-
Software that organizes, manages, and processes business data, such as data concerned withinventory, customers, and vendors, is called:
Data Management Software
-
Software that manages the resources of the computer is called:
System Software
-
Software used to apply the computer to a specific task for an end user is called:
Application Software
-
Legacy systems are still in use today because:
They are to expensive to redesign
-
In co-location, a firm:
Purchases and owns their web server but locates the server in the physical facility of a hosting service.
-
What would be a reason for using a workstation rather than a personal computer?
When you need more powerful computational abilities
-
Which of the following types of computer is used for weather forecasting?puter?
Supercomputer
-
Connecting geographically remote computers in a single network to create a .virtual
supercomputer. is called:
Grid Computing
-
The use of multiple computers linked by a communications network for processing is called:(
Distributed processing
-
The business case for using grid computing involves all of the following except:
Centralized maintance
-
In a multitiered network
The work of the entire network is balanced over several levels of servers
-
A client computer networked to a server computer, with processing split between the two types of machinces is called
Two-tiered client/server architecture.
-
The primary storage technologies are
Storage networks, magnetic tape,magnetic disk, and optical disk
-
Which of the following is a type of optical disk storage
CD rom
-
Which of the following storage technology stores data sequentially
Magnetic disks
-
A high-speed network dedicated to storage that connects different kids of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers best describes
SAN
-
Which of the following is a device used to collect data directly form the environment for input into a computer system
Sensor
-
Which of the following is not a type of output device
Keyboard
-
The main challenge coming to microsofts office software suite will be
web based productivity software such as google apps
-
What type of device gathers data and converts them to electronic form for sure by the computer?
Input device.
-
A widget is a
Small software program that can be added to web pages or placed on the desktop
-
Microsoft word is an example of
Word processing software
-
An industry-wide effort to develop systems that can configure optimize tune and heal themselves when broken and protect themselves from outside intruders and self destruction is called
Autonomic computing
-
An example of autonomic computing is
Virus protection software that runs and updates itself automatically
-
lunuz places a major role back office operation with _______ of the us server market
25%
-
Microsoft excel is an example of
Spreadsheet software
-
Which of the following types of computer would you use to support a computer network?
Server
-
The interactive multiuser operating system developed by bell laboratories in 1969 to be highly supportive of communications and networking is
Unix
-
Which is the most recent windows operating system
Windows 7
-
In client/server computing the client is
The computer that acts as the user point of entry
-
which of the following is not one of the most important four programming languages for business
Java
-
Linux is
An example of open-source software
-
Languages that enable a user to make requests using conversational commands resembling human speech are called
Natural languages
-
A report generator is a type of
Fourth generation language
-
Two categories of fourth generation languages are
Graphics language and application software package
-
Which type of software provides more control over text and graphic placement in the layout of a page than word processing software
Desktop publishing software
-
A software suite
Includes full featured versions of application software bundled as a unit
-
Running a java program on a computer requires
A java virtual machine to be installed on the computer
-
Which technology allows a client and server to exchange small pieces of data behind the scene so that an entire web page does not have to be reloaded each time the user requests a chang
Ajax
-
What is the foundation technology for web services
XML
-
A set of self-contained services that communicate with each other to create a working software application is called
SOA
-
Chicagocrim.org which combines google maps with crime data for the city of chicago is an example of
A mashup
-
software applications that combine different online software applications are referred to as
Mashups
-
To analyze the direct and indirect costs and determine the actual cost of a specific technology implementations you would use
Total cost of ownership model
-
All of the following place strain on system capacity except for
Minimized response time for transaction processing
-
Which of the following refers to the abilitiy of a computer product or system to expand to serve a larger number of users without breaking down
Scalability
-
The concetracting of custom software development to outside firms is commonly referred to as
Outsourcing
-
In order to manage their relationship with outsourcer or technology service provider firms need a contract that includes a
SLA
-
Which of the following statments in not true about cloud computing
It removes the concern about data systems security for businesses
-
Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referrred to as
Utility computing.
-
Which of the following is not a true statment about MDM
It is a quality of data concept that is used to identify a company's most important data
-
What is the first step you should take in managing data for a firm?
Identify the data needed to run the business
-
An example of a predigital database is a
Library's card catalog
-
Which of the following best illustrates the relationship between entities and attribures
The entity CUSTOMER with the attribute ADDRESS
-
The tyep of logical database model that treats data as if they were stored in two-dimensional tables is the
relational DBMS
-
What are the relationships that the relational database is named for
Relationships between entities
-
A characteristic or quality describing and entity is called
attribute
-
The most basic business database is comprised of
Five tables: for customers, employees, suppliers, products, and sales
-
In a table for customers, the information about a single customer would reside in a single
Row
-
In a relational database a record is also called a
Tuple
-
A field identified in a table as holding the unique identifier of the table's records is called the
Primary Key
-
A field identified in a record as holding the unique identifier for that record is called the
Key Field
-
A schematic of the entire database that describes the relationships in a datebase is called a
entity-relationship diagram
-
A one to one relationship between two entities is symbolized in a diagram by a line that ends
in two short marks
-
A one to many relationship between two entities is symoblized in a diagram by a line that ends
with a crow's foot preceded by a short mark
-
A table that links two tables that have amny to many relationship is often called a
intersection relation
-
the process of streamlining data to minimize redundancy and awkward many to many relationships is called
normalization
-
a DBMS make the
physical database available for different logical views
-
The logical view of a database
Presents data as they would be perceived by end users
-
Which of the following is not a typical deature of DBMS
Query wizard tool
-
Oracle database lite is a
DBMS for small handheld computing devices
-
Access is a
DBMS for desktop systems
-
MySQL is a
popular open source DBMS
-
Microsoft SQL server is a
DBMS for midrange computers
-
In a relational database the three basic operations used to develop useful sets of data are
Select project and join
-
The select operation
Creates a subset consisting of all records in the file that meets stated criteria
-
The join operation
Combines relational tables to provide the user with more information than is otherwise available
-
The project operation
Creates a subset consisting of columns in a table
-
The data dictionary serves as an important data management tool by
Creating an inventory of data definitions contained in the database.
-
An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation ownership authorization and security is the
Data definition diagram
-
The specialized language programmers use to add and change data in the database is called
Structured Query Language
-
The most prominent data manipulation language today is
Crystal reports
-
DBMS typically include report generating tools in order to
Display data in an easier to read format
-
The type of database management approach that can handle multimedia is the
Object oriented DBMS
-
Which of the following database types is useful for storing Java applets as well as handling large number of transactions
Object relational DBMS
-
A data warehouse is composed of
both historical and current data
-
Which of the following statements about data warehouse is not true
Data warehouse systems provide a range of ad hoc and standardized query tools analytical tools and graphical reporting facilities
-
A data mart usually can be constructed more rapidly and at a lower cost than a data warehouse because
it typically focuses on a single subject area or line of business
-
tools for consoliddating analyzing and providing access to vast amounts of data to help users make better business decisions are known as
business intelligence
-
The tool that enables users to view the same data in different ways using multiple dimensions is
OLAP
-
OLAP is a tool for enabling
Users to obtain online answers to ad hoc questions in a rapid amount of time
-
Data mining is a tool for allowing users to
find hidden relationships in data
-
in terms of the data relationships found by data mining sequences refers to
events linked over time
-
In terms of the data relationships found by data mining associations refers to
occurrences linked to a single event.
-
An alternative to using application server software for interfacing between a web server and back-end database is
CGL
-
Businesses use ______ tools to search and analyze unstructured data sets and such as emails and memos
Text mining
-
The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources
Data redundancy
-
detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called
data scrubbing
-
Which of the following would you use to find patterns in user interaction data recorded by the Web servers
Web usage mining
-
Which of the following would you use to find out which websites with content related to database design were the most often linked to by the other web sites?
Web structure mining
-
The device that acts as a connection point between computers and can filter and forward data to a specified destination is called
switch
-
The internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers.
-
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called
Packet switching
-
The telephone system is an example of a ______ network
Circuit switched
-
Which of the following is not a characteristic of a packet switching?
Packet switching requires point to point circuits
-
In TCP/IP, IP is responsible for?
Disassembling and reassembling of packets during transmission
-
In a telecommunications network architecture a protocol is
A standard set of rules and procedures for control of communications in a network
-
What are the four layers of TCP/IP reference model
Application, transport, internet, and network interface.
-
Which signal types are represented by continuous waveform
Analog
-
To use the analog telephone system for sending digital data you muse also use
A modem
-
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Peer to peer
-
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
Campus area network
-
In a bus network
Signals are broadcast in both directions to the entire network.
-
All network components connect to a single hub in a ______ topology
Star
-
The most common Ethernet topology is
Bus
-
A network that spans a city and sometimes its major suburbs as well is called a
MAN
-
A network that covers entire geographical regions is most commonly referred to as a
Wide area network
-
Which type of network is used to connect digital devices within half mile or 500 meter radius?
LAN
-
____ works by using radio waves to communicate with radio antennas placed within adjacent geographic areas
Cell Phones
-
Bandwidth is the
Difference between the highest and lowest frequencies that can be accommodated on a single channel
-
The total amount of digital information that can be transmitted through any telecommunications medium is measured in
BPS
-
Digital subscriber lines
operate over existing telephone lines to carry voice data and video
-
Which protocol is the internet based on
TCP/IP
-
What service converts IP addresses into more recognizable alphanumeric names?
DNS
-
the child domain of the root is the
Top level domain
-
In the domain name http://myspace.blogging.com what are the root, top level, second level, and third level domains respectively?
".", com, blogging, myspace
-
Which organization helps define the overall structure of the internet
IAB
-
IPv6 is being developed in order to
Create more IP addresses
-
Which of the following services enables logging on to one computer system and working on another?
FTP
-
Instant messaging is a type of _____ service
Chat
-
T lines
Are high speed leased data lines providing guaranteed service levels
-
The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies
need to base their Internet use policies on the needs of the organization and culture
-
______ Integrates disparate channels for voice communications data communications instant messaging email and electronic conferencing into a single experience
Unified communications
-
A VPN
Is an encrypted private network configured within a public network
-
Web browser software requests web pages form the internet using which protocol
HTTP
-
Together a protocol prefix a domain name a directory path and a document name are called a
Uniform resource locator
-
The most common web server today controlling 46 percent of the market is
Apache HTTP server
-
What technology allows people to have content pulled from the web sites and fed automatically to their computers
RSS
-
The process of employing techniques to help a web site achieve a higher ranking with the major search engines is called
SEO
-
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention with no clear leader having yet emerged.
-
Which fo the following is the first generation of cellular systems suitable for wireless broadband internet access?
3G
-
CDMA
transmits over several frequencies
-
The most appropriate wireless networking standard for creating PANs is
I-mode
-
Bluetooth can be used to link up to _________ devices within a 10 meter area using low power radio based communications
Eight
-
the wi-fi 802.11a standard can transmit up to
54 Mbps in the 5-GHz frequency range
-
one or more access points positioned on a ceiling wall or other strategic spot in public places to provide maximum wireless coverage for a specific area are referred to as
hotspots
-
The IEEE standard for the WiMax is
IEEE802.16
-
The WiMax standard can transmit up to a distance of apporiximately
30 miles
-
Passive RFID tags
Have a range of several feet.
-
Based on your reading of the examples in the cahpter, what would the best use of RFID for a business?
Logging tansactions
-
______ refers to policies procedures and technical measures used to prevent unauthorized access alternation theft or physical damage to information systems
"Security"
-
______ refers to all of the mehtods policies and organizational procedures that ensure the safety of the organization's assets the accuracy and reliability of its accounting records and operational adherence to management standards
Controls
-
Large amounts of data stored in electronic form are _____ than the same data in manual form
Vulnerable to many more kinds of threats
-
Electronic data are more susceptible to destruction fraud error and misuse because information systems concentrate data in computer files that
have the potential to be accessed by large numbers of people and by groups outside of the organizations
-
Specific security challenges that threaten the communications lines in a client/server environment include
tapping sniffing message alteration radiation
-
Specific security challenges that threaten clients in a client/server environment include
unauthorized access errors spyware
-
specific security challenges that threaten corporate servers in a client/server environment include
hacking vandalism denial of service attacks
-
The internet poses specific security problems because
it was designed to be easily accessible.
-
Which of the following statements about the internet security is not true
VoIP is more secure than switched voice network
-
An independent computer program that copies itsefl form one computer to another over a network is called
worm
-
A salesperson clicks repeatedly on the online ads of competitors in order to drive the competitors advertising cost up this is an example of
spoofing
-
In 2004 ICQ users were enticed by a sales message from a supposed anti virus vendor. on the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
Trojan Horse
-
Redirecting a web link to a different address is a form of
spoofing
-
a keylogger is a type of
spyware
-
hackers create a botnet by
by causing other people's computers to become "zombie" PCs following a master computer
-
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack
DDoS
-
Which of the following is not an example of a computer use as a target of crime.
Illegally accessing stored electronic communication
-
Which of the following is not an example of a computer use as an instrument of crime?
Breaching the confidentiality of protected computerized data.
-
Phishing is a form of
Spoofing
-
An example of phishing is
Setting up a fake medical web site that asks users for confidential information
-
Evil twins are
Bogus wireless network access points that look legitimate to users
-
Pharming involves
Redirecting users to a fraudulent web site even when the user has type in the correct address in the web browser
-
You have been hired as a security consultant for a low firm. Which of the following constitutes the greatest source of security threats to the firm?
Employees
-
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
Social engineering
-
How do software vendors correct flaws in their software after it has been distributed
Issue patches
-
The HIPAA act of 1997
outlines medical security and privacy rules.
-
The gramm leach bliley act
Requires financial institutions to ensure the security of customer data
-
The sarbanes oxley act
Imposes responsibility on companies and management to safegaurd the accuracy of financial information
-
The most common type of electronic evidence is
Email
-
Electronic evidence on computer storage media that is not visible to the average user is called ________ data
Ambient
-
Application controls
Can be classified as input controls, processing controls, and output controls
-
_______ conrtols ensure that valuable business data files on either disk or tape are not subject to unauthorized access change or destruction while they are in use or in storage
Data security
-
Analysis of the information system that rates the likelihood of a security incident occurring and its cost is included in a
Risk assesment
-
Statements ranking information risks and identifying security goals are included in a
Security policy
-
An analysis of the firm's most critical systems and the impact a system's outage would have on teh business is included in a
business impact analysis
-
Rigorous password systems
May hinder employee productivity
-
An authentication token is a
Device the size of a crdit card that contains access permission data
-
Biometric authentication
only uses physical measurement for identification
-
A firewall allows the organization to
Enforce a security policy on traffic between its network and the Internet
-
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver
Intrusion detection system
-
________ use scanning software to look for known problems such as bad passwords the removal of important files, security attacks in progress, and system administration errors
Intrusion detection systems
-
Currently, the protocols used for secure information transfer over the Internet are
HTTP and TCP/IP
-
Most antivirus software is effective against
Only those viruses already known when the software is written
-
In which method of encryption is a single enxryption key sent to the receiver so both sender and receiver share the same key
Symmetric key encryption
-
A digital certificate system
Uses third party CAs to validate a user's identity
-
Downtime refers to periods of time in which a
Computer system is not operational
-
For 100% availability, online transaction processing requires
Fault-tolerant computer systems
-
In controlling network traffic to minimize slow-downs a technology called _____ is used to examine data files and sort low priority data from high priority data
Deep packet inspection
-
The development and use of methods to make computer systems resume their activites more quickly after mishaps is called
Recovery ooriented computing
-
Smaller firms may outsource some or many security funtions to
ISPs
-
From your reading of the severstal case study the firm implemented new information systems in order to achieve which of the main six business objectives?
Operational excellence
-
Which of the following is not an example of the next generation enterprise applications
Solutions incorporating SCM
-
A suite of intergrated software modules for finance and accounting human resources manufacturing and production and sales and marketing that allows data to be used by multiple funcions and business processes best describes
ERP systems
-
Enterprise software is built around thousands of predefined business processes that reflect
Best practices
-
Which of the following is not ture about enterprise systems?
Enterprise software is expressly built to allow companies to mimic their unique business practices
-
You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?
Select the funtions of the system you wish to use
-
When tailoring a particular aspect of a system to the way a company does buiness enterprise software can provide the company with
configuration tables
-
In order to achieve maximum benfit from an enterprise software packag a business
Changes the way it works to match the software's business processes
-
Supply chain complexity and scale increases when firms
Produce products and services that coordinate with hundreds or more firms and suppliers
-
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs
-
A network of arganizations and business processes for procuring raw materials transorming these marerials into intermediate and finished products and distributing the finished products to customers is called a
Supply chain
-
Components or parts of finished products are referred to as
Intermediate products
-
A company's supplier's supplier and the processes for managing relationships with them is the
Upstream portion of the supply chain
-
A company's organizations and processes for distributing and delivering products to the final customer is the
Downstream portion of the supply chain
-
Uncertainties arise in any supply chain because of
Unforeseeable events
-
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
Safety stock
-
A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy
Just in time.
-
A distortion of information about the demand for a porduct as it passes from one entity to the next across the supply chain is called the ______ effect
Bullwhip
-
Supply chain software can be classified as either supply chain ______ system or supply chain _______ systems
Upstream, Downstream
-
Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain _______ systems
Planning
-
Supply chain planning systems
Identify the transportation mode to use for product delivery.
-
Which supply chain planning function determines how much product is needed to satisfy all customer demands
Demand planning
-
Supply chain _____ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner
Execution
-
Capabilities of supply chain execution systems would not include
identifying the optimal transportation mode
-
From your reading of the Procter & Gamble case study, the company implemented a multi-echelon inventory optimization systems to achieve which of the main six business objectives?
Operational excellence.
-
A supply chain driven by actual customer orders or purchases follows a ________ model
Pull-based model
-
A build to order supply chain model is also called _______ model
Demand driven
-
Concurrent supply chains are made possible by which technology
Just in time supply chain technologies
-
The business value of an effective supply chain management system includes all of the following except
increased inventory levels
-
A _______ is a method of interaction with a customer, such as a telephone or customer service desk
Touch point
-
Which of the following would not be considered a contact point
Intranet
-
_______ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners
PRM
-
_______ modules deal with issues such as setting objectives employee performance management and performance based compensation
ERM
-
Customer relationship management systems typically provide software and online tools for sales customer service and
Marketing
-
SFA modules in CRM systems would provide tools for
Managing sales prospect and contact information
-
Customer service modules in CRM systems provide tools for
Assigning and managing customer service requests
-
Marketing modules in CRM systems would provide tools for
Identifying profitable and unprofitable customers
-
________ software deals with employee issues that are closely related to CRM such as setting objectives employee performance management performance-besed compensation and employee training
ERM
-
Selling a customer with a checking account a home improvement loan is an example of
Cross-selling
-
_________ management is an important capability for service processes that is found in most major CRM software products
?????
-
Which of the following is an important capability for sales processes that is found in most major CRM software products
Lead management
-
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes __________ applications
Analytical CRM
-
Analytical CRM applications
Are based on data warehouses consolidated form operational CRM applications
-
Operation CRM applications include tools for
Salesforce automation
-
Analyzing customer buying patterns is an example of
Analytical CRM
-
Which metric is based on the relationship between teh revenue produced by and a specific customer the expenses incurred in acquiring and servivcing that customer and the expected life of the relationship between the customer and the company?
CLTV
-
The measurement of the number of customers who stop using or purchasing products or services from a company is called
Churn rate
-
Which fo the following statements about enterprise applications is not true
Enterprise applications are best implemented when few changes in business processes are required.
-
_______ integrate multiple applications from multiple business functions business units or business partners to deliver a seamless experience for customers employee manager or business partner and provide a greater degree of cross functional integration than the traditional enterprise applications
Service platforms
-
Enterprise application vendors have created ________ to make their own customer relationship management supply chain management and enterprise systems work closely together with each other
E business suites
|
|