clerical jobs.

It has cut down production costs.

In the context of information privacy, which of the following is true of spam? a. It is solicited e-mail sent for business purposes. b. It can only be send to a small number of people. c. It can only be used to provide access to legitimate e-mails. d. It is sent in bulk using automated mailing software.

It is sent in bulk using automated mailing software.

Which is a potential drawback of telecommuting? a. Increased interruptions from coworkers b. Increased employee turnover and absenteeism c. Lack of necessary supplies or equipment d. Difficult work environment for employees with disabilities

Lack of necessary supplies or equipment

_____, which are generated by Web server software, record a user's actions on a Web site. a. Viruses b. Junk e-mails c. Log files d. Worms

Log files

Which is a key factor that has contributed to the growth and popularity of big data? a. Exponential decay of organizational data b. Mobile and wireless technology c. Implosion in data growth d. Brick and mortar businesses

Mobile and wireless technology

UNIX is a type of a. remote access server b. operating system c. storage area network d. application software

Operating system

In the context of storage devices, CD-ROMs and DVDs are examples of a. magnetic disks b. magnetic tape c. main memory devices d. optical discs

Optical discs

A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. a. serial port b. control unit c. arithmetic logic unit d. parallel port

Parallel port

Microsoft PowerPoint is the most commonly used _____ software. a. presentation b. project management c. graphics d. desktop publishing

Presentation

Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)? a. Protecting patients' computer records b. Safeguarding conversations between patients and their families c. Protecting patients' credit information d. Safeguarding patients' billing information

Safeguarding patients' billing information

In a relational database model, which operation searches data in a table and retrieves records based on certain criteria? a. join operation b. insert operation c. find operation d. select operation

Select operation

_____, also known as virtual work, has enabled some people to perform their jobs from home. a. Offshoring b. Telecommuting c. Outsourcing d. Urbanizing

Telecommuting

_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. a. The Fair Use Doctrine b. IT code of conduct c. The Copyright Act of 1790 d. Uniform Civil Code

The Fair Use Doctrine

Which is true of virtual organizations? a. They let independent suppliers share skills and have access to each other's markets via information technologies. b. They need an organizational hierarchy for participants to contribute their expertise. c. They are networks of dependent companies and manufacturers connected via information technologies. d. They need central offices for participants to contribute their expertise.

They let independent suppliers share skills and have access to each other's markets via information technologies.

In the context of information privacy, which is true of cookies? a. They get saved on a computers' primary memory. b. They make it impossible for Web sites to customize pages for users. c. They provide information about users' location. d. They record users' actions on a Web site.

They provide information about users' location.

ENIAC is an example of a first-generation computer. True or false.

True

Green computing helps an organization save on energy costs. True or false.

True

In a management information system (MIS) application, processes are usually methods for performing a task. True or false.

True

In contrast to the query languages used to interact with a relational database, interaction with an object-oriented database takes places via methods, which are called by sending a message to an object True or false.

True

Information systems are broader in scope than information technologies. True or false.

True

The most common personal digital assistant (PDA) is a smartphone. True or false.

True

In a relational database model, the rows are called a. tuples b. roots c. attributes d. branches

Tuples

To minimize the invasion of privacy, users should be barred from reviewing their records. True or false.

false

A _____ is an intellectual property that protects product names and identifying marks. a. registration b. patent c. trademark d. copyright

trademark

In the context of the major components of an information system, which is a difference between information and data a. Unlike data, information by itself is difficult to use for making decisions. b. Unlike data, information can be collected in aggregated and disaggregated forms. c. Unlike data, information is considered the input to an information system. d. Unlike data, information consists of facts that have been analyzed by the process component.

Unlike data, information consists of facts that have been analyzed by the process component.

_____ are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets. a. Merged organizations b. Collated organizations c. Virtual organizations d. Pool organizations

Virtual organizations

A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. a. dictionary b. pattern c. mine d. warehouse

Warehouse

To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____. a. article ownership policy b. standard data policy c. acceptable use policy d. user content policy

acceptable use policy

In the context of computer operations, division is a(n) a. arithmetic operation b. storage operation c. retrieval operation d. logical operation

arithmetic operation

According to the 1980 revisions to the Copyright Act of 1976, _____. a. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs b. copyright protection extends to original works of authorship in architectural fields c. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers d. copyright holders can perform a copyrighted work by means of digital audio transmission

both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs

According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____. a. discriminate data based on content b. start blocking data traffic to specific users c. cease charging different rates on data d. treat data based on the types of application

cease charging different rates on data

In the context of ethical issues of information technologies, restricting access to the Web is a type of _____. a. copyright b. spamming c. cybersquatting d. censorship

censorship

In designing a management information system (MIS), the first task is to a. clearly define the system's objectives b. provided information in a useful format c. analyze data d. collect data

clearly define the system's objectives

E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data. a. kernels b. log files c. applets d. cookies

cookies

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for a. create, repeat, undo, and develop b. create, read, update, and delete c. copy, read, update, and define d. copy, revise, undo, and define

create, read, update, and delete

In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark. a. spamming b. phishing c. cybersquatting d. sniffing

cybersquatting

In the context of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools. a. web strategist b. database administrator c. data design officer d. systems mining analyst

database administrator

A _____, identified by Michael Porter, helps organizations make their products and services distinct from their competitors. a. simulation strategy b. differentiation strategy c. leadership strategy d. focus strategy

differentiation strategy

Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____. a. data junction b. information barrier c. digital divide d. domain squat

digital divide

In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed. a. e-checks b. debit cards c. credit cards d. e-wallets

e-wallets

In the context of the input component of a data warehouse, _____ collect, integrate, and process data that can be used by all functional areas in an organization. a. enterprise resource planning systems b. online transaction management systems c. data mining analysis systems d. online analytical processing systems

enterprise resource planning systems

Job deskilling occurs when: a. fragmented jobs are combined as a whole. b. experienced labor is eliminated by high technology. c. a job is carried out manually. d. a worker is promoted from a semiskilled to a skilled position.

experienced labor is eliminated by high technology.

A ____ is typically used to support decisions related to managing an organization's cash flows. a. logistics information system b. financial information system c. manufacturing information system d. marketing information system

financial information system

In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the: a. Fifth Amendment to the United States Constitution. b. Fourth Amendment to the United States Constitution. c. self-defense provisions of the Second Amendment. d. freedom of speech provisions of the First Amendment.

freedom of speech provisions of the First Amendment.

URL _____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser. a. opening b. hijacking c. parsing d. decoding

hijacking

Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____. a. legal, but unethical b. illegal, but ethical c. legal and ethical d. illegal and unethical

illegal, but ethical

The advantage of the _____ access method is that both sequential and random access can be used to access records, depending on the number being accessed. a. direct random b. random-serialized c. indexed sequential d. progressive

indexed sequential

A(n) _____ enables communication between a video card and memory. a. internal bus b. floppy drive c. optical disc d. keyboard

internal bus

Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____. a. illegal and unethical b. legal, but unethical c. illegal, but ethical d. legal and ethical

legal and ethical

Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____. a. illegal and unethical b. illegal but ethical c. legal but unethical d. legal and ethical

legal but unethical

Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____. a. legal, but unethical b. legal and ethical c. ethical, but illegal d. unethical and illegal

legal, but unethical

In the context of intellectual property, _____ are categorized as industrial property. a. music albums b. copyrights c. novels d. logos

logos

In the context of Web and network privacy, _____ is a method for binding all the parties to a contract. a. phishing b. encapsulation c. cybersquatting d. nonrepudiation

nonrepudiation

A _____ is an intellectual property that protects new processes. a. registration b. copyright c. trademark d. patent

patent

Decisions related to scheduling and assigning employees can be supported by a a. manufacturing information system b. financial information system c. logistics information system d. personnel information system

personnel information system

In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media. a. logical view b. rational view c. physical view d. analytical view

physical view

Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on. a. application generators b. predictive modeling c. dashboards d. query reports

predictive modeling

The purpose of an information system's _____ component is generating the most useful type of information for making decisions. a. process b. database c. internal data d. external data

process

To be useful, information systems should a. produce information in different formats b. not use rumors, unconfirmed reports, and stories c. use command line user interfaces d. generate raw data, which can be used for decision making

produce information in different formats

A potential benefit of telecommuting is that it _____. a. regulates work routine b. increases interaction with coworkers c. reduces employee turnover d. separates work and home life

reduces employee turnover

In a(n) _____, records in files are organized and processed in numerical order. a. random access file structure b. direct access file structure c. indexed access file structure d. sequential access file structure

sequential access file structure

The cost of hiring additional employees in virtual organizations is reduced because: a. skills are shared among the participating companies. b. companies hire candidates with minimum experience. c. there is less emphasis on hiring new talent. d. training costs are reduced because of the absence of training programs.

skills are shared among the participating companies.

In the context of information privacy, junk e-mail is also known as _____. a. spam b. bookmark c. cookie d. draft

spam

In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _____. a. a virus b. abug c. spam d. a cookie

spam

For the past 60 years, _____ have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control. a. procedural-programming systems b. business-analysis systems c. transaction-processing systems d. object-oriented-modelling systems

transaction-processing systems

When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____. a. spamming b. phishing c. cyberstalking d. typosquatting

typosquatting

To minimize the invasion of privacy, users and organizations should: a. provide wrong data to unauthorized users. b. use verification procedures to ensure data accuracy. c. keep collected information even after the stated purpose is over. d. provide access to one's personal information to all interested parties.

use verification procedures to ensure data accuracy.

Green computing can be achieved by: a. replacing meetings over computer networks with actual face-to-face meetings. b. using video conferencing, electronic meeting systems, and groupware. c. using computing devices that are nonbiodegradable. d. replacing one large server with several underutilized smaller servers.

using video conferencing, electronic meeting systems, and groupware.

The principle of _____ is the idea that several organizations working together can do what one organization cannot. a. pool organization b. virtual organization c. merged organization d. collated organization

virtual organization


Set pelajaran terkait

AP Environmental Science El Niño

View Set