• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/59

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

59 Cards in this Set

  • Front
  • Back
A nuclear power plant uses electronic sensors linked to computers to continually monitor processes and make instant (real-time) adjustments that control the power generation process. This is an example of a(n) _______________.
process control system
A system that can change itself or its environment in order to survive is _______________ system.
an adaptive
Be able to identify different types computer hardware technology except:
- NOT A Hardware Technology: Operating System Software, (Programs & Procedures)
- Examples of Hardware Technology: Printer, Keyboard, Microcomputers
Give examples of an information system.
- Operations support systems, Transaction Processing Systems, Process control systems, Enterprise collaboration systems, management support system, management information system, functional business system, cross functional informational systems
E-business uses Internet technologies to work and empower _______________.
5. E-business uses Internet technologies to work and empower:
A. Business processes
B. E - commerce
C. Enterprise collaboration within a company
D. ALL THE ABOVE CHOICES ARE CORRECT
E-commerce ____________________.
. E-commerce:
A. Involves buying, selling, marketing, and servicing of products, services, and information over a variety of computer networks
B. Uses the internet, intranets, and extranets to support every step of the commercial process, such as multimedia advertising, product information, and customer support
C. Involves internet security and payment mechanisms that ensure completion of delivery and payment processes
D. All of the above choices are correct
If a system is one of the components of a larger system, it is considered a(n) _______________.
subsystem
Organizations are examples of _______________ systems because they interface and interact with other systems in their environment.
OPEN
The original, formal record of a transaction is called the
source document
When employees in a project team use email to send and receive messages and use video conferences to hold electronic meetings and coordinate their activities, they are using
Enterprise Collaboration Systems.
. A customer-focused business can build customer value and loyalty by
A. Making a Loyal Customer Feel Special With Website Personalization
B. Letting Customers Place Orders Directly Or Through Distribution Partners,
C. Letting Customers Check Order History And Delivery Status
D. All Of The Above Choices Are Correct
. What is a serious problem of competitive advantage
A. Normally Doesn’t Last Very Long and Isn’t Sustainable Over Long Term
B. Competitors Figure Out How It Was Done and Do The Same Thing
C. Can Become a Competitive Necessity
D. All Of The Above Choices Are Correct
. A(n) ------ is a competitive strategy by which a firm develops unique products or services from those of its competitors, or makes radical business changes that may alter the fundamental nature of the industry.
innovation strategy
. A(n) ------strategy is a competitive strategy by which a firm seeks to become a low-cost producer of products and services in the industry.
Cost Leadership
. According to the text, in the world of the Internet, a firm's biggest competitor
May not exist YET but could emerge overnight
What are the basic competitive forces discussed in the text?
- Rivalry of Competitors
- Threat of New Entrants
- Threat of Substitutes
-Bargaining Power of Customers
- Bargaining Power of Suppliers
What are the basic competitive strategies discussed in the text?
- Cost Leadership
- Differentiation
- Innovation
- Growth
- Alliance
- Other Strategies
18. Expanding a company's product offering into global markets is an example of a(n) ----- strategy.
growth
. In addition to the five basic competitive strategies, the text describes several key strategies implemented with information technology. What are those strategies?
- Lock in Customers and Suppliers
- Create Switching Costs
- Raise Barriers to Entry
- Leverage Investment in IT (new products & services only from strong IT capability)
. The practice of becoming the largest purchaser of products from a given supplier is an example of:
locking in the supplier
. The most popular pointing device used today is the
light pen
A bit, the smallest element of data, can have values of:
0 or 1
According to Moore's Law, --------- doubles every 18 to 24 months.
the exponential growth in the number of transistors per integrated circuit (COMPUTING POWER)
Banks use-------- technologies for check processing.
Magnetic Ink Character Processing
Continuous speech recognition systems are characterized by:
Recognizing Continuous Conversationally Paced Speech.
In the 1950s, ------- were invented and quickly replaced the thousands of vacuum tubes used in electronic computers
Transistors
. Personal digital assistants most commonly use what type of technology?
- Pen Based Computing
The first generation of computers relied on
Vacuum Tubes
. What is a secondary storage device?
- A device that stores more data and software instructions needed for processing
- Ex: Magnetic Disks & Optical Disk Drives
What are the characteristics of supercomputer systems?
- A device that stores more data and software instructions needed for processing.
1. USES PARALLEL, INTERCONNECTED MICROPROCESSORS.
2. CAN PROCESS AT SPEEDS OF BILLIONS OF OPERATIONS PER SECOND.
3. DESIGNED SPECIFICALLY FOR HIGH SPEED NUMERIC COMPUTATION (Not a characteristic but they RUN THE SAME SOFTWARE FOUND ON HOME COMPUTERS, BUT AT FASTER SPEEDS)
. According to the text, Linux' popularity is due to what….
A. Performance and price
B. Flexibility and reliability
C. It is Open Source software
D. All of the choices are correct.
. According to the text, function-specific application software does what?
It supports specific applications of end users in business and other fields
. According to the text, operating systems are a type of
system management program
What are the characteristics of a desktop publishing package?
All of the following are considered characteristics of a desktop publishing package except:
A. Used to print newsletters and brochures
B. Imports text and graphic files from other programs
**C. Used for business analysis and modeling **
COTS software stands for:
Commercial off-the-shelf software
. Cloud computing is best described as:
A style of computing where resources are provided as a service over the Internet
Software is considered the------ part of the computer, whereas the hardware is considered the ---- part.
Variable
Invariable
The acronym HTML stands for:
Hypertext Markup Language
The user interface function of an operating system typically does what?
Allows end users to communicate with it so they can load programs, access files, and accomplish other tasks
. Which of the following is a basic function that an operating system performs in the operation of a computer system?
. User interface and support services
B. Resource and task management
C. File management and utilities
D. It performs all of the functions above.
A DBMS query language is designed:
to Support end users who wish to obtain ad hoc reports
A central source of data that have been cleaned, transformed, and cataloged so that they can be used for business analysis, market research, and decision support is called a
Data Warehouse.
A group of related records is a data file, or a
Table.
All of the following are major functions of a database management system except:
B. Identifying insufficient data processing or storage needs
. All the fields used to describe the attributes of an entity are grouped to form a(n)
Record.
46. Boolean logic deals with three logical operators:
- AND
- OR, and
-NOT
. Database management involves the use of database management software to control how databases are:
A. created
B. interrogated
C. maintained
D. All of the choices are correct.
Large organizations usually place control of enterprise-wide database development in the hands of
Database administrators (DBAs).
What type of databases are employees using when they access online data banks, whether those data banks are free or paid for through subscriptions?
- External Databases
------ is the most commonly used database application for the PC.
microsoft access
A network configuration that consists of a central computer system with a number of smaller computers tied directly to it, but not to each other, is a -----network.
star
A network that covers a large geographic distance, such as a state or a country, is considered a ----network.
wide area
------ are a standard set of rules and procedures for the control of communication in a network
protocols
. What is -----: the practice of using an Internet connection to pass voice data using IP instead of using the standard public-switched telephone network, also known as VoIP
internet telephony
. An ---- is a network inside an organization that uses Internet technologies to provide an Internet-like environment within the enterprise
intranet
. An---- is a network link that uses Internet technologies to interconnect the intranet of a business with the intranets of its customers, suppliers, or other business partners
extranet
As it relates to telecommunications media, the problem of the last mile is
Tying into older Technology
Fiber optics are regarded as the communications media of the future, primarily due to its
Greater Speed and Capacity
------ is: a theory advanced by Robert Metcalfe that suggests that the value of a given network will double with the addition of each new connection or node.
Metcalfe's law