BSIS
When using NIC teaming with Windows Server 2012 R2 virtual machines, which of the following tasks must be completed? (Choose two answers.)
-Configure a NIC team virtual network adapter. -Create a team virtual switch.
Which of the following features are supported by the NIC team with Hyper-V virtual machines running in Windows Server 2012 R2?
-Redundancy - Aggregated bandwidth
Which of the following indicates the top-level domain for the universal resource locator (URL) http://www.csub.edu?
.edu
Which of the following is a country code top-level domain?
.fr
The generic top-level domain (gTLD) for the United Nations is _____.
.int
_____ is a generic top-level domain (TLD) name used for backbone, regional, and commercial networks.
.net
In the uniform resource locator (URL) http://www.csub.edu/~hbidgoli/books.html, _____ represents the name of the directory in which files are stored.
/~hbidgoli
After creating a VM, how many virtual adapters are included by default?
1
An American Standard Code for Information Interchange (ASCII) file defines up to _____ character
128
An American Standard Code for Information Interchange (ASCII) file defines up to _____ characters.
128
What is an example of a valid IPv4 address?
192.29.1.42
What is the maximum number of NICs used in NIC teaming for Hyper-V virtual machines?
2
What is an example of a valid IPv6 address?
21cd:0053:0000:0000:e8bb:04f2:003c:c394
Certain IPv6 addresses can be contracted. Which of the following answers is the contracted form of 21cd:0053:0000:0000/64?
21cd:53::/64
A petabyte is equal to _____ bytes.
250
An Extended ASCII data code allows representation of maximum _____ characters
256
An Extended ASCII data code allows representation of maximum _____ characters.
256
How many MAC addresses are available for virtual network adapters, created by Hyper-V?
256
In the context of virtual reality (VR) technology, the main technology used in an exocentric environment is _____.
3D graphics
What is the technology intended to help transition IPv4 networks to IPv6, by expressing IPv4 addresses in IPv6 format?
6 to 4
The word computer consists of 64 bits, which is equivalent to _____ bytes.
8
Which of the following is an example of an input device?
A barcode reader
Which of the following security measures uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?
A biometric security measure
Which of the following systems' goal is to improve services offered to clients and use client contact information for targeted marketing?
A customer relationship management system
Which of the following types of databases is not limited by the data's physical location?
A distributed database
Which of the following is an outcome of the design phase of the systems development life cycle (SDLC)?
A document with exact specifications for executing the system, including procedures, hardware and software, and networking components
Identify a topology used by traditional mainframe networks.
A hierarchical topology
Which of the following is a disadvantage of a request for proposal (RFP)?
A lengthy time frame makes an RFP less appealing.
Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?
A logic bomb
Identify an advantage of a mouse over a trackball
A mouse is more precise in positioning the pointer than a trackball.
Identify an advantage of a mouse over a trackball.
A mouse is more precise in positioning the pointer than a trackball.
GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A private cloud
In the context of information systems, which of the following is a disadvantage of prototyping?
A prototype might not reflect the final system's actual operation and, therefore, could be misleading.
Wytes Pharmaceuticals wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would offer the highest cost savings and would require the least amount of involvement by IT managers. Which of the following cloud computing options would be the most suitable for Wytes Pharmaceuticals?
A public cloud
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
A public key infrastructure
_____ allows data to be stored in multiple places to improve a system's reliability.
A redundant array of independent disks
Which of the following statements is true of extreme programming (XP)?
A system's quality is improved by addressing major issues that have not been examined before.
Which of the following paths of the given network is the critical path?
A → C → F → H → I
When using query by example (QBE) in the data manipulation component of a database management system (DBMS), the _____ is used when all the conditions in the QBE form must be met.
AND operator
_____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
Active
What is the primary reason IPv6 has not completely replaced IPv4?
Administrators are hesitant and reluctant to change.
is an incremental development process that focuses on setting a minimum number of requirements and turning them into a working product.
Agile methodology
is an incremental development process that has less emphasis on team coding and more emphasis on limiting a project's scope.
Agile methodology
_____ are considered the first large-scale interactive global system.
Airline reservation systems
Creating a new virtual switch automatically connects the host operating system with the child partition VMs by default. What setting can be changed during virtual switch creation to disconnect the host OS?
Allow management operating system to share this network adapter
In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.
American Standard Code for Information Interchange (ASCII)
Which of the following is an example of an e-marketplace?
An e-distributor
Which of the following is a type of interorganizational system?
An extranet
Which of the following components of an expert system uses forward and backward chaining to manipulate a series of rules?
An inference engine
What is the difference between an external virtual switch and an internal virtual switch?
An internal switch doesn't allow child partition VMs to access the external network, but they can on an external switch.
Which of the following statements is true of the types of client/server architectures?
An n-tier architecture helps improve network performance.
What does a differencing disk offer administrators?
An opportunity to experiment with no changes committed to the parent image
_____ is an example of a secondary memory device.
An optical disc
The _____ of the Open Systems Interconnection (OSI) model provides services that support users' tasks, such as file transfers, database access, and e-mail.
Application layer
A(n) _______ is a type of server that stores computer software, which users can access from their workstations.
Application server
Which of the following geographic objects of a geographic information system (GIS) is most likely used to show a particular zip code or a large tourist attraction?
Areas
consists of related technologies that try to simulate and reproduce human thought behavior, including thinking, speaking, feeling, and reasoning.
Artificial intelligence
are used when data is fuzzy and uncertainty is involved.
Artificial neural networks
In the context of intellectual property, which of the following is categorized as copyrighted material?
Artistic works
Which of the following Digital Subscriber Line (DSL) services has a lower transmission rate upstream than downstream?
Asymmetric DSL
_____ uses a public key known to everyone and a private key known only to the recipient.
Asymmetric encryption
In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps.
Asynchronous Transfer Mode
_____ is the amount of data that can be transferred from one point to another in one second.
Bandwidth
_____ is a short-range wireless communication technology that acts as a supporting technology for mobile commerce (m-commerce) applications.
Bluetooth
Which of the following is a similarity between agile methodology and extreme programming (XP)?
Both focus on an incremental development process.
Which of the following is a similarity between the Internet and an intranet?
Both use similar languages for developing applications.
_____ involves semistructured decisions.
Budget preparation
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
Business continuity planning
What is a subnetting method that enables you to place the division between the network bits and the host bits anywhere in the address, not just between octets?
CIDR
_____ is an expert system used for monitoring what consumers are saying in blogs, comment sections, message boards, and Web-based articles.
COGITO
The layout and appearance of a Hypertext Markup Language (HTML) document should be handled by
Cascading Style Sheets
is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it.
Case-based reasoning
What is the captured image of the state, data, and hardware configuration of a VM at a particular moment in time?
Checkpoint
is an executive position created for overseeing knowledge management within an organization.
Chief knowledge officer
As defined by the original Internet Protocol standard, what are the three classes of IP addresses used for networks, and what differentiates them?
Class A, B, C, differing by how many bits distinguish the networks from the hosts
is a mix of traditional commerce and e-commerce.
Click-and-brick e-commerce
_____ incorporates many recent technologies under one platform, including the software as a service (SaaS) model, Web 2.0, grid computing, and utility computing.
Cloud computing
_____, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties.
Cloud storage
____ are conducted media that can be used for both data and voice transmissions.
Coaxial cables
_____ are conducted media that can be used for both data and voice transmissions.
Coaxial cables
_____ is a search for specific information or patterns using input from multiple business partners and data sources.
Collaborative filtering
Which of the following is an operational requirement for a global information system (GIS)?
Communication between headquarters and subsidiaries
is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
Computer fraud
_____ is used for drafting and has replaced traditional tools, such as T-squares, triangles, paper, and pencils.
Computer-aided design software
is an operational requirement of a global information system (GIS) that includes accounting and financial data, manufacturing updates, inventory, and so forth.
Consolidated global reporting
_____ refers to widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals.
Context aware computing
_____ refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, where we are, and whom we are with-offer recommendations.
Contextual computing
Which of the following is a commonly used technology for data collection?
Cookies
make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.
Cookies
laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.
Copyright
Which of the following protects contents of an HTML code that can be printed or saved on a storage device?
Copyright laws
_____ are an inexpensive way to secure a computer to a desktop or counter and often have locks as an additional protection against theft.
Corner bolts
_____ check to see what links are on the user's Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page.
Crawlers
_____, software used by search engines, can go through the other pages that are part of your Web site, as long as there are links to those pages.
Crawlers
In the context of multinational corporations (MNCs), which of the following is one of the four factors in a global environment?
Cultural
consists of the processes a company uses to track and organize its contacts with consumers.
Customer relationship management
allows customers to modify the standard offering, such as selecting a different home page to be displayed each time you open your Web browser.
Customization
_____ was the first expert system developed to determine the chemical structure of molecules.
DENDRAL
The component of a decision support system (DSS) that manages and coordinates the other major components is the _____.
DSS engine
Identify a true statement about decision support systems (DSSs).
DSSs facilitate improvements but do not necessarily cause them.
is one of the most popular password managers.
Dashlane
_____ is the electronic transfer of data from one location to another.
Data communication
Which of the following is a cloud-computing risk that deals with specific jurisdictions and commitment to local privacy?
Data location
Which of the following statements is true of data marts and data warehouses?
Data marts usually perform the same types of analysis as data warehouses.
_____ is a cloud-computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.
Data segregation
is used to discover patterns and relationships.
Data-mining analysis
In a customer relationship management (CRM) system, which of the following is effective in tracking and analyzing customers' buying patterns?
Data-mining tools
_____ can be described as using an organization's database of customers and potential customers in order to promote products or services that an organization offers.
Database marketing
Which of the following is a type of artificial neural network (ANN) that includes many layers to deal with complex problems that may have very large data sets?
Deep learning
is a feature of electronic meeting systems that combines the advantages of video teleconferencing and real-time computer conferencing.
Desktop conferencing
Identify a characteristic of electronic meeting systems.
Desktop conferencing enables participants to have multiple video windows open at one time.
Which of the following decisions is supported by a financial information system (FIS)?
Determining portfolio structures
What type of disk enables you to preserve an existing virtual disk image file in its original state, while mounting it in an OS and even modifying its contents?
Differencing disk
_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.
Digital subscriber line
_____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
Discussion groups
In manufacturing, which of the following is one of the major links in the supply chain?
Distribution centers
_____ are unique identifiers of computer or network addresses on the Internet.
Domain names
encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies.
E-business
_____ help businesses maintain a competitive edge in the supply chain by solving time-constraint problems for international trade and making it possible to conduct business around the clock.
E-marketplaces
__________bits equal one byte
Eight
bits equal one byte.
Eight
Collaborative planning, forecasting, and replenishment
Electronic data interchange
_____ enable decision makers in different locations to participate in a group decision-making process.
Electronic meeting systems
Which of the two types of virtual network adapters, synthetic or emulated, is called the legacy adapter and why?
Emulated is called the legacy adapter because it is a standard network adapter driver and communicates more slowly.
is an integrated system that collects and processes data and manages and coordinates resources, information, and functions throughout an organization.
Enterprise resource planning
_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).
Ethernet cables
In Hyper-V terminology, what do you call a virtual switch configured to provide connections external to the Hyper-V environment?
External network switch
_____ is a method for developing software applications and information system projects in which a project is divided into smaller functions and developers cannot go on to the next phase until the current phase is finished.
Extreme programming
A byte is a single value of 0 or 1.
False
A computer with a 32-bit processor can perform calculations with larger numbers better than a 64-bit system.
False
A server is a set of programs for controlling and managing computer hardware and software.
False
An expert system is not a good choice when a lot of human expertise is needed to tackle a problem.
False
An object code must be translated into source code for a computer to read and execute it.
False
Businesses find attracting new customers less expensive than maintaining current customers.
False
Fourth-generation languages (4GLs) are also called procedural languages.
False
In network-attached storage (NAS), as the number of users increases, its performance increases.
False
Spreadsheet software is more powerful than financial planning software.
False
The arithmetic logic unit and the control unit are part of the Basic Input/Output System
False
The arithmetic logic unit and the control unit are part of the Basic Input/Output System.
False
The focus of a top-line strategy for successfully competing in a marketplace is improving efficiency by reducing overall costs.
False
The hardware component of a computer system consists of programs written in computer languages.
False
The main difference between an intranet and the Internet is that intranets are public and the Internet is private.
False
Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers.
False
Which of the following is an example of a third-party exchange?
Farms.com
According to Peter G. Keen, a former MIT professor, which of the following is a benefit of a decision support system (DSS)?
Fast response to unexpected situations
_____ are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.
Fiber-optic cables
_____ have the highest bandwidth of any communication medium.
Fiber-optic cables
__________include gallium arsenide chips that run at higher speeds and consume less power than silicon chips and optical technologies.
Fifth-generation computers
include gallium arsenide chips that run at higher speeds and consume less power than silicon chips and optical technologies.
Fifth-generation computers
In a manufacturing firm's supply chain management (SCM) system, which of the following areas handles credit terms and payment schedules?
Finances flow
Which of the following is a task performed by a geographic information system (GIS)?
Finding zip codes of areas with high population
A(n) _____ lists the completion time of a project on the x-axis and all the activities on the y-axis, which allows the systems analyst to monitor the progress of the project and detect any delay in the daily operation of the project.
Gantt chart
_____ are used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems.
Genetic algorithms
mimic the process of natural evolution to generate solutions to optimization and search problems.
Genetic algorithms
_____ is an operational requirement for a global information system (GIS).
Global data access
, which are products or services that have been standardized for all markets, are becoming increasingly important in international marketing efforts.
Global products
_____ uses the geographic information system (GIS) application to dispatch personnel and equipment to crime and fire locations.
Government
involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
Green computing
is software that helps a team of decision makers work with the same application, regardless of their locations.
Groupware
Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?
Hand geometry
_____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments.
Heuristics
In supply chain management (SCM) related to manufacturing, which of the following is considered a key decision about inventory?
How much should be ordered?
_____ is a supporting activity in Michael Porter's value chain.
Human resource management
What Server Manager tool allows you to create a new virtual hard disk?
Hyper-V Manager
How does a SAN work with VMs in Windows Server 2012 R2?
Hyper-V virtualizes the SAN and makes the WWNNs and WWPNs available to the VM.
Which of the following can be used in domain names in uniform resource locators (URLs)?
Hyphens
When configuring Storage Quality of Service in Windows Server 2012 R2, which of the following options ensures that one system does not consume input/output capacity of a physical disk?
IOPS
What is a tunneling protocol that emulates an IPv6 link using an IPv4 network, primarily for Windows workstation operating systems?
ISATAP
What is Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)?
ISATAP emulates an IPv6 link for use on an IPv4 network.
For virtual network adapters, Hyper-V assigns a value up to 256 to create individual MAC addresses. What happens if this is not sufficient?
If more than 256 adapters are needed, an administrator can modify the MAC address pool to be larger.
Which of the following statements is true of offshore outsourcing?
Improved telecommunication systems have increased its attractiveness.
In the context of defining the objectives and benefits of a management support system (MSS), which of the following is an intangible benefit?
Improving customer service
Which of the following statements is true of distributed databases?
In distributed databases, local storage of data increases communication costs.
Which of the following is categorized as a tangible benefit of an information system?
Increased company profits
Which of the following can help offset the digital divide?
Increasing the number of computers in public places
Which of the following countries was among the top Asia Pacific offshore locations for outsourcing in 2016?
India
In a manufacturing firm's supply chain management (SCM) system, which of the following areas oversees order transmission
Information flow
In a manufacturing firm's supply chain management (SCM) system, which of the following areas oversees order transmission?
Information flow
_____ is the first activity involved in a typical business-to-consumer (B2C) cycle.
Information sharing
is the approach where an organization's team develops an information system internally.
Insourcing
is an Internet service for communicating with others via a private "chat room" on the Internet.
Instant messaging
_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods.
Integrity rules
is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.
Intellectual property
_____ are programs that carry out repetitive tasks and can be programmed to make decisions based on specified conditions.
Intelligent agents
Which of the following is a common cost-effectiveness analysis method?
Internal rate of return
_____ are employees who will use an information system regularly and can offer important feedback on the system's strengths and weaknesses.
Internal users
_____ is responsible for packet forwarding.
Internet Protocol
is used to encrypt the data sent through a virtual private network (VPN).
Internet Protocol Security
James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the Internet Corporation for Assigned Names and Numbers (ICANN) to his computer system is 115.248.178.233. This numerical code is referred to as a(n) _____.
Internet Protocol address
is an Internet service that enables users in chat rooms to exchange text messages with people in other locations in real time.
Internet Relay Chat
is a service that uses the Internet rather than the telephone network to exchange spoken conversations.
Internet telephony
_____ are usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for a network administrator, and cause routers to terminate connections with suspicious sources.
Intrusion detection systems
In the context of Internet-enabled supply chain management (SCM), which of the following SCM activities involves providing real-time stock information and replenishing stock efficiently?
Inventory management
Which of the following statements is true of integrating an expert system into the database component of a decision support system (DSS)?
It adds the capability to handle uncertainty and fuzzy data.
Which of the following statements is true of collaborative planning, forecasting, and replenishment (CPFR)?
It aims to improve operational efficiency and manage inventory.
Which of the following statements is true of a database?
It allows more than one program to use the same data.
Which of the following statements is true of an intranet in an organization?
It can be used by trusted business partners with a password.
Identify a true statement about a Web-based group support system (GSS).
It can be used on any operating system.
Which of the following is a characteristic of joint application design (JAD)?
It centers on a structured workshop in which users and system professionals come together to develop an application.
Which of the following is true of a cave automatic virtual environment (CAVE)?
It consists of a cube-shaped room in which the walls are rear-projection screens.
Which of the following is true of the supervisor program of an operating system (OS)?
It controls compilers in the OS.
Which of the following statements is true of Critical Path Method (CPM)?
It determines the critical path for the completion of a series of interrelated activities.
Which of the following statements is true of telemedicine?
It enables medical professionals to conduct remote consultation.
Identify a true statement about virtual medicine on the Internet.
It enables specialists at major hospitals to operate on patients remotely.
In the context of using information technologies for a competitive advantage, which of the following statements is true of a top-line strategy?
It focuses on generating new revenue by offering new products and services.
In the context of using information technology for a competitive advantage, identify a true statement about top-line strategy.
It focuses on generating new revenue by offering new products and services.
Identify a true statement about information and communications technology (ICT).
It generates approximately two percent of the world's carbon dioxide emissions.
Which of the following is true of the control program of an operating system (OS)?
It generates checksums to verify that data is not corrupted.
In the context of a GIS, which of the following is true of high coordination?
It gives flexibility in responding to competitors in different markets.
Identify an advantage of the bus topology.
It handles steady traffic well.
Identify a true statement about information technology.
It has cut down production costs
Identify an advantage of centralized processing.
It helps in exercising tight control over system operations and applications.
In the context of data communication, which of the following media is based on "line of sight"?
It improves customer service.
Which of the following is an advantage of the joint application design (JAD) approach?
It incorporates varying viewpoints from different functional areas of an organization to help ensure that collected requirements for an application is not too narrow or one-dimensional in focus.
In the context of data communication, which of the following is true of e-collaboration?
It increases the cost involved in data communication.
Which of the following statements is true of phishing?
It involves sending fraudulent e-mails that seem to come from legitimate sources.
Which of the following best defines an operating system (OS)?
It is a set of programs for controlling and managing computer hardware and software.
Which of the following statements is true of symmetric encryption?
It is difficult to share a key over the Internet in symmetric encryption.
In the context of information systems, identify an advantage of prototyping.
It is easier to modify a prototype than a complete system.
Which of the following statements is true of the Internet?
It is less secure than an intranet.
Which of the following statements is true of electronic data interchange (EDI)?
It is more beneficial when there are more companies in its network.
In the context of information privacy, which of the following is true of spam?
It is sent in bulk using automated mailing software.
Which of the following statements best describes spyware?
It is software that secretly gathers information about users while they browse the Web.
Which of the following statements is true of big data?
It is the result of the exponential growth of data in both public and private organizations.
Which of the following statements is true of Hypertext Markup Language (HTML)?
It is used to define a Web page's layout and appearance.
Which of the following statements is true of database marketing?
It makes an organization responsive to the needs of its customers.
In the context of trading partner agreements, identify a true statement about electronic business Extensible Markup Language (ebXML).
It makes searches more efficient.
Which of the following statements is true of case-based reasoning (CBR)?
It matches a new problem with a previously solved problem and its solution.
Which of the following statements is true of an e-marketplace?
It reduces marketing costs more than traditional sales channels.
Which of the following is true of a group support system (GSS)?
It reduces stress levels of decision makers.
Which of the following statements is true of Web-based electronic data interchange (Open EDI)?
It reduces the cost of transmitting documents.
Which of the following statements is true of asymmetric encryption?
It requires a large amount of processing power.
In the context of data communication, which of the following is true of convergence?
It requires major network upgrades, because video requires much more bandwidth.
Which of the following is true of magnetic tape?
It stores data sequentially.
Which of the following is true of push technology?
It streamlines the process of users getting software updates.
In the context of the common intentional security threats, which of the following statements best describes a worm?
It travels from computer to computer in a network, but it does not usually erase data.
Which of the following statements is true of a high-quality inkjet printer?
It uses multicolor ink cartridges to print digital photographs.
Which of the following statements is true of an inkjet printer?
It uses multicolor ink cartridges to print digital photographs.
In the context of information technology in workplaces, which of the following allows adding new tasks to employees' responsibilities?
Job upgrading
_____ ensures that key decision makers are involved in designing a management support system (MSS).
Keeping lines of communication open
Which of the following is an important factor in designing a management support system (MSS)?
Keeping the interface simple
monitor and record the keys pressed on a keyboard and can be software or hardware devices.
Keystroke loggers
Which of the following techniques is used to improve customer relationship management (CRM) systems by identifying, storing, and disseminating facts about how to perform tasks?
Knowledge management
Which of the following is a potential drawback of telecommuting?
Lack of necessary supplies or equipment
Which of the following problems is resolved by distributed processing?
Lack of responsiveness in centralized processing
Data sent through a virtual private network (VPN) can be encrypted using the _____.
Layer Two Tunneling Protocol
_____ is concerned with issues such as political repercussions of using an information system and meeting the requirements of the Information Privacy Act.
Legal feasibility
Which of the following geographic objects of a geographic information system (GIS) is most likely used to show a street or a river?
Lines
Which of the following is considered a key decision in supply chain management (SCM) related to manufacturing?
Location
_____, which are generated by Web server software, record a user's actions on a Web site
Log files
Virtual network adapters in Windows Server 2012 R2 can support some hardware acceleration features. Select which one they do NOT support.
MAC address caching
Which of the following statements is true of multinational corporations (MNCs)?
MNCs deliver products and services across national borders.
_____ consists of a series of 0s and 1s representing data or instructions.
Machine language
__________are compatible with the IBM System/360 line introduced in 1965.
Mainframe computers
Which of the following is a strategic requirement for a global information system (GIS)?
Management of global tax risks
In the context of the planning phase of the systems development life cycle (SDLC), which of the following is an example of an internally identified problem in information systems?
Management voicing concern about the organization's lack of a competitive edge in the marketplace
What system is used for forecasting sales?
Marketing information system (MKIS)
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
McCumber cube
Every network adapter has a hardware address. What is the common name for it and how long is it?
Media Access Control (MAC) address, 6 bytes
_____ is a method for advertisers to pay for cost per view or cost per click, which is typically one-tenth of a cent.
Micropayment
Which of the following is an example of a client-based e-mail program?
Mozilla Thunderbird
is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.
Narrowband
_____ was developed so that users could communicate with computers in human language.
Natural-language processing
Which of the following principles states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
Net neutrality
Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model.
Network layer
Select the PowerShell cmdlet with basic syntax if you want to create a private network switch called HalifaxLAN and connect it to your VM's adapter named NSNet1.
New-VMSwitch "HalifaxLAN" -NetAdapterName "NSNet1" -SwitchType Private
In the context of the operators used in a query by example (QBE) form, the _____ is used when only one of the conditions in the QBE form must be met.
OR operator
In the context of customer relationship management (CRM) applications, which of the following approaches is chosen by organizations with an established IT infrastructure?
On-premises CRM
tools are capable of "drilling up," proceeding from the smallest unit of data to higher levels.
Online analytical processing
After creating a private virtual switch, what servers can communicate to each other?
Only VMs on the child partitions can communicate with each other only.
The _____ is a seven-layer architecture for defining how data is transmitted from computer to computer in a network.
Open Systems Interconnection model
_____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.
Operational feasibility
In the context of a global information system (GIS), which of the following kinds of managerial support involves day-to-day activities?
Operational support
Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?
Operations
The following PowerShell cmdlets are all valid for executing functions related to VHDs. Which cmdlet is used for compacting dynamic or differencing disks?
Optimize-VHD
You are using differencing disks for multiple virtual machines (VMs) to preserve the parent image from changes. Now you want to combine the two images together. What PowerShell cmdlet allows you to do this?
Optimize-VHD
_____ is a database management system (DBMS) that is suitable for a large organization.
Oracle
In the context of Internet-enabled supply chain management (SCM), which of the following SCM activities involves handling returned goods and out-of-stock notifications to customers?
Order processing
_____ is a primary activity in a value chain that involves moving and storing products, from the end of the production line to end users or distribution centers.
Outbound logistics
What type of virtual disk points to a physical disk drive, rather than an area of space on a physical disk?
Pass-through disk
_____ radio frequency identification (RFID) tags have no internal power supply.
Passive
_____ is a popular online payment system used on many online auction sites.
PayPal
_____ are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations.
Peer-to-peer e-commerce platforms
Which of the following healthcare systems can make interactive medical tools available to the public?
Personal health information systems
A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model's _____ layers.
Physical and Data Link
The _____ of the Open Systems Interconnection (OSI) model specifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network.
Physical layer
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
Physical security measures
Joey, a businessman, designs cases and covers for cell phones. He wishes to showcase his products so that more people know about his work. Which of the following will help Joey promote his products?
are usually collected by an "aggregator" such as iTunes.
Podcasts
Which of the following geographic objects of a geographic information system (GIS) is most likely used to show the location of an airport?
Points
In the context of Internet services, which of the following protocols is used for retrieving messages?
Post Office Protocol
The _____ of the Open Systems Interconnection (OSI) model formats message packets.
Presentation layer
_____, in e-commerce, means all market participants can trade at the same price.
Price transparency
What is the difference between a private virtual switch and an internal virtual switch?
Private switch allows communication between child partition VMs only, whereas an internal includes the parent partition.
Which of the following functions is coordinated by a supply chain management (SCM) system?
Procuring materials and transforming them into intermediate and finished products or services
is a set of rules that governs data communication, including error detection, message length, and transmission speed.
Protocol
are small-scale versions of information systems, which are built before building the entire system, and are used to illustrate the system's benefits and allow users to offer feedback.
Prototypes
_____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.
Public
In the context of Internet-enabled supply chain management (SCM), which of the following SCM activities involves bargaining and renegotiating prices and term agreements?
Purchasing/procurement
Which of the following is a difference between read-only memory (ROM) and random access memory (RAM)?
ROM is nonvolatile memory, whereas RAM is volatile memory.
Which of the following is a factor to consider when determining the best communication media to meet global performance and traffic needs?
Range
_____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users.
Rapid application development
aggregate customers' opinions related to products or services that they have purchased and then suggest them to others with the same interest.
Recommendation Web sites
Jacob, a data analyst, is working on a project from home and needs to download some data from his office network. Which of the following server platforms will best serve Jacob's purpose?
Remote access servers
_____ is an area that involves unstructured decisions.
Research and development
_____ refers to using a cellular phone outside of a carrier's limited service area.
Roaming
Which of the following vendors offers comprehensive solutions for organizations that do not have in-house resources to develop a supply chain management (SCM) system?
SAP
is an example of antispyware software.
STOPzilla
_____ is a computer crime that involves destroying or disrupting computer services.
Sabotage
Which of the following is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)?
Safeguarding patients' billing information
Which of the following features of a customer relationship management (CRM) application assists with tasks such as controlling inventory and processing orders?
Salesforce automation
_____ is concerned with whether a new system can be completed on time.
Scheduling feasibility
_____ is a method for improving the volume or quality of traffic to a Web site.
Search engine optimization
_____ holds data when the computer is off or during the course of a program's operation.
Secondary memory
In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.
Secure Sockets Layer
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
Secure Sockets Layer
How does an administrator set up a new virtual network adapter to communicate on a network VLAN?
Select Enable virtual LAN identification and enter a VLAN identifier to associate the network adapter to the VLAN.
Which of the following decisions is supported by a logistics information system (LIS)?
Selecting the best modes of transportation
_____ helps reduce the backlog in producing information systems and improve flexibility in responding to users' information needs.
Self-sourcing
prototypes are used to market a proposed system to users and management by showing some of its features and demonstrating how beneficial it could be to the organization.
Selling
_____ are vaguely defined by standard operating procedures but include a structured aspect that benefits from information retrieval, analytical models, and information systems technology.
Semistructured decisions
_____ is a primary activity in Michael Porter's value chain.
Service
In real estate firms, which of the following is considered one of the major links in the supply chain?
Service providers
_____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
Service-oriented architecture
Which of the following is a biometric security measure?
Signature analysis
A common way to index and link databases is by using
Social Security numbers
_____ refers to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
Social networking
is a model in which application service providers (ASPs) deliver software to users for a fee.
Software as a service
_____ are not allowed in domain names.
Spaces
is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
Spoofing
_____ can interfere with users' control of their computers, through such methods as installing additional software and redirecting Web browsers.
Spyware
Rather than manually assign IPv6 addresses to computers, how can administrators ensure each Windows computer receives a link-local unicast address upon starting?
Stateless IPv6 Address Autoconfiguration
____ means saving data in computer memory.
Storage
Which of the following is considered a core function of a global information system (GIS)?
Strategic planning
focuses on regionalizing resources more effectively and responding to rapid environmental changes, such as increased political and foreign exchange risks and global competition.
Strategic planning support
_____ of a global information system (GIS) involves broad and long-term goals.
Strategic support
of a global information system (GIS) involves broad and long-term goals.
Strategic support
_____ can be automated because a well-defined standard operating procedure exists for these types of decisions.
Structured decisions
Identify the type of computers that has the highest price.
Supercomputers
Identify the type of computers that has the highest storage capability.
Supercomputers
How do virtual network adapters running on a child partition communicate with the parent partition?
Synthetic adapters communicate by using the VMBus; emulated adapters communicate by making calls to the hypervisor.
_____ of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving long-term goals.
Tactical support
How do you give a VM exclusive access to a physical hard disk?
Taking the disk offline in the parent OS, and then selecting the physical disk in the VM.
In the context of the types of data in a database, which of the following is a source of external data?
Tax records
Which of the following is a supporting activity in a value chain?
Technological development
also known as virtual work, has enabled some people to perform their jobs from home.
Telecommuting
What encapsulates IPv6 packets within User Datagram Protocol (UDP) datagrams between two registered IPv4 nodes in order to traverse IPv4 networks?
Teredo
Which IPv4-to-IPv6 transition technology works through NAT IPv4 routers by establishing tunnel endpoints behind non-IPv6 routers that encapsulate IPv6 packets with UDP datagrams?
Teredo
is a method of access control that prevents unauthorized users from using an unattended computer to access the network and data.
Terminal resource security
_____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.
The Fair Use Doctrine
In the context of electronic exchange of information, which of the following is used by companies to improve the efficiency and effectiveness of the supply chain process?
The Internet and established Web protocols
refers to the physical objects that are connected to the Internet and, therefore, to all the other physical objects.
The Internet of Things
Which of the following is a smart device that can tell the user's heart rate and lung capacity?
The Under Armour Armour39 shirt
Which of the following components of an enterprise resource planning (ERP) system tracks financial information, such as budget allocations and debits and credits?
The accounting component
Which of the following approaches to set up a distributed database management system (DDBMS) combines the fragmentation approach and the replication approach?
The allocation approach
Which of the following components of a database management system (DBMS) is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages?
The application generation component
Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
The brokerage model
In the context of Internet services, which of the following is a drawback of Internet telephony?
The call quality is not as good as it is with regular phone lines.
Identify the component of a virtual reality (VR) system that generates and manipulates high-quality graphics.
The central coordinating processor and software system
Which of the following is true of memory devices?
The contents of programmable read-only memory cannot be reprogrammed.
Which of the following is true of memory devices?
The contents of programmable read-only memory cannot be reprogrammed..
Which of the following components of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval?
The database engine
Which of the following components of an enterprise resource planning (ERP) system provides business-to-consumer (B2C) information related to order status and business-to-business (B2B) information related to suppliers and business partners?
The e-commerce
When creating a checkpoint file using Hyper-V Manager, what is the file format and where is it stored?
The file has an AVHD or AVHDX extension, stored in the same folder as the virtual hard disk file.
Which of the following components of an enterprise resource planning (ERP) system provides information on assessing job candidates?
The human resources
Which of the following file structures is similar to a book index that lists page numbers where certain topics can be found?
The indexed sequential access method
Which of the following statements is true of auctions?
The organization hosting an auction collects transaction fees for the service.
What is an example of Automatic Private IP Addressing (APIPA) in IPv4?
The process of discovering, offering, requesting, and acknowledging an IP address from a DHCP server
Which of the following components of an enterprise resource planning (ERP) system provides information related to e-procurement?
The purchasing component
Which of the following components of an enterprise resource planning (ERP) system provides information on marketing?
The sales component
Regarding the benefits of a SAN, what happens during a serverless backup?
The server initiates the backup, but the server is not involved during the backup.
Which of the following events takes place in the most basic client/server configuration?
The user creates a query by running client software.
In the context of decision makers using information technology, which of the following decision-making analyses is available in spreadsheet programs, such as Microsoft Excel?
The what-if analysis
Identify a true statement about unstructured decisions.
They are heavily influenced by the decision maker's intuitions.
Which of the following is true of fourth-generation languages (4GLs)?
They are the easiest computer languages to use.
Which of the following statements is true of geographic top-level domains (TLDs)?
They are used to promote business and tourism.
Which of the following is true of biometrics?
They can enhance Web page security and reduce defacing.
Which of the following is an advantage of application service providers (ASPs)?
They ensure that software is kept up to date, based on users' requests.
Which of the following statements is true of personal robots?
They have limited mobility.
Which of the following is true of semistructured decisions?
They involve multiple criteria.
Which of the following is true of virtual organizations?
They let independent suppliers share skills and have access to each other's markets via information technologies.
In the context of economic feasibility, which of the following statements is true of opportunity costs?
They measure what an individual would miss by not having an information system or feature.
Which of the following statements is true of quick response (QR) codes?
They offer a larger storage capacity than conventional barcodes.
Which of the following statements is true of firewalls?
They protect against external access, but they leave networks unprotected from internal intrusions.
Identify a true statement about copyright laws.
They protect tangible material, such as books.
In the context of information privacy, which of the following is true of cookies?
They provide information about users' location.
Which of the following statements is true of gallium arsenide chips?
They run at higher speeds than silicon chips.
Which of the following is true of fifth-generation languages (5GLs)?
They use artificial intelligence technologies, such as knowledge-based systems.
Which of the following statements is true of laser printers?
They use toners to create high-quality outputs.
Identify a true statement about the different forms of sender and receiver devices.
Thin clients have no processing power.
In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
Time Division Multiple Access
Why is a differencing disk beneficial?
To maintain the parent image with no changes written to it.
In the context of intellectual property, which of the following is categorized as industrial property?
Trademarks
restricts what type of data can be captured and transmitted in foreign countries.
Transborder data flow
_____ allows the linking of devices running on many different platforms.
Transmission Control Protocol/Internet Protocol
_____, a recent cryptographic protocol, ensures data security and integrity over public networks, such as the Internet.
Transport Layer Security
contains code intended to disrupt a computer, network, or Web site and is usually hidden inside a popular program.
Trojan program
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
Trojan programs
Augmented reality users are immersed in the virtual world while interacting with objects.
True
Collaborative filtering is one of the IT tools that can be used to implement a personalization system.
True
ENIAC is an example of a first-generation computer.
True
Inkjet printers produce characters by projecting onto paper electrically charged droplets of ink that create an image.
True
Rivalry among existing competitors is high when many competitors occupy the same marketplace position.
True
The most common personal digital assistant (PDA) is a smartphone.
True
The quality of information is determined by its usefulness to management information system (MIS) users.
True
is a popular blogging tool that allows users to post anything from their browsers, phones, desktops, e-mail programs, and so forth.
Tumblr
How many network interfaces does Microsoft recommend be installed in a Hyper-V server?
Two physical adapters; one adapter servicing the parent partition and the other to the child partitions
Which of the following statements is true of pair programming?
Two programmers work on the same code at one workstation.
is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
URL hijacking
Which of the following is a difference between information systems and artificial intelligence (AI) technologies?
Unlike AI technologies, information systems are concerned with capturing and storing data.
When creating a virtual switch by Hyper-V, how many virtualized ports are available?
Unlimited
Identify a disadvantage of group support systems (GSSs).
Unnecessary meetings
How many virtual network adapters can be created on a Hyper-V server?
Up to 12 network adapters-8 synthetic and 4 emulated
is a practice where a store sends coupons to a customer, who has already bought a product from the store, for a more expensive brand of the same product, in the hope that the customer would prefer the expensive brand.
Upselling
What tool can you use to modify a virtual hard disk?
Use Edit Virtual Hard Disk Wizard in Hyper-V Manager in Server Manager
Which of the following statements is true of information systems?
Using information systems on a global scale is more challenging than doing so on a local scale.
If your company uses Hyper-V on Windows Server 2012 R2 and the older Virtual Server, what virtual image file format can you use on both hypervisor products?
VHD
When choosing between disk types in the New Virtual Hard Disk Wizard, what type permits an image size up to 2 TB?
VHD
In Windows Server 2012 R2, what virtual image file provides for the largest size?
VHDX files, up to 64 TB
are private multipoint networks managed by a third party and used by organizations on a subscription basis.
Value-added networks
What type of disk is simply part of the space on a physical disk and appears to the VM as a physical hard disk drive?
Virtual hard disk
What is the key benefit for creating a virtual switch?
Virtual switches have unlimited ports, so there's no need to connect physical switches by uplinks or crossover circuits.
Hyper-V created virtual switches reside in the parent partition and are part of a component called the network ______.
Virtualization Service Provider (VSP)
a biometric security measure, translates words into digital patterns, which are recorded and examined for tone and pitch.
Voice recognition
relies on text-to-speech technologies.
Voice-based e-commerce
The goal of _____ is to tailor online searching and requests to users' specific search patterns, preferences, and needs.
Web 3.0
Which of the following is also known as "the Semantic Web"?
Web 3.0
The Internet is playing an important role in helping organizations reduce expenses, because _____.
Web applications can be used with minimum costs
Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____.
Web browsers
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____.
Web browsers
In the context of e-commerce, which of the following is used to provide product information?
Web sites
enables a user to access his or her e-mail account from any computer and, in some cases, store the e-mails on a Web server.
Web-based e-mail
Which of the following tools is used to create virtual instructional environments?
WebEx
In the context of the roles in the decision support system (DSS) environment, which of the following questions does a managerial designer address?
What should the balance between aggregated and disaggregated data be?
is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.
Wi-Fi Protected Access
Your company environment includes Windows Server versions 2003, 2008 (including R2) and 2012 (including R2). Desktops range from Windows XP and Vista. To transition to IPv6, what versions have IPv6 support running by default?
Windows Server 2003 and Windows XP both include support for IPv6, but they do not install it by default.
In which version of Windows was NIC teaming allowed for Hyper-V virtual machines?
Windows Server 2012 R2
Mobile commerce (m-commerce) is based on the _____.
Wireless Application Protocol
support m-commerce applications.
Wireless wide area networks
You intend to create a new virtual hard disk, specifying a 700 GB VHDX image file with a logical sector size of 4 KB. How do you proceed?
With PowerShell, use the New-VHD cmdlet with appropriate parameters.
Which of the following statements is true of the different forms of sender and receiver devices?
Workstations serve as stand-alone systems.
In the context of supply chain management (SCM) systems, which of the following markup languages has helped organizations use the Internet and Open electronic data interchange (EDI) perform the same function as that of traditional EDI?
XML
Which of the following statements is true of Extensible Markup Language (XML)?
XML tags represent the kind of content being posted and transmitted.
Do VMs ever directly access a physical hard disk?
Yes, virtual hard disks associate directly to the physical hard disks.
Can you modify an existing virtual hard disk (VHD) file?
Yes, you can even modify it without mounting it to a VM.
When creating a new virtual hard disk, what feature does Windows PowerShell offer that the graphical interface does not?
You can specify the block size and the logical sector size.
You need to build a virtual environment with several groups of identical OS installs. How do you accomplish this using minimal disk space?
You clone VMs using differencing disks, pointing multiple VMs to the same parent image.
In the context of Web and network privacy issues, new employees in an organization have to sign a(n) ______ before they access the network.
acceptable use policy
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n)
acceptable use policy
In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
accountability
Decisions related to _____ are considered semistructured decisions at the operational management level of an organization.
accounts receivable
In a value chain, service involves _____.
activities to support customers after the sale of products
In the context of Web marketing, the term _____ refers to one user viewing one ad.
ad impression
The _____ characteristic of an intelligent agent demonstrates its ability to learn from previous knowledge and go beyond information given previously.
adaptability
The computers in a local area network (LAN) are usually connected to the network via a hardware component called a(n) _____.
adapter card
The _____ of an executive information system (EIS) is responsible for managing data access.
administrative module
The ______ of e-commerce is an extension of traditional marketing media, such as radio and television.
advertising model
Spoofing happens when:
an illegitimate program poses as a legitimate one.
What IPv6 address type functions to identify the routers within a given address scope and send traffic to the nearest router, as determined by the local routing protocols?
anycast address
A(n) ______ is a type of server that stores computer software, which users can access from their workstations.
application server
A(n)__________is a type of server that stores computer software, which users can access from their workstations.
application server
In the context of computer operations, division is a(n) _____.
arithmetic operation
Codes written for one type of computer using _____ do not work on another type of computer.
assembly language
ROM is nonvolatile memory, whereas RAM is volatile memory
assembly language
In a relational database model, the columns are called _____.
attributes
In the context of customer relationship management, ____ is used to manage call centers and help desks.
automated customer service
In the context of customer relationship management, _____ is used to manage call centers and help desks.
automated customer service
In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.
availability
In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
availability
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
back-end systems
A _____ is a type of an intentional computer and network threat.
backdoor
In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.
backdoor
Every character, number, or symbol on the keyboard is represented as a(n) _____ in computer memory.
binary number
Bandwidth is often expressed as _____.
bits per second
In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
blended threat
According to the 1980 revisions to the Copyright Act of 1976, _____.
both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
Intelligent agents are also known as _____.
bots
In the context of data models, relationships among records in a hierarchical model are called _____.
branches
In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
broadband
An online auction is based on the _____, which brings buyers and sellers together in a virtual marketplace.
brokerage business model
The _____ of an executive information system (EIS) is used by developers to configure data mapping and screen sequencing.
builder module
A _____ is a link between devices connected to a computer.
bus
Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of _____ e-commerce transactions.
business-to-business
Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of ________ e-commerce transactions.
business-to-business
A _____ is initiated by a group of consumers and enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products.
buyer-side marketplace
Large corporations (such as General Electric or Boeing) as well as consortiums of large companies use the _____ model.
buyer-side marketplace
By participating in _____, sellers can automate the fulfillment function of business-to-business (B2B) e-commerce.
buyer-side marketplaces
In the context of storage measurements, a _____ is the size of a character.
byte
Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:
cannot emit light and has speed limitations.
In design and implementation of any _____ application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
case-based reasoning
A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.
cave automatic virtual environment
According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____.
cease charging different rates on data
The__________is the heart of a computer.
central processing unit (CPU)
The control dimension of a global information system requires a(n) _____ architecture for data.
centralized
In the early days of computer technology, a(n) ____ system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.
centralized processing
In the early days of computer technology, a(n) _____ system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.
centralized processing
one node is in charge of selecting the path for all packets.
centralized routing
Initially, offshore outsourcing was used mostly in manufacturing to find _____.
cheap labor
During the _________ of the decision-making process, the best and most effective course of action is selected.
choice phase
In designing a management information system (MIS), the first task is to _____.
clearly define the system's objectives
In the context of Web marketing, the _____ is computed by dividing the number of clicks an ad gets by the total impressions bought.
click-through rate
Microsoft Outlook is an example of a _____.
client-based e-mail program
Computers requesting hypermedia documents on the Internet are called
clients
To minimize the invasion of privacy, organizations should:
collect only the data that is necessary for the stated purpose.
In a technological conference, all the participating IT firms agreed to transfer the data pertaining to their human resources to a cloud. The objective behind this is to improve talent acquisition process and communication among HR professionals around the globe. The cloud referred to in this scenario is a _____ cloud.
community
A(n) ______ is the enclosure containing the computer's main components. CONTINUE
computer chassis
A(n)__________is the enclosure containing the computer's main components.
computer chassis
A similarity between e-commerce and traditional commerce is that both:
concentrate on selling products to generate profit.
A _____ is a tool used in the structured systems analysis and design (SSAD) model for data analysis.
conceptual data model
In the design phase of the systems development life cycle (SDLC), the _____ is an overview of the system and does not include hardware or software choices.
conceptual design
In the context of communication media, _____ provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.
conducted media
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
confidentiality
Online auction sites that involve business transactions between users of products and services are categorized as _____ e-commerce.
consumer-to-consumer
Ryan, an employee of Widget Corp., makes and sells customized paper notebooks. He uses the company's intranet to advertise the notebooks and sell them to the employees of the company. This is an example of _____ e-commerce.
consumer-to-consumer
In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that shows a process at a more general level and is helpful for showing top management and the task force how a process works.
context diagram
In the context of a global information system (GIS), _____ refers to the use of managerial power to ensure adherence to the organization's goals.
control
The ____ tells the computer what to do, such as instructing the computer which device to read or send output to.
control unit
The__________tells the computer what to do, such as instructing the computer which device to read or send output to.
control unit
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
convergence
E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.
cookies
are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.
cookies
make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases.
cookies
In the context of a global information system (GIS), _____ is the process of managing the interaction among activities in different, specialized parts of an organization.
coordination
The trade-off between the amount of control needed and the amount of ______ needed, which are the two dimensions of a global information system (GIS), defines an organization's globalization strategy.
coordination
In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.
copyrights
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
corporate network
Intranets are also called _____.
corporate portals
Online auctions are:
cost-effective for selling excessive inventory.
When a Web page changes, _____ update their indexes and databases automatically to reflect the change.
crawler-based directories
In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____
create, read, update, and delete
The _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.
data administration
Computers and communication systems use _____ to represent information between computers and network systems.
data codes
The _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
data definition
The _____ stores data types for fields, default values for fields, and validation rules for data in each field.
data dictionary
In the context of structured systems analysis and design (SSAD) models, a _____ is a modeling tool that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.
data flow diagram
A _____ is the structure and organization of data, which involves fields, records, and files.
data hierarchy
The _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.
data manipulation
A _____ is usually a smaller version of a data warehouse, used by a single department or function.
data mart
The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained.
data model
A _____ is an input device.
data tablet
A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
data warehouse
Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.
data warehouse
A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.
data-driven Web site
The _____ component of a decision support system (DSS) enables the DSS to perform analysis operations on the information stored in the system.
database
In large organizations, database design and management is handled by a
database administrator
A ____ converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS).
database engine
A ____ is software for creating, storing, maintaining, and accessing database files.
database management system
Microsoft Access is an example of a(n) _____.
database management system
Microsoft Access, which is used to create and manage a series of integrated files, is a(n) _____.
database management system
A natural-language processing (NLP) system provides a question-and-answer setting that is particularly useful with _____.
databases
Coordination in a global information system requires a(n) _____ architecture for data, standardization within departments.
decentralized
In _____, each department has its own computer for performing and controlling processing tasks.
decentralized processing
After a global network is in place, a company must _____.
decide which types of information-sharing technology it will be using
A(n) _____ is an interactive information system consisting of hardware, software, data, and models (mathematical and statistical) designed to assist strategy makers in an organization.
decision support system
A(n) _____, used in the choice phase, helps sort through possible solutions to choose the best one for an organization.
decision support system
Adding deductive reasoning to traditional database management system (DBMS) functions is a benefit of integrating an expert system into the database component of a(n) _____.
decision support system
Structuring the data component, in a management information system, to define what type of data is collected and in what form is usually easy if the organization has ______.
defined its strategic goals, objectives, and critical factors
In the context of segmentation of customers in database marketing, _____ is a variable that includes gender, age, income, and marital status.
demographic information
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
denial-of-service attack
Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).
design phase
During the _____ of the systems development life cycle (SDLC), analysts choose the solution that is the most realistic and offers the highest payoff for the organization.
design phase
A database administrator (DBA) is responsible for _____.
developing recovery procedures in case data is lost or corrupted
Designing and implementing a global database is a technical challenge, mainly because of the _____.
different character sets used for the names of people and places
Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.
digital divide
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore damaged data and equipment.
disaster recovery plan
A _____ is a peripheral device for recording, storing, and retrieving information.
disk drive
One of the major disadvantages of application service providers (ASPs) is that they:
do not guarantee that applications will fully meet an organization's needs.
Service and support are more important in e-commerce than in traditional commerce because e-commerce companies _____.
do not have a physical location to help maintain current customers
A(n) _____ is a network connection device that can build tables that identify addresses on each network.
dynamic router
By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities.
e-business
Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment.
e-cash
A(n) ______ is the electronic version of a paper check and offers security, speed, and convenience for online transactions.
e-check
A(n) _______ is the electronic version of a paper check and offers security, speed, and convenience for online transactions.
e-check
In a customer relationship management (CRM) system, e-commerce sites use _____ to send notifications on new products and services.
An ____ is a third-party exchange that provides a platform for buyers and sellers to interact with each other and trade more efficiently online.
e-marketplace
In the context of the seller-side marketplace model, _____ prevents purchases from suppliers that are not on the approved list of sellers.
e-procurement
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.
e-wallets
In the context of trading partner agreements, which of the following is true of electronic business Extensible Markup Language (ebXML)?
ebXML allows Web browsers to select only the data requested in a search.
In the planning phase of the systems development life cycle (SDLC), _____ assesses an information system's costs and benefits.
economic feasibility
In a(n) ______ , a user is totally immersed in the virtual reality (VR) world.
egocentric environment
In supply chain management (SCM), many companies substitute _____ for printing, mailing, and faxing paper documents, such as purchase orders, invoices, and shipping notices.
electronic data interchange
In the context of supply chain management (SCM) technologies, _____ enables business partners to send and receive information on business transactions.
electronic data interchange
A(n) _____ is the electronic exchange of money or scrip.
electronic payment
As a physical security measure, _____.
electronic trackers are attached to a computer at the power outlet
Virtual SANs allow you to _______.
eliminate the physical disks
Sometimes called a legacy adapter, the _______ is a standard network adapter driver that communicates with the parent partition by making calls directly to the hypervisor.
emulated network adapter
For a business that is properly designing and using a social media information system (SMIS), the SMIS would most likely:
enable it to share new and dynamic contents with customers in real time.
In object-oriented databases, grouping objects along with their attributes and methods into a class is called
encapsulation
In the context of the input component of a data warehouse, _____ collect, integrate, and process data that can be used by all functional areas in an organization.
enterprise resource planning systems
A(n) _____ is an application used in all the functions of a business and supports decision making throughout the organization.
enterprise system
In the context of collaborative planning, forecasting, and replenishment (CPFR), handling unforeseen problems is called _____.
exception management
The ____ feature of a decision support system (DSS) pinpoints the region that generated the highest total sales.
exception reporting analysis
The _____ feature of a decision support system (DSS) pinpoints the region that generated the highest total sales.
exception reporting analysis
A(n) ____ is a branch of decision support systems (DSSs) that gives managers easy access to internal and external data and typically includes drill-down features and a digital dashboard for examining and analyzing information.
executive information system
For a(n) _____ to be useful, it should collect data related to an organization's critical success factors-issues that make or break a business.
executive information system
Job deskilling occurs when:
experienced labor is eliminated by high technology.
A(n) _____ consists of programs that mimic human thought behavior in a specific area that human specialists have solved successfully.
expert system
Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.
expert system
An ____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.
explanation facility
In an examination evaluation expert system, the _____ component of the expert system is responsible for stating why a candidate passed or failed in an examination.
explanation facility
In a data warehouse, _____ is the process of collecting data from a variety of sources and converting it into a format that can be used in transformation processing.
extraction
A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.
extranet
A T3 line uses two pairs of copper wires to carry up to 24 simultaneous conversations and has a transmission rate of 1.544 Mbps.
false
A byte is a single value of 0 or 1.
false
A global information system (GIS) can be defined along two dimensions: customization and communication.
false
A global information system (GIS) remains unaffected irrespective of a company's size and business needs.
false
A key decision in supply chain management (SCM) related to manufacturing is pricing.
false
A network model is similar to a hierarchical data model because in both data models records are organized in the same way.
false
A patent protects product names and identifying marks.
false
A quick response (QR) code offers a smaller storage capacity compared to standard universal product codes (UPC) barcodes.
false
A radio frequency identification (RFID) tag provides a generic identification for a credit or debit card carrying the tag.
false
A ring topology needs more cables to connect the nodes within a network than a star topology.
false
A select operation pares down a table in a relational database by eliminating columns according to certain criteria.
false
A user interface enables a decision support system (DSS) to analyze information.
false
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
false
An expert system should be used when well-structured numerical problems are involved.
false
Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a client.
false
Application-filtering firewalls are less expensive than packet-filtering firewalls.
false
As a knowledge worker, while making a work-related decision, it is unnecessary to check if the decision complies with the organization's values.
false
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
false
Auctions help determine the price of goods and services when the original set price is too high in the marketplace.
false
Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment.
false
Bluetooth has line-of-sight limitations.
false
Client-based e-mail enables a user to access his or her e-mail account from any computer.
false
Companies with a transnational structure have decreased efficiency in production costs because production is spread across more locations.
false
Computers cannot store massive amounts of data in small spaces.
false
Computers perform all tasks using a combination of arithmetic and logical operations.
false
Consolidating information from different departments or functional areas is easier in data marts than in data warehouses.
false
Contextual computing lacks the ability to tailor a course of action to a user in a particular situation and environment based on what it knows about the user.
false
Creating a help desk to support users is an important task in the implementation phase of the systems development life cycle (SDLC).
false
Data communication systems increase inventory costs.
false
Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions.
false
Decision makers use the "what-is" analysis to monitor the effect of a change in one or more variables.
false
Decision support systems (DSS) are focused on efficiency rather than effectiveness.
false
Disks are sequential access devices, whereas tapes are random access devices.
false
Distributed processing maintains decentralized control and centralized operations.
false
During the planning phase of the systems development life cycle (SDLC), a systems designer must define the symptoms rather than the underlying problem.
false
E-business excludes transactions that generate demand for goods and services.
false
E-commerce is a subset of social commerce.
false
E-commerce provides product acknowledgements through phone calls and faxes.
false
E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
false
Establishing evaluation criteria often gives rise to subjectivity issues during the systems development life cycle (SDLC) process.
false
Extended ASCII is a data code that allows the representation of 1024 characters
false
Extended ASCII is a data code that allows the representation of 1024 characters.
false
External users are normally part of a company's task force.
false
Government and nonbusiness organizations are prohibited from using e-commerce applications.
false
Groupware is software that helps a group of decision makers work with the same application, provided they work in the same location.
false
In a decision support system (DSS), the user interface manages and coordinates the database and model base.
false
In a multinational structure, financial management is decentralized.
false
In an exocentric environment of virtual reality (VR), users can interact with objects.
false
In an organization with a global structure, the headquarters has the responsibility of selling, marketing, and tailoring products to the requirements and tastes of the countries of its subsidiaries.
false
In contrast to pharming, phishing involves hijacking an official Web site address by hacking a Domain Name System server.
false
In network-attached storage (NAS), as the number of users increases, its performance increases.
false
In phased-in-phased-out conversion of the implementation phase of the systems development life cycle (SDLC), an analyst introduces a new information system in only a limited area of an organization.
false
In the context of directories on the Web, Open Directory is an example of an automated directory.
false
In the context of directories on the Web, a human-powered directory uses crawlers to collect data.
false
In the context of intentional computer and network threats, social engineers protects the integrity of information resources.
false
In the context of knowledge management, tacit knowledge can be captured easily in data repositories.
false
In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).
false
In the context of supply chain management technologies, using the Internet and Web protocols for electronic data interchange (EDI) increases the cost of transmitting documents.
false
In the intelligence phase of the decision-making process, a decision maker defines criteria and generates alternatives to meet the criteria.
false
Information management is broader in scope than knowledge management because the latter tends to focus on just explicit knowledge.
false
Labor and population statistics are examples of sources for internal data that are accessed by a database.
false
Mobile commerce (m-commerce) predominantly relies on voice recognition and text-to-speech technologies.
false
Normally, a task force for the planning phase of the systems development life cycle (SDLC) includes only representatives from the IT department and the top management.
false
One of the advantages of prototyping is that modifying a prototype is easier than modifying a complete system.
false
One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices.
false
One of the drawbacks of a well-designed enterprise resource planning (ERP) system is that it tends to increase the cost of inventories.
false
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
false
Online degree programs adversely affect colleges and universities that are facing an enrollment decline.
false
Outbound logistics, a primary activity in Michael Porter's value chain, includes tasks associated with receiving, storing, and converting raw materials to finished goods.
false
Protocols are devices that connect users to the Internet.
false
Pull technology is adequate for marketing certain products and services and for providing customized information.
false
Real-time computer conferencing used in electronic meeting systems includes video capability.
false
Service and support are more important in traditional commerce than in e-commerce.
false
Social engineering is an attack that takes advantage of the backdoors in security systems.
false
Spreadsheet software is more powerful than financial planning software.
false
Static Web sites are useful for e-commerce sites that need frequent updates.
false
Terrestrial microwave systems use radio control transmitters and receivers for transmitting data.
false
The Internet complicates communication and restricts opportunities for consumers.
false
The Internet is owned by the Advanced Research Projects Agency Network (ARPANET).
false
The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology.
false
The buyer-side marketplace offers suppliers a direct channel of communication to buyers through online storefronts.
false
The cost of setting up a virtual private network (VPN) is usually high.
false
The creation of a system specifications document indicates the beginning of the analysis phase of the systems development life cycle (SDLC).
false
The data transfer speeds of local area networks (LANs) are typically below 100 Mbps.
false
The increase in direct buyer-seller communication through e-business has eliminated the opportunities for intermediaries.
false
The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.
false
The object-oriented approach to the analysis and design of information systems treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design.
false
The systems development life cycle (SDLC) model is appropriate in situations when the problem under investigation is not well defined.
false
The third-party exchange marketplace model is controlled by sellers and buyers.
false
The use of e-wallets is restricted to nonportable devices.
false
The use of the OR operator in a query form, when using query by example (QBE), means that all conditions must be met.
false
Transmitting documents across the Internet involves lower security risks than traditional electronic data interchange (EDI).
false
Unstructured decisions are often used in computer configuration.
false
Users and top management should not be included in the construction phase of a prototype because construction is purely a technical matter.
false
Very-large-scale integration (VLSI) circuits were introduced in fifth-generation computers.
false
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
false
While using PERT (Program Evaluation Review Technique) and CPM (Critical Path Method) techniques, activities that are on the critical path are more flexible than those activities which are not on the critical path.
false
With asynchronous transmission, both parties on a network must be connected at the same time.
false
With the indexed sequential access method (ISAM), records cannot be accessed randomly.
false
With the popularity of the Internet, the use of value-added networks has increased.
false
When planning a comprehensive security system, the first step is designing ____ , which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.
fault-tolerant systems
The Internet backbone is a foundation network linked with _____ that can support very high bandwidth.
fiber-optic cables
is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
firewall
In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.
flowchart
In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.
focuses on a specific area
In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.
foreign key
Structured query language (SQL) is an example of a(n) _____.
fourth-generation language
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the:
freedom of speech provisions of the First Amendment.
A level 1 security system is used to protect _____ against unauthorized access.
front-end servers
In the context of virtual reality (VR), ______ refers to allowing users to move around freely by combining interactive environments with cameras, monitors, and other devices.
full-body immersion
If a company uses multimedia applications in addition to normal file and database sharing, _____ is more efficient.
full-duplex transmission
GeneHunter is a hybrid product that combines artificial intelligence (AI) technologies using _____.
genetic algorithms
A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).
geographic information system
A(n) ______ captures, stores, processes, and displays information in a topographical context, such as showing the location of all streetlights on a map.
geographic information system
A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function is the exchange of Internet2 (I2) traffic with a specified bandwidth.
gigapop
Social networking sites can reduce organizations' costs by _____.
giving customers more access to all sorts of data
is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.
global information system
An organization with a(n) _______ , sometimes called a "franchiser," uses highly centralized information systems.
global structure
One of the issues with a _____ is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation.
global structure
In the IPv6 space, what is the equivalent of a registered IPv4 address, routable worldwide and unique on the Internet?
global unicast address
In _____, a geographic information system (GIS) is used to make the best use of personnel and equipment while dealing with a tight budget and maintaining crime statistics.
government
Tax filing and payments; completing, submitting, and downloading forms; and requests for records are all categorized as ______ e-government applications.
government-to-citizen
With ____ , users can make use of other computers' resources within an organization to solve problems involving large-scale, complex calculations, such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.
grid computing
With _______ ,users can make use of other computers' resources within an organization to solve problems involving large-scale, complex calculations, such as circuit analysis or mechanical design-problems that a single computer is not capable of solving in a timely manner.
grid computing
Buyline is an e-commerce Web site. It has come up with a promotional offer where buyers get a 60 percent discount on refrigerators if a minimum of 100 buyers agree to buy the product within 24 hours of the offer being announced. In this case, it is evident that BuyLine is a _____.
group buying platform
A ____ is the most commonly used device that enables users to navigate in the virtual reality (VR) environment and manually control various objects.
head-mounted display
In a global information system (GIS), high coordination:
helps maintain control of market needs around the world.
In a _____ , the relationships among records form a treelike structure.
hierarchical model
In a(n) _____, nodes with the same parents are called twins or siblings.
hierarchical model
Java and C++ are examples of ___
high-level languages
Java and C++ are examples of _____.
high-level languages
In the context of Web marketing, any element of a Web page that is clicked counts as a _____ to a server.
hit
A _____ concentrates on a specific function or business process and automates this function or process for different industries.
horizontal market
A company can purchase a maintenance, repair, and operation (MRO) package that might include services from different vendors, but an e-distributor coordinates them into one package for customers. This packaging is an example of a _____.
horizontal market
In the context of e-marketplaces, a _____ concentrates on coordinating a business process or function involving multiple vendors.
horizontal market
In the third-party exchange marketplace model, media buying is an example of a _____.
horizontal market
A group support system (GSS), with the help of a(n) _____, enhances decision making by providing a clear focus for group discussion and focusing attention on critical issues.
human facilitator
A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
hybrid
The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.
hypermedia
In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.
if
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.
illegal and unethical
Aaron bought a photo-editing software package for personal use. He makes two copies of the software, in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____.
illegal, but ethical
Diverse regulatory practices _____ the integration process of a global information system (GIS).
impede
During the _____ of the decision-making process, ideas are converted into actions.
implementation phase
One of the advantages of e-commerce is that it:
improves customer service.
In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:
in spear phishing, the attack is targeted toward a specific person or a group.
In the context of an organization's information system, external users _____.
include customers, contractors, and suppliers
A knowledge management system should help an organization:
increase revenue by reducing the delivery time for products and services.
The advantage of the _______ is that both sequential and random access can be used to access records, depending on the number being accessed.
indexed sequential access method
In the context of intellectual property, inventions are categorized as _____ properties.
industrial
In the context of the components of an expert system, a(n) _____ is similar to the model base component of a decision support system.
inference engine
E-commerce sites that use the _____ collect data on consumers and businesses and then sell this data to other companies for marketing purposes.
infomediary model
Symbic Technologies offers cloud computing services to several data centers around the world. It provides servers, networking elements, and storage. Symbic Technologies owns the equipment and is in charge of housing, functioning, and maintaining it. In the context of cloud computing services, it is evident that Symbic Technologies provides _____.
infrastructure as a service
Third-generation computers operated on _____.
integrated circuits
A(n) _____ for global control over an organization's resources is the foundation of any global information system (GIS).
integrated network
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
integrity
In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
integrity
In the _____ of the decision-making process, data is collected from internal and external sources and processed.
intelligence phase
A(n) _____ is an artificial intelligence application that can be used for Web marketing
intelligent agent
A(n) _____ is an artificial intelligence application that can be used for Web marketing.
intelligent agent
In a virtual reality (VR) environment, enabling users to act on objects, such as using a data glove to pick up and move objects, is known as _____.
interaction
A(n) _____ enables communication between a video card and memory.
internal bus
An organization with a(n) _____ operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions.
international structure
The _____ aspect of a group support system (GSS) reduces communication barriers and introduces order and efficiency into situations that are inherently unsystematic and inefficient.
intervention
E-commerce activities that take place within an organization's data communication network are part of _____.
intrabusiness e-commerce
Unstructured decisions are often used in _____.
introducing a new product
Gallium arsenide _____ than silicon.
is more fragile
For each database, there:
is only one physical view of data.
The data transfer speed of a wide area network (WAN) depends on the speed of _____.
its interconnections
In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.
job upgrading
The supervisor program in an operating system (OS) is also known as the _____.
kernel
Housed at server farms, search engines use _____ to index data coming in from crawlers.
keywords
In the context of computer literacy and information literacy, to be competitive in a workplace, knowledge workers should _____.
know how and why data is collected
To be competitive in a workplace, in terms of computer and information literacy, a knowledge worker should _____.
know how and why data is collected
In a natural-language processing (NLP) system, the ____ activity involves using the computer to read large amounts of text and understanding the information well enough to summarize important points and store information so that the system can respond to inquiries about the content.
knowledge acquisition
In the context of the components of a typical expert system, a _____ is a software package with manual or automated methods for acquiring and incorporating new rules and facts so that the expert system is capable of growth.
knowledge acquisition facility
A(n) _____ is a common output device for hard copy.
laser printer
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.
legal and ethical
Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____.
legal but unethical
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____
legal, but unethical
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.
legal, but unethical
In the IPv6 space, what kind of network address do systems automatically assign themselves, similarly to an APIPA address in IPv4?
link-local unicast address
A(n) _____ is a common output device for soft copy.
liquid crystal display
is typically used to connect workstations and peripheral devices that are in close proximity.
local area network
Some companies create separate Web sites for each country in which they do business. This is called _____ of a Web site.
localization
In the design phase of the systems development life cycle (SDLC), the _____ indicates hardware and software, such as specifying Linux servers and Windows clients.
logical design
To begin designing a relational database, you must define the _____ by defining each table and the fields in it.
logical structure
The ____ of a database involves how information appears to users and how it can be organized and retrieved.
logical view
In the context of intellectual property, _____ are categorized as industrial property.
logos
In a customer relationship management (CRM) system, marketing strategies focus on:
long-term relationships with customers.
A(n) _____ , made of Mylar, is used for random-access processing of data in a computer.
magnetic disk
A(n)__________, made of Mylar, is used for random-access processing of data in a computer.
magnetic disk
During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.
maintenance phase
During the _______ of the systems development life cycle (SDLC), a team assesses how a system is working and takes steps to keep the system up and running.
maintenance phase
The different types of information systems that have been developed to support certain aspects and types of decisions are collectively called
management support systems
The four Ms of resources in information systems are _____.
manpower, machinery, materials, and money
The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet.
merchant model
The _______ is an HTML tag that provides information on the keywords that represent the contents of a Web page.
meta tag
In the context of the knowledge base component of an expert system, _____ enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution.
meta-knowledge
In data warehouses, _____ is information about data-its content, quality, condition, origin, and other characteristics.
metadata
A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.
metropolitan area network
is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.
metropolitan area network
The _____ , a widely used business model in e-commerce, refers to generating revenue from more than one source.
mixed model
A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
mobile network
The _____ characteristic of an intelligent agent demonstrates the agent's ability to migrate from one platform to another with a minimum of human intervention.
mobility
The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information
model base
The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.
model base
A(n) ____ is a system that performs tasks similar to a database management system (DBMS).
model base management system
In a decision support system (DSS) environment, a _____ is the liaison between users and designers.
model builder
A(n) _____ is a device that connects a user to the Internet.
modem
A ____ is an input device for computers.
mouse
A__________is an input device for computers.
mouse
is an organization with assets and operations in at least one country other than its home country.
multinational corporation
In a(n) _____, a company's subsidiaries operate autonomously but regularly report to the parent company.
multinational structure
In a(n) _____, production, sales, and marketing are decentralized and financial management remains the parent company's responsibility.
multinational structure
A _____ is a hardware device that allows several nodes to share one communication channel.
multiplexer
A ____ provides an easier way for people to communicate with a computer than a graphical user interface (GUI).
natural-language processing system
A _____ provides an easier way for people to communicate with a computer than a graphical user interface (GUI).
natural-language processing system
The size and complexity of the human language has made developing _____ difficult.
natural-language processing systems
With the _____ approach, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico.
nearshore outsourcing
Given the IPv6 address: 21cd:001b:0000:0000/8, what does the "/8" at the end signify?
network bits
Given the IPv6 address: 21cd:0053:0000:0000/64, what does the "slash 64" at the end signify?
network bits
In a(n) _____, each record can have multiple parent and child records.
network model
A _____ represents a network's physical layout.
network topology
In the context of grid computing, each participant in a grid is referred to as a(n) _____.
node
A routing table lists _____.
nodes on a network
In the context of determining the best communication media to meet global performance, the _____ factor involves how immune a communication medium is to outside electronic interference.
noise
In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.
nonrepudiation
What is the primary benefit of the IPv6 address space over the IPv4 address space?
number of possible hosts and networks
To make a computer understand a program, the source code must be first translated into ______ code.
object
To make a computer understand a program, the source code must be first translated into__________code.
object
Trackballs are ideal for notebook computers because they _____.
occupy less space than a mouse
Compared with a star topology, a hierarchical topology:
offers a great deal of network control and lower cost.
With an ______ approach, an organization chooses an outsourcing firm in another country that can provide needed services and products.
offshore outsourcing
In the context of machine learning, an artificial neural network (ANN) is most likely used for:
oil and gas exploration.
With the _____ approach, an organization chooses an outsourcing company in the same country.
onshore outsourcing
UNIX is a type of _____.
operating system
A(n) ___ , a memory device, uses laser beams to access and store data.
optical disc
A(n)__________, a memory device, uses laser beams to access and store data.
optical disc
In the context of storage devices, CD-ROMs and DVDs are examples of _____.
optical discs
A(n) _____ is an input device used to grade multiple-choice and true/false tests.
optical mark recognition system
A write once, read many (WORM) disc is a common type of _____.
optical storage
is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network.
packet
In the extreme programming environment, _____ allows programmers to detect and correct programming mistakes as they go, which is faster than correcting them after an entire program has been written.
pair programming
In the extreme programming environment, ______ allows programmers to detect and correct programming mistakes as they go, which is faster than correcting them after an entire program has been written.
pair programming
In _____ of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simultaneously for a short time to ensure the new system works correctly.
parallel conversion
A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.
parallel port
In grid computing, when a large complex task is split into smaller tasks that run simultaneously on several nodes, it is known as
parallel processing
is an intellectual property that protects new processes.
patent
Decisions related to _____ are considered structured decisions at the operational management level of an organization.
payroll
In general terms, there are three ways a computer receives an IPv4 or IPv6 address. Which of the following is NOT one of them?
peer allocation
A _____ can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.
personal agent
Bluetooth can be used to create a _____ for communication among computerized devices.
personal area network
In the context of customer relationship management (CRM), _____ requires gathering a lot of information about customers' preferences and shopping patterns.
personalization
The internal data sources for an information system include _____.
personnel records
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
pharming
In _____ of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, the corresponding part of an old system is retired.
phased-in-phased-out conversion
During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.
physical design
In the context of how information is viewed in a database, the _____ involves how data is stored on and retrieved from storage media.
physical view
During the _____ of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem.
planning phase
During the _____ of the systems development life cycle (SDLC), analysts investigate a proposed solution's feasibility and determine how best to present the solution to management to obtain funding.
planning phase
The end result of the _______ of the systems development life cycle (SDLC) model should give users and top management a clear view of what the problem is and how the information system will solve the problem.
planning phase
In the context of cloud computing, _____ automates the configuration, deployment, and ongoing management of applications in the cloud.
platform as a service
A _____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or their computers.
podcast
Syndication feeds are one way of announcing the availability of a _____.
podcast
In the context of Web marketing, _____ are display ads that appear on top of a browser window, blocking the user's view.
pop-up ads
Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on.
predictive modeling
Microsoft PowerPoint is the most commonly used _______ software.
presentation
Microsoft PowerPoint is the most commonly used__________software.
presentation
In a relational database, every record must be uniquely identified by a
primary key
In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.
private
The purpose of an information system's _____ component is generating the most useful type of information for making decisions.
process
To be useful, information systems should _____.
produce information in different formats
In the context of a manufacturing firm's supply chain management (SCM) system, the ____ area manages the movement of goods all the way from suppliers to customers, including customer service and support.
product flow
In the context of a manufacturing firm's supply chain management (SCM) system, the ______ area manages the movement of goods all the way from suppliers to customers, including customer service and support.
product flow
Considering the entire organization's operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market.
production and marketing
With virtual organizations, _____.
products can be customized more to respond to customers' needs
In the context of the requirement of skilled analysts for implementing a global information system (GIS), there is a severe shortage of qualified information systems:
professionals in the United States.
A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.
program
In a relational database model, a(n) _____ pares down a table by eliminating columns according to certain criteria.
project operation
In the context of prototyping during the design phase of the systems development life cycle (SDLC), a _____ shows users how a particular task that was not technically feasible or appears to be unfeasible can be done.
proof-of-concept prototype
The final task in designing a management information system (MIS) is _____.
providing information in a useful format for decision-making purposes
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.
proxy server
Alconac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments. Given this information, it can be concluded that Alconac Systems uses _____ to access information from different departments.
pull technology
BuyStore Inc., an online retail store, sells all of its products through its Web site, buystore.com, and through an application on cell phones. BuyStore Inc. is an example of a _____.
pure-play company
In Web marketing, with _____, information is sent to users based on their previous inquiries, interests, or specifications.
push technology
With _____, a Web server delivers information to users, who have signed up for the service, instead of waiting for them to request the information be sent to them.
push technology
A(n) _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.
quick response code
Communication media that use an antenna for transmitting data through air or water are called
radiated media
Transmission of data across satellites is an example of data communication through _____.
radiated media
A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.
radio frequency identification tag
Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the _____ as the communication medium.
radio frequency spectrum
In a(n) _____ , records can be accessed in any order, regardless of their physical locations in storage media.
random access file structure
The Clipboard's contents are typically stored in _____.
random access memory
Intelligent agents demonstrate _____, which is the ability to select problems or situations that need attention and act on them.
reactivity
A potential benefit of telecommuting is that it _____.
reduces employee turnover
In the context of a global information system, consolidated global reporting is a crucial tool for managing overseas subsidiaries because it:
reduces the difficulties caused by the differences in accounting procedures.
Aton Motors, an automobile manufacturer, establishes its manufacturing units in Argentina because of the low cost of the metal used to make automobile frames. In this scenario, Aton Motors has _____ its operations.
regionalized
A manufacturer moving operations to another country because of the advantages available in that country is involved in _____ the operations.
regionalizing
In the _____ of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it.
requirements-gathering and analysis phase
Nanomaterials, if added to golf balls, increase the _____ of the golf balls.
responsiveness
In a(n) _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.
ring topology
In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.
robots
The process of deciding which path data takes on a network is called _____.
routing
The _____ module of an executive information system (EIS) is responsible for using the system.
runtime
The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:
safeguarding health insurers' credit information.
In the context of customer relationship management, ____ assists with tasks such as tracking customer interactions and analyzing sales forecasts.
salesforce automation
In the context of data communication, a _____ is based on "line of sight."
satellite
The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.
scanning tunneling microscope
A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.
search engine
Companies exclusively using business-to-consumer (B2C) applications:
sell directly to consumers.
A popular application of the _____ , which is a major business-to-business (B2B) e-commerce model, is e-procurement.
seller-side marketplace model
In a typical organization, _____ are often used in capital acquisition analysis.
semistructured decisions
In the context of the features of a decision support system (DSS), _____ enables you to apply different variables in decision making.
sensitivity analysis
In a(n) ______ , records in files are organized and processed in numerical order.
sequential access file structure
A(n) _____ is a communication interface through which information is transferred one bit at a time.
serial port
Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a _____.
server
The fundamental principle behind ______ is that the self-contained blocks of codes can be reused in a variety of different applications, allowing new business processes to be created from a pool of existing services.
service-oriented architecture
Twitter is an example of _____.
short-message service
To design a successful global information system (GIS), management of a company:
should not assume that customers' preferences will not change.
The most common type of main memory is a semiconductor memory chip made of
silicon
The most common type of main memory is a semiconductor memory chip made of__________.
silicon
In a virtual reality (VR) environment, giving objects texture and shading for a three-dimensional (3D) appearance is known as _____.
simulation
The cost of hiring additional employees in virtual organizations is reduced because:
skills are shared among the participating companies.
A _____ is about the size of a credit card and contains an embedded microprocessor chip for storing important financial and personal information.
smart card
The process of capturing and recording network traffic is referred to as _____.
sniffing
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
social engineering
Equi Technologies offers cloud computing services to several data centers around the world. It hosts services in the cloud, which can be accessed by clients through Equibrowse-a Web browser designed by Equi Technologies. In the context of cloud computing services, it is evident that Equi Technologies provides _____.
software as a service
Hosting services are now available for supply chain management (SCM) systems. This trend is called
software as a service
With the _____, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software.
software as a service model
When a computer is infected by a virus, _____.
some programs suddenly increase in size
In the context of information privacy, junk e-mail is also known as _____.
spam
A geographic information system (GIS) with analytical capabilities evaluates the impact of decisions by interpreting _____.
spatial data
The Web page displayed when a user first visits a site is called a(n) _____.
splash screen
John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.
spoofing
Search engines and directories offer space that companies can purchase for advertising purposes. This process is called
spot leasing
Managers use executive information systems (EISs) to:
spot trends..
Corel Quattro Pro is an example of_________
spreadsheet software
The coordination dimension of a global information system (GIS) requires _____.
standardization within departments
While deciding the type of information-sharing technology that a company will be using for its global network, the company's information system manager should keep in mind that:
standardized software and hardware are not always feasible.
In comparison with a flat file system, _____ in a database.
storage space is reduced
Data warehouses are sometimes called hypercubes because they _____.
store multidimensional data
Record keeping, payroll, and simple inventory problems are examples of _____ tasks.
structured
In the context of organizational decisions at the strategic management level, _____ are often used in deciding the plant location of an organization.
structured decisions
The ____ approach treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design of information systems.
structured systems analysis and design
The _____ approach treats process and data independently and is a sequential approach that requires completing the analysis before beginning the design of information systems.
structured systems analysis and design
How does Classless Inter-Domain Routing help reduce waste of IP addresses?
subnetting method that divides between network bits and host bits anywhere, not only between octets
Using the _____, e-commerce sites sell digital products and services
subscription model
Using the _____, e-commerce sites sell digital products and services.
subscription model
In a manufacturing firm's supply chain, raw materials flow from _____ to manufacturers, where they are transformed into finished goods.
suppliers
is an integrated network consisting of an organization, its vendors, transportation companies, and brokers used to deliver goods and services to customers.
supply chain
With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.
synchronous
A(n) ______ is a virtual device that communicates with the parent partition by using a high-speed conduit called the VMBus.
synthetic network adapter
The synthetic network adapter in the child partition is a(n) ________.
synthetic network adapter
Personal or informal knowledge is referred to as _____.
tacit knowledge
Groupware is intended mainly for _____.
teamwork
In a decision support system (DSS), decisions about the type of file structure to be used are taken by the _____.
technical designer
In the decision support system (DSS) environment, the _____ focuses on how a DSS is implemented and usually addresses questions about data storage, user access, response time, and security measures.
technical designer
Before adding a global information system (GIS), international companies must take into consideration the _____ infrastructures of the countries where its subsidiaries are located.
telecommunication
A ____ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web.
teleimmersion system
In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal.
terminator
One shortcoming of rapid application development (RAD) is _____.
that it has a narrow focus, which might limit future development
Saving data on the application service provider's (ASP's) servers instead of on users' own workstations might cause:
the data to be exposed to theft by attackers.
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
the person using a credit card number is the card's legitimate owner.
In the two-tier architecture of the client/server model, _____.
the presentation logic is always on the client
During the implementation phase of the systems development life cycle (SDLC), _____.
the proposed solution is transferred from paper to action, and a team configures the system and procures components for it
Control in a global information system requires _____.
the use of defined behaviors for different processes
In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the _____ part, and backtracks to find the right solution.
then
The _____ model generates revenue from the fees charged for matching buyers and sellers.
third-party exchange marketplace
To be useful, information must have the quality of _____.
timeliness
Organizations can benefit from patents as they can use patents:
to keep competitors from entering certain market segments.
The _____ denotes the type of organization or country the address of a document or site on the Internet specifies.
top-level domain
Second-generation computers used _____.
transistors
An organization with a(n) _____ might have several regional divisions that share authority and responsibility, but in general, it does not have its headquarters in a particular country.
transnational structure
Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support a(n) _____.
transnational structure
In an organization with a(n) _____ , the parent company and all the subsidiaries work together in designing policies, procedures, and logistics for delivering products and services to the right market.
transnational structure
In the context of the types of organizations that do business across national borders, the architecture of the global information system (GIS) in a(n) _____ requires a higher level of standardization and uniformity for global efficiency, and yet it must maintain local responsiveness.
transnational structure
A hierarchical topology is also called a _____.
tree topology
A database engine converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS).
true
A database is a critical component of information systems because any type of analysis that is done is based on data available in the database.
true
A geographic information system (GIS) can integrate maps and database data with queries.
true
A grocery store offering loyalty cards with discounts to its customers is an example of how transaction data can be used in a customer relationship management (CRM) system.
true
According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.
true
According to the guidelines for designing a management support system, when benefits are intangible, the design team should associate the benefits with a measurable factor, such as increased sales.
true
Active radio frequency identification (RFID) tags have internal power supply.
true
Although a database can consist of only a single file, it is usually a group of files.
true
An access point (AP) is the part of a wireless local area network (WLAN) that connects it to other networks.
true
An intranet is an application or service that uses an organization's computer network.
true
An intrusion detection system (IDS) can protect networks against both external and internal access.
true
An organization's structure usually determines the architecture of its global information system (GIS).
true
Any packet-switching network can handle multimedia data.
true
Artificial intelligence (AI) applications and technologies are more intelligent than traditional information systems.
true
As e-business matures and more companies conduct business online, consumers can engage in comparison shopping more easily.
true
Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling.
true
Copyright laws cover online materials that can be printed or saved on a storage device.
true
Criteria are goals and objectives that decision makers establish to achieve certain performance levels.
true
Currency conversion is a challenge in global database development.
true
Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.
true
E-commerce is part of e-business.
true
Effective design and implementation of an executive information system (EIS) requires top management support and user involvement.
true
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).
true
Even if there are more than one smart object on an individual's body, they would not be aware of each other's existence.
true
Executive information systems (EISs) are used for reporting exceptions.
true
Fuzzy logic is used in refrigerators that set defrosting and cooling times based on usage patterns.
true
Green computing helps an organization save on energy costs.
true
If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.
true
In some instances, after examining an incoming packet, a firewall can send a message to the packet's sender that the attempt to transmit the packet has failed.
true
Information system projects are often an extension of existing systems or involve replacing an old technology with a new one.
true
Intelligent agents are used for virtual catalogs.
true
Intranets are typically set up behind a firewall.
true
It is important to project an organization's growth rate when designing information systems.
true
Knowledge management draws on concepts of organizational learning and organizational culture.
true
Lack of standardization can impede the development of a cohesive global information system (GIS) that is capable of sharing information resources across borders.
true
Local hardware and software vendors influence which applications a multinational company chooses.
true
One method of conducting voice-based e-commerce is using e-wallets.
true
Organizations sometimes pay external agencies for additional data about their potential customers.
true
Problems involving a combination of the five senses, such as taste and smell, are not suitable for expert systems.
true
Robots can be used in environments that are hazardous to humans.
true
Service-oriented architecture (SOA) advocates that core business functions and the dynamic functions that change all the time should be decoupled.
true
Some robots have limited vision that is useful for locating and picking up objects, as long as the objects are isolated from other objects.
true
Supply chains exist in both service and manufacturing organizations.
true
Telepresence surgery allows surgeons to operate all over the world without physically traveling anywhere.
true
The World Wide Web changed the Internet by introducing a graphical interface to the largely text-based Internet.
true
The best way to gather tacit knowledge is interactively, such as asking an employee specific questions about how he or she would handle an issue.
true
The three important aspects of computer and network security, confidentiality, integrity, and availability, are collectively referred to as the CIA triangle.
true
Universities are an example of nonbusiness organizations that use e-commerce applications.
true
Viruses can be transmitted through a network or through e-mail attachments.
true
Voice over Internet Protocol (VoIP) is used to route traffic starting and ending at conventional public switched telephone network phones.
true
When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.
true
When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.
true
When disaster strikes, an organization should contact the insurance company to resume normal operations as soon as possible.
true
Wireless network traffic can be captured with sniffers.
true
With a global information system (GIS) in place, a company can efficiently track production schedules.
true
In a relational database model, the rows are called _____.
tuples
In the ____ , the application logic is usually on the client side.
two-tier architecture
In the ______ , the application logic is usually on the client side.
two-tier architecture
When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.
typosquatting
The _____ component of an enterprise resource planning (ERP) system collects and analyzes relevant internal and external information needed by other functions.
unified database
A(n) _____ identifies a Web page and is the address of a document or site on the Internet.
uniform resource locator
In the IPv6 space, what are the equivalent of the 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 private network addresses in IPv4?
unique local unicast address
In the context of organizational decisions at the tactical management level, _____ are often used in resolving conflicts between two divisions.
unstructured decisions
In the context of organizational decisions at the tactical management level, _____ are often used in setting queue priorities.
unstructured decisions
To minimize the invasion of privacy, users and organizations should:
use verification procedures to ensure data accuracy.
Unlike data in databases, data in data warehouses is:
used for analytical purposes.
With Voice over Internet Protocol (VoIP), _____.
users can have calls forwarded from anywhere in the world
To minimize the invasion of privacy, _____.
users should be able to review their records and correct any inaccuracies
Green computing can be achieved by:
using video conferencing, electronic meeting systems, and groupware.
Beginning in the 1940s, first-generation computers used _____.
vacuum tube technology
The _____ concept introduced by Michael Porter consists of a series of activities designed to meet business needs by adding cost in each phase of the e-commerce process.
value chain
In the context of a global information system (GIS), _____ offer electronic data interchange standards, encryption, secure e-mail, data synchronization, and other services to conduct international business.
value-added networks
In the context of executive information systems (EISs), _____ allows managers to flag data that is unusual or out of normal boundaries.
variance reporting
In the third-party exchange marketplace model, a ____ concentrates on a specific industry or market.
vertical market
In the third-party exchange marketplace model, a ________ concentrates on a specific industry or market.
vertical market
In the third-party exchange marketplace model, the sale of medical products is an example of a _____.
vertical market
A(n) _____ is often used so that remote users have a secure connection to an organization's network.
virtual private network
A _______, like its physical counterpart, is a device that functions at layer 2 of the Open Systems Interconnect (OSI) reference model.
virtual switch
A(n) _____ is a simulated environment designed for users to interact via avatars.
virtual world
consists of self-propagating program code that is triggered by a specified time or event.
virus
The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes.
volume
The systems development life cycle (SDLC) is also known as the _____.
waterfall model
In the context of the types of decision-making analyses, the ____ is commonly used in transaction-processing systems and management information systems.
what-is analysis
In the context of database marketing, when a buyer is segmented on the basis of variable psychographics, it explains _____.
why the buyer buys a product or service
A _____ is a type of Web site that allows users to add, delete, and sometimes modify content.
wiki
Worldwide Interoperability for Microwave Access (WiMAX) is designed for _____.
wireless metropolitan area networks
Code Red, Melissa, and Sasser are examples of
worms