Chapters 4-8

  1. Software that organizes, manages, and processes business data, such as data concerned withinventory, customers, and vendors, is called:
    Data Management Software
  2. Software that manages the resources of the computer is called:
    System Software
  3. Software used to apply the computer to a specific task for an end user is called:
    Application Software
  4. Legacy systems are still in use today because:
    They are to expensive to redesign
  5. In co-location, a firm:
    Purchases and owns their web server but locates the server in the physical facility of a hosting service.
  6. What would be a reason for using a workstation rather than a personal computer?
    When you need more powerful computational abilities
  7. Which of the following types of computer is used for weather forecasting?puter?
    Supercomputer
  8. Connecting geographically remote computers in a single network to create a .virtual
    supercomputer. is called:
    Grid Computing
  9. The use of multiple computers linked by a communications network for processing is called:(
    Distributed processing
  10. The business case for using grid computing involves all of the following except:
    Centralized maintance
  11. In a multitiered network
    The work of the entire network is balanced over several levels of servers
  12. A client computer networked to a server computer, with processing split between the two types of machinces is called
    Two-tiered client/server architecture.
  13. The primary storage technologies are
    Storage networks, magnetic tape,magnetic disk, and optical disk
  14. Which of the following is a type of optical disk storage
    CD rom
  15. Which of the following storage technology stores data sequentially
    Magnetic disks
  16. A high-speed network dedicated to storage that connects different kids of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers best describes
    SAN
  17. Which of the following is a device used to collect data directly form the environment for input into a computer system
    Sensor
  18. Which of the following is not a type of output device
    Keyboard
  19. The main challenge coming to microsofts office software suite will be
    web based productivity software such as google apps
  20. What type of device gathers data and converts them to electronic form for sure by the computer?
    Input device.
  21. A widget is a
    Small software program that can be added to web pages or placed on the desktop
  22. Microsoft word is an example of
    Word processing software
  23. An industry-wide effort to develop systems that can configure optimize tune and heal themselves when broken and protect themselves from outside intruders and self destruction is called
    Autonomic computing
  24. An example of autonomic computing is
    Virus protection software that runs and updates itself automatically
  25. lunuz places a major role back office operation with _______ of the us server market
    25%
  26. Microsoft excel is an example of
    Spreadsheet software
  27. Which of the following types of computer would you use to support a computer network?
    Server
  28. The interactive multiuser operating system developed by bell laboratories in 1969 to be highly supportive of communications and networking is
    Unix
  29. Which is the most recent windows operating system
    Windows 7
  30. In client/server computing the client is
    The computer that acts as the user point of entry
  31. which of the following is not one of the most important four programming languages for business
    Java
  32. Linux is
    An example of open-source software
  33. Languages that enable a user to make requests using conversational commands resembling human speech are called
    Natural languages
  34. A report generator is a type of
    Fourth generation language
  35. Two categories of fourth generation languages are
    Graphics language and application software package
  36. Which type of software provides more control over text and graphic placement in the layout of a page than word processing software
    Desktop publishing software
  37. A software suite
    Includes full featured versions of application software bundled as a unit
  38. Running a java program on a computer requires
    A java virtual machine to be installed on the computer
  39. Which technology allows a client and server to exchange small pieces of data behind the scene so that an entire web page does not have to be reloaded each time the user requests a chang
    Ajax
  40. What is the foundation technology for web services
    XML
  41. A set of self-contained services that communicate with each other to create a working software application is called
    SOA
  42. Chicagocrim.org which combines google maps with crime data for the city of chicago is an example of
    A mashup
  43. software applications that combine different online software applications are referred to as
    Mashups
  44. To analyze the direct and indirect costs and determine the actual cost of a specific technology implementations you would use
    Total cost of ownership model
  45. All of the following place strain on system capacity except for
    Minimized response time for transaction processing
  46. Which of the following refers to the abilitiy of a computer product or system to expand to serve a larger number of users without breaking down
    Scalability
  47. The concetracting of custom software development to outside firms is commonly referred to as
    Outsourcing
  48. In order to manage their relationship with outsourcer or technology service provider firms need a contract that includes a
    SLA
  49. Which of the following statments in not true about cloud computing
    It removes the concern about data systems security for businesses
  50. Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referrred to as
    Utility computing.
  51. Which of the following is not a true statment about MDM
    It is a quality of data concept that is used to identify a company's most important data
  52. What is the first step you should take in managing data for a firm?
    Identify the data needed to run the business
  53. An example of a predigital database is a
    Library's card catalog
  54. Which of the following best illustrates the relationship between entities and attribures
    The entity CUSTOMER with the attribute ADDRESS
  55. The tyep of logical database model that treats data as if they were stored in two-dimensional tables is the
    relational DBMS
  56. What are the relationships that the relational database is named for
    Relationships between entities
  57. A characteristic or quality describing and entity is called
    attribute
  58. The most basic business database is comprised of
    Five tables: for customers, employees, suppliers, products, and sales
  59. In a table for customers, the information about a single customer would reside in a single
    Row
  60. In a relational database a record is also called a
    Tuple
  61. A field identified in a table as holding the unique identifier of the table's records is called the
    Primary Key
  62. A field identified in a record as holding the unique identifier for that record is called the
    Key Field
  63. A schematic of the entire database that describes the relationships in a datebase is called a
    entity-relationship diagram
  64. A one to one relationship between two entities is symbolized in a diagram by a line that ends
    in two short marks
  65. A one to many relationship between two entities is symoblized in a diagram by a line that ends
    with a crow's foot preceded by a short mark
  66. A table that links two tables that have amny to many relationship is often called a
    intersection relation
  67. the process of streamlining data to minimize redundancy and awkward many to many relationships is called
    normalization
  68. a DBMS make the
    physical database available for different logical views
  69. The logical view of a database
    Presents data as they would be perceived by end users
  70. Which of the following is not a typical deature of DBMS
    Query wizard tool
  71. Oracle database lite is a
    DBMS for small handheld computing devices
  72. Access is a
    DBMS for desktop systems
  73. MySQL is a
    popular open source DBMS
  74. Microsoft SQL server is a
    DBMS for midrange computers
  75. In a relational database the three basic operations used to develop useful sets of data are
    Select project and join
  76. The select operation
    Creates a subset consisting of all records in the file that meets stated criteria
  77. The join operation
    Combines relational tables to provide the user with more information than is otherwise available
  78. The project operation
    Creates a subset consisting of columns in a table
  79. The data dictionary serves as an important data management tool by
    Creating an inventory of data definitions contained in the database.
  80. An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation ownership authorization and security is the
    Data definition diagram
  81. The specialized language programmers use to add and change data in the database is called
    Structured Query Language
  82. The most prominent data manipulation language today is
    Crystal reports
  83. DBMS typically include report generating tools in order to
    Display data in an easier to read format
  84. The type of database management approach that can handle multimedia is the
    Object oriented DBMS
  85. Which of the following database types is useful for storing Java applets as well as handling large number of transactions
    Object relational DBMS
  86. A data warehouse is composed of
    both historical and current data
  87. Which of the following statements about data warehouse is not true
    Data warehouse systems provide a range of ad hoc and standardized query tools analytical tools and graphical reporting facilities
  88. A data mart usually can be constructed more rapidly and at a lower cost than a data warehouse because
    it typically focuses on a single subject area or line of business
  89. tools for consoliddating analyzing and providing access to vast amounts of data to help users make better business decisions are known as
    business intelligence
  90. The tool that enables users to view the same data in different ways using multiple dimensions is
    OLAP
  91. OLAP is a tool for enabling
    Users to obtain online answers to ad hoc questions in a rapid amount of time
  92. Data mining is a tool for allowing users to
    find hidden relationships in data
  93. in terms of the data relationships found by data mining sequences refers to
    events linked over time
  94. In terms of the data relationships found by data mining associations refers to
    occurrences linked to a single event.
  95. An alternative to using application server software for interfacing between a web server and back-end database is
    CGL
  96. Businesses use ______ tools to search and analyze unstructured data sets and such as emails and memos
    Text mining
  97. The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources
    Data redundancy
  98. detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called
    data scrubbing
  99. Which of the following would you use to find patterns in user interaction data recorded by the Web servers
    Web usage mining
  100. Which of the following would you use to find out which websites with content related to database design were the most often linked to by the other web sites?
    Web structure mining
  101. The device that acts as a connection point between computers and can filter and forward data to a specified destination is called
    switch
  102. The internet is based on which three key technologies?
    Client/server computing, packet switching, and the development of communications standards for linking networks and computers.
  103. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called
    Packet switching
  104. The telephone system is an example of a ______ network
    Circuit switched
  105. Which of the following is not a characteristic of a packet switching?
    Packet switching requires point to point circuits
  106. In TCP/IP, IP is responsible for?
    Disassembling and reassembling of packets during transmission
  107. In a telecommunications network architecture a protocol is
    A standard set of rules and procedures for control of communications in a network
  108. What are the four layers of TCP/IP reference model
    Application, transport, internet, and network interface.
  109. Which signal types are represented by continuous waveform
    Analog
  110. To use the analog telephone system for sending digital data you muse also use
    A modem
  111. Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
    Peer to peer
  112. Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
    Campus area network
  113. In a bus network
    Signals are broadcast in both directions to the entire network.
  114. All network components connect to a single hub in a ______ topology
    Star
  115. The most common Ethernet topology is
    Bus
  116. A network that spans a city and sometimes its major suburbs as well is called a
    MAN
  117. A network that covers entire geographical regions is most commonly referred to as a
    Wide area network
  118. Which type of network is used to connect digital devices within half mile or 500 meter radius?
    LAN
  119. ____ works by using radio waves to communicate with radio antennas placed within adjacent geographic areas
    Cell Phones
  120. Bandwidth is the
    Difference between the highest and lowest frequencies that can be accommodated on a single channel
  121. The total amount of digital information that can be transmitted through any telecommunications medium is measured in
    BPS
  122. Digital subscriber lines
    operate over existing telephone lines to carry voice data and video
  123. Which protocol is the internet based on
    TCP/IP
  124. What service converts IP addresses into more recognizable alphanumeric names?
    DNS
  125. the child domain of the root is the
    Top level domain
  126. In the domain name http://myspace.blogging.com what are the root, top level, second level, and third level domains respectively?
    ".", com, blogging, myspace
  127. Which organization helps define the overall structure of the internet
    IAB
  128. IPv6 is being developed in order to
    Create more IP addresses
  129. Which of the following services enables logging on to one computer system and working on another?
    FTP
  130. Instant messaging is a type of _____ service
    Chat
  131. T lines
    Are high speed leased data lines providing guaranteed service levels
  132. The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies
    need to base their Internet use policies on the needs of the organization and culture
  133. ______ Integrates disparate channels for voice communications data communications instant messaging email and electronic conferencing into a single experience
    Unified communications
  134. A VPN
    Is an encrypted private network configured within a public network
  135. Web browser software requests web pages form the internet using which protocol
    HTTP
  136. Together a protocol prefix a domain name a directory path and a document name are called a
    Uniform resource locator
  137. The most common web server today controlling 46 percent of the market is
    Apache HTTP server
  138. What technology allows people to have content pulled from the web sites and fed automatically to their computers
    RSS
  139. The process of employing techniques to help a web site achieve a higher ranking with the major search engines is called
    SEO
  140. Which of the following statements is not true about search engines?
    There are hundreds of search engines vying for user attention with no clear leader having yet emerged.
  141. Which fo the following is the first generation of cellular systems suitable for wireless broadband internet access?
    3G
  142. CDMA
    transmits over several frequencies
  143. The most appropriate wireless networking standard for creating PANs is
    I-mode
  144. Bluetooth can be used to link up to _________ devices within a 10 meter area using low power radio based communications
    Eight
  145. the wi-fi 802.11a standard can transmit up to
    54 Mbps in the 5-GHz frequency range
  146. one or more access points positioned on a ceiling wall or other strategic spot in public places to provide maximum wireless coverage for a specific area are referred to as
    hotspots
  147. The IEEE standard for the WiMax is
    IEEE802.16
  148. The WiMax standard can transmit up to a distance of apporiximately
    30 miles
  149. Passive RFID tags
    Have a range of several feet.
  150. Based on your reading of the examples in the cahpter, what would the best use of RFID for a business?
    Logging tansactions
  151. ______ refers to policies procedures and technical measures used to prevent unauthorized access alternation theft or physical damage to information systems
    "Security"
  152. ______ refers to all of the mehtods policies and organizational procedures that ensure the safety of the organization's assets the accuracy and reliability of its accounting records and operational adherence to management standards
    Controls
  153. Large amounts of data stored in electronic form are _____ than the same data in manual form
    Vulnerable to many more kinds of threats
  154. Electronic data are more susceptible to destruction fraud error and misuse because information systems concentrate data in computer files that
    have the potential to be accessed by large numbers of people and by groups outside of the organizations
  155. Specific security challenges that threaten the communications lines in a client/server environment include
    tapping sniffing message alteration radiation
  156. Specific security challenges that threaten clients in a client/server environment include
    unauthorized access errors spyware
  157. specific security challenges that threaten corporate servers in a client/server environment include
    hacking vandalism denial of service attacks
  158. The internet poses specific security problems because
    it was designed to be easily accessible.
  159. Which of the following statements about the internet security is not true
    VoIP is more secure than switched voice network
  160. An independent computer program that copies itsefl form one computer to another over a network is called
    worm
  161. A salesperson clicks repeatedly on the online ads of competitors in order to drive the competitors advertising cost up this is an example of
    spoofing
  162. In 2004 ICQ users were enticed by a sales message from a supposed anti virus vendor. on the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
    Trojan Horse
  163. Redirecting a web link to a different address is a form of
    spoofing
  164. a keylogger is a type of
    spyware
  165. hackers create a botnet by
    by causing other people's computers to become "zombie" PCs following a master computer
  166. Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack
    DDoS
  167. Which of the following is not an example of a computer use as a target of crime.
    Illegally accessing stored electronic communication
  168. Which of the following is not an example of a computer use as an instrument of crime?
    Breaching the confidentiality of protected computerized data.
  169. Phishing is a form of
    Spoofing
  170. An example of phishing is
    Setting up a fake medical web site that asks users for confidential information
  171. Evil twins are
    Bogus wireless network access points that look legitimate to users
  172. Pharming involves
    Redirecting users to a fraudulent web site even when the user has type in the correct address in the web browser
  173. You have been hired as a security consultant for a low firm. Which of the following constitutes the greatest source of security threats to the firm?
    Employees
  174. Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
    Social engineering
  175. How do software vendors correct flaws in their software after it has been distributed
    Issue patches
  176. The HIPAA act of 1997
    outlines medical security and privacy rules.
  177. The gramm leach bliley act
    Requires financial institutions to ensure the security of customer data
  178. The sarbanes oxley act
    Imposes responsibility on companies and management to safegaurd the accuracy of financial information
  179. The most common type of electronic evidence is
    Email
  180. Electronic evidence on computer storage media that is not visible to the average user is called ________ data
    Ambient
  181. Application controls
    Can be classified as input controls, processing controls, and output controls
  182. _______ conrtols ensure that valuable business data files on either disk or tape are not subject to unauthorized access change or destruction while they are in use or in storage
    Data security
  183. Analysis of the information system that rates the likelihood of a security incident occurring and its cost is included in a
    Risk assesment
  184. Statements ranking information risks and identifying security goals are included in a
    Security policy
  185. An analysis of the firm's most critical systems and the impact a system's outage would have on teh business is included in a
    business impact analysis
  186. Rigorous password systems
    May hinder employee productivity
  187. An authentication token is a
    Device the size of a crdit card that contains access permission data
  188. Biometric authentication
    only uses physical measurement for identification
  189. A firewall allows the organization to
    Enforce a security policy on traffic between its network and the Internet
  190. In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver
    Intrusion detection system
  191. ________ use scanning software to look for known problems such as bad passwords the removal of important files, security attacks in progress, and system administration errors
    Intrusion detection systems
  192. Currently, the protocols used for secure information transfer over the Internet are
    HTTP and TCP/IP
  193. Most antivirus software is effective against
    Only those viruses already known when the software is written
  194. In which method of encryption is a single enxryption key sent to the receiver so both sender and receiver share the same key
    Symmetric key encryption
  195. A digital certificate system
    Uses third party CAs to validate a user's identity
  196. Downtime refers to periods of time in which a
    Computer system is not operational
  197. For 100% availability, online transaction processing requires
    Fault-tolerant computer systems
  198. In controlling network traffic to minimize slow-downs a technology called _____ is used to examine data files and sort low priority data from high priority data
    Deep packet inspection
  199. The development and use of methods to make computer systems resume their activites more quickly after mishaps is called
    Recovery ooriented computing
  200. Smaller firms may outsource some or many security funtions to
    ISPs
  201. From your reading of the severstal case study the firm implemented new information systems in order to achieve which of the main six business objectives?
    Operational excellence
  202. Which of the following is not an example of the next generation enterprise applications
    Solutions incorporating SCM
  203. A suite of intergrated software modules for finance and accounting human resources manufacturing and production and sales and marketing that allows data to be used by multiple funcions and business processes best describes
    ERP systems
  204. Enterprise software is built around thousands of predefined business processes that reflect
    Best practices
  205. Which of the following is not ture about enterprise systems?
    Enterprise software is expressly built to allow companies to mimic their unique business practices
  206. You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?
    Select the funtions of the system you wish to use
  207. When tailoring a particular aspect of a system to the way a company does buiness enterprise software can provide the company with
    configuration tables
  208. In order to achieve maximum benfit from an enterprise software packag a business
    Changes the way it works to match the software's business processes
  209. Supply chain complexity and scale increases when firms
    Produce products and services that coordinate with hundreds or more firms and suppliers
  210. Why is overstocking warehouses not an effective solution for a problem of low availability?
    It increases inventory costs
  211. A network of arganizations and business processes for procuring raw materials transorming these marerials into intermediate and finished products and distributing the finished products to customers is called a
    Supply chain
  212. Components or parts of finished products are referred to as
    Intermediate products
  213. A company's supplier's supplier and the processes for managing relationships with them is the
    Upstream portion of the supply chain
  214. A company's organizations and processes for distributing and delivering products to the final customer is the
    Downstream portion of the supply chain
  215. Uncertainties arise in any supply chain because of
    Unforeseeable events
  216. Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
    Safety stock
  217. A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy
    Just in time.
  218. A distortion of information about the demand for a porduct as it passes from one entity to the next across the supply chain is called the ______ effect
    Bullwhip
  219. Supply chain software can be classified as either supply chain ______ system or supply chain _______ systems
    Upstream, Downstream
  220. Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain _______ systems
    Planning
  221. Supply chain planning systems
    Identify the transportation mode to use for product delivery.
  222. Which supply chain planning function determines how much product is needed to satisfy all customer demands
    Demand planning
  223. Supply chain _____ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner
    Execution
  224. Capabilities of supply chain execution systems would not include
    identifying the optimal transportation mode
  225. From your reading of the Procter & Gamble case study, the company implemented a multi-echelon inventory optimization systems to achieve which of the main six business objectives?
    Operational excellence.
  226. A supply chain driven by actual customer orders or purchases follows a ________ model
    Pull-based model
  227. A build to order supply chain model is also called _______ model
    Demand driven
  228. Concurrent supply chains are made possible by which technology
    Just in time supply chain technologies
  229. The business value of an effective supply chain management system includes all of the following except
    increased inventory levels
  230. A _______ is a method of interaction with a customer, such as a telephone or customer service desk
    Touch point
  231. Which of the following would not be considered a contact point
    Intranet
  232. _______ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners
    PRM
  233. _______ modules deal with issues such as setting objectives employee performance management and performance based compensation
    ERM
  234. Customer relationship management systems typically provide software and online tools for sales customer service and
    Marketing
  235. SFA modules in CRM systems would provide tools for
    Managing sales prospect and contact information
  236. Customer service modules in CRM systems provide tools for
    Assigning and managing customer service requests
  237. Marketing modules in CRM systems would provide tools for
    Identifying profitable and unprofitable customers
  238. ________ software deals with employee issues that are closely related to CRM such as setting objectives employee performance management performance-besed compensation and employee training
    ERM
  239. Selling a customer with a checking account a home improvement loan is an example of
    Cross-selling
  240. _________ management is an important capability for service processes that is found in most major CRM software products
    ?????
  241. Which of the following is an important capability for sales processes that is found in most major CRM software products
    Lead management
  242. Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes __________ applications
    Analytical CRM
  243. Analytical CRM applications
    Are based on data warehouses consolidated form operational CRM applications
  244. Operation CRM applications include tools for
    Salesforce automation
  245. Analyzing customer buying patterns is an example of
    Analytical CRM
  246. Which metric is based on the relationship between teh revenue produced by and a specific customer the expenses incurred in acquiring and servivcing that customer and the expected life of the relationship between the customer and the company?
    CLTV
  247. The measurement of the number of customers who stop using or purchasing products or services from a company is called
    Churn rate
  248. Which fo the following statements about enterprise applications is not true
    Enterprise applications are best implemented when few changes in business processes are required.
  249. _______ integrate multiple applications from multiple business functions business units or business partners to deliver a seamless experience for customers employee manager or business partner and provide a greater degree of cross functional integration than the traditional enterprise applications
    Service platforms
  250. Enterprise application vendors have created ________ to make their own customer relationship management supply chain management and enterprise systems work closely together with each other
    E business suites
Author
Njadwin
ID
47837
Card Set
Chapters 4-8
Description
Blahb
Updated