Question Details

[answered] 1. 1. QUESTION 1 What is the process of analyzing data to i


80 multiply choices about management information system


1. 1. QUESTION 1

 

What is the process of analyzing data to identify trends, patterns, and other useful

 

information?

 

A. Data mining

 

B. Digging agent C.

 

D. Database

 

modeling

 

Querying E. Clustering QUESTION 2

 

Which of the following is basically the acquisition of software via a subscription

 

model?

 

A. BPaaS

 

B. SaaS C. PaaS D. IaaS E. Virtualization QUESTION 3

 

1.

 

Each computer attached to a network or the Internet has a unique address called

 

a(n) ________.

 

A. IP address

 

B. local address C. network address D. PC address E. Internet address QUESTION 4

 

1.

 

What are cookies?

 

A. Small text files that store information

 

B. Review IP address to track online browsing C. Hidden application to record keystrokes D. Malware designed to slow down your PC E. 1. 1. QUESTION 5

 

When you click on a ___________ on your university?s homepage, your browser

 

sends a request to the Web server that houses the requested page.

 

A. HTTP

 

B. hyperlink C. desktop D. server E. protocol QUESTION 6

 

What is the main difference between the initial set of web applications and Web 2.0?

 

A. interactivity 10. 11. 1. Program offered by an organization which post rules B. speed C. bandwidth

 

requirements D. software

 

requirements E. technology QUESTION 7

 

The fastest transmission speeds on cables for a wired network are ______________,

 

while ___________ are the slowest.

 

A. coaxial, fiber

 

B. fiber, copper C. copper, coaxial 1. D. copper, fiber E. fiber, coaxial QUESTION 8

 

When considering security threats it is very important to consider __________ and

 

__________ of the threat on the organization.

 

impact, theft prevalence, impact

 

repudiation, availability

 

authenticity, availability

 

theft, prevalence 1. QUESTION 9

 

Which phase of SDLC begins the process?

 

Requirements Planning

 

Development

 

Implementation

 

Maintenance 1. QUESTION 10

 

Encryption is not only used to protect data transmissions, but it can also be used to:

 

lock out users protect data on servers

 

identify viruses update email

 

take photographs 1. QUESTION 11

 

In contrast to ________, ERP applications make accessing information easier by

 

providing a central information repository.

 

legacy systems custom applications

 

off the shelf applications

 

data warehouses

 

database management systems

 

QUESTION 12

 

1.

 

What is one of the core characteristics of the Internet that has contributed to its

 

rapid growth?

 

interoperability addressing

 

Internet Protocol

 

IPv4

 

fiber optics 1. QUESTION 13

 

Biometrics are primarily used for one of two things. What are they?

 

Authentication, identification Non-repudiation, authentication

 

Fingerprint recognition, iris recognition

 

Account access, recognition

 

User rights, printing services

 

QUESTION 14 1. What type of architecture can be used in different systems with different technology

 

platforms?

 

A. Service Oriented Architecture

 

B. peer-to-peer C. Software as a Service (SaaS) D. Intranet E. VPN QUESTION 15

 

1.

 

What is the process of identifying, assessing and prioritizing the security risks an

 

organization may face?

 

Risk management Virus Risk

 

Wi-Fi Protected Access

 

Security

 

Preventative Controls 1 QUESTION 16

 

1.

 

An important B2C enabler that allows for users that use a wide variety of platforms

 

to access businesses that also use different platforms is:

 

Interoperability OS specific

 

Platform based

 

Bandwidth

 

E-business QUESTION 17

 

1.

 

What do the operational components of a CRM accomplish? Improve day to day interactions with customers

 

Lower overall cost of production

 

Identify customer preferences

 

Automate customer responses

 

Determine product location 1. QUESTION 18

 

What type of decision is routine and repetitive and often has well-defined

 

procedures for dealing with them?

 

Unstructured Structured

 

Semi-structured

 

Unusual

 

Control 1 points QUESTION 19

 

1.

 

If a virus is embedded in a legitimate file, they are often called a(n)__________.

 

worm Trojan horse

 

hack

 

theft

 

active content QUESTION 20 1. The AARP, an organization that caters towards people over the age of 50, uses its

 

members? information to place them into very small groups for the purpose of identifying

 

marketing opportunities. This is an example of what?

 

Customer profiling

 

Customer segmentation

 

Customer grouping

 

Client profiling

 

Client segmentation QUESTION 21

 

1.

 

In order for you to enter the server room at your office you must have a key to the

 

room, and then you must have a proper user name and password to access the server. All of

 

the student files on the server are encrypted. What is this called?

 

Layered security Overkill

 

Defense in depth

 

Organizational policy

 

Information security 1. QUESTION 22

 

When verifying that the solution solves the problem at hand, you must be sure that

 

the alternative meets all __________ and best meets the _________.

 

requirements, goals requirements, needs

 

goals, wants

 

solutions, vision

 

problem, definition 1. QUESTION 23

 

When you shop online, what is an indication that the transaction is secure?

 

http:// https://

 

ftp://

 

smtp

 

POP3 1. QUESTION 24

 

Cloud computing allows organizations to rent computing resources from providers

 

instead of having their own locally managed __________ and __________.

 

hardware, software hardware, human resources

 

network, software

 

Web 2.0, Web 3.0

 

websites, servers 1. QUESTION 25

 

In February of 2011 the Internet Assigned Number Authority (IANA) assigned the last

 

block of IPv4 addresses. What is the new address standard?

 

IPv5 IPv6

 

MAC address

 

DARPA virtual address QUESTION 26

 

1.

 

When considering decision making techniques/tools, which tool requires you to

 

evaluate each alternative against all other alternatives?

 

Pros/cons analysis Paired comparison

 

Deep research

 

Decision Criteria

 

Requirements QUESTION 27

 

1.

 

What allows one physical device such as a server or computer to operate as if it was

 

several machines?

 

Software as a Service Service Oriented Architecture

 

virtualization

 

Web 2.0

 

unified communications QUESTION 28

 

1.

 

Which of the provides a cloud-based platform for running websites and databases

 

and executing programming languages?

 

BPaaS SaaS

 

PaaS IaaS

 

Virtualization 1. QUESTION 29

 

You have been included on an IT task force for your university. The committee?s first

 

priority is wireless access on your campus. The task force chair keeps discussing increasing

 

enrollment numbers. What principle of architecture is the chair most likely alluding to?

 

ease of implementation flexibility

 

control

 

scalability

 

security 1. QUESTION 30

 

After reviewing table after table of data for your marketing research project, you can

 

no longer make much sense of most of the information. What type of tool would be able to

 

help you uncover trends in the data?

 

Dedicated statistical software DBMS

 

Document management software

 

Data visualization software

 

Reporting tools 1. QUESTION 31

 

Methods to improve a site's ranking in search engine results are referred to as:

 

Search engine optimization Search marketing Conversion rate

 

Pay per click

 

Click through ads QUESTION 32

 

1.

 

Auto makers spend a significant amount of time and money developing new

 

automobiles. Often these auto makers create a working mock up for display and testing.

 

What methodology are these automakers using?

 

Prototyping Modeling

 

Maintenance

 

Spiral Model

 

Off the shelf 1. QUESTION 33

 

A connection that uses encryption and other channels to provide a secured channel

 

over an open wire connection is called a(n):

 

smpt network

 

Symmetric network Virtual private network

 

Bridged network

 

Switched network 1. QUESTION 34

 

Transaction Processing Systems (TPS) can make decisions using predetermined rules

 

and processes. This is an example of a(n) _________ decision of a(n) ____________ control.

 

unstructured, operational structured, operational

 

semi-structured, managerial

 

unstructured, managerial

 

structured, strategic 1. QUESTION 35

 

Many cities across the Unites States are considering fiber networks that would

 

connect commercial and residential areas to a single network. This would be what kind of

 

network?

 

LAN PAN

 

WLAN

 

WAN

 

CAN 1. QUESTION 36

 

___________ are used to determine how well each alternative meets a particular

 

goal or requirement.

 

Analysis Comparison

 

Criteria

 

Technique

 

Tool QUESTION 37

 

1.

 

EDI refers to the _______________ sharing of information between two businesses

 

in a standard format. electronic

 

paper

 

classified

 

organized

 

direct QUESTION 38

 

1.

 

Innovators are working on Web 3.0. What type of new technology is expected from

 

Web 3.0?

 

virtualization instant gratification

 

signatures

 

procedures

 

semantics QUESTION 39

 

1.

 

What is the term for a computer or a router that controls access in and out of the

 

organization?s networks, applications, and computers?

 

Switch Bridge

 

Gateway

 

Firewall

 

Hub QUESTION 40 1. ___________ involves making sure that information or data can only be accessed by

 

individuals with authorized access.

 

Integrity

 

Availability

 

Confidentiality

 

Authenticity

 

Non-repudiation 1. QUESTION 41

 

______________ software is software that allows users to access the underlying

 

source code for an application.

 

COTS Custom-built

 

Developed

 

Open source

 

Hybrid 1. QUESTION 42

 

Valerie has decided to purchase her first home. Before she begins looking at houses,

 

she has chosen to review her budget, and has decided on a very specific number that she is

 

comfortable with for her monthly mortgage payment. What kind of analysis has Valerie

 

done?

 

What-if analysis Goal seeking analysis

 

Paired comparison

 

Pros/cons

 

Decision Matrix 1. QUESTION 43

 

Your national office of your student organization has established a Portal for you to

 

track news, memos, and download forms. What kind of system does this most closely

 

describe?

 

Decision support system DBMS

 

Reporting tools

 

Document management tools

 

Paired comparison s QUESTION 44

 

1.

 

A Web merchant wants to ensure that people cannot deny that they entered into a

 

transaction, so they starting using digital signatures and encryption as part of their

 

transaction processing. This is an example of what?

 

Integrity Availability

 

Confidentiality

 

Authenticity

 

Non-repudiation 1 QUESTION 45

 

1.

 

What is a more recent and more powerful encryption algorithm widely available in

 

most routers?

 

WEP WPA

 

https Symmetric encryption

 

Stealth 1. QUESTION 46

 

What is the biggest challenge with ERP systems?

 

Customizing it to the needs of the organization Efficiency of the system

 

Cost of the implementation

 

Customer support

 

Production time lost QUESTION 47

 

1.

 

When registering online for your classes you log onto to a website provided by your

 

university. The computer and web browser that you are using acts as a _________, while the

 

university computer acts as a ___________.

 

client, server server, client

 

computer, server

 

browser, client

 

client, application 1. QUESTION 48

 

The Institutional Research department at your university gathers data on nearly

 

everything on campus. At first the department used spreadsheets to maintain the data, but

 

more sophisticated statistical methods are required for the data. What type of tool does the

 

Institutional Research department likely need?

 

Reporting tools What-if analysis Dedicated statistical software

 

Data visualization software

 

DBMS 1. QUESTION 49

 

What is the second phase of Simon?s Information Systems and Decision model which

 

requires developing alternative approaches to bringing about the required change?

 

Intelligence Design

 

Choice

 

Implementation

 

Knowledge 1. QUESTION 50

 

You step out of your office and miss a telephone call. When you sit at your desk you

 

notice that the voicemail light is blinking on your phone, you have a new email, and you have

 

a transcribed instant message on your computer screen in the form of an Instant Message.

 

Your organization has most likely adopted what type of technology?

 

intranet VPN

 

wireless

 

unified communications

 

Web 3.0 1. QUESTION 51

 

What describes a series of actions that result in an outcome for an actor?

 

Outsourcing Use case

 

Requirements

 

Planning

 

Development 1. QUESTION 52

 

___________ involves making sure that data are consistent and complete.

 

Integrity Availability

 

Confidentiality

 

Authenticity

 

Non-repudiation QUESTION 53

 

1.

 

Strategic planning often involves _____________ decisions because it is very difficult

 

to anticipate the information needs of managers involved in strategic planning.

 

structured flexible

 

controlled

 

strategic

 

unstructured QUESTION 54

 

1.

 

The Internet has been the contributor to a global platform where organizations

 

across the world can compete for customers and gain access to new __________. competitors

 

markets

 

revenues

 

employees

 

Media QUESTION 55

 

1.

 

Using a unique username and a complicated password is one possible method to

 

verify that a user is who they say they are. What type of goal is this?

 

Non-repudiation Authenticity

 

CIA

 

Availability

 

Privileges 1 QUESTION 56

 

1.

 

Which of the following is not a disadvantage of an ERP system?

 

They require an enormous amount of work. They are expensive.

 

It may not work better than the previous system.

 

They may require redesigned business processes.

 

Users may resist implementation. 1. QUESTION 57

 

What kind of threat renders a system inoperative or limits its capability to operate? Denial of service

 

Unauthorized access

 

Theft and fraud

 

Forceful

 

Passive QUESTION 58

 

1.

 

When using your cell phone, what type of transmission are you using?

 

infrared Bluetooth

 

microwave

 

radio

 

cable 1 QUESTION 59

 

1.

 

Search engine results achieved by design and search engine optimization are known

 

as ______.

 

Sponsored links Pay-per-click

 

Keyword bidding

 

Search engine optimization

 

Organic links QUESTION 60 1. You are asked to provide your location and email address when downloading iTunes

 

from the Apple site. You are also prompted to check a box if you would like any Apple News

 

updates. This checkbox allows you to do what?

 

Opt-in

 

Create account

 

Opt-out

 

Enable cookie manager

 

Identify data collection threat QUESTION 61

 

1.

 

What is a primary focus of supply chain management (SCM)?

 

Inventory cost reduction Increased level of customer support

 

Sales tracking

 

Outsourcing manufacturing

 

Unified communication 1 QUESTION 62

 

1.

 

____________ refers to having some level of control over potential secondary uses

 

of one?s personal information.

 

Information privacy Information security

 

Information assurance

 

Data collection threat

 

Accessibility 1. QUESTION 63

 

Which of the following refers to security solutions that protect access to systems,

 

applications, or data by ensuring users or systems are authenticated and allowed to have

 

such access?

 

Physical access controls System access controls

 

User profiles

 

Logical access controls

 

Account management 1. QUESTION 64

 

Which of the following allows companies to pass the operation of their computer

 

systems to another company?

 

BPaaS SaaS

 

PaaS

 

IaaS

 

Virtualization 1. QUESTION 65

 

____________ is when firms are able to maintain the lowest level of inventory while

 

still being able to fulfill demand.

 

Supply Chain Management Inventory flow management

 

Just-in-time inventory

 

Inventory scheduling

 

Inventory capacity management 1. QUESTION 66

 

What is the most critical phase in the detailed decision making process? Identify and clearly define the problem

 

Determine requirements and goals

 

Identify alternatives

 

Define the criteria

 

Select a decision making technique 1. QUESTION 67

 

You have received an email from your university IT department stressing that the IT

 

department will NEVER ask you for your username and password to your email account.

 

What type of scheme is the university most likely trying to protect you from?

 

Phishing Smurfing

 

Spoofing

 

Break-ins

 

Security holes QUESTION 68

 

1.

 

Search engine results where companies pay for placement are known as ______.

 

Sponsored links Pay-per-click

 

Keyword bidding

 

Search engine optimization Organic links QUESTION 69

 

1.

 

As the amount of structure in a decision __________, the need for flexibility

 

__________ .

 

decreases, increases increases, decreases

 

decreases, decreases

 

increases, increases

 

none of the above QUESTION 70

 

1.

 

The systems development committee has chosen to implement the new system in a

 

limited number of sites based on location. What type of integration plan is being

 

implemented here?

 

Direct Changeover Parallel Operation

 

Phased implementation

 

Pilot Operation

 

Use Case 1. QUESTION 71

 

A system that has been accessed illegally is a victim of ___________.

 

theft and fraud unauthorized access

 

careless behavior denial of service

 

automation tools 1. QUESTION 72

 

What term is used to refer to someone (or something) pretending to be someone

 

else (or another computer)?

 

Phishing Spoofing

 

Smurfing

 

Porting

 

Break-in 1. QUESTION 73

 

Privacy of information is the ___________ of the ___________ collected by

 

organizations about the individuals using their services.

 

confidentiality, information collection, data

 

protection, knowledge

 

certification, wisdom

 

privacy, information 1. QUESTION 74

 

Statistical analysis emphasizes ______________ models, while data mining tries to

 

____________ the models.

 

concludes, organize preexisting, discover

 

definition, explain described, structure

 

explicit, recreate 1. QUESTION 75

 

Information security is not just about technology, but also about management and

 

_________ .

 

hardware software

 

people

 

networks

 

policies 1. QUESTION 76

 

On a recent trip to my local grocery store, I noticed that ping pong balls are available

 

for sale in the same aisle where beer and other spirits are sold. What component of a CRM

 

likely made the management at this store consider placing these items next to each other?

 

Operational Collaborative

 

Analytical

 

Direct

 

Unified 1. QUESTION 77

 

__________ refers to mass collaboration of information to solve a problem.

 

social networking collaborative content unified communications

 

Really Simple Syndication

 

Crowdsourcing QUESTION 78

 

1.

 

_______________ is a set of applications, technologies and processes for gathering,

 

storing, analyzing, and accessing data to help users make better decisions.

 

EIS Business intelligence

 

Data mining

 

A discussion database

 

Groupware QUESTION 79

 

1.

 

What are the two types of cryptography systems used in encryption today?

 

Asymmetric, symmetric Accurate, accessible

 

Threat, solution

 

Analog, digital

 

Private, public 1. QUESTION 80

 

As a manager at your University Bookstore, you often run weekly inventory reports

 

that give you lists of inventory on hand as well as inventory sold over the past week. The

 

reports are run from data stored within the database management system (DBMS) of the

 

Bookstore. What type of information retrieval tool are you using when running the report?

 

Reporting tools Document management tools

 

Decision Support System

 

Decision Matrix

 

Pro/cons analysis

 


Solution details:
STATUS
Answered
QUALITY
Approved
ANSWER RATING

This question was answered on: Sep 18, 2020

PRICE: $15

Solution~0001001198.zip (25.37 KB)

Buy this answer for only: $15

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy from our tutoring website www.aceyourhomework.com (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
SiteLock

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Sep 18, 2020

EXPERT

Tutor

ANSWER RATING

GET INSTANT HELP/h4>

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

NEW ASSIGNMENT HELP?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN YOUR SET DEADLINE.

Order Now