itec 110
Assembly language takes a little bit of programming to accomplish a great deal. Question 54 options: True False
False
Deadlock issues are always resolved without the intervention of the operating system. Question 24 options: True False
False
Errors in transmissions are detected when the receiving side detects that there are blank spots in the sent packet. Question 68 options: True False
False
FTP is the protocol that allows Web browsers and Web servers to "talk" to each other. Question 69 options: True False
False
Forrester Research forecasts that the volume of mobile commerce will reach $31 billion by 2016 or about one-third of the total B2C e-commerce sales. Question 22 options: True False
False
Information is simply a collection of raw facts such as an employee number or the total hours worked in a week. Question 1 options: True False
False
Nonprogrammed decisions are made using a rule, procedure, or quantitative method. Question 42 options: True False
False
Software developers seldom put off designing a program's user interface until the end. Question 31 options: True False
False
The MORE clause in a SQL SELECT statement specifies additional criteria for retrieving data from a table. Question 5 options: True False
False
The Unicode method of character representation is fast becoming obsolete. Question 13 options: True False
False
The hexadecimal numbering system has seventeen unique digits. Question 11 options: True False
False
The single instruction, multiple data (SIMD) stream allows different parts of a program or different programs to be worked on simultaneously. Question 5 options: True False
False
The software engineer is responsible for making sure programs function correctly and meet the specified functional requirements set forth in the design document. Question 43 options: True False
False
The software engineer is responsible for pulling together all the pieces of the project and incorporating them into the design document. Question 45 options: True False
False
The third normal form creates columns that are independent of the primary key. Question 3 options: True False
False
Von Neumann architecture supports the parallel execution of instructions. Question 23 options: True False
False
Whole numbers, or integer numbers, can be represented internally in a computer as hexadecimal numbers. Question 12 options: True False
False
Visceral thinking is snap judgment about an object. Question 35 options: True False
True
With the introduction of the semiconductor, both the cost and size of computers were decreased as speed and reliability took a leap in magnitude. Question 2 options: True False
True
Without protocols, there would be no Internet. Question 74 options: True False
True
____ complement is a method of representing negative numbers in a computer system. Question 69 options: Integer Ones Twos Binary
Twos
RAM is volatile, meaning that when the power goes off, RAM is cleared. Question 60 options: True False
True
Spyware is often passed into your computer through a virus, worm, or Trojan program. Question 72 options: True False
True
The 4004 chip was named for the number of transistors onboard. Question 3 options: True False
True
The length of the sales process for the typical B2B sale is much longer and involves more decision makers than for the typical C2C sale. Question 21 options: True False
True
The only language the computer understands is binary, consisting of 1s and 0s. Question 51 options: True False
True
The operating system is the first program loaded into memory when the computer starts (boots). Question 21 options: True False
True
The primary purpose of an MIS is to help an organization achieve its goals by providing managers with insight into the regular operations of the organization so they can control, organize, and plan more effectively. Question 43 options: True False
True
There are many SQL commands for maintaining, defining, and administering the data in a database. Question 4 options: True False
True
ENIAC was a functioning and useful computer that could perform both arithmetic and ____ operations. Question 8 options: linguistic surgical logical standard
logical
Assembly language, although easier to use than machine code, still had a ____ correspondence with machine code. Question 71 options: one-to-many one-to-one many-to-one many-to-many
one-to-one
In many high-level languages, ____ are used to manipulate the data stored in variables. Question 59 options: operands operators expressions literals
operators
Interface programs that allow a computer to interact with peripheral devices are called ____. Question 26 options: monitors shell scripts applets drivers
drivers
_____ involves using information systems and the Internet to acquire parts and supplies. Question 13 options: e-commerce e-business mobile commerce e-procurement
e-business
Computers found in other devices such as in phones, cars, or thermometers are known as ____ computers. Question 10 options: internal included subinternal embedded
embedded
Outsourcing is the hiring of an overseas company to perform some or all of a systems development project. Question 7 options: True False
false
Programming and software acquisition, user preparation, and site and data preparation are all part of the system design process. Question 29 options: True False
false
Proper planning can guarantee that projects will be completed on time and on budget. Question 22 options: True False
false
Rapid application development uses pairs of programmers who work together to design, test, and code parts of the systems they develop. Question 21 options: True False
false
Secretaries, administrative assistants, bookkeepers, and similar data-entry people are often called knowledge workers. Question 2 options: True False
false
Source data automation is the capture and immediate processing of transaction data. Question 27 options: True False
false
Spyware/adware is illegal. Question 16 options: True False
false
System stakeholders are people who will regularly interact with the system. Question 17 options: True False
false
Technical feasibility is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project. Question 24 options: True False
false
The IS plan translates strategic and organizational goals into specific information system initiatives. Question 26 options: True False
false
The NOR gate is a combination of an OR gate and a(n) NAND gate. Question 24 options: True False
false
The TCP protocol has provisions for addressing the packets to ensure that they get to the correct place. Question 42 options: True False
false
The UNIVAC incorrectly predicted the outcome of the 1952 election. Question 47 options: True False
false
The distinction between LANs and WANs is clear and well defined. Question 34 options: True False
false
The most common guided medium has been silicon. Question 31 options: True False
false
The real revolution of the '70s was the minicomputer. Question 48 options: True False
false
The supply chain includes finished product storage, outbound logistics, marketing and sales, and customer service. Question 8 options: True False
false
Unfortunately reverse-engineering a program takes very little effort. Question 14 options: True False
false
Vision systems are not yet effective at identifying people based on facial features. Question 7 options: True False
false
Very Large-Scale Integration (VLSI) chips contain ____ of circuits. Question 28 options: thousands millions hundreds trillions
millions
Attacks on a system that alter information illicitly are known as ____ attacks. Question 19 options: access denial-of-service modification man-in-the-middle
modification
Attacks on a system that can include snooping, eavesdropping, and interception are known as ____ attacks. Question 53 options: access man-in-the-middle modification interface
modification
Hiring an outside company to perform some or all of a systems development project is called _____ Question 15 options: virtual reality offshoring systems investigation outsourcing
outsourcing
The OS running on a computer is often called its ____ and is typically tied to a particular CPU. Question 27 options: platform driver intermediary support
platform
With TCP, you can go beyond specifying an IP address by specifying a unique ____ number for each application and for the sending and receiving computers in the TCP header. Question 45 options: identifier code serial number port
port
A ____ key is simply a column or combination of columns that uniquely identifies a row within a table. Question 64 options: primary principal chief main
primary
The freedom from unwanted access to or intrusion into a person's private life or information is known as ____. Question 20 options: privacy retreat solitude non-interference
privacy
A collection of statements or steps that solves a problem and needs to be converted into a language the computer understands to perform tasks is known as a(n) ____. Question 56 options: process object link program
program
A(n) ____ is a set of rules designed to facilitate communication. Question 38 options: protocol code procedure accord
protocol
A ____ is a standard or typical example that gives the end users a good idea of what they will see when their application is completed. Question 48 options: flowchart prototype data dictionary design document
prototype
In Linus, to exit manual pages, simply type "____." Question 74 options: E q Q e
q
A pilot start-up involves running the new system for one group of users while the rest of the users still run the old system. Question 30 options: True False
true
A systems analyst develops detailed plans for the new or modified system. Question 18 options: True False
true
Adoption of an ERP system enables an organization to eliminate dozens or even hundreds of separate systems and replace them with a single, integrated set of applications for the entire enterprise. Question 29 options: True False
true
After an object is created by using a class, it has access to all the properties, methods, and events defined for the object type. Question 55 options: True False
true
After entering the appropriate attributes, the knowledge acquisition facility correctly stores information and relationships in the knowledge base, making the knowledge base easier and less expensive to set up and maintain. Question 12 options: True False
true
An MIS typically provides standard reports generated with data and information from a TPS or ERP system. Question 6 options: True False
true
An expert system can use cases to develop the solution to a problem by finding cases stored in the knowledge base that are similar to the problem at hand and then modifying the solution to the cases to fit the current problem. Question 11 options: True False
true
Assistive technology systems help overcome disabilities or improve health. Question 15 options: True False
true
Computers and the Internet are changing the face of nearly every industry. Question 66 options: True False
true
Data about the problems or needs for the new system can come from both sources internal and external to the organization. Question 25 options: True False
true
Decoder circuits perform functions such as addressing memory and selecting I/O devices. Question 58 options: True False
true
Developing new systems in an environmentally sensitive way is becoming more important for many IS departments. Question 27 options: True False
true
E-mail uses SMTP. Question 67 options: True False
true
Each generation of a prototype is a refined of the previous generation based on user feedback. Question 20 options: True False
true
Engagement ratings show how ads convert to sales. Question 48 options: True False
true
Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence. Question 6 options: True False
true
Flash memory is nonvolatile. Question 25 options: True False
true
Gateways can be used to connect networks of different types or to connect mainframe computers to PCs. Question 35 options: True False
true
Good computer security is as much about locking doors, storing backups, and following protocol as it is about writing smarter software to catch the bad guys. Question 11 options: True False
true
Impedance makes the electrical signals weaken as they travel along the wire. Question 32 options: True False
true
Learning systems allow a computer to change how it reacts to situations based on feedback it receives. Question 8 options: True False
true
Many manufacturing operations have been dramatically improved over the last decade as a result of advances in information systems. Question 46 options: True False
true
Marketing functions are increasingly being performed on the Internet and mobile devices. Question 47 options: True False
true
Mobile commerce is the use of mobile, wireless devices to place orders and conduct business. Question 5 options: True False
true
Most financial MISs integrate financial and operational information from multiple sources, including the Internet, into a single system. Question 45 options: True False
true
Over 300 billion coupons are distributed each year in North America however, less than 2% of those coupons are redeemed. Question 24 options: True False
true
Over 95% of Web site visitors leave a shopping site without making a purchase; retargeting is a technique to recapture these shoppers. Question 25 options: True False
true
ROM isn't erased when the computer power goes off. Question 25 options: True False
true
Teraflops is a measure of computer processing speed. Question 3 options: True False
true
The Boolean OR operator returns a 1 only when either or both of the inputs are 1. Question 22 options: True False
true
The OR gate allows two inputs and one output. True False
true
The Von Neumann machine's operation was governed by a program loaded into memory. Question 46 options: True False
true
The Watson computer supercomputer developed by IBM was able narrowly missed defeating two prior champions of the TV game show Jeopardy. Question 4 options: True False
true
The World Wide Web is a network of links on the Internet to documents containing text, graphics, video, and sound. Question 4 options: True False
true
The combinations of gates enables the computer to do all the things that it does. Question 57 options: True False
true
The demilitarized zone (DMZ) separates services you want to offer internally from those you want to offer externally. Question 13 options: True False
true
The dialogue manager of a DSS can also connect to external databases to give decision makers even more information and decision support beyond that available through just corporate databases. Question 50 options: True False
true
The flip-flop circuit latches onto a bit and maintains the output state until it's changed. Question 59 options: True False
true
The inference engine coordinates the flow of knowledge to other components of the expert systems. Question 10 options: True False
true
The ultimate goal of management information and decision support systems is to help managers and executives at all levels make better decisions and solve important problems. Question 41 options: True False
true
Today, companies are shifting from strategic management to performance-based management of their information systems by carefully considering both strategic advantage and costs. Question 9 options: True False
true
Transistors are simply small electronic switches that can be in either an on or an off state. Question 56 options: True False
true
Vendor proposals are typically evaluated in a three-phase process that includes a preliminary evaluation, an initial evaluation, and a final evaluation. Question 28 options: True False
true
When audio files are played while they are being downloaded from the Internet, it is called streaming audio. Question 14 options: True False
true
Wireless networking uses the same technology as the radio in your car and the cell phone in your pocket. Question 33 options: True False
true
Intentional intruders motivated primarily by the challenge of breaking into a system, called ____ hackers. Question 51 options: planned directed undirected targeted
undirected
Written descriptions of who the users are, including backgrounds, skills, and so forth are known as ____. Question 39 options: user tasks the user environment user profiles user requirements
user profiles
What users want and need to do are called ____. Question 40 options: user profiles user tasks user requirements the user environment
user tasks
Designing by focusing on users' needs before considering other constraints of the system is known as ____ design. Question 78 options: system-centric user-centric task-oriented data-centric
user-centric
A group of 8 bits considered as one unit is known as a ____. Question 68 options: world nibble bit byte
byte
In information systems, _____ is used to make changes to input or processing activities. Question 12 options: forecasting feedback output processing
feedback
One of the basics of Von Neumann architecture is the ____ cycle. Question 29 options: encrypt-encapsulate store-revise fetch-execute edit-add
fetch-execute
Michael Porter proposed a now widely accepted competitive forces model that includes ______ forces. Question 18 options: three four five six
five
A(n) ____ key is a column in one table that relates to the primary key in another. Question 9 options: auxiliary foreign secondary composite
foreign
A sound consists of a waveform with amplitude (volume) and ____ (pitch). Question 20 options: phase angle frequency period phase shift
frequency
Fiber-optic cables use ____ fibers to guide light pulses along a cable. Question 62 options: ceramic tungsten plastic glass
glass
A(n) _____ is a single Web site that offers many products and services at one Internet location. Question 33 options: Web portal e-boutique cybermall none of the above
cybermall
A(n) ____ is a document describing the type of data being utilized within the program, showing the table definitions, indexes, and other data relationships. Question 85 options: flow chart design document use case data dictionary
data dictionary
The second stage in the problem solving process during which you develop alternative solutions to the problem and evaluate their feasibility. Question 52 options: design choice intelligence monitoring
design
A(n) ____ network is where each computer on the network decides independently how to channel to the next computer. Question 9 options: centralized distributed monolithic concentrated
distributed
_____ is a technically proficient person who breaks into a computer system. Question 17 options: Phreak Hacker Leech Cracker
hacker
Cracking into a system as a political act is known as ____. Question 18 options: cracktivism activism hacker activism hacktivism
hacktivism
Information and data are essentially the same thing. Question 2 options: True False
false
Unicode character representation uses a(n) ____-bit standard. Question 70 options: 8 16 4 7
16
What is the value in decimal for the hexadecimal number "A1"? Question 15 options: 101 161 81 121
161
Computer voice-recognition technology has improved considerably since the mid-____, and you're probably familiar with the increasing use of voice-activated help systems or answering systems that companies use. Question 37 options: 1990s 1970s 1980s 2000s
1990s
What is the value in decimal for the binary number "11001"? Question 14 options: 17 23 25 19
25
The eight bit extended ASCII (American Standard Code for Information Interchange) character set can be used to represent ____ characters. Question 19 options: 128 512 256 34,168
256
According to positional value, the binary number 10012 represents ____ things. Question 66 options: 9 5 21 3
9
The PCI system bus consists of ____ wires. Question 61 options: 10 98 20 198
98
The letters ____ are used in hexadecimal to represent numeric values above 9. Question 67 options: A-C A-E A-D A-F
A-F
_____ is the direct sale of products or services by businesses to consumers through electronic storefronts. Question 34 options: E-commerce B2C e-commerce Cybermalling E-tailing
E-tailing
____ is a programming language that's one step up from machine language; it assigns letter codes to each machine-language instruction. Question 57 options: Jave C++ PARC Assembly language
Assembly language
Factors such as memory type, bus speed, and even hard drive speed can affect overall speed far more than the ____ clock. Question 30 options: master OS ALU CPU
CPU
____ algebra is concerned with the logic of the operators AND, OR, and NOT. Question 73 options: Boolean Linear Modern Fibonacci
Boolean
_____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process. Question 32 options: B2B B2C C2C G2C
C2C
____ was one of the computer scientists at IBM creating a theoretical model for designing data structures. Question 61 options: E.F. Codd John Von Neumann Alan Turing Grace Hopper
E.F. Codd
______ is a set of major understandings and assumptions shared by a group, such as within an ethnic group or a country. Question 17 options: Value Culture Organizational culture Organizational change
Culture
The ____ protocol allows assigning each computer an IP address automatically every time it's started. Question 44 options: TCP HTTP FTP DHCP
DHCP
A widely used technology that has become an industry standard for LANs is ____. Question 64 options: FDDI ATM token ring Ethernet
Ethernet
Developers of ______ systems try to build on the advantages of individual support systems while adding new approaches unique to group decision making. Question 59 options: DSS MIS GSS GIS
GSS
The ______ visa program allows new employees from foreign lands into the United States. Question 19 options: H-1B L-1 B-1 V-1A
H-1B
The ____ statement is the most commonly used SQL statement. Question 10 options: DELETE CREATE INSERT SELECT
INSERT
____ is the process of creating more specific classes based on generic classes. Question 90 options: Polymorphism Inheritance Overloading Composition
Inheritance
____ was designed to accommodate multiple users and multiple tasks. Question 72 options: DOS Windows 3.0 Linux CP/M
Linux
____ is a primary function of an operating system. Question 28 options: Generating documents Displaying images Managing resources Connecting to networks
Managing resources
____ convert binary digits into sounds by modulating or modifying a tone. Question 65 options: Oscilloscopes Modems Transceivers Transformers
Modems
_____of Web site visitors leave a shopping site without making a purchase. Question 36 options: Less that 25% Almost 50% Nearly 75% Over 95%
Over 95%
____ values are used to calculate how many of something a number represents. Question 17 options: Multiplicational Base Positional Location
Positional
The ____ layer of the OSI model is responsible for formatting data so that it's ready for presentation to an application. Question 39 options: Session Presentation Data Link Application
Presentation
Lady Ada Byron was a mathematician and is considered the first programmer. Question 52 options: True False
True
All programs and processes running on a computer are stored in ____. Question 73 options: NOS ROM CMOS RAM
RAM
Linux commands have what are called command-line switches (sometimes called parameters or flags), used in the format: ls -lrt Question 25 options: True False
True
The ____ describes the life of the application, including all of the stages involved in the development, testing, installation, and maintenance of a program. Question 46 options: SDLC UML SLC DBA
SDLC
The ____ layer of the OSI model starts or stops a session and maintains order. Question 75 options: Application Session Data Link Presentation
Session
____ is the process of producing software applications. Question 81 options: Database administration Software engineering UML SDLC
Software engineering
____ determine the functions of the software and any constraints or requirements. Question 82 options: Data dictionaries Software specifications Use cases UMLs
Software specifications
Knowledge management and specialized information systems are used in only a few industries. Question 1 options: True False
false
Both the Jacquard loom and the player piano had a "____". Question 7 options: disk drive monitor stored program keyboard
Stored program
High-level languages can be used on many different types of computers, making them more platform independent. Question 53 options: True False
True
A digital transmission link with a capacity of 1.544 Mbps is known as a ____ line. Question 41 options: broadband T1 satellite T2
T1
A(n) _____ is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision making. Question 14 options: TPS MIS DSS Virtual reality system
TPS
IBM built the first electronic computer. True False
True
In 1998, Netscape took a different tack, going open source, and released the source code for its browser. Question 6 options: True False
True
Once you have determined that a database is needed, you should create a data dictionary. Question 44 options: True False
True
One common technique to avoid scope creep is to use a phased approach to software development. Question 42 options: True False
True
A Web service is a server-based Web program containing data to be used by other programs or Web pages. Question 70 options: True False
True
A collection of columns referring to one item is called a row or tuple. Question 2 options: True False
True
A database management system (DBMS) provides an end-user interface with the database. Question 1 options: True False
True
A design document details the design issues for an application. Question 41 options: True False
True
A design team might include someone with good visual design skills, someone who understands behavior, someone who's good at creating prototypes, and someone who knows how to test and observe behavior. Question 32 options: True False
True
A key sector of wholesale e-commerce is spending on MRO goods and services. Question 23 options: True False
True
An OS can reside on a ROM chip. Question 22 options: True False
True
Being able to recognize "normal" conversation is called natural-language processing. Question 33 options: True False
True
Designing applications takes more into account than human memory storage. Question 34 options: True False
True
____ are symbols that are used to match any character and are used in selecting files or directories. Question 75 options: Wildcards Aces Deuces Jokers
Wildcards
Lotus 1-2-3 was based on entirely different spreadsheet principles than VisiCalc. Question 49 options: True False
false
A(n) ____ diagram shows the events that occur within a use case or within an object's behavior. Question 50 options: class use case collaboration activity
activity
In programming, a(n) ____ consists of steps you need to follow to solve the problem. Question 89 options: process psuedocode algorithm procedure
algorithm
A key Web site performance measure is _____. Question 37 options: response time transactions success rate outage time during one week all of the above
all of the above
Decision support systems _____. Question 54 options: are used for operational, tactical, and strategic decision making might support a decision maker in only one or two of the problem-solving phases support optimization, satisficing, and heuristic approaches all of the above
all of the above
Mobile coupons _____. Question 35 options: have a much higher redemption rate than paper coupons can be sent to mobile shoppers by numerous mobile coupon aggregators may not be able to be read by the standard red laser scanners used at checkout stands all of the above
all of the above
The ability to _____ is a characteristic of a financial MIS. Question 55 options: nable analysis of financial data along multiple dimensions provide easy access to financial data through use of a corporate intranet to access corporate Web pages integrate financial and operational information from multiple sources, including the Internet all of the above
all of the above
The tendency of a signal to become weaker over distance is known as ____. Question 37 options: amelioration amplification alienation attenuation
attenuation
A ____ class is a general class from which other classes can be created via inheritance. Question 60 options: simple base general child
base
A ____ is identified by the number of digits a numbering system has, including the digit 0. Question 16 options: determinant base discriminant root
base
The process used by leading companies to complete a business process in the most efficient and effective manner are called _____. Question 40 options: mature process streamlined processes current best approach best practices
best practices
All programming languages end up in ____. Question 87 options: assembly binary byte code intermediate languages
binary
Each 1 and 0 (on and off ) in a computer is referred to as a ____. Question 18 options: word nibble bit byte
bit
An executive support system _____. Question 60 options: is designed for use strictly by executives at a very senior level is very similar to a DSS, except it is targeted for use by executives includes only internally generated data and information about the organization can present structured information about aspects of the organization that executives consider important
can present structured information about aspects of the organization that executives consider important
The UML ____ diagram shows how the different object classes relate to each other. Question 84 options: sequence use case class activity
class
Making corporate information available on mobile devices is becoming decreasingly less important as more companies move to cloud computing. Question 19 options: True False
false
A(n) ____ key is a primary key made up of more than one column. Question 8 options: union composite aggregate joined
composite
The goal of a(n) _____ system is to tie together all aspects of production, including order processing, product design, manufacturing, inspection and quality control, and shipping. Question 56 options: computer-assisted manufacturing computer integrated manufacturing flexible manufacturing system computer assisted design
computer integrated manufacturing
Authentication technologies are used by many organizations to _____. Question 38 options: verify the accuracy of their product descriptions and prices verify the ship to address of their online customers confirm the identity of the user requesting access to information or assets all of the above
confirm the identity of the user requesting access to information or assets
A program that can gather information about a user and store it on the user's machine is known as a ____. Question 55 options: byte nugget cookie brownie
cookie
Data that has been organized and logically related to allow access, retrieval, and use of that data is called a ____. Question 6 options: record database store field
database
A typical DSS includes many components including the _____ which allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases. Question 58 options: model base dialogue manager database external database access
dialogue manager
OSs allow you to organize files into structures called folders or ____. Question 30 options: vectors stacks directories arrays
directories
A charge card is another name for a credit card, they both have the same rules and restrictions. Question 26 options: True False
false
A decision support system includes people, procedures, software, databases, and devices to help assemble, store, manipulate, and display geographic information. Question 49 options: True False
false
A truth table with two inputs would have two rows. Question 21 options: True False
false
A virus is a program that actively reproduces itself across a network. Question 12 options: True False
false
All cultures have the same set of ethics or laws concerning privacy. Question 15 options: True False
false
Although computers excel at numerical calculations, they are not as good at dealing with symbols and three-dimensional objects. Question 5 options: True False
false
An information center is a miniature IS Department attached and directly reporting to a functional area in a large organization. Question 10 options: True False
false
Capturing and gathering all data necessary to complete the processing of transactions is called data input. Question 28 options: True False
false
Computer-aided software engineering (CASE) tools are used to plan and schedule a software project. Question 23 options: True False
false
Customer relationship management software helps plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers. Question 30 options: True False
false
DSL (digital subscriber line) technologies do not allow the upload speed to differ from the download speed. Question 36 options: True False
false
Data mining and business intelligence are often used to capture the knowledge stored in a knowledge management system. Question 3 options: True False
false
Demand reports are automatically produced when a situation is unusual or requires management action. Question 44 options: True False
false
Few organizations are willing to hire outside firms to take over some or all of its software development and operations activities. Question 16 options: True False
false
IBM only sold its PC through an established commercial sales force rather than retail outlets. Question 4 options: True False
false
In just the past five years, expert system shells have become available to lessen the burden of programming, allowing nonprogrammers to develop and benefit from the use of expert systems. Question 13 options: True False
false
When an interrupt occurs, the CPU stops what it's doing and goes to a program in memory called a(n) ____ handler. Question 29 options: job control interrupt disruption
interrupt
With ____ the application is developed and released in a series of software releases. Question 49 options: rapid prototyping incremental development waterfall prototyping build and fix prototyping
incremental development
A(n) ____ is a special type of file that occupies its own space and specifies one or more columns that determine how information stored in a table can be accessed more efficiently. Question 62 options: identifier key field index
index
A(n) ____ is an application that converts each program statement into a language the computer understands. Question 86 options: compiler linker interpreter editor
interpreter
One characteristic of a structured problem is that _____. Question 51 options: it is straightforward, requiring known facts and relationships the relationships among the pieces of data are not always clear the data might be difficult to manipulate or obtain the decision maker might not know the information requirements of the decision in advance
it is straightforward, requiring known facts and relationships
The ____ instruction tests the value of the ZR flag maintained by the system. Question 58 options: jmz jmp jnz jzn
jnz
The process of defining relationships among data to create useful information requires ______ Question 11 options: an information system intelligence knowledge intuition
knowledge
In assembly language, the ____ instruction moves values around. Question 88 options: mov sto jmp cmp
mov
A system that recognizes the natural way in which humans communicate verbally (by speech or text) and can discern meaning from this communication is known as ____. Question 77 options: heuristic processing haptic technology natural processing natural-language processing
natural-language processing
It is estimated that the revenue generated by U.S. B2B e-commerce is _____ compared to B2C revenue Question 31 options: about the same nearly five times larger nearly thirteen times larger about half
nearly thirteen times larger
A ____ operating system is an OS designed to provide strong network services. Question 71 options: flow control command kernel network
network
The set of rules that dictates how databases are designed is called ____. Question 63 options: customization invocation normalization standardization
normalization
Subsystems for the marketing MIS and their outputs help marketing managers and executives to _____. Question 57 options: accelerate product development lower inventory levels and expenses reduce markting expenses all of the above
reduce markting expenses
A(n) ____ defines how one table (entity) works with or relates to another. Question 65 options: arrangement relationship connection union
relationship
The NAND gate takes the output of the AND gate and then ____ it with the NOT gate. Question 27 options: reverses duplicates amplifies scrambles
reverses
Where sensory information is first processed by the human brain before passing it to short-term memory is known as ____ storage. Question 38 options: sensory primary system long-term
sensory
A ____ happens when a program tries to place more information into a memory location than that location can handle. Question 52 options: runtime error stack overflow heap overflow buffer overflow
stack overflow
A ____ or entity is arranged into rows or columns much like a spreadsheet. Question 7 options: grid chart table box
table
The ______ is a credit card-sized device with an embedded microchip to provide memory and processing capability. Question 39 options: p-card credit card charge card smart card
smart card
Testing software to ensure that it meets the software specifications is called ____. Question 47 options: scope creep software validation rapid prototype incremental development
software validation
Software that can track, collect, and transmit to a third party or Web site certain information about a user's computer habits is known as ____. Question 54 options: spyware Trojan viruses phishing
spyware
In a ____ topology, a computer or a network device serves as a central point, or hub, for all messages. Question 63 options: grid star bus ring
star
The number of eras of globalization that Thomas Friedman describes in his book the World is Flat is ______. Question 20 options: two three four five
three
Network configurations are often referred to as network ____. Question 40 options: organizations arrangements structures topologies
topologies
An organized collection of people, procedures, software, databases, and devices used to perform and record business transactions. Question 16 options: decision support system management information system business intelligence system transaction system
transaction system
A URL consists of the domain name followed by specific folder and filenames. Question 43 options: True False
true
A neural network relies on massively parallel processing to enable a computer to simulate the function of a human brain. Question 9 options: True False
true
A measure of how many of the intended tasks users can perform with the technology is called ____. Question 79 options: learnability effectiveness usefulness attitude
usefulness
The component that handles interaction between a technology and the user is known as the ____. Question 36 options: system user structure user interface system interface
user interface
The most significant internal data sources for an MIS are the organization's _____ . Question 53 options: data from customers, suppliers, competitors, and stockholders various TPS and ERP systems and related databases Internet Web sites various DSS and GSS systems and users
various TPS and ERP systems and related databases
There are three levels of design: ____. Question 80 options: negative, positive, and reflective visceral, positive, and reflective visceral, behavioral, and reflective behavioral, reflective, and influential
visceral, behavioral, and reflective
A technology that can recognize human speech and process instructions is known as ____ technology. Question 76 options: natural voice-recognition haptic gaze
voice-recognition
In the ____ model of software development, the developer writes a program and continues to modify it until the system is functional. Question 83 options: incremental waterfall build and fix rapid prototype
waterfall