Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Q1. Which of the following is NOT a browser? A. Internet Explorer B. Mozilla FireFox C. GOOGLE D. Safari Q2. Cathy bakes cakes and other

Q1. Which of the following is NOT a browser?

A. Internet Explorer B. Mozilla FireFox C. GOOGLE D. Safari

Q2. Cathy bakes cakes and other products at home and sells them via her own web site. She has few friends and relatives who informally buy her products from her web site. This would be an example of

A) C2B

B) C2C

C) B2C

D) None of the above

Q3. Given: AUTHOR (Author_id, Author_name, Book_ID). Assume an author can write many books but a book can be written by only one author. Whats the Primary key (PK) of AUTHOR relation?

A. Author_id

B. Author_name

C. Book_ID

D. None of the above

Q4. If you were thinking of a washing machine, which of the following represents the process? A. The dirty clothes. B. The clean clothes. C. The measured detergent. D. The wash and rinse cycle.

Q5. Cheryl Steffan is the operations manager for Nature's Bread Company, which specializes in providing natural products for health-conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of the type of information Cheryl would be using to successfully perform her job?

A. Craig Newmark is customer number 15467. B. Compare the costs of supplies, including energy, over the last five years to determine the best-selling product by month. C. Best-selling product by day. D. Best-selling product changes when Tony, the best baker, is working.

Q6. . Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to ensure the company has 10 percent market share by the end of the year. When evaluating the current sales numbers she determines that her sales division has total sales of $4 million and the entire industry has total sales of $50 million. What additional sales must Anne-Marie's division meet to ensure they have 10 percent of the market by the end of the year? A. $3 million B. $2 million C. $1 million D. $4 million

Q7 Which of the following is considered information? A. Least product sold by month B. Date sold C. Order number D. All of the above

Q8. Mr. Keely stole pin number of Ms Jones credit card and has been using for buying expensive items. The credit card company calls Mr. Keely to confirm a $5000 purchase. Mr. Keely denied ever making that purchase. Which of the following most likely technique credit card company might have used to detect fraud?

a. A DSS

b. Neural Network

c. Fuzzy Logic

d. Expert System

Q9. Jim Smith prepares routine inventory reports at ABC.com. Jim is most likely involved in

A. Semi-Structured task. B. Structured task. C. Unstructured task. D. None of the above.

Q#10. Which of the following is not considered a challenge facing most managers today?

A. Managerial decisions must be made quickly. B. Strategic decisions need to be made by applying analysis techniques. C. Artificial intelligence is required by all managers to be successful. D. Managerial decisions require large amounts of information to analyze.

Q#11 Mr. Keely stole pin number of Ms Jones credit card and has been using for buying expensive items. Mr. Keely is most likely engaged in

A. Pharming B. Spoofing C. Identity Theft D. Authentication

Q#12 Susan smith works for National security agency (NSA). She has to scan her finger every time she enters the NSA building. She is most likely part of

A. First Line of defense B. Second line of defense C. Hacker group D. None of the above

Q#13. number 3 can be represented in 8-bit ASCII code as

A. 10111003

B. 10110011

C. 10110101

D. none of the above

Q#14 Which of the following task can be easily automated? A. Developing overall business goals and objectives B. Developing payroll reports C. Allocating resources to a department D. Monitoring performance of a project team

Q#15. Secure Sockets Layer is an example of which of the following?

a Encryption b. Worm c. Virus d. Spyware

Q#16 Mary makes cakes from her home and sells them via her own web site to Giant Food company. Mary is engaged in

A. B2C

B. B2B

C. C2B

D. C2C

Q#17. Tony receives an e-mail from Bank of America that asks for his userID and password. This e-mail, most likely, is an example of

A. Phishing B. Pharming C. Trojan Horse virus D. Denial of service attack

Q#18 Which of the following replicates and spreads itself? a. Encryption b. Worm c. VoIP d. Spyware Q19. Diane has developed an app to provide fashion tips to teenagers. What would be the best medium for her to introduce her product?

a. Blogs b Newspapers c. Social networking sites like Facebook d. crowdsourcing

Q#20. In following relations:

CLASS(Class_ID, class_date, Semester, faculty_id)

Faculty (faculty_Id, Faculty_name, education). What is the foreign key?

a) class_id

b) faculty_id

c) Faculty_name

d) none of the above

Q#21 Explain the meaning of different parts of a URL

(3 points)

Ex: http://www.irs.gov/

Explain the meaning of each term in the url in generic terms; clearly identify the domain

Q#22.

Discuss the following:

(6 points)

a. What is the difference between Neural Network and brain?

b. Mike Smith wants to achieve 10% sales growth. What system is he most likely to use? (ES, GIS, NN, ES, DSS) and why?

c. Currently Burger to go serves walks in customers who stand in line and order. Lunch time lines get long and many customers leave without ordering. This is costing Burger to go much lost revenues. How can technology be used to mitigate this problem? Explain your answer.

Q23 Convert the following number

(3 points)

(201) into 8-bit ASCII code

Q # 24 Sammy needs to make a decision, if his balance is more than $800, he wants to take out $600 from his account, if it is less than or equal to $800, he wants to take out $100. Once money is withdrawn bank must update customers balance. Draw this decision in a flow chart.

(3 points)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Access Patterns Database Interactions In Object Oriented Applications

Authors: Clifton Nock

1st Edition

0321555627, 978-0321555625

More Books

Students also viewed these Databases questions