itec 110

Ace your homework & exams now with Quizwiz!

Assembly language takes a little bit of programming to accomplish a great deal. Question 54 options: True False

False

Deadlock issues are always resolved without the intervention of the operating system. Question 24 options: True False

False

Errors in transmissions are detected when the receiving side detects that there are blank spots in the sent packet. Question 68 options: True False

False

FTP is the protocol that allows Web browsers and Web servers to "talk" to each other. Question 69 options: True False

False

Forrester Research forecasts that the volume of mobile commerce will reach $31 billion by 2016 or about one-third of the total B2C e-commerce sales. Question 22 options: True False

False

Information is simply a collection of raw facts such as an employee number or the total hours worked in a week. Question 1 options: True False

False

Nonprogrammed decisions are made using a rule, procedure, or quantitative method. Question 42 options: True False

False

Software developers seldom put off designing a program's user interface until the end. Question 31 options: True False

False

The MORE clause in a SQL SELECT statement specifies additional criteria for retrieving data from a table. Question 5 options: True False

False

The Unicode method of character representation is fast becoming obsolete. Question 13 options: True False

False

The hexadecimal numbering system has seventeen unique digits. Question 11 options: True False

False

The single instruction, multiple data (SIMD) stream allows different parts of a program or different programs to be worked on simultaneously. Question 5 options: True False

False

The software engineer is responsible for making sure programs function correctly and meet the specified functional requirements set forth in the design document. Question 43 options: True False

False

The software engineer is responsible for pulling together all the pieces of the project and incorporating them into the design document. Question 45 options: True False

False

The third normal form creates columns that are independent of the primary key. Question 3 options: True False

False

Von Neumann architecture supports the parallel execution of instructions. Question 23 options: True False

False

Whole numbers, or integer numbers, can be represented internally in a computer as hexadecimal numbers. Question 12 options: True False

False

Visceral thinking is snap judgment about an object. Question 35 options: True False

True

With the introduction of the semiconductor, both the cost and size of computers were decreased as speed and reliability took a leap in magnitude. Question 2 options: True False

True

Without protocols, there would be no Internet. Question 74 options: True False

True

____ complement is a method of representing negative numbers in a computer system. Question 69 options: Integer Ones Twos Binary

Twos

RAM is volatile, meaning that when the power goes off, RAM is cleared. Question 60 options: True False

True

Spyware is often passed into your computer through a virus, worm, or Trojan program. Question 72 options: True False

True

The 4004 chip was named for the number of transistors onboard. Question 3 options: True False

True

The length of the sales process for the typical B2B sale is much longer and involves more decision makers than for the typical C2C sale. Question 21 options: True False

True

The only language the computer understands is binary, consisting of 1s and 0s. Question 51 options: True False

True

The operating system is the first program loaded into memory when the computer starts (boots). Question 21 options: True False

True

The primary purpose of an MIS is to help an organization achieve its goals by providing managers with insight into the regular operations of the organization so they can control, organize, and plan more effectively. Question 43 options: True False

True

There are many SQL commands for maintaining, defining, and administering the data in a database. Question 4 options: True False

True

ENIAC was a functioning and useful computer that could perform both arithmetic and ____ operations. Question 8 options: linguistic surgical logical standard

logical

Assembly language, although easier to use than machine code, still had a ____ correspondence with machine code. Question 71 options: one-to-many one-to-one many-to-one many-to-many

one-to-one

In many high-level languages, ____ are used to manipulate the data stored in variables. Question 59 options: operands operators expressions literals

operators

Interface programs that allow a computer to interact with peripheral devices are called ____. Question 26 options: monitors shell scripts applets drivers

drivers

_____ involves using information systems and the Internet to acquire parts and supplies. Question 13 options: e-commerce e-business mobile commerce e-procurement

e-business

Computers found in other devices such as in phones, cars, or thermometers are known as ____ computers. Question 10 options: internal included subinternal embedded

embedded

Outsourcing is the hiring of an overseas company to perform some or all of a systems development project. Question 7 options: True False

false

Programming and software acquisition, user preparation, and site and data preparation are all part of the system design process. Question 29 options: True False

false

Proper planning can guarantee that projects will be completed on time and on budget. Question 22 options: True False

false

Rapid application development uses pairs of programmers who work together to design, test, and code parts of the systems they develop. Question 21 options: True False

false

Secretaries, administrative assistants, bookkeepers, and similar data-entry people are often called knowledge workers. Question 2 options: True False

false

Source data automation is the capture and immediate processing of transaction data. Question 27 options: True False

false

Spyware/adware is illegal. Question 16 options: True False

false

System stakeholders are people who will regularly interact with the system. Question 17 options: True False

false

Technical feasibility is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project. Question 24 options: True False

false

The IS plan translates strategic and organizational goals into specific information system initiatives. Question 26 options: True False

false

The NOR gate is a combination of an OR gate and a(n) NAND gate. Question 24 options: True False

false

The TCP protocol has provisions for addressing the packets to ensure that they get to the correct place. Question 42 options: True False

false

The UNIVAC incorrectly predicted the outcome of the 1952 election. Question 47 options: True False

false

The distinction between LANs and WANs is clear and well defined. Question 34 options: True False

false

The most common guided medium has been silicon. Question 31 options: True False

false

The real revolution of the '70s was the minicomputer. Question 48 options: True False

false

The supply chain includes finished product storage, outbound logistics, marketing and sales, and customer service. Question 8 options: True False

false

Unfortunately reverse-engineering a program takes very little effort. Question 14 options: True False

false

Vision systems are not yet effective at identifying people based on facial features. Question 7 options: True False

false

Very Large-Scale Integration (VLSI) chips contain ____ of circuits. Question 28 options: thousands millions hundreds trillions

millions

Attacks on a system that alter information illicitly are known as ____ attacks. Question 19 options: access denial-of-service modification man-in-the-middle

modification

Attacks on a system that can include snooping, eavesdropping, and interception are known as ____ attacks. Question 53 options: access man-in-the-middle modification interface

modification

Hiring an outside company to perform some or all of a systems development project is called _____ Question 15 options: virtual reality offshoring systems investigation outsourcing

outsourcing

The OS running on a computer is often called its ____ and is typically tied to a particular CPU. Question 27 options: platform driver intermediary support

platform

With TCP, you can go beyond specifying an IP address by specifying a unique ____ number for each application and for the sending and receiving computers in the TCP header. Question 45 options: identifier code serial number port

port

A ____ key is simply a column or combination of columns that uniquely identifies a row within a table. Question 64 options: primary principal chief main

primary

The freedom from unwanted access to or intrusion into a person's private life or information is known as ____. Question 20 options: privacy retreat solitude non-interference

privacy

A collection of statements or steps that solves a problem and needs to be converted into a language the computer understands to perform tasks is known as a(n) ____. Question 56 options: process object link program

program

A(n) ____ is a set of rules designed to facilitate communication. Question 38 options: protocol code procedure accord

protocol

A ____ is a standard or typical example that gives the end users a good idea of what they will see when their application is completed. Question 48 options: flowchart prototype data dictionary design document

prototype

In Linus, to exit manual pages, simply type "____." Question 74 options: E q Q e

q

A pilot start-up involves running the new system for one group of users while the rest of the users still run the old system. Question 30 options: True False

true

A systems analyst develops detailed plans for the new or modified system. Question 18 options: True False

true

Adoption of an ERP system enables an organization to eliminate dozens or even hundreds of separate systems and replace them with a single, integrated set of applications for the entire enterprise. Question 29 options: True False

true

After an object is created by using a class, it has access to all the properties, methods, and events defined for the object type. Question 55 options: True False

true

After entering the appropriate attributes, the knowledge acquisition facility correctly stores information and relationships in the knowledge base, making the knowledge base easier and less expensive to set up and maintain. Question 12 options: True False

true

An MIS typically provides standard reports generated with data and information from a TPS or ERP system. Question 6 options: True False

true

An expert system can use cases to develop the solution to a problem by finding cases stored in the knowledge base that are similar to the problem at hand and then modifying the solution to the cases to fit the current problem. Question 11 options: True False

true

Assistive technology systems help overcome disabilities or improve health. Question 15 options: True False

true

Computers and the Internet are changing the face of nearly every industry. Question 66 options: True False

true

Data about the problems or needs for the new system can come from both sources internal and external to the organization. Question 25 options: True False

true

Decoder circuits perform functions such as addressing memory and selecting I/O devices. Question 58 options: True False

true

Developing new systems in an environmentally sensitive way is becoming more important for many IS departments. Question 27 options: True False

true

E-mail uses SMTP. Question 67 options: True False

true

Each generation of a prototype is a refined of the previous generation based on user feedback. Question 20 options: True False

true

Engagement ratings show how ads convert to sales. Question 48 options: True False

true

Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence. Question 6 options: True False

true

Flash memory is nonvolatile. Question 25 options: True False

true

Gateways can be used to connect networks of different types or to connect mainframe computers to PCs. Question 35 options: True False

true

Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys. Question 11 options: True False

true

Impedance makes the electrical signals weaken as they travel along the wire. Question 32 options: True False

true

Learning systems allow a computer to change how it reacts to situations based on feedback it receives. Question 8 options: True False

true

Many manufacturing operations have been dramatically improved over the last decade as a result of advances in information systems. Question 46 options: True False

true

Marketing functions are increasingly being performed on the Internet and mobile devices. Question 47 options: True False

true

Mobile commerce is the use of mobile, wireless devices to place orders and conduct business. Question 5 options: True False

true

Most financial MISs integrate financial and operational information from multiple sources, including the Internet, into a single system. Question 45 options: True False

true

Over 300 billion coupons are distributed each year in North America however, less than 2% of those coupons are redeemed. Question 24 options: True False

true

Over 95% of Web site visitors leave a shopping site without making a purchase; retargeting is a technique to recapture these shoppers. Question 25 options: True False

true

ROM isn't erased when the computer power goes off. Question 25 options: True False

true

Teraflops is a measure of computer processing speed. Question 3 options: True False

true

The Boolean OR operator returns a 1 only when either or both of the inputs are 1. Question 22 options: True False

true

The OR gate allows two inputs and one output. True False

true

The Von Neumann machine's operation was governed by a program loaded into memory. Question 46 options: True False

true

The Watson computer supercomputer developed by IBM was able narrowly missed defeating two prior champions of the TV game show Jeopardy. Question 4 options: True False

true

The World Wide Web is a network of links on the Internet to documents containing text, graphics, video, and sound. Question 4 options: True False

true

The combinations of gates enables the computer to do all the things that it does. Question 57 options: True False

true

The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally. Question 13 options: True False

true

The dialogue manager of a DSS can also connect to external databases to give decision makers even more information and decision support beyond that available through just corporate databases. Question 50 options: True False

true

The flip-flop circuit latches onto a bit and maintains the output state until it's changed. Question 59 options: True False

true

The inference engine coordinates the flow of knowledge to other components of the expert systems. Question 10 options: True False

true

The ultimate goal of management information and decision support systems is to help managers and executives at all levels make better decisions and solve important problems. Question 41 options: True False

true

Today, companies are shifting from strategic management to performance-based management of their information systems by carefully considering both strategic advantage and costs. Question 9 options: True False

true

Transistors are simply small electronic switches that can be in either an on or an off state. Question 56 options: True False

true

Vendor proposals are typically evaluated in a three-phase process that includes a preliminary evaluation, an initial evaluation, and a final evaluation. Question 28 options: True False

true

When audio files are played while they are being downloaded from the Internet, it is called streaming audio. Question 14 options: True False

true

Wireless networking uses the same technology as the radio in your car and the cell phone in your pocket. Question 33 options: True False

true

Intentional intruders motivated primarily by the challenge of breaking into a system, called ____ hackers. Question 51 options: planned directed undirected targeted

undirected

Written descriptions of who the users are, including backgrounds, skills, and so forth are known as ____. Question 39 options: user tasks the user environment user profiles user requirements

user profiles

What users want and need to do are called ____. Question 40 options: user profiles user tasks user requirements the user environment

user tasks

Designing by focusing on users' needs before considering other constraints of the system is known as ____ design. Question 78 options: system-centric user-centric task-oriented data-centric

user-centric

A group of 8 bits considered as one unit is known as a ____. Question 68 options: world nibble bit byte

byte

In information systems, _____ is used to make changes to input or processing activities. Question 12 options: forecasting feedback output processing

feedback

One of the basics of Von Neumann architecture is the ____ cycle. Question 29 options: encrypt-encapsulate store-revise fetch-execute edit-add

fetch-execute

Michael Porter proposed a now widely accepted competitive forces model that includes ______ forces. Question 18 options: three four five six

five

A(n) ____ key is a column in one table that relates to the primary key in another. Question 9 options: auxiliary foreign secondary composite

foreign

A sound consists of a waveform with amplitude (volume) and ____ (pitch). Question 20 options: phase angle frequency period phase shift

frequency

Fiber-optic cables use ____ fibers to guide light pulses along a cable. Question 62 options: ceramic tungsten plastic glass

glass

A(n) _____ is a single Web site that offers many products and services at one Internet location. Question 33 options: Web portal e-boutique cybermall none of the above

cybermall

A(n) ____ is a document describing the type of data being utilized within the program, showing the table definitions, indexes, and other data relationships. Question 85 options: flow chart design document use case data dictionary

data dictionary

The second stage in the problem solving process during which you develop alternative solutions to the problem and evaluate their feasibility. Question 52 options: design choice intelligence monitoring

design

A(n) ____ network is where each computer on the network decides independently how to channel to the next computer. Question 9 options: centralized distributed monolithic concentrated

distributed

_____ is a technically proficient person who breaks into a computer system. Question 17 options: Phreak Hacker Leech Cracker

hacker

Cracking into a system as a political act is known as ____. Question 18 options: cracktivism activism hacker activism hacktivism

hacktivism

Information and data are essentially the same thing. Question 2 options: True False

false

Unicode character representation uses a(n) ____-bit standard. Question 70 options: 8 16 4 7

16

What is the value in decimal for the hexadecimal number "A1"? Question 15 options: 101 161 81 121

161

Computer voice-recognition technology has improved considerably since the mid-____, and you're probably familiar with the increasing use of voice-activated help systems or answering systems that companies use. Question 37 options: 1990s 1970s 1980s 2000s

1990s

What is the value in decimal for the binary number "11001"? Question 14 options: 17 23 25 19

25

The eight bit extended ASCII (American Standard Code for Information Interchange) character set can be used to represent ____ characters. Question 19 options: 128 512 256 34,168

256

According to positional value, the binary number 10012 represents ____ things. Question 66 options: 9 5 21 3

9

The PCI system bus consists of ____ wires. Question 61 options: 10 98 20 198

98

The letters ____ are used in hexadecimal to represent numeric values above 9. Question 67 options: A-C A-E A-D A-F

A-F

_____ is the direct sale of products or services by businesses to consumers through electronic storefronts. Question 34 options: E-commerce B2C e-commerce Cybermalling E-tailing

E-tailing

____ is a programming language that's one step up from machine language; it assigns letter codes to each machine-language instruction. Question 57 options: Jave C++ PARC Assembly language

Assembly language

Factors such as memory type, bus speed, and even hard drive speed can affect overall speed far more than the ____ clock. Question 30 options: master OS ALU CPU

CPU

____ algebra is concerned with the logic of the operators AND, OR, and NOT. Question 73 options: Boolean Linear Modern Fibonacci

Boolean

_____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process. Question 32 options: B2B B2C C2C G2C

C2C

____ was one of the computer scientists at IBM creating a theoretical model for designing data structures. Question 61 options: E.F. Codd John Von Neumann Alan Turing Grace Hopper

E.F. Codd

______ is a set of major understandings and assumptions shared by a group, such as within an ethnic group or a country. Question 17 options: Value Culture Organizational culture Organizational change

Culture

The ____ protocol allows assigning each computer an IP address automatically every time it's started. Question 44 options: TCP HTTP FTP DHCP

DHCP

A widely used technology that has become an industry standard for LANs is ____. Question 64 options: FDDI ATM token ring Ethernet

Ethernet

Developers of ______ systems try to build on the advantages of individual support systems while adding new approaches unique to group decision making. Question 59 options: DSS MIS GSS GIS

GSS

The ______ visa program allows new employees from foreign lands into the United States. Question 19 options: H-1B L-1 B-1 V-1A

H-1B

The ____ statement is the most commonly used SQL statement. Question 10 options: DELETE CREATE INSERT SELECT

INSERT

____ is the process of creating more specific classes based on generic classes. Question 90 options: Polymorphism Inheritance Overloading Composition

Inheritance

____ was designed to accommodate multiple users and multiple tasks. Question 72 options: DOS Windows 3.0 Linux CP/M

Linux

____ is a primary function of an operating system. Question 28 options: Generating documents Displaying images Managing resources Connecting to networks

Managing resources

____ convert binary digits into sounds by modulating or modifying a tone. Question 65 options: Oscilloscopes Modems Transceivers Transformers

Modems

_____of Web site visitors leave a shopping site without making a purchase. Question 36 options: Less that 25% Almost 50% Nearly 75% Over 95%

Over 95%

____ values are used to calculate how many of something a number represents. Question 17 options: Multiplicational Base Positional Location

Positional

The ____ layer of the OSI model is responsible for formatting data so that it's ready for presentation to an application. Question 39 options: Session Presentation Data Link Application

Presentation

Lady Ada Byron was a mathematician and is considered the first programmer. Question 52 options: True False

True

All programs and processes running on a computer are stored in ____. Question 73 options: NOS ROM CMOS RAM

RAM

Linux commands have what are called command-line switches (sometimes called parameters or flags), used in the format: ls -lrt Question 25 options: True False

True

The ____ describes the life of the application, including all of the stages involved in the development, testing, installation, and maintenance of a program. Question 46 options: SDLC UML SLC DBA

SDLC

The ____ layer of the OSI model starts or stops a session and maintains order. Question 75 options: Application Session Data Link Presentation

Session

____ is the process of producing software applications. Question 81 options: Database administration Software engineering UML SDLC

Software engineering

____ determine the functions of the software and any constraints or requirements. Question 82 options: Data dictionaries Software specifications Use cases UMLs

Software specifications

Knowledge management and specialized information systems are used in only a few industries. Question 1 options: True False

false

Both the Jacquard loom and the player piano had a "____". Question 7 options: disk drive monitor stored program keyboard

Stored program

High-level languages can be used on many different types of computers, making them more platform independent. Question 53 options: True False

True

A digital transmission link with a capacity of 1.544 Mbps is known as a ____ line. Question 41 options: broadband T1 satellite T2

T1

A(n) _____ is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision making. Question 14 options: TPS MIS DSS Virtual reality system

TPS

IBM built the first electronic computer. True False

True

In 1998, Netscape took a different tack, going open source, and released the source code for its browser. Question 6 options: True False

True

Once you have determined that a database is needed, you should create a data dictionary. Question 44 options: True False

True

One common technique to avoid scope creep is to use a phased approach to software development. Question 42 options: True False

True

A Web service is a server-based Web program containing data to be used by other programs or Web pages. Question 70 options: True False

True

A collection of columns referring to one item is called a row or tuple. Question 2 options: True False

True

A database management system (DBMS) provides an end-user interface with the database. Question 1 options: True False

True

A design document details the design issues for an application. Question 41 options: True False

True

A design team might include someone with good visual design skills, someone who understands behavior, someone who's good at creating prototypes, and someone who knows how to test and observe behavior. Question 32 options: True False

True

A key sector of wholesale e-commerce is spending on MRO goods and services. Question 23 options: True False

True

An OS can reside on a ROM chip. Question 22 options: True False

True

Being able to recognize "normal" conversation is called natural-language processing. Question 33 options: True False

True

Designing applications takes more into account than human memory storage. Question 34 options: True False

True

____ are symbols that are used to match any character and are used in selecting files or directories. Question 75 options: Wildcards Aces Deuces Jokers

Wildcards

Lotus 1-2-3 was based on entirely different spreadsheet principles than VisiCalc. Question 49 options: True False

false

A(n) ____ diagram shows the events that occur within a use case or within an object's behavior. Question 50 options: class use case collaboration activity

activity

In programming, a(n) ____ consists of steps you need to follow to solve the problem. Question 89 options: process psuedocode algorithm procedure

algorithm

A key Web site performance measure is _____. Question 37 options: response time transactions success rate outage time during one week all of the above

all of the above

Decision support systems _____. Question 54 options: are used for operational, tactical, and strategic decision making might support a decision maker in only one or two of the problem-solving phases support optimization, satisficing, and heuristic approaches all of the above

all of the above

Mobile coupons _____. Question 35 options: have a much higher redemption rate than paper coupons can be sent to mobile shoppers by numerous mobile coupon aggregators may not be able to be read by the standard red laser scanners used at checkout stands all of the above

all of the above

The ability to _____ is a characteristic of a financial MIS. Question 55 options: nable analysis of financial data along multiple dimensions provide easy access to financial data through use of a corporate intranet to access corporate Web pages integrate financial and operational information from multiple sources, including the Internet all of the above

all of the above

The tendency of a signal to become weaker over distance is known as ____. Question 37 options: amelioration amplification alienation attenuation

attenuation

A ____ class is a general class from which other classes can be created via inheritance. Question 60 options: simple base general child

base

A ____ is identified by the number of digits a numbering system has, including the digit 0. Question 16 options: determinant base discriminant root

base

The process used by leading companies to complete a business process in the most efficient and effective manner are called _____. Question 40 options: mature process streamlined processes current best approach best practices

best practices

All programming languages end up in ____. Question 87 options: assembly binary byte code intermediate languages

binary

Each 1 and 0 (on and off ) in a computer is referred to as a ____. Question 18 options: word nibble bit byte

bit

An executive support system _____. Question 60 options: is designed for use strictly by executives at a very senior level is very similar to a DSS, except it is targeted for use by executives includes only internally generated data and information about the organization can present structured information about aspects of the organization that executives consider important

can present structured information about aspects of the organization that executives consider important

The UML ____ diagram shows how the different object classes relate to each other. Question 84 options: sequence use case class activity

class

Making corporate information available on mobile devices is becoming decreasingly less important as more companies move to cloud computing. Question 19 options: True False

false

A(n) ____ key is a primary key made up of more than one column. Question 8 options: union composite aggregate joined

composite

The goal of a(n) _____ system is to tie together all aspects of production, including order processing, product design, manufacturing, inspection and quality control, and shipping. Question 56 options: computer-assisted manufacturing computer integrated manufacturing flexible manufacturing system computer assisted design

computer integrated manufacturing

Authentication technologies are used by many organizations to _____. Question 38 options: verify the accuracy of their product descriptions and prices verify the ship to address of their online customers confirm the identity of the user requesting access to information or assets all of the above

confirm the identity of the user requesting access to information or assets

A program that can gather information about a user and store it on the user's machine is known as a ____. Question 55 options: byte nugget cookie brownie

cookie

Data that has been organized and logically related to allow access, retrieval, and use of that data is called a ____. Question 6 options: record database store field

database

A typical DSS includes many components including the _____ which allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases. Question 58 options: model base dialogue manager database external database access

dialogue manager

OSs allow you to organize files into structures called folders or ____. Question 30 options: vectors stacks directories arrays

directories

A charge card is another name for a credit card, they both have the same rules and restrictions. Question 26 options: True False

false

A decision support system includes people, procedures, software, databases, and devices to help assemble, store, manipulate, and display geographic information. Question 49 options: True False

false

A truth table with two inputs would have two rows. Question 21 options: True False

false

A virus is a program that actively reproduces itself across a network. Question 12 options: True False

false

All cultures have the same set of ethics or laws concerning privacy. Question 15 options: True False

false

Although computers excel at numerical calculations, they are not as good at dealing with symbols and three-dimensional objects. Question 5 options: True False

false

An information center is a miniature IS Department attached and directly reporting to a functional area in a large organization. Question 10 options: True False

false

Capturing and gathering all data necessary to complete the processing of transactions is called data input. Question 28 options: True False

false

Computer-aided software engineering (CASE) tools are used to plan and schedule a software project. Question 23 options: True False

false

Customer relationship management software helps plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. Question 30 options: True False

false

DSL (digital subscriber line) technologies do not allow the upload speed to differ from the download speed. Question 36 options: True False

false

Data mining and business intelligence are often used to capture the knowledge stored in a knowledge management system. Question 3 options: True False

false

Demand reports are automatically produced when a situation is unusual or requires management action. Question 44 options: True False

false

Few organizations are willing to hire outside firms to take over some or all of its software development and operations activities. Question 16 options: True False

false

IBM only sold its PC through an established commercial sales force rather than retail outlets. Question 4 options: True False

false

In just the past five years, expert system shells have become available to lessen the burden of programming, allowing nonprogrammers to develop and benefit from the use of expert systems. Question 13 options: True False

false

When an interrupt occurs, the CPU stops what it's doing and goes to a program in memory called a(n) ____ handler. Question 29 options: job control interrupt disruption

interrupt

With ____ the application is developed and released in a series of software releases. Question 49 options: rapid prototyping incremental development waterfall prototyping build and fix prototyping

incremental development

A(n) ____ is a special type of file that occupies its own space and specifies one or more columns that determine how information stored in a table can be accessed more efficiently. Question 62 options: identifier key field index

index

A(n) ____ is an application that converts each program statement into a language the computer understands. Question 86 options: compiler linker interpreter editor

interpreter

One characteristic of a structured problem is that _____. Question 51 options: it is straightforward, requiring known facts and relationships the relationships among the pieces of data are not always clear the data might be difficult to manipulate or obtain the decision maker might not know the information requirements of the decision in advance

it is straightforward, requiring known facts and relationships

The ____ instruction tests the value of the ZR flag maintained by the system. Question 58 options: jmz jmp jnz jzn

jnz

The process of defining relationships among data to create useful information requires ______ Question 11 options: an information system intelligence knowledge intuition

knowledge

In assembly language, the ____ instruction moves values around. Question 88 options: mov sto jmp cmp

mov

A system that recognizes the natural way in which humans communicate verbally (by speech or text) and can discern meaning from this communication is known as ____. Question 77 options: heuristic processing haptic technology natural processing natural-language processing

natural-language processing

It is estimated that the revenue generated by U.S. B2B e-commerce is _____ compared to B2C revenue Question 31 options: about the same nearly five times larger nearly thirteen times larger about half

nearly thirteen times larger

A ____ operating system is an OS designed to provide strong network services. Question 71 options: flow control command kernel network

network

The set of rules that dictates how databases are designed is called ____. Question 63 options: customization invocation normalization standardization

normalization

Subsystems for the marketing MIS and their outputs help marketing managers and executives to _____. Question 57 options: accelerate product development lower inventory levels and expenses reduce markting expenses all of the above

reduce markting expenses

A(n) ____ defines how one table (entity) works with or relates to another. Question 65 options: arrangement relationship connection union

relationship

The NAND gate takes the output of the AND gate and then ____ it with the NOT gate. Question 27 options: reverses duplicates amplifies scrambles

reverses

Where sensory information is first processed by the human brain before passing it to short-term memory is known as ____ storage. Question 38 options: sensory primary system long-term

sensory

A ____ happens when a program tries to place more information into a memory location than that location can handle. Question 52 options: runtime error stack overflow heap overflow buffer overflow

stack overflow

A ____ or entity is arranged into rows or columns much like a spreadsheet. Question 7 options: grid chart table box

table

The ______ is a credit card-sized device with an embedded microchip to provide memory and processing capability. Question 39 options: p-card credit card charge card smart card

smart card

Testing software to ensure that it meets the software specifications is called ____. Question 47 options: scope creep software validation rapid prototype incremental development

software validation

Software that can track, collect, and transmit to a third party or Web site certain information about a user's computer habits is known as ____. Question 54 options: spyware Trojan viruses phishing

spyware

In a ____ topology, a computer or a network device serves as a central point, or hub, for all messages. Question 63 options: grid star bus ring

star

The number of eras of globalization that Thomas Friedman describes in his book the World is Flat is ______. Question 20 options: two three four five

three

Network configurations are often referred to as network ____. Question 40 options: organizations arrangements structures topologies

topologies

An organized collection of people, procedures, software, databases, and devices used to perform and record business transactions. Question 16 options: decision support system management information system business intelligence system transaction system

transaction system

A URL consists of the domain name followed by specific folder and filenames. Question 43 options: True False

true

A neural network relies on massively parallel processing to enable a computer to simulate the function of a human brain. Question 9 options: True False

true

A measure of how many of the intended tasks users can perform with the technology is called ____. Question 79 options: learnability effectiveness usefulness attitude

usefulness

The component that handles interaction between a technology and the user is known as the ____. Question 36 options: system user structure user interface system interface

user interface

The most significant internal data sources for an MIS are the organization's _____ . Question 53 options: data from customers, suppliers, competitors, and stockholders various TPS and ERP systems and related databases Internet Web sites various DSS and GSS systems and users

various TPS and ERP systems and related databases

There are three levels of design: ____. Question 80 options: negative, positive, and reflective visceral, positive, and reflective visceral, behavioral, and reflective behavioral, reflective, and influential

visceral, behavioral, and reflective

A technology that can recognize human speech and process instructions is known as ____ technology. Question 76 options: natural voice-recognition haptic gaze

voice-recognition

In the ____ model of software development, the developer writes a program and continues to modify it until the system is functional. Question 83 options: incremental waterfall build and fix rapid prototype

waterfall


Related study sets

Determining Chemical Formulas Chemistry

View Set

Chem. for Health Science - Ch. 11 Intro to Organic Molecules

View Set

Ch.1. The Essentials of Statistics

View Set