Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. A is responsible for researching, planning, and recommending software and systems choices to meet an organizations business requirements. a. network administrator b. network analyst

1. A is responsible for researching, planning, and recommending software and systems choices to meet an organizations business requirements. a. network administrator b. network analyst c. system administrator d. systems analyst 2. A oversees the planning and implementation of sophisticated security measures to block unauthorized access but at the same time to allow easy and timely access to authorized users. a. database administrator b. network administrator c. programmer d. systems analyst 3. In most organizations, the chief security officer (CSO) reports to the . a. chief administrative officer (CAO) b. chief information officer (CIO) c. chief information security officer (CISO) d. systems executive officer (SEO) 4. Which of the following is considered a strategic advantage of the first-mover? a. Technological literacy b. Superior brand name c. High market value d. Guaranteed long-term success 5. Which of the following conditions must exist for an information system to be a strategic information system? a. The information system must simply provide information. b. The organization's top management must be involved only during the implementation stage. c. The organizations information system unit must only work with managers of the same unit. d. The information system must serve an organizational goal. 6. Mostly, customer relationship management (CRM) systems support three areas: , sales, and customer service. a. marketing b. human resources c. manufacturing d. processing HC1041 IT for Business T3 2015 6 7. The combination of customer relationship management (CRM) and supply chain management (SCM) systems is referred to as _____. a. decision support systems (DSSs) b. enterprise resource planning (ERP) systems c. business intelligence (BI) systems d. geographic information systems (GISs) 8. The process of a group of colleagues meeting and working collaboratively to generate creative solutions and new ideas is known as . a. teleconferencing b. brainstorming c. groupthink d. think tank 9. The CPU and primary memory are usually plugged into a circuit board in the computer case called the a. motherboard b. monitor c. control unit d. multicore processor 10. The is the most important part of any computer. a. external storage b. central processing unit c. monitor d. ROM 11. are the most powerful computers at any given time, but are built especially for assignments that require arithmetic speed. a. Mainframe computers b. Mega-servers c. Supercomputers d. Workstations 12. The is the maximum number of bits that the control unit can fetch from primary memory in one machine cycle. a. pixel b. byte c. data word d. binary limit 13. Locating and fixing programming errors is called . a. compiling b. coding c. assembling d. debugging HC1041 IT for Business T3 2015 7 14. Which of the following is true of objective-oriented programming languages? a. Operations are linked to the data that they run on. b. They require more code than other languages. c. Data and the operations to manipulate the data are kept separate from each other. d. Their primary emphasis is on the procedure for performing a task. 15. The most popular OOP languages are Java, Visual Basic, and . a.XML b. HTTP c. C++/C# d. HTML 16. Programs designed to perform specific jobs, such as calculating and executing a companys payroll, are collectively called . a. application-specific software b. general-purpose application software c. packaged software d. utility software 17. The purpose of ____ is to manage computer resources and perform routine tasks that are not specific to any application. a. multimedia software b. production software c. packaged software d. system software 18. A computer network within a building, or a campus of adjacent buildings, is called a . a. MAN (metropolitan area network) b. WAN (wide area network) c. LAN (local area network) d. PAN (personal area network) 19. The most important and pervasive set of protocols for telecommunications and networks today is called . a. NFC b. WPA c. TCP/IP d. CDMA 20. The smallest piece of data is called a . a. field b. record c. query d. character HC1041 IT for Business T3 2015 8 21. are entered to manipulate data, including adding, deleting, and updating data. a. Foreign keys b. Primary keys c. Queries d. Reports 22. A _______ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records. a. database query b. database model c. database system d. database catalog 23. Every time you download a file from a Web site or attach files to e-mail, you are using a(n) application. a. TCP b. NNTP c. FTP d. POP 24. In the context of B2B trading, online advertising is done mainly in two ways: through ____ and through banners. a. e-mail b. search engines c. spam d. newsgroups 25. is a tool used to translate MS-Word documents to multiple languages. a. Linux b. WordPad c. Unix d. Wordfast 26. Differences in must be considered when integrating information systems internationally, even within the same company. a. standards b. computer brands c. programming languages d. storage availability 27. The three major components of a DSS are a data management module, a model management module, and a(n) _______module. a. network b. inference engine c. dialog d. knowledge base HC1041 IT for Business T3 2015 9 28. Organizations must use software tools to process data into meaningful information to make useful. a. data warehouses b. information silos c. decision systems d. expert systems 29. The data-mining application that identifies which prospective clients should be included in a mailing or email list to obtain the highest response rate is known as _______. a. trend analysis b. customer churn c. consumer clustering d. direct marketing 30. ___________is a traditional approach to systems development. a. SDLC b. ASD c. DSDM d. RUP

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Financial Accounting Theory

Authors: William R Scott

5th Edition

0132072866, 978-0132072861

More Books

Students also viewed these Accounting questions