Ww2.justanswer.com



A ________ is a professional who is relatively well educated and creates, modifies, and/or synthesizes knowledge as a fundamental part of his/her job.Answer Webmaster Technician Knowledge Worker CIO 5 points Question 2 A global information systems strategy is characterized by ________ systems Answer distributed centralized decentralized homogeneous 5 points Question 3 ________ is/are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings. Answer Information Systems Routers Business Technology 5 points Question 4 Companies setting up entire factories in China is an example ofAnswer on-shoring offshoring in-sourcing outsourcing 5 points Question 5 In the last few decades, it has often been observed that while IS expenditures (salaries, number of IS staff, etc.) have risen, productivity has not increased at the same rate. This observation is referred to as Answer the "productivity paradox" the cost of doing business inflation underperformance 5 points Question 6 ________ software is the collection of software that controls the basic functions of the computer. That is, it coordinates the interaction between hardware devices, peripherals, application software, and users.Answer systems intergration command applications 5 points Question 7 Procedures that different computers follow when they transmit and receive data are calledAnswer modems controls protocols networks 5 points Question 8 Which network is a private network used for communications with business partners? Answer Intranet Extranet Internet E-Net 5 points Question 9 Web-based collaboration tools need all of the following EXCEPT what?Answer Email Account Browser Internet Connection All of the above are needed 5 points Question 10 ________ are a type of virus that target networks and take advantage of operating system security holes to replicate endlessly. Answer Brute-force Worms Manipulation Denial of Service 5 points Question 11 ________ attacks occur when electronic intruders deliberately attempt to prevent legitimate users from using that service. Answer Information modification Man in the Middle Brute-force Denial of Service 5 points Question 12 Some spam e-mail includes ________, which are attempts to trick financial account and credit card holders into giving away their authorization information. Answer phishing tricking luring freaking 5 points Question 13 At the managerial level, ________ managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization. Answer personnel operational functional executive 5 points Question 14 Knowledge that reflects processes and procedures that are located in a person's mind is called Answer best practices implicit knowledge explicit knowledge tacit knowledge 5 points Question 15 ________ systems consist of technology and the people needed to consolidate information and to support managers at the highest level of the organization. Answer Management Information Transaction Processing Decision Support Executive Information 5 points Question 16 If packaged applications cannot meet the requirements of the business, the managers must conduct a ________ analysis to ensure that taking the custom application approach will prove worthwhile to the company. Answer earned value cost-benefit what-if None of the above 5 points Question 17 After the conceptual model has been completed using an entity-relation diagram, it can be easily translated into a physical data model in a Answer form report file database management system 5 points Question 18 Currently, ________ costs constitute the majority of overall systems costs. Answer software user management hardware 5 points Question 19 One of the fastest growing "information" crimes in recent years has been Answer computer theft information resource theft identity theft information theft 5 points Question 20 Software piracy is a(n) Answer Ethical issue Economic problem Crime All of the above ? ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download