A(n) ______________ collects data from various key business processes and stores the data in a single comprehensive data repository, unable by many...
Cloud computing is
Cloud computing is
Answer: Using remote servers hosted on the internet to store, manage, and process data
...
What is the foundation technology for web services?
What is the foundation technology for web services?
Answer: HT...
Google Apps is an example of SaaS.
Google Apps is an example of SaaS.
Answer: Tr...
An example of a Web 2.0 technology is
An example of a Web 2.0 technology is
Answer: a type of service that enable employees to interact as online communities using blogs, social networks,...
Decision support system (DSS)
Decision support system (DSS)
Answer: Supports solving problems that are unique and rapidly changing
...
The four major enterprise applications are
The four major enterprise applications are
Answer: KMS, CRM, ERP, S...
A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives?
A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following...
Which of the following is NOT true about a transaction processing system (TPS)
Which of the following is NOT true about a transaction processing system (TPS)
Answer: it has analytical capabiliti...
The following make long-range strategic decisions for the firm regarding products, services and financial performance:
The following make long-range strategic decisions for the firm regarding products, services and financial performance:
Answer: Senior Manage...
What type of device gathers data and converts them into electronic form for use by the computer?
What type of device gathers data and converts them into electronic form for use by the computer?
Answer: input devi...
The average number of baseball tickets sold at a particular price is an example of:
The average number of baseball tickets sold at a particular price is an example of:
Answer: meaningful informati...
Which type of system would you use to decide on granting a customer a credit limit increase?
Which type of system would you use to decide on granting a customer a credit limit increase?
Answer: T...
Which of the following definitions apply to business processes?
Which of the following definitions apply to business processes?
Answer: They refer to unique ways in which organizations coordinate work, information,...
There is a high variation in the returns on information technology investments because
There is a high variation in the returns on information technology investments because
Answer: Information technology investments alone cannot...
The three activities in an information system that produce the information organizations use to control operations are:
The three activities in an information system that produce the information organizations use to control operations are:
Answer: input, processing,...
Today, most system and application software is custom built by in-house programmers.
Today, most system and application software is custom built by in-house programmers.
Answer: Fal...
Supportive organizational culture that values efficiency and effectiveness with a strong Information Systems development team is a
Supportive organizational culture that values efficiency and effectiveness with a strong Information Systems development team is a
Answer: Organizational...
An example of a business using information systems for supplier intimacy is:
An example of a business using information systems for supplier intimacy is:
Answer: JCPenney's information system that allows its contract manufacturers...
What is the difference between Information Systems and Information Technology?
What is the difference between Information Systems and Information Technology?
Answer: The term information system describes all the components...
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
Answer: Cyber Warfa...
______ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
______ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
Answer: Identity The...
A practice in which eavesdropper's drive by buildings or park outside and try to intercept wireless network traffic is referred to as:
A practice in which eavesdropper's drive by buildings or park outside and try to intercept wireless network traffic is referred to as:
Answer: War...
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:
Answer: Social Engineeri...
Which of the following is the single greatest cause of network security breaches?
Which of the following is the single greatest cause of network security breaches?
Answer: User lack of knowled...
An example of phishing is:
An example of phishing is:
Answer: Setting up a fake medical website that asks users for confidential information
...
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
Answer: DD...
A keylogger is a type of:
A keylogger is a type of:
Answer: Spywa...
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
Answer:...
An independent computer program that copies itself from one computer to another over a network is called a:
An independent computer program that copies itself from one computer to another over a network is called a:
Answer: Wo...
Hadoop can process large quantities of any type of data, including video and twitter feed.
Hadoop can process large quantities of any type of data, including video and twitter feed.
Answer: Tr...
Which is a company's business model based on access to large database through the web?
Which is a company's business model based on access to large database through the web?
Answer: Facebo...
Business use ______ tools to search & analyze unstructured data sets, i.e. emails and memos?
Business use ______ tools to search & analyze unstructured data sets, i.e. emails and memos?
Answer: Text Mini...
Data mining is a tool for allowing users to:
Data mining is a tool for allowing users to:
Answer: Find hidden relationships in da...
Which enables users to view the same data in different ways using multiple dimensions?
Which enables users to view the same data in different ways using multiple dimensions?
Answer: OL...
In clustering, a data mining tool will find
In clustering, a data mining tool will find
Answer: New Groupings within da...
A manual file that stores information about data and field values in the tables in database?
A manual file that stores information about data and field values in the tables in database?
Answer: Data Dictiona...
What is the first step you should take in managing data for a firm?
What is the first step you should take in managing data for a firm?
Answer: Identify the data needed to run the busine...
Access is a
Access is a
Answer: DBMS for Desktop PC syste...
Both Oracle and Microsoft access use SQL to retrieve information from a database.
Both Oracle and Microsoft access use SQL to retrieve information from a database.
Answer: Tr...
Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables?
Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables?
Answer: Relational...
What is the first step you should take in managing data for a firm
What is the first step you should take in managing data for a firm
Answer: Identify the data needed to run the business
...
The select operation:
The select operation:
Answer: creates a subset consisting of all records in the file that meet stated criteria
...
What are the relationships that the relational database is named for?
What are the relationships that the relational database is named for?
Answer: Relationship between entiti...
Which of the following is the most prominent data manipulation language today?
Which of the following is the most prominent data manipulation language today?
Answer: S...
In a table for customers, the information about a single customer would reside in a single:
In a table for customers, the information about a single customer would reside in a single:
Answer: R...
A schematic of the entire database that describes the relationships in a database is called a(n):
A schematic of the entire database that describes the relationships in a database is called a(n):
Answer: Entity-Relationship diagr...
A characteristic or quality describing an entity is called a(n):
A characteristic or quality describing an entity is called a(n):
Answer: Attribu...
A field identified in a table as holding the unique identifier of the table's records is called the:
A field identified in a table as holding the unique identifier of the table's records is called the:
Answer: Primary K...
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
Answer: Normalizati...
Subscribe to:
Posts (Atom)