The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 408 Weeks Ago, 3 Days Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
Question 1 The rapid development of microcomputer processing power, application software packages, and telecommunications networks gave birth to the phenomenon of _______________. Answer a.manufacturer-to-public direct salesb.MIS departmentsc.end user computingd.electronic monitoringQuestion 2 When employees in a project team use email to send and receive messages and use video conferences to hold electronic meetings and coordinate their activities, they are using _______________. Answer a.transaction processing systemsb.process control systemsc.enterprise collaboration systemsd.
Â
Â
Question 1Â
 Â
The rapid development of microcomputer processing power, application software packages, and telecommunications networks gave birth to the phenomenon of _______________.Â
AnswerÂ
Â
a. manufacturer-to-public direct sales  Â
b. MIS departments  Â
c. end user computing  Â
d. electronic monitoring Â
Question 2Â
 Â
When employees in a project team use email to send and receive messages and use video conferences to hold electronic meetings and coordinate their activities, they are using _______________.Â
AnswerÂ
Â
a. transaction processing systems  Â
b. process control systems  Â
c. enterprise collaboration systems  Â
d. decision support systems Â
Question 3Â
 Â
In the information systems concept, the processing function involves:Â
AnswerÂ
Â
a. Capturing and assembling elements that enter the system to be processed  Â
b. Transformation processes that convert input into output  Â
c. Transferring elements that have been produced by a transformation process to their ultimate destination  Â
d. Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal Â
Question 4Â
 Â
Expanding a company's product offering into global markets is an example of a(n) _______________ strategy.Â
AnswerÂ
Â
a. cost leadership  Â
b. differentiation  Â
c. growth  Â
d. alliance Â
Question 5Â
 Â
Which of the following is supported by the marketing business function?Â
AnswerÂ
Â
a. Compensation analysis  Â
b. Process control  Â
c. Credit management  Â
d. Sales force automation Â
Question 6Â
 Â
According to one of the videos shown during class, the speaker announced there should be four individuals involved with IT decisions sitting on the board of directors. An IT Technician is one, which option below lists the other three?Â
AnswerÂ
Â
a. CEO, TKBE’s, CIO  Â
b. CEO TKF’s, CIO  Â
c. CFO, CEO, CIO. Â Â
d. CEO, CTP, TKBEs Â
Question 7Â
 Â
Which of the following is an example of an unstructured data source?Â
AnswerÂ
Â
a. ERP database  Â
b. CRM database  Â
c. Other databases  Â
d. E-mail Â
Question 8Â
 Â
Which one of the following would typically not be accomplished with presentation graphics software?Â
AnswerÂ
Â
a. Converting numerical data into graphics and displays  Â
b. Incorporating multimedia files into presentations  Â
c. Preparing a computerized sideshow to accompany an oral presentation  Â
d. Preparing a text report for management Â
Question 9Â
 Â
What would senior management's role be in relation to the question "Whom do we blame if an IT initiative fails?"Â
AnswerÂ
Â
a. Decide which IT capabilities should be provided centrally and which should be developed by individual businesses  Â
b. Decided which features are needed on the basis of their costs and benefits  Â
c. Lead the decision making on the trade-offs between security and privacy on one hand and convenience on the other  Â
d. Assign a business executive to be accountable for every IT project, and monitor business metrics Â
Question 10Â
 Â
Business applications of information systems are typically combinations of several types of information systems. This integration is referred to as _______________ systems.Â
AnswerÂ
Â
a. information reporting  Â
b. decision support  Â
c. cross-functional informational  Â
d. end user computing Â
Question 11Â
 Â
The e-commerce component that deals with gathering data on customers and their website behavior and choices is:Â
AnswerÂ
Â
a. Event notification  Â
b. Profiling and personalizing  Â
c. Search management  Â
d. Access control and security Â
Question 12Â
 Â
When a firm strives to find ways to help its suppliers and customers reduce their costs or to increase the costs of their competitors, it is pursuing a strategy of _______________.Â
AnswerÂ
Â
a. innovation  Â
b. alliance  Â
c. cost leadership  Â
d. growth Â
Question 13Â
 Â
Which of the following statements is a characteristic of the content dimension of information?Â
AnswerÂ
Â
a. Information is provided when it is needed. Â Â
b. Information is related to the information needs of a specific recipient for a specific situation. Â Â
c. Information is provided in an easy-to-understand form. Â Â
d. Information is presented in a narrative, numeric, or graphic form. Â
Question 14Â
 Â
In large organizations, a database is usually controlled by a DBA, which stands for:Â
AnswerÂ
Â
a. Database Administrator. Â Â
b. Database Analyst. Â Â
c. Definition-Based Algorithm. Â Â
d. Direct Biased Agent. Â
Question 15Â
 Â
Which of the following is an international regulatory issue?Â
AnswerÂ
Â
a. Dealing with transborder data flow restrictions. Â Â
b. Improving the operational efficiency of networks. Â Â
c. Managing network infrastructure across countries. Â Â
d. Controlling data communication security. Â
Question 16Â
 Â
CIO and IT managers share responsibility for managing the work of IT professionals. In addition, they are responsible for managing the:Â
AnswerÂ
Â
a. Hardware infrastructure  Â
b. IT infrastructure of hardware, software, databases, and telecommunications networks  Â
c. IT infrastructure of hardware and software  Â
d. IT infrastructure of hardware, software, and human resources Â
Question 17Â
 Â
The statement "Most business-to-consumer sites offer consumers incentives to buy and return, such as coupons, discounts, special offers, and vouchers for other Web services" reflects the _______________ success factor for retailing on the Web.Â
AnswerÂ
Â
a. performance and service efficiency  Â
b. selection and value  Â
c. advertising and incentives  Â
d. look and feel Â
Question 18Â
 Â
Which of the following is a business driver for global IT?Â
AnswerÂ
Â
a. Global assembly line hardware  Â
b. Global work unit software  Â
c. Global collaboration  Â
d. Global employees Â
Question 19Â
 Â
Personal digital assistants most commonly use which of these technologies?Â
AnswerÂ
Â
a. Pen-based computing  Â
b. Optical scanning  Â
c. Jump drives  Â
d. Back-lit keyboards Â
Question 20Â
 Â
The first step of the transaction processing cycle is _______________.Â
AnswerÂ
Â
a. inquiry processing  Â
b. document generation  Â
c. transaction processing  Â
d. data entry Â
Question 21Â
 Â
Which targeted marketing component includes advertising such as electronic billboards or banners placed on selected Web sites?Â
AnswerÂ
Â
a. Context. Â Â
b. Content. Â Â
c. Community. Â Â
d. Online behavior. Â
Question 22Â
 Â
_______________ agility is the ability to accomplish speed, accuracy, and cost economy in the exploitation of innovation opportunities.Â
AnswerÂ
Â
a. Customer  Â
b. Partnering  Â
c. Operational  Â
d. Technological Â
Question 23Â
 Â
Individuals have been mistakenly arrested and jailed, and others have been denied credit because of their physical profiles or personal data. These are often the result of:Â
AnswerÂ
Â
a. Computer profiling and computer matching  Â
b. Unauthorized opt-in  Â
c. Censorship  Â
d. Adware Â
Question 24Â
 Â
Which of the following is considered a storage tradeoff?Â
AnswerÂ
Â
a. Higher speed media costs less per byte but have higher storage capacities. Â Â
b. Higher speed media have higher storage capacities but cost more per byte. Â Â
c. Higher-capacity storage costs more per byte and has lower speed media. Â Â
d. Large-capacity storage media cost less per byte but are slower Â
Question 25Â
 Â
The consequence of failing to establish how good IT services really need to be is:Â
AnswerÂ
Â
a. The company may fail to develop an IT platform that furthers its strategy, despite high IT expenditures  Â
b. Excessive technical and process standardization limits the flexibility of business units  Â
c. IT is overwhelmed with projects that have little companywide value  Â
d. The company may pay for service options that, given its priorities, aren't worth the money Â
Question 26Â
 Â
According to the text, all of the following statements are included in the definition of computer crime except:Â
AnswerÂ
Â
a. Unauthorized modification of software, data, or network resources  Â
b. Unauthorized release of information  Â
c. Unauthorized copying of software  Â
d. Unauthorized distribution of public domain software Â
Question 27Â
 Â
Which of the following statements best defines a network?Â
AnswerÂ
Â
a. The usefulness or utility that comes from linking computers together  Â
b. An interrelated or interconnected chain, group, or system  Â
c. Computers linked together via cabling or wireless technology  Â
d. A group of individuals linked via hardware and software Â
Â
Question 28Â
 Â
Which of the following would perform the required mathematical and logic operations of a central processing unit (CPU)?Â
AnswerÂ
Â
a. Control unit  Â
b. Arithmetic-logic unit  Â
c. RAID unit  Â
d. Fuzzy logic unit Â
Question 29Â
 Â
The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems.Â
AnswerÂ
Â
a. hacking  Â
b. cyber-slacking  Â
c. cracking  Â
d. resource theft Â
Question 30Â
 Â
Which of the following is the number one reason that companies outsource?Â
AnswerÂ
Â
a. Reduce and control operating costs  Â
b. Accelerate re-engineering benefits  Â
c. Gain access to world-class capabilities  Â
d. Share Risks Â
Question 31Â
 Â
Systems integrators or facilities management companies are:Â
AnswerÂ
Â
a. Independent subsidiaries of an organization that offer information-processing services to external organizations, as well as to their parent company. Â Â
b. Companies that use information resource management techniques to manage the development of their information systems. Â Â
c. Outside contractors that take over part or all of a company's information services operations. Â Â
d. Companies using a hybrid of centralized and decentralized information systems. Â
Question 32Â
 Â
Which of the following is a secondary storage device?Â
AnswerÂ
Â
a. Primary memory  Â
b. Random access memory  Â
c. Magnetic disk  Â
d. The CPU Â
Question 33Â
 Â
A DBMS query language is designed to:Â
AnswerÂ
Â
a. Support information systems professionals in the development of complex application software  Â
b. Support end users who wish to obtain ad hoc reports  Â
c. Provide efficient batch mode processing of the database  Â
d. Specify the content, relationships, and structure of a database Â
Question 34Â
 Â
All of the following are done during the systems implementation stage of application development except:Â
AnswerÂ
Â
a. Develop logical models of the current system. Â Â
b. Acquire or develop hardware and software. Â Â
c. Convert to the new business system. Â Â
d. Manage the effects of system changes on end users. Â
Question 35Â
 Â
The _______________ is usually second-in-command to the CIO and usually has years of applications development experience.Â
AnswerÂ
Â
a. e-commerce architect  Â
b. practice manager  Â
c. systems analyst  Â
d. chief technology officer Â
Question 36Â
 Â
_______________ information systems support the production/operations function that includes all activities concerned with the planning and control of the processes producing goods and services.Â
AnswerÂ
Â
a. Finance  Â
b. Management  Â
c. Marketing  Â
d. Manufacturing Â
Question 37Â
 Â
The user interface function of an operating system typically:Â
AnswerÂ
Â
a. Allows end users to communicate with it so they can load programs, access files, and accomplish other tasks  Â
b. Manages the hardware resources of a computer system  Â
c. Controls the creation, deletion, and access of files of data and programs  Â
d. Manages the accomplishment of the computing tasks of end users Â
Question 38Â
 Â
Which of the following statements regarding Internet Service Providers is correct?Â
AnswerÂ
Â
a. ISPs provide individuals and organizations with access to the Internet for a fee  Â
b. ISPs are independent organizations; they have no connection to one another  Â
c. ISPs are no longer necessary for access to the Internet  Â
d. ISPs provide an indirect connection between a company's networks and the Internet Â
Question 39Â
 Â
Which of the following is an example of an intangible cost?Â
AnswerÂ
Â
a. Employee salaries  Â
b. Loss of customer goodwill  Â
c. Reduced inventory-carrying costs  Â
d. Improved customer service Â
Question 40Â
 Â
Which of the following is one of the most common and useful types of data mining for marketing?Â
AnswerÂ
Â
a. Goal seeking analysis  Â
b. Market basket analysis  Â
c. Optimization analysis  Â
d. Sensitivity analysis Â
Question 41Â
 Â
Which of the following, according to the text, are the basic components found in a comprehensive software suite?Â
AnswerÂ
Â
a. Word processing, spreadsheet, and accounting  Â
b. Word processing, spreadsheet, and email  Â
c. Word processing, spreadsheet, database manager, and presentation graphics  Â
d. Word processing, database manager, presentation graphics, and email Â
Question 42Â
 Â
E-commerce includes all of the following except:Â
AnswerÂ
Â
a. E-business processes, such as extranet access of inventory databases  Â
b. Intranet access of customer relationship management systems by sales and customer service reps  Â
c. Customer collaboration in product development via e-mail exchanges  Â
d. Acceptance of payments through ATM networks Â
Question 43Â
 Â
Communications channels such as microwave, fiber optics, or satellite transmission that provide high-speed transmission rates typically use _______________ channels.Â
AnswerÂ
Â
a. broadband  Â
b. narrow-band  Â
c. wireless  Â
d. voice-band Â
Question 44Â
 Â
Fast retrieval and update of data from product, pricing, and customer databases is an example of a _______________ requirement.Â
AnswerÂ
Â
a. user interface  Â
b. processing  Â
c. control  Â
d. storage Â
Â
Question 45Â
 Â
The text describes a/an _______________ as a "gatekeeper" system that protects a company's intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks.Â
AnswerÂ
Â
a. firewall  Â
b. filtered portal  Â
c. encoder  Â
d. telecommunications line Â
Question 46Â
 Â
Building an e-commerce website can be done in a number of ways. Which of the following would a small company with limited capital most likely choose as a cost-effective option?Â
AnswerÂ
Â
a. Use the website design tools and predesigned templates provided by a website host  Â
b. Use in-house personnel or outside website developers to build a custom-designed site  Â
c. Share the cost of developing a website by partnering with companies that offer similar products and services  Â
d. Buy an existing website Â
Question 47Â
 Â
_______________ systems are cross-functional information systems that enhance communication and coordination among the members of business teams and workgroups.Â
AnswerÂ
Â
a. Enterprise coordination  Â
b. Enterprise integration  Â
c. Enterprise collaboration  Â
d. Transaction processing Â
Question 48Â
 Â
Which of the following best describes a local area network?Â
AnswerÂ
Â
a. A network that covers a large geographic area, such as a city or state  Â
b. A network that connects computers within a limited physical area, such as inside a single building  Â
c. A network that covers no more than a single state  Â
d. A private network that uses the Internet as its main backbone Â
Question 49Â
 Â
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.Â
AnswerÂ
Â
a. sniffing  Â
b. hacking  Â
c. phishing  Â
d. spoofing Â
Question 50Â
 Â
A _______________ buy-side marketplace attracts many suppliers that flock to the exchange to bid for the business of a major buyer, such as GE or AT&T.Â
AnswerÂ
Â
a. many-to-one  Â
b. some-to-many  Â
c. many-to-some  Â
d. many-to-many Â
Â
Hel-----------lo -----------Sir-----------/Ma-----------dam----------- Â----------- -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll