• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back

What is the difference between data and information as they relate to business functions?

Data is processed to get information

What is business intelligence?

Collective information

Which business strategy is a large computer company using if it offered products with several appearances and screen interfaces?

Differentiation

What is the difference between data and information in information systems?

Information is processed data

A company would like to implement a new software system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time.




Which system should this company use?

Enterprise resource planning

How do information systems support accounting functions?

By generating balance sheets and income statements

Which type of computer system would an employee need to complete a project requiring a spreadsheet?

Microcomputer

A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM).




What is this called?

Primary storage

Which type of software application is most effective for analyzing small to medium sets of numbers?

Spreadsheets

Which types of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices?

Network operating system

What is a requirement of a field when it is in a table and is defined as the primary key?

The field must have unique values

What is true of a relational database?

It provides relational integrity for the database

A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season.




Which approach would allow the staff to most efficiently extract that information?

Data warehouse

A database administrator is creating a new relational database table to track products brought in for warranty service. The warranty service table links to the customer information table so the repaired product can be shipped back to the right person. It also links to the parts table to track which parts were used to make the repairs.




Which relational database feature is this an example of ?

Foreign Keys

Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles?

WiMAX

A real estate office has several divisions located in different states.




Which type of network should the real estate company implement to connect their divisions?

WAN

What is the primary networking standard used to communicate over the internet?

TCP/IP

Which technology would allow a company to host a computing service on an encrypted internal network and restrict it to employees within the organization?

Virtual private network

Which application is utilized by both GPS and GIS?

Location-based services

What is telematics?

A blend of computers and wireless telecommunications technologies

What are three models of e-business?

G2B, G2C, G2G

Which type of commerce model is used when a company sells tires to automobile companies?

B2B

Which e-business tool converts an audio broadcast to a file that can be played on a digital music player?

Podcasting

What is the main challenge to growth encountered when e-business is used?

Product or service limitations

Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function?

Autonomic

A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts for the chief financial officer (CFO).




Which decision support system should be the foundation for this new product?

Executive information systems

A company wants to find a technique that will provide the best value for the target variable.




Which analysis should the company select?

Optimization

A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement.




Which systems being used by the team?

Executive information system

Match each feature with its artificial intelligence technology.




Answer options may be used more than once or not all. Select your answers from the pull-down list.

Realistic Training - Virtual reality


Monitoring events - Intelligent agents


Working from home - Virtual reality


Managing personal data - Intelligent agents


Simulating physical worlds - Virtual reality

An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam.




Which type of artificial intelligence technology should this provider use?

Fuzzy logic

Which investigative tool is used during the analysis phase of systems development to guide process imporvements?

A data flow diagram

Which risk is reduced when the investigations step is well executed during the planning and analysis phases of systems development?

Scope Creep

Which investigative activity must occur during the analysis phase of a project?

Gathering the business requirements

Why would a company consider using a prototype when converting an existing order entry system to a web-based system?

It supports change through iteration

Which term is used to describe an iterative approach to building a system?

Prototyping

What can happen when project requirements are not clearly defined?

It can lead to feature creep

What is a drawback of outsourcing systems development projects?

It leads to a loss of confidentiality

Which method measures the ease with which people perform transactions or find information?

Usability

What measures computer speed?

CPU

Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday?

Plunge



A development team is creating a new reporting system to track vacation and expenses. Which conversion implementation should the team use if it uses the new vacation reporting module first and implements the expense reporting module two months later?

Phased

A company has recently acquired a former distribution competitor in another country. The new subsidiary uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses.




What is a political challenge to implementing this decision?

Prohibitions against the transfer of certain technologies across national boundaries

A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a multinational team to develop the new software.




Why has this approach been proposed.=?

It takes into account the needs of end users

An individual writes a program that will take over a computer for the purpose of launching attacks on additional computers




Which type of threat is being used?

Zombie

An individual writes software that collects personal data about a user from a computer and transmits the data over the internet without the user's knowledge.




Which type of threat is this?

Spyware

An employee downloads software that claims to improve computer performance. Instead, it introduces system vulnerabilities.




Which type of threat is this software?

Trojan horse

Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages?

Firewalls

Which security technique uses private key and public key pairs to protect sensitive information?

Encryption

A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use.




Which step should the company take?

Write guidelines for usage of technology

An employee works as an engineer at a software firm and often checks personal e-mail while at work. Due to the long hours at the office, the employee does not have any time to check e-mail at home and feels that these actions are acceptable even though it is company's internet use policy.




Which method could be used to appropriately discourage this employee's behaviors?

Offering an ethics training program

A contractor is bidding on a system to help a dental office schedule patient appointments and payments.




Which law would the contractor need to understand?

HIPAA

What is the federal bill that addresses computer monitoring of employees?

The Electronic Communications Privacy Act

Why would a school administration choose to utilize Microsoft Office?

It provides many personal productivity applications

Why would a vendor choose to utilize electronic data interchange (EDI)?

It permits secure transmission of business information.

What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy

It would decrease errors in medications.