Maurice Tutor

(5)

$15/per page/Negotiable

About Maurice Tutor

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Biology,Calculus,Chemistry,Economics,English,Essay writing,Geography,Geology,Health & Medical,Physics,Science Hide all
Teaching Since: May 2017
Last Sign in: 408 Weeks Ago, 3 Days Ago
Questions Answered: 66690
Tutorials Posted: 66688

Education

  • MCS,PHD
    Argosy University/ Phoniex University/
    Nov-2005 - Oct-2011

Experience

  • Professor
    Phoniex University
    Oct-2001 - Nov-2016

Category > Management Posted 10 Jun 2017 My Price 14.00

rapid development of microcomputer

Question 1 The rapid development of microcomputer processing power, application software packages, and telecommunications networks gave birth to the phenomenon of _______________. Answer a.manufacturer-to-public direct salesb.MIS departmentsc.end user computingd.electronic monitoringQuestion 2 When employees in a project team use email to send and receive messages and use video conferences to hold electronic meetings and coordinate their activities, they are using _______________. Answer a.transaction processing systemsb.process control systemsc.enterprise collaboration systemsd.

 

 

Question 1 

  

The rapid development of microcomputer processing power, application software packages, and telecommunications networks gave birth to the phenomenon of _______________. 

Answer 

 

a. manufacturer-to-public direct sales   

b. MIS departments   

c. end user computing   

d. electronic monitoring  

Question 2 

  

When employees in a project team use email to send and receive messages and use video conferences to hold electronic meetings and coordinate their activities, they are using _______________. 

Answer 

 

a. transaction processing systems   

b. process control systems   

c. enterprise collaboration systems   

d. decision support systems  

Question 3 

  

In the information systems concept, the processing function involves: 

Answer 

 

a. Capturing and assembling elements that enter the system to be processed   

b. Transformation processes that convert input into output   

c. Transferring elements that have been produced by a transformation process to their ultimate destination   

d. Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal  

Question 4 

  

Expanding a company's product offering into global markets is an example of a(n) _______________ strategy. 

Answer 

 

a. cost leadership   

b. differentiation   

c. growth   

d. alliance  

Question 5 

  

Which of the following is supported by the marketing business function? 

Answer 

 

a. Compensation analysis   

b. Process control   

c. Credit management   

d. Sales force automation  

Question 6 

  

According to one of the videos shown during class, the speaker announced there should be four individuals involved with IT decisions sitting on the board of directors. An IT Technician is one, which option below lists the other three? 

Answer 

 

a. CEO, TKBE’s, CIO   

b. CEO TKF’s, CIO   

c. CFO, CEO, CIO.   

d. CEO, CTP, TKBEs  

Question 7 

  

Which of the following is an example of an unstructured data source? 

Answer 

 

a. ERP database   

b. CRM database   

c. Other databases   

d. E-mail  

Question 8 

  

Which one of the following would typically not be accomplished with presentation graphics software? 

Answer 

 

a. Converting numerical data into graphics and displays   

b. Incorporating multimedia files into presentations   

c. Preparing a computerized sideshow to accompany an oral presentation   

d. Preparing a text report for management  

Question 9 

  

What would senior management's role be in relation to the question "Whom do we blame if an IT initiative fails?" 

Answer 

 

a. Decide which IT capabilities should be provided centrally and which should be developed by individual businesses   

b. Decided which features are needed on the basis of their costs and benefits   

c. Lead the decision making on the trade-offs between security and privacy on one hand and convenience on the other   

d. Assign a business executive to be accountable for every IT project, and monitor business metrics  

Question 10 

  

Business applications of information systems are typically combinations of several types of information systems. This integration is referred to as _______________ systems. 

Answer 

 

a. information reporting   

b. decision support   

c. cross-functional informational   

d. end user computing  

Question 11 

  

The e-commerce component that deals with gathering data on customers and their website behavior and choices is: 

Answer 

 

a. Event notification   

b. Profiling and personalizing   

c. Search management   

d. Access control and security  

Question 12 

  

When a firm strives to find ways to help its suppliers and customers reduce their costs or to increase the costs of their competitors, it is pursuing a strategy of _______________. 

Answer 

 

a. innovation   

b. alliance   

c. cost leadership   

d. growth  

Question 13 

  

Which of the following statements is a characteristic of the content dimension of information? 

Answer 

 

a. Information is provided when it is needed.   

b. Information is related to the information needs of a specific recipient for a specific situation.   

c. Information is provided in an easy-to-understand form.   

d. Information is presented in a narrative, numeric, or graphic form.  

Question 14 

  

In large organizations, a database is usually controlled by a DBA, which stands for: 

Answer 

 

a. Database Administrator.   

b. Database Analyst.   

c. Definition-Based Algorithm.   

d. Direct Biased Agent.  

Question 15 

  

Which of the following is an international regulatory issue? 

Answer 

 

a. Dealing with transborder data flow restrictions.   

b. Improving the operational efficiency of networks.   

c. Managing network infrastructure across countries.   

d. Controlling data communication security.  

Question 16 

  

CIO and IT managers share responsibility for managing the work of IT professionals. In addition, they are responsible for managing the: 

Answer 

 

a. Hardware infrastructure   

b. IT infrastructure of hardware, software, databases, and telecommunications networks   

c. IT infrastructure of hardware and software   

d. IT infrastructure of hardware, software, and human resources  

Question 17 

  

The statement "Most business-to-consumer sites offer consumers incentives to buy and return, such as coupons, discounts, special offers, and vouchers for other Web services" reflects the _______________ success factor for retailing on the Web. 

Answer 

 

a. performance and service efficiency   

b. selection and value   

c. advertising and incentives   

d. look and feel  

Question 18 

  

Which of the following is a business driver for global IT? 

Answer 

 

a. Global assembly line hardware   

b. Global work unit software   

c. Global collaboration   

d. Global employees  

Question 19 

  

Personal digital assistants most commonly use which of these technologies? 

Answer 

 

a. Pen-based computing   

b. Optical scanning   

c. Jump drives   

d. Back-lit keyboards  

Question 20 

  

The first step of the transaction processing cycle is _______________. 

Answer 

 

a. inquiry processing   

b. document generation   

c. transaction processing   

d. data entry  

Question 21 

  

Which targeted marketing component includes advertising such as electronic billboards or banners placed on selected Web sites? 

Answer 

 

a. Context.   

b. Content.   

c. Community.   

d. Online behavior.  

Question 22 

  

_______________ agility is the ability to accomplish speed, accuracy, and cost economy in the exploitation of innovation opportunities. 

Answer 

 

a. Customer   

b. Partnering   

c. Operational   

d. Technological  

Question 23 

  

Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of: 

Answer 

 

a. Computer profiling and computer matching   

b. Unauthorized opt-in   

c. Censorship   

d. Adware  

Question 24 

  

Which of the following is considered a storage tradeoff? 

Answer 

 

a. Higher speed media costs less per byte but have higher storage capacities.   

b. Higher speed media have higher storage capacities but cost more per byte.   

c. Higher-capacity storage costs more per byte and has lower speed media.   

d. Large-capacity storage media cost less per byte but are slower  

Question 25 

  

The consequence of failing to establish how good IT services really need to be is: 

Answer 

 

a. The company may fail to develop an IT platform that furthers its strategy, despite high IT expenditures   

b. Excessive technical and process standardization limits the flexibility of business units   

c. IT is overwhelmed with projects that have little companywide value   

d. The company may pay for service options that, given its priorities, aren't worth the money  

Question 26 

  

According to the text, all of the following statements are included in the definition of computer crime except: 

Answer 

 

a. Unauthorized modification of software, data, or network resources   

b. Unauthorized release of information   

c. Unauthorized copying of software   

d. Unauthorized distribution of public domain software  

Question 27 

  

Which of the following statements best defines a network? 

Answer 

 

a. The usefulness or utility that comes from linking computers together   

b. An interrelated or interconnected chain, group, or system   

c. Computers linked together via cabling or wireless technology   

d. A group of individuals linked via hardware and software  

 

Question 28 

  

Which of the following would perform the required mathematical and logic operations of a central processing unit (CPU)? 

Answer 

 

a. Control unit   

b. Arithmetic-logic unit   

c. RAID unit   

d. Fuzzy logic unit  

Question 29 

  

The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems. 

Answer 

 

a. hacking   

b. cyber-slacking   

c. cracking   

d. resource theft  

Question 30 

  

Which of the following is the number one reason that companies outsource? 

Answer 

 

a. Reduce and control operating costs   

b. Accelerate re-engineering benefits   

c. Gain access to world-class capabilities   

d. Share Risks  

Question 31 

  

Systems integrators or facilities management companies are: 

Answer 

 

a. Independent subsidiaries of an organization that offer information-processing services to external organizations, as well as to their parent company.   

b. Companies that use information resource management techniques to manage the development of their information systems.   

c. Outside contractors that take over part or all of a company's information services operations.   

d. Companies using a hybrid of centralized and decentralized information systems.  

Question 32 

  

Which of the following is a secondary storage device? 

Answer 

 

a. Primary memory   

b. Random access memory   

c. Magnetic disk   

d. The CPU  

Question 33 

  

A DBMS query language is designed to: 

Answer 

 

a. Support information systems professionals in the development of complex application software   

b. Support end users who wish to obtain ad hoc reports   

c. Provide efficient batch mode processing of the database   

d. Specify the content, relationships, and structure of a database  

Question 34 

  

All of the following are done during the systems implementation stage of application development except: 

Answer 

 

a. Develop logical models of the current system.   

b. Acquire or develop hardware and software.   

c. Convert to the new business system.   

d. Manage the effects of system changes on end users.  

Question 35 

  

The _______________ is usually second-in-command to the CIO and usually has years of applications development experience. 

Answer 

 

a. e-commerce architect   

b. practice manager   

c. systems analyst   

d. chief technology officer  

Question 36 

  

_______________ information systems support the production/operations function that includes all activities concerned with the planning and control of the processes producing goods and services. 

Answer 

 

a. Finance   

b. Management   

c. Marketing   

d. Manufacturing  

Question 37 

  

The user interface function of an operating system typically: 

Answer 

 

a. Allows end users to communicate with it so they can load programs, access files, and accomplish other tasks   

b. Manages the hardware resources of a computer system   

c. Controls the creation, deletion, and access of files of data and programs   

d. Manages the accomplishment of the computing tasks of end users  

Question 38 

  

Which of the following statements regarding Internet Service Providers is correct? 

Answer 

 

a. ISPs provide individuals and organizations with access to the Internet for a fee   

b. ISPs are independent organizations; they have no connection to one another   

c. ISPs are no longer necessary for access to the Internet   

d. ISPs provide an indirect connection between a company's networks and the Internet  

Question 39 

  

Which of the following is an example of an intangible cost? 

Answer 

 

a. Employee salaries   

b. Loss of customer goodwill   

c. Reduced inventory-carrying costs   

d. Improved customer service  

Question 40 

  

Which of the following is one of the most common and useful types of data mining for marketing? 

Answer 

 

a. Goal seeking analysis   

b. Market basket analysis   

c. Optimization analysis   

d. Sensitivity analysis  

Question 41 

  

Which of the following, according to the text, are the basic components found in a comprehensive software suite? 

Answer 

 

a. Word processing, spreadsheet, and accounting   

b. Word processing, spreadsheet, and email   

c. Word processing, spreadsheet, database manager, and presentation graphics   

d. Word processing, database manager, presentation graphics, and email  

Question 42 

  

E-commerce includes all of the following except: 

Answer 

 

a. E-business processes, such as extranet access of inventory databases   

b. Intranet access of customer relationship management systems by sales and customer service reps   

c. Customer collaboration in product development via e-mail exchanges   

d. Acceptance of payments through ATM networks  

Question 43 

  

Communications channels such as microwave, fiber optics, or satellite transmission that provide high-speed transmission rates typically use _______________ channels. 

Answer 

 

a. broadband   

b. narrow-band   

c. wireless   

d. voice-band  

Question 44 

  

Fast retrieval and update of data from product, pricing, and customer databases is an example of a _______________ requirement. 

Answer 

 

a. user interface   

b. processing   

c. control   

d. storage  

 

Question 45 

  

The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks. 

Answer 

 

a. firewall   

b. filtered portal   

c. encoder   

d. telecommunications line  

Question 46 

  

Building an e-commerce website can be done in a number of ways. Which of the following would a small company with limited capital most likely choose as a cost-effective option? 

Answer 

 

a. Use the website design tools and predesigned templates provided by a website host   

b. Use in-house personnel or outside website developers to build a custom-designed site   

c. Share the cost of developing a website by partnering with companies that offer similar products and services   

d. Buy an existing website  

Question 47 

  

_______________ systems are cross-functional information systems that enhance communication and coordination among the members of business teams and workgroups. 

Answer 

 

a. Enterprise coordination   

b. Enterprise integration   

c. Enterprise collaboration   

d. Transaction processing  

Question 48 

  

Which of the following best describes a local area network? 

Answer 

 

a. A network that covers a large geographic area, such as a city or state   

b. A network that connects computers within a limited physical area, such as inside a single building   

c. A network that covers no more than a single state   

d. A private network that uses the Internet as its main backbone  

Question 49 

  

One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________. 

Answer 

 

a. sniffing   

b. hacking   

c. phishing   

d. spoofing  

Question 50 

  

A _______________ buy-side marketplace attracts many suppliers that flock to the exchange to bid for the business of a major buyer, such as GE or AT&T. 

Answer 

 

a. many-to-one   

b. some-to-many   

c. many-to-some   

d. many-to-many  

 

Answers

(5)
Status NEW Posted 10 Jun 2017 06:06 PM My Price 14.00

Hel-----------lo -----------Sir-----------/Ma-----------dam----------- Â-----------  -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)