Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
What is the difference between data and information as they relate to business functions? |
Data is processed to get information |
|
What is business intelligence? |
Collective information |
|
Which business strategy is a large computer company using if it offered products with several appearances and screen interfaces? |
Differentiation |
|
What is the difference between data and information in information systems? |
Information is processed data |
|
A company would like to implement a new software system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time. Which system should this company use? |
Enterprise resource planning |
|
How do information systems support accounting functions? |
By generating balance sheets and income statements |
|
Which type of computer system would an employee need to complete a project requiring a spreadsheet? |
Microcomputer |
|
A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM). What is this called? |
Primary storage |
|
Which type of software application is most effective for analyzing small to medium sets of numbers? |
Spreadsheets |
|
Which types of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices? |
Network operating system |
|
What is a requirement of a field when it is in a table and is defined as the primary key? |
The field must have unique values |
|
What is true of a relational database? |
It provides relational integrity for the database |
|
A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information? |
Data warehouse |
|
A database administrator is creating a new relational database table to track products brought in for warranty service. The warranty service table links to the customer information table so the repaired product can be shipped back to the right person. It also links to the parts table to track which parts were used to make the repairs. Which relational database feature is this an example of ? |
Foreign Keys |
|
Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles? |
WiMAX |
|
A real estate office has several divisions located in different states. Which type of network should the real estate company implement to connect their divisions? |
WAN |
|
What is the primary networking standard used to communicate over the internet? |
TCP/IP |
|
Which technology would allow a company to host a computing service on an encrypted internal network and restrict it to employees within the organization? |
Virtual private network |
|
Which application is utilized by both GPS and GIS? |
Location-based services |
|
What is telematics? |
A blend of computers and wireless telecommunications technologies |
|
What are three models of e-business? |
G2B, G2C, G2G |
|
Which type of commerce model is used when a company sells tires to automobile companies? |
B2B |
|
Which e-business tool converts an audio broadcast to a file that can be played on a digital music player? |
Podcasting |
|
What is the main challenge to growth encountered when e-business is used? |
Product or service limitations |
|
Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function? |
Autonomic |
|
A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts for the chief financial officer (CFO). Which decision support system should be the foundation for this new product? |
Executive information systems |
|
A company wants to find a technique that will provide the best value for the target variable. Which analysis should the company select? |
Optimization
|
|
A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement. Which systems being used by the team? |
Executive information system |
|
Match each feature with its artificial intelligence technology. Answer options may be used more than once or not all. Select your answers from the pull-down list. |
Realistic Training - Virtual reality Monitoring events - Intelligent agents Working from home - Virtual reality Managing personal data - Intelligent agents Simulating physical worlds - Virtual reality |
|
An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which type of artificial intelligence technology should this provider use? |
Fuzzy logic |
|
Which investigative tool is used during the analysis phase of systems development to guide process imporvements? |
A data flow diagram |
|
Which risk is reduced when the investigations step is well executed during the planning and analysis phases of systems development? |
Scope Creep |
|
Which investigative activity must occur during the analysis phase of a project? |
Gathering the business requirements |
|
Why would a company consider using a prototype when converting an existing order entry system to a web-based system? |
It supports change through iteration |
|
Which term is used to describe an iterative approach to building a system? |
Prototyping |
|
What can happen when project requirements are not clearly defined? |
It can lead to feature creep |
|
What is a drawback of outsourcing systems development projects? |
It leads to a loss of confidentiality |
|
Which method measures the ease with which people perform transactions or find information? |
Usability |
|
What measures computer speed? |
CPU |
|
Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday? |
Plunge |
|
A development team is creating a new reporting system to track vacation and expenses. Which conversion implementation should the team use if it uses the new vacation reporting module first and implements the expense reporting module two months later? |
Phased |
|
A company has recently acquired a former distribution competitor in another country. The new subsidiary uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing this decision? |
Prohibitions against the transfer of certain technologies across national boundaries |
|
A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a multinational team to develop the new software. Why has this approach been proposed.=? |
It takes into account the needs of end users |
|
An individual writes a program that will take over a computer for the purpose of launching attacks on additional computers Which type of threat is being used? |
Zombie |
|
An individual writes software that collects personal data about a user from a computer and transmits the data over the internet without the user's knowledge. Which type of threat is this? |
Spyware |
|
An employee downloads software that claims to improve computer performance. Instead, it introduces system vulnerabilities. Which type of threat is this software? |
Trojan horse |
|
Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages? |
Firewalls |
|
Which security technique uses private key and public key pairs to protect sensitive information? |
Encryption |
|
A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take? |
Write guidelines for usage of technology |
|
An employee works as an engineer at a software firm and often checks personal e-mail while at work. Due to the long hours at the office, the employee does not have any time to check e-mail at home and feels that these actions are acceptable even though it is company's internet use policy. Which method could be used to appropriately discourage this employee's behaviors? |
Offering an ethics training program |
|
A contractor is bidding on a system to help a dental office schedule patient appointments and payments. Which law would the contractor need to understand? |
HIPAA |
|
What is the federal bill that addresses computer monitoring of employees? |
The Electronic Communications Privacy Act |
|
Why would a school administration choose to utilize Microsoft Office? |
It provides many personal productivity applications |
|
Why would a vendor choose to utilize electronic data interchange (EDI)? |
It permits secure transmission of business information. |
|
What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy |
It would decrease errors in medications. |