How can we help?

You can also find more resources in our Help Center.

268 terms

isys exam2

STUDY
PLAY
Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called:
Data Management Software
Software that manages the resources of the computer is called:
System Software
Software used to apply the computer to a specific task for an end user is called:
Application Software
Legacy systems are still in use today because:
They are to expensive to redesign
In co-location, a firm:
Purchases and owns their web server but locates the server in the physical facility of a hosting service
What would be a reason for using a workstation rather than a personal computer?
When you need more powerful computational abilities
7. Which of the following types of computer is used for weather forecasting?puter?
Supercomputer
Connecting geographically remote computers in a single network to create a virtual supercomputer is called:
Grid Computing
The use of multiple computers linked by a communications network for processing is called:
Distributed processing
The business case for using grid computing involves all of the following except:
Centralized maintance
In a multitiered network
The work of the entire network is balanced over several levels of servers
A client computer networked to a server computer, with processing split between the two types of machinces is called
Two-tiered client/server architecture
The primary storage technologies are
Storage networks, magnetic tape,magnetic disk, and optical disk
Which of the following is a type of optical disk storage
CD rom
Which of the following storage technology stores data sequentially
Magnetic disks
A high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers best describes
SAN
Which of the following is a device used to collect data directly form the environment for input into a computer system
Sensor
Which of the following is not a type of output device
Keyboard
The main challenge coming to microsofts office software suite will be
web based productivity software such as google apps
What type of device gathers data and converts them to electronic form for sure by the computer?
Input device
A widget is a
Small software program that can be added to web pages or placed on the desktop
Microsoft word is an example of
Word processing software
An industry-wide effort to develop systems that can configure optimize tune and heal themselves when broken and protect themselves from outside intruders and self destruction is called
Autonomic computing
An example of autonomic computing is
Virus protection software that runs and updates itself automatically
lunuz places a major role back office operation with _______ of the us server market
25%
Microsoft excel is an example of
Spreadsheet software
Which of the following types of computer would you use to support a computer network?
Server
The interactive multiuser operating system developed by bell laboratories in 1969 to be highly supportive of communications and networking is
Unix
Which is the most recent windows operating system
Windows 7
In client/server computing the client is
The computer that acts as the user point of entry
which of the following is not one of the most important four programming languages for business
Java
Linux is
An example of open-source software
Languages that enable a user to make requests using conversational commands resembling human speech are called
Natural languages
A report generator is a type of
Fourth generation language
Two categories of fourth generation languages are
Graphics language and application software package
Which type of software provides more control over text and graphic placement in the layout of a page than word processing software
Desktop publishing software
A software suite
Includes full featured versions of application software bundled as a unit
Running a java program on a computer requires
A java virtual machine to be installed on the computer
Which technology allows a client and server to exchange small pieces of data behind the scene so that an entire web page does not have to be reloaded each time the user requests a change
Ajax
What is the foundation technology for web services
XML
A set of self-contained services that communicate with each other to create a working software application is called
SOA
Chicagocrim.org which combines google maps with crime data for the city of chicago is an example of
A mashup
software applications that combine different online software applications are referred to as
Mashups
To analyze the direct and indirect costs and determine the actual cost of a specific technology implementations you would use
Total cost of ownership model
All of the following place strain on system capacity except for
Minimized response time for transaction processing
Which of the following refers to the abilitiy of a computer product or system to expand to serve a larger number of users without breaking down
Scalability
The concetracting of custom software development to outside firms is commonly referred to as
Outsourcing
In order to manage their relationship with outsourcer or technology service provider firms need a contract that includes a
SLA
Which of the following statments in not true about cloud computing
It removes the concern about data systems security for businesses
Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referrred to as
Utility computing.
Which of the following is not a true statment about MDM
It is a quality of data concept that is used to identify a company's most important data
What is the first step you should take in managing data for a firm?
Identify the data needed to run the business
An example of a predigital database is a
Library's card catalog
Which of the following best illustrates the relationship between entities and attribures
The entity CUSTOMER with the attribute ADDRESS
The type of logical database model that treats data as if they were stored in two-dimensional tables is the
relational DBMS
What are the relationships that the relational database is named for
Relationships between entities
A characteristic or quality describing and entity is called
attribute
The most basic business database is comprised of
Five tables: for customers, employees, suppliers, products, and sales
In a table for customers, the information about a single customer would reside in a single
Row
In a relational database a record is also called a
Tuple
A field identified in a table as holding the unique identifier of the table's records is called the
key field
A field identified in a record as holding the unique identifier for that record is called the
Key Field
A schematic of the entire database that describes the relationships in a datebase is called a
entity-relationship diagram
A one to one relationship between two entities is symbolized in a diagram by a line that ends
in two short marks
A one to many relationship between two entities is symoblized in a diagram by a line that ends
with a crow's foot preceded by a short mark
A table that links two tables that have many to many relationship is often called a
intersection relation
the process of streamlining data to minimize redundancy and awkward many to many relationships is called
normalization
a DBMS make the
physical database available for different logical views
The logical view of a database
Presents data as they would be perceived by end users
Which of the following is not a typical feature of DBMS
Query wizard tool
Oracle database lite is a
DBMS for small handheld computing devices
Access is a
DBMS for desktop systems
MySQL is a
popular open source DBMS
Microsoft SQL server is a
DBMS for midrange computers
In a relational database the three basic operations used to develop useful sets of data are
Select project and join
The select operation
Creates a subset consisting of all records in the file that meets stated criteria
The join operation
Combines relational tables to provide the user with more information than is otherwise available
The project operation
Creates a subset consisting of columns in a table
The data dictionary serves as an important data management tool by
Creating an inventory of data definitions contained in the database.
An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation ownership authorization and security is the
Data definition diagram
The specialized language programmers use to add and change data in the database is called
Structured Query Language
The most prominent data manipulation language today is
Crystal reports
DBMS typically include report generating tools in order to
Display data in an easier to read format
The type of database management approach that can handle multimedia is the
Object oriented DBMS
Which of the following database types is useful for storing Java applets as well as handling large number of transactions
Object relational DBMS
A data warehouse is composed of
both historical and current data
Which of the following statements about data warehouse is not true
Data warehouse systems provide a range of ad hoc and standardized query tools analytical tools and graphical reporting facilities
A data mart usually can be constructed more rapidly and at a lower cost than a data warehouse because
it typically focuses on a single subject area or line of business
tools for consoliddating analyzing and providing access to vast amounts of data to help users make better business decisions are known as
business intelligence
The tool that enables users to view the same data in different ways using multiple dimensions is
OLAP
OLAP is a tool for enabling
Users to obtain online answers to ad hoc questions in a rapid amount of time
Data mining is a tool for allowing users to
find hidden relationships in data
in terms of the data relationships found by data mining sequences refers to
events linked over time
In terms of the data relationships found by data mining associations refers to
occurrences linked to a single event.
An alternative to using application server software for interfacing between a web server and back-end database is
CGL
Businesses use ______ tools to search and analyze unstructured data sets and such as emails and memos
Text mining
The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources
Data redundancy
detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called
data scrubbing
Which of the following would you use to find patterns in user interaction data recorded by the Web servers
Web usage mining
Which of the following would you use to find out which websites with content related to database design were the most often linked to by the other web sites?
Web structure mining
The device that acts as a connection point between computers and can filter and forward data to a specified destination is called
switch
The internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers.
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called
Packet switching
The telephone system is an example of a ______ network
Circuit switched
Which of the following is not a characteristic of a packet switching?
Packet switching requires point to point circuits
In TCP/IP, IP is responsible for?
Disassembling and reassembling of packets during transmission
In a telecommunications network architecture a protocol is
A standard set of rules and procedures for control of communications in a network
What are the four layers of TCP/IP reference model
Application, transport, internet, and network interface.
Which signal types are represented by continuous waveform
Analog
To use the analog telephone system for sending digital data you muse also use
A modem
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Peer to peer
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
Campus area network
In a bus network
Signals are broadcast in both directions to the entire network.
All network components connect to a single hub in a ______ topology
Star
The most common Ethernet topology is
Bus
A network that spans a city and sometimes its major suburbs as well is called a
MAN
A network that covers entire geographical regions is most commonly referred to as a
Wide area network
Which type of network is used to connect digital devices within half mile or 500 meter radius?
LAN
____ works by using radio waves to communicate with radio antennas placed within adjacent geographic areas
Cell Phones
Bandwidth is the
Difference between the highest and lowest frequencies that can be accommodated on a single channel
The total amount of digital information that can be transmitted through any telecommunications medium is measured in
BPS
Digital subscriber lines
operate over existing telephone lines to carry voice data and video
Which protocol is the internet based on
TCP/IP
What service converts IP addresses into more recognizable alphanumeric names?
DNS
the child domain of the root is the
Top level domain
In the domain name http://myspace.blogging.com what are the root, top level, second level, and third level domains respectively?
".", com, blogging, myspace
Which organization helps define the overall structure of the internet
IAB
IPv6 is being developed in order to
Create more IP addresses
Which of the following services enables logging on to one computer system and working on another?
FTP
Instant messaging is a type of _____ service
Chat
T lines
Are high speed leased data lines providing guaranteed service levels
The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies
need to base their Internet use policies on the needs of the organization and culture
______ Integrates disparate channels for voice communications data communications instant messaging email and electronic conferencing into a single experience
Unified communications
A VPN
Is an encrypted private network configured within a public network
Web browser software requests web pages form the internet using which protocol
HTTP
Together a protocol prefix a domain name a directory path and a document name are called a
Uniform resource locator
The most common web server today controlling 46 percent of the market is
Apache HTTP server
What technology allows people to have content pulled from the web sites and fed automatically to their computers
RSS
The process of employing techniques to help a web site achieve a higher ranking with the major search engines is called
SEO
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention with no clear leader having yet emerged.
Which fo the following is the first generation of cellular systems suitable for wireless broadband internet access?
3G
CDMA
transmits over several frequencies
The most appropriate wireless networking standard for creating PANs is
I-mode
Bluetooth can be used to link up to _________ devices within a 10 meter area using low power radio based communications
Eight
the wi-fi 802.11a standard can transmit up to
54 Mbps in the 5-GHz frequency range
one or more access points positioned on a ceiling wall or other strategic spot in public places to provide maximum wireless coverage for a specific area are referred to as
hotspots
The IEEE standard for the WiMax is
IEEE802.16
The WiMax standard can transmit up to a distance of apporiximately
30 miles
Passive RFID tags
Have a range of several feet.
Based on your reading of the examples in the cahpter, what would the best use of RFID for a business?
Logging tansactions
______ refers to policies procedures and technical measures used to prevent unauthorized access alternation theft or physical damage to information systems
"Security"
______ refers to all of the mehtods policies and organizational procedures that ensure the safety of the organization's assets the accuracy and reliability of its accounting records and operational adherence to management standards
Controls
Large amounts of data stored in electronic form are _____ than the same data in manual form
Vulnerable to many more kinds of threats
Electronic data are more susceptible to destruction fraud error and misuse because information systems concentrate data in computer files that
have the potential to be accessed by large numbers of people and by groups outside of the organizations
Specific security challenges that threaten the communications lines in a client/server environment include
tapping sniffing message alteration radiation
Specific security challenges that threaten clients in a client/server environment include
unauthorized access errors spyware
specific security challenges that threaten corporate servers in a client/server environment include
hacking vandalism denial of service attacks
The internet poses specific security problems because
it was designed to be easily accessible.
Which of the following statements about the internet security is not true
VoIP is more secure than switched voice network
An independent computer program that copies itsefl form one computer to another over a network is called
worm
A salesperson clicks repeatedly on the online ads of competitors in order to drive the competitors advertising cost up this is an example of
click fraud
In 2004 ICQ users were enticed by a sales message from a supposed anti virus vendor. on the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of?
Trojan Horse
Redirecting a web link to a different address is a form of
spoofing
a keylogger is a type of
spyware
hackers create a botnet by
by causing other people's computers to become "zombie" PCs following a master computer
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack
DDoS
Which of the following is not an example of a computer use as a target of crime.
Illegally accessing stored electronic communication
Which of the following is not an example of a computer use as an instrument of crime?
Breaching the confidentiality of protected computerized data.
Phishing is a form of
Spoofing
An example of phishing is
Setting up a fake medical web site that asks users for confidential information
Evil twins are
Bogus wireless network access points that look legitimate to users
Pharming involves
Redirecting users to a fraudulent web site even when the user has type in the correct address in the web browser
You have been hired as a security consultant for a low firm. Which of the following constitutes the greatest source of security threats to the firm?
Employees
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
Social engineering
How do software vendors correct flaws in their software after it has been distributed
Issue patches
The HIPAA act of 1997
outlines medical security and privacy rules.
The gramm leach bliley act
Requires financial institutions to ensure the security of customer data
The sarbanes oxley act
Imposes responsibility on companies and management to safegaurd the accuracy of financial information
The most common type of electronic evidence is
Email
Electronic evidence on computer storage media that is not visible to the average user is called ________ data
Ambient
Application controls
Can be classified as input controls, processing controls, and output controls
_______ conrtols ensure that valuable business data files on either disk or tape are not subject to unauthorized access change or destruction while they are in use or in storage
Data security
Analysis of the information system that rates the likelihood of a security incident occurring and its cost is included in a
Risk assesment
Statements ranking information risks and identifying security goals are included in a
Security policy
An analysis of the firm's most critical systems and the impact a system's outage would have on teh business is included in a
business impact analysis
Rigorous password systems
May hinder employee productivity
An authentication token is a
Device the size of a crdit card that contains access permission data
Biometric authentication
only uses physical measurement for identification
A firewall allows the organization to
Enforce a security policy on traffic between its network and the Internet
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver
Intrusion detection system
________ use scanning software to look for known problems such as bad passwords the removal of important files, security attacks in progress, and system administration errors
Intrusion detection systems
Currently, the protocols used for secure information transfer over the Internet are
HTTP and TCP/IP
Most antivirus software is effective against
Only those viruses already known when the software is written
In which method of encryption is a single enxryption key sent to the receiver so both sender and receiver share the same key
Symmetric key encryption
A digital certificate system
Uses third party CAs to validate a user's identity
Downtime refers to periods of time in which a
Computer system is not operational
For 100% availability, online transaction processing requires
Fault-tolerant computer systems
In controlling network traffic to minimize slow-downs a technology called _____ is used to examine data files and sort low priority data from high priority data
Deep packet inspection
The development and use of methods to make computer systems resume their activites more quickly after mishaps is called
Recovery ooriented computing
Smaller firms may outsource some or many security funtions to
ISPs
From your reading of the severstal case study the firm implemented new information systems in order to achieve which of the main six business objectives?
Operational excellence
Which of the following is not an example of the next generation enterprise applications
Solutions incorporating SCM
A suite of intergrated software modules for finance and accounting human resources manufacturing and production and sales and marketing that allows data to be used by multiple funcions and business processes best describes
ERP systems
Enterprise software is built around thousands of predefined business processes that reflect
Best practices
Which of the following is not ture about enterprise systems?
Enterprise software is expressly built to allow companies to mimic their unique business practices
You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?
Select the funtions of the system you wish to use
When tailoring a particular aspect of a system to the way a company does buiness enterprise software can provide the company with
configuration tables
In order to achieve maximum benfit from an enterprise software packag a business
Changes the way it works to match the software's business processes
Supply chain complexity and scale increases when firms
Produce products and services that coordinate with hundreds or more firms and suppliers
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs
A network of arganizations and business processes for procuring raw materials transorming these marerials into intermediate and finished products and distributing the finished products to customers is called a
Supply chain
Components or parts of finished products are referred to as
Intermediate products
A company's supplier's supplier and the processes for managing relationships with them is the
Upstream portion of the supply chain
A company's organizations and processes for distributing and delivering products to the final customer is the
Downstream portion of the supply chain
Uncertainties arise in any supply chain because of
Unforeseeable events
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
Safety stock
A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy
Just in time
A distortion of information about the demand for a porduct as it passes from one entity to the next across the supply chain is called the ______ effect
Bullwhip
Supply chain software can be classified as either supply chain ______ system or supply chain _______ systems
Upstream, Downstream
Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product best describes supply chain _______ systems
Planning
Supply chain planning systems
Identify the transportation mode to use for product delivery.
Which supply chain planning function determines how much product is needed to satisfy all customer demands
Demand planning
Supply chain _____ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner
Execution
Capabilities of supply chain execution systems would not include
identifying the optimal transportation mode
From your reading of the Procter & Gamble case study, the company implemented a multi-echelon inventory optimization systems to achieve which of the main six business objectives?
Operational excellence.
A supply chain driven by actual customer orders or purchases follows a ________ model
Pull-based model
A build to order supply chain model is also called _______ model
Demand driven
Concurrent supply chains are made possible by which technology
Just in time supply chain technologies
The business value of an effective supply chain management system includes all of the following except
increased inventory levels
A _______ is a method of interaction with a customer, such as a telephone or customer service desk
Touch point
Which of the following would not be considered a contact point
Intranet
_______ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners
PRM
_______ modules deal with issues such as setting objectives employee performance management and performance based compensation
ERM
Customer relationship management systems typically provide software and online tools for sales customer service and
Marketing
SFA modules in CRM systems would provide tools for
Managing sales prospect and contact information
Customer service modules in CRM systems provide tools for
Assigning and managing customer service requests
Marketing modules in CRM systems would provide tools for
Identifying profitable and unprofitable customers
________ software deals with employee issues that are closely related to CRM such as setting objectives employee performance management performance-besed compensation and employee training
ERM
Selling a customer with a checking account a home improvement loan is an example of
Cross-selling
Which of the following is an important capability for sales processes that is found in most major CRM software products
Lead management
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes __________ applications
Analytical CRM
Analytical CRM applications
Are based on data warehouses consolidated form operational CRM applications
Operational CRM applications include tools for
Salesforce automation
Analyzing customer buying patterns is an example of
Analytical CRM
Which metric is based on the relationship between teh revenue produced by and a specific customer the expenses incurred in acquiring and servivcing that customer and the expected life of the relationship between the customer and the company?
CLTV
The measurement of the number of customers who stop using or purchasing products or services from a company is called
Churn rate
Which fo the following statements about enterprise applications is not true
Enterprise applications are best implemented when few changes in business processes are required.
_______ integrate multiple applications from multiple business functions business units or business partners to deliver a seamless experience for customers employee manager or business partner and provide a greater degree of cross functional integration than the traditional enterprise applications
Service platforms
Enterprise application vendors have created ________ to make their own customer relationship management supply chain management and enterprise systems work closely together with each other
E business suites
system testing:
tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned
Hardware and software are acquired and installed in the _____ of the traditional SDLC life cycle.
implementation
When systems are created rapidly, without a formal development methodology
testing and documentation may be inadequate
___ an ERP system during the implementation increases the cost of the system and increases the implementation risks.
Modifying
A strong commitment from ___ is critical for the success of an ERP system.
management
You have been hired by a pharmaceutical company to evaluate its portfolio of systems
High-risk, low benefit projects.
Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed:
maintenance
For ERP implementations, it is best if the ___ is composed of people with a wide variety of IT and business skills.
development team
If an organization's requirements conflict with the software package chosen and the package cannot be customized, the organization will have to:
change its procedures
In the traditional ERP life cycle a gap analysis should be conducted in the ___ stage.
analysis and design
Users prefer systems that:
are oriented to facilitating organizational tasks and solving business problems.
An organization must first do a ___ to help narrow down the ERP vendors to a select few.
needs assessment
The process of creating workable information systems in a very short period of time is called:
RAD
___ provides software tools to automate development methodologies and reduce the amount of repetitive work in systems development.
CASE
Unit testing:
a tests each individual program separately
An ERP architecture consist of both a physical architecture and a(n):
logical architecture
You are an IT project manager for an advertising firm. The firm wishes to create an online survey tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project?
Prototyping
In the ___ phase of the traditional SDLC, the team should do a thorough analysis of the costs and benefits of the proposed system.
investigation
ERP system implementation failures are often caused by lack of attention to the business processes and the ___ components.
people