CIS pt.2 – College Essay

question
Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more
answer
fasle
question
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.
answer
privacy
question
The lack of feedback is one disadvantage of Web-based training and distance learning.
answer
false
question
A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.
answer
wiki
question
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
answer
ARPANET
question
Before using a dial-up access number to connect to the Internet, verify that it is a local telephone number; if it is not, you will incur long-distance charges.
answer
true
question
Performance-based exams cannot be administered and taken online.
answer
false
question
Web sites provide access to specic types of useful information, such as maps and driving directions.
answer
reference
question
Twittering allows up to 256 characters
answer
false, 140
question
Web services companies are the enterprises that own or operate the paths or "roadways" along which Internet data travels, such as the Internet backbone and the communications networks connected to it.
answer
false
question
The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.
answer
true
question
Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.
answer
RSS
question
Application service providers (ASPs) supply the information that is available through the Internet.
answer
false
question
A ____ limits the search to a particular search characteristic, such as the page title, URL, page text, top-level domain, or Web site.
answer
field search
question
A good strategy to use when basic searching is not producing the desired results is field searching
answer
true
question
____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.
answer
ICANN (Internet Corporation for Assigned Names and Numbers)
question
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.
answer
online portfolio
question
Conventional dial-up connects to the Internet at a maximum of ____.
answer
56 Kbps
question
Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a fee.
answer
VOD
question
One advantage of a dial-up connection is ____.
answer
security
question
____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service.
answer
coaxial cable
question
Support for TCP/IP is built into operating systems, and TCP addresses are commonly used to identify the various devices on computer networks.
answer
false
question
TCP/IP is the protocol used for transferring data over the Internet.
answer
true
question
A(n) ring network uses a central cable to which all network devices connect.
answer
false
question
An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular service when it is available and then switches to satellite service when cellular service is not available.
answer
dual-mode
question
A personal area network (PAN) is a small network of two or more personal devices for one individual, such as a personal computer, smartphone, headset, tablet, portable speaker, smart watch, and/or printer.
answer
true
question
Electronic medical monitors take the vital signs of an individual (such as weight, blood-sugar readings, or blood pressure) or prompt an individual to answer questions.
answer
true
question
Physicians can use telemedicine to perform remote diagnosis of patients.
answer
true
question
Client-server networks are frequently referred to as peer-to-peer networks.
answer
false
question
The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes.
answer
global positioning system (GPS)
question
____ is typically used with LANs that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-optic cabling.
answer
Ethernet
question
A GPS receiver measures the distance between the receiver and ____ GPS satellites simultaneously to determine the receiver's exact geographic location.
answer
four
question
____ is relatively uncommon in data transmissions because most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.
answer
Simplex transmission
question
The trend toward online collaboration is usually called workgroup computing.
answer
true
question
Some wireless ____ are created by large organizations to provide free or low-cost Internet access to area residents.
answer
MANs
question
In ____, data is sent when it is ready but all data must be delivered at the time that it is needed
answer
isochronous transmission
question
With a(n) partial mesh ​topology, some devices are connected to all other devices, but some are connected only to those devices with which they exchange the most data.
answer
true
question
____ networks use a central device to connect each device directly to the network.
answer
Star
question
Because geosynchronous satellites are so close above the surface of the earth, there is no delay while signals travel from earth, to the satellite, and back to earth again.
answer
False
question
Companies that provide mobile phone services are commonly called wireless providers
answer
True
question
____ refers to the complete malfunction of a computer system.
answer
system failure
question
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
answer
USB security tokens
question
By ____, you instruct companies with whom you do business not to share your personal information with third parties.
answer
opting out
question
____ are designed to withstand much more physical abuse than conventional devices.
answer
Ruggedized devices
question
One of the most obvious types of hardware loss is hardware theft
answer
true
question
A fraud or scam carried out through the Internet is a form of ____.
answer
dot con
question
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
answer
true
question
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.
answer
security holes
question
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled.
answer
false
question
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.
answer
backup
question
For extended power outages, generators are needed.
answer
true
question
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
answer
private
question
A hard drive that uses FDE is often referred to as a(n) ____.
answer
self-encrypting hard drive
question
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
answer
throw-away
question
Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack.
answer
false
question
A government database is a collection of data about people that is collected and maintained by private industry.
answer
false
question
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software.
answer
true
question
A(n) Trojan horse is a type of malware that masquerades as something else—usually an application program.
answer
true
question
To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address.
answer
true
question
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.
answer
Access control systems
question
A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
answer
information system
question
When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.
answer
artificial intelligence (AI)
question
A(n) data mart typically stores data for an entire enterprise.
answer
false
question
A ____ is responsible for maintaining a large, multiuser system.
answer
system administrator
question
A paperless office can be implemented today through a variety of technologies and processing techniques.
answer
false
question
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary is also interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.
answer
business analyst
question
The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.
answer
request for proposal (RFP)
question
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the biochemistry division, Mother Goose is planning to implement the new system first in their New York location. If it works properly, they will extend it to their Boston and Chicago locations. This is called a ____ conversion.
answer
direct (WRONG)
question
In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions
answer
inference engine
question
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
answer
false
question
The objective of ____ is to gather useful data about the system being studied.
answer
data collection
question
A(n) GIS program helps design buildings, bridges, and other structures; design new products; design mechanical and electrical systems; and so forth.
answer
false
question
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
answer
true
question
____ refer to the variety of systems in place to record the details of a company's financial transactions (such as payments and purchases).
answer
accounting systems
question
A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related tasks.
answer
false
question
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
answer
order entry systems
question
A(n) ____ is used to describe the characteristics of all data used in a system.
answer
data dictionary
question
Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.
answer
tangible benefits
question
System development can take place in-house or it can be outsourced to external companies
answer
true
question
____ refers to the use of computers to help manage manufacturing operations and control the machinery used in those processes.
answer
computer-aided manufacturing (CAM)
question
An emerging sport robotic application is the exoskeleton suit.
answer
false
question
____ are useful for identifying procedures and summarizing the decision making process for one step of a system.
answer
decision tables
question
The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.
answer
false
question
____ is a conceptual blueprint that defines the structure and operations of an enterprise (a business, organization, government agency, or other entity).
answer
enterprise architecture
question
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
answer
order entry systems
question
When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.
answer
artificial intelligence (AI)
question
Robots of the future are expected to have a less humanoid form than the household robots currently on the market.
answer
false
question
Typically, information systems are used to support business intelligence (BI).
answer
true
question
The information systems (IS) department is also called the information technology (IT) department.
answer
true
question
is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
answer
business intelligence
question
When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called
answer
EAI
question
In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, financial institutions, and other organizations.
answer
true
question
The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.
answer
incorrect - not request for quotation (RFQ)
question
An emerging type of system is the digital ecosystem, which is the collection of people, products, services, and business processes related to a digital element.
answer
true
question
is the phase of system development in which the current system and identified problems are studied in depth and the needs of system users are assessed.
answer
system analysis
question
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.
answer
customer profiling
question
Data mining used in conjunction with Web site data is referred to as Web mining
answer
true
question
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
answer
false
question
A company's ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.
answer
chief information officer (CIO)
question
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
answer
true
question
The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.
answer
false
question
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary might want to consider becoming a ____, as she would eventually like to manage networks for an organization and determine what changes, if any, are needed.
answer
network systems and data communications analyst
question
With a ____, both systems are operated in tandem until it is determined that the new system is working correctly, and then the old system is deactivated.
answer
parallel conversion
question
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
answer
false
question
Pharming ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize.
answer
false
question
The goal of SCM is to reduce operating and inventory costs while meeting delivery objectives and increasing profits; that is, to be able to deliver the right product to the right place, at the right time, and at the right price.
answer
true
question
The objective of ____ is to gather useful data about the system being studied.
answer
data collection
question
Two of the most common design and manufacturing systems are known as CAM and CAD.
answer
true
question
TPS transactions are typically processed using batch processing
answer
false
question
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.
answer
proximity cards
question
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.
answer
customer profiling
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?
answer
kill switch hard drives
question
Data mining used in conjunction with Web site data is referred to as Web mining.
answer
true
question
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.
answer
phased
question
A(n) ____ is an information system that provides decision makers with regular, routine, and timely information that is used to make decisions.
answer
management information system (MIS)
question
DSSs are most often used by middle and executive managers for unstructured decisions, which often need to be based on unpredictable events or incomplete knowledge.
answer
true
question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer
privacy policy
question
____ focuses on specifying what the new system will look like and how it will work.
answer
system design
question
____ refers to the complete malfunction of a computer system.
answer
system failure
question
Digital badges consist of icons that represent academic achievements or acquired skills
answer
true
question
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
answer
true
question
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
answer
false
question
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
answer
false
question
Smartphones are prone to attacks and are known to have OS flaws.
answer
true
question
____ are designed to withstand much more physical abuse than conventional devices.
answer
ruggedized devices
question
To supplement backup procedures, businesses and other organizations should have a(n) ____.
answer
disaster recovery plan
question
Collecting in-depth information about an individual is known as ____.
answer
electronic profiling
question
The various types of communications systems that are in place at many organizations include e-mail, messaging, videoconferencing, ____, and telecommuting.
answer
collaborative (workgroup) computing
question
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.
answer
War driving
question
Antiglare screens are sometimes called ____.
answer
privacy filters
question
Braille printers print embossed output in Braille format on paper.
answer
true
question
An emotional health concern related to computer use is ____.
answer
an Internet addiction
question
Corporate integrity, as it relates to accounting practices and proper disclosure, is topic of personal character that has come to the forefront recently.
answer
false
question
Some human resources departments view college degrees from nonaccredited organizations as a form of digital manipulation.
answer
false
question
The goal of ____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self-expression.
answer
OLPC
question
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.
answer
DRM
question
To prevent sore or stiff neck, ____.
answer
place the monitor directly in front of you
question
The term ____ refers to the gap between those who have access to information and communications technology and those who do not.
answer
digital divide
question
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country but not in another. One example is ____.
answer
copyright law
question
To date, the MPAA has not pursued civil litigation against movie pirates.
answer
false
question
A(n) screen reader is a software program that reads aloud all text information available via the computer screen.
answer
true
question
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.
answer
one-third
question
In some countries, bootleg copies of music CDs and movie DVDs are sold openly.
answer
true
question
Although some publications allow the use of "photo illustrations," others have strict rules about digital manipulation— especially for news photojournalists
answer
true
question
Adding to the problem of unethical ____ is that, unlike film cameras, digital cameras don't have photo negatives that could be used to show what photographs actually looked like at the time they were taken.
answer
digital manipulation
question
Case 16-1 Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about his persistent eyestrain and aching back. To combat his eyestrain, Jack's doctor correctly advises him to ____.
answer
NOT use a footrest
question
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the ____ (ADA).
answer
americans with disabilities act
question
Case 16-2 Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services. Jill has poor eyesight. When proofreading her book, she can use a ____ that will read aloud whatever she has typed.
answer
screen reader
question
____ is the act of registering a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.
answer
cybersquatting
1 of

Unlock all answers in this set

Unlock answers
question
Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more
answer
fasle
question
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.
answer
privacy
question
The lack of feedback is one disadvantage of Web-based training and distance learning.
answer
false
question
A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.
answer
wiki
question
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
answer
ARPANET
question
Before using a dial-up access number to connect to the Internet, verify that it is a local telephone number; if it is not, you will incur long-distance charges.
answer
true
question
Performance-based exams cannot be administered and taken online.
answer
false
question
Web sites provide access to specic types of useful information, such as maps and driving directions.
answer
reference
question
Twittering allows up to 256 characters
answer
false, 140
question
Web services companies are the enterprises that own or operate the paths or "roadways" along which Internet data travels, such as the Internet backbone and the communications networks connected to it.
answer
false
question
The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.
answer
true
question
Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.
answer
RSS
question
Application service providers (ASPs) supply the information that is available through the Internet.
answer
false
question
A ____ limits the search to a particular search characteristic, such as the page title, URL, page text, top-level domain, or Web site.
answer
field search
question
A good strategy to use when basic searching is not producing the desired results is field searching
answer
true
question
____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.
answer
ICANN (Internet Corporation for Assigned Names and Numbers)
question
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.
answer
online portfolio
question
Conventional dial-up connects to the Internet at a maximum of ____.
answer
56 Kbps
question
Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a fee.
answer
VOD
question
One advantage of a dial-up connection is ____.
answer
security
question
____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service.
answer
coaxial cable
question
Support for TCP/IP is built into operating systems, and TCP addresses are commonly used to identify the various devices on computer networks.
answer
false
question
TCP/IP is the protocol used for transferring data over the Internet.
answer
true
question
A(n) ring network uses a central cable to which all network devices connect.
answer
false
question
An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular service when it is available and then switches to satellite service when cellular service is not available.
answer
dual-mode
question
A personal area network (PAN) is a small network of two or more personal devices for one individual, such as a personal computer, smartphone, headset, tablet, portable speaker, smart watch, and/or printer.
answer
true
question
Electronic medical monitors take the vital signs of an individual (such as weight, blood-sugar readings, or blood pressure) or prompt an individual to answer questions.
answer
true
question
Physicians can use telemedicine to perform remote diagnosis of patients.
answer
true
question
Client-server networks are frequently referred to as peer-to-peer networks.
answer
false
question
The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes.
answer
global positioning system (GPS)
question
____ is typically used with LANs that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-optic cabling.
answer
Ethernet
question
A GPS receiver measures the distance between the receiver and ____ GPS satellites simultaneously to determine the receiver's exact geographic location.
answer
four
question
____ is relatively uncommon in data transmissions because most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.
answer
Simplex transmission
question
The trend toward online collaboration is usually called workgroup computing.
answer
true
question
Some wireless ____ are created by large organizations to provide free or low-cost Internet access to area residents.
answer
MANs
question
In ____, data is sent when it is ready but all data must be delivered at the time that it is needed
answer
isochronous transmission
question
With a(n) partial mesh ​topology, some devices are connected to all other devices, but some are connected only to those devices with which they exchange the most data.
answer
true
question
____ networks use a central device to connect each device directly to the network.
answer
Star
question
Because geosynchronous satellites are so close above the surface of the earth, there is no delay while signals travel from earth, to the satellite, and back to earth again.
answer
False
question
Companies that provide mobile phone services are commonly called wireless providers
answer
True
question
____ refers to the complete malfunction of a computer system.
answer
system failure
question
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
answer
USB security tokens
question
By ____, you instruct companies with whom you do business not to share your personal information with third parties.
answer
opting out
question
____ are designed to withstand much more physical abuse than conventional devices.
answer
Ruggedized devices
question
One of the most obvious types of hardware loss is hardware theft
answer
true
question
A fraud or scam carried out through the Internet is a form of ____.
answer
dot con
question
System failure can occur because of a hardware problem, a software problem, or computer sabotage.
answer
true
question
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.
answer
security holes
question
The hard drives of devices to be disposed of should be destroyed before they are sold or recycled.
answer
false
question
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.
answer
backup
question
For extended power outages, generators are needed.
answer
true
question
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
answer
private
question
A hard drive that uses FDE is often referred to as a(n) ____.
answer
self-encrypting hard drive
question
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
answer
throw-away
question
Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack.
answer
false
question
A government database is a collection of data about people that is collected and maintained by private industry.
answer
false
question
Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software.
answer
true
question
A(n) Trojan horse is a type of malware that masquerades as something else—usually an application program.
answer
true
question
To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address.
answer
true
question
____ are used to control access to facilities, devices, computer networks, company databases, Web site accounts, and other assets.
answer
Access control systems
question
A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
answer
information system
question
When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.
answer
artificial intelligence (AI)
question
A(n) data mart typically stores data for an entire enterprise.
answer
false
question
A ____ is responsible for maintaining a large, multiuser system.
answer
system administrator
question
A paperless office can be implemented today through a variety of technologies and processing techniques.
answer
false
question
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary is also interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.
answer
business analyst
question
The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.
answer
request for proposal (RFP)
question
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the biochemistry division, Mother Goose is planning to implement the new system first in their New York location. If it works properly, they will extend it to their Boston and Chicago locations. This is called a ____ conversion.
answer
direct (WRONG)
question
In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions
answer
inference engine
question
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
answer
false
question
The objective of ____ is to gather useful data about the system being studied.
answer
data collection
question
A(n) GIS program helps design buildings, bridges, and other structures; design new products; design mechanical and electrical systems; and so forth.
answer
false
question
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
answer
true
question
____ refer to the variety of systems in place to record the details of a company's financial transactions (such as payments and purchases).
answer
accounting systems
question
A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related tasks.
answer
false
question
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
answer
order entry systems
question
A(n) ____ is used to describe the characteristics of all data used in a system.
answer
data dictionary
question
Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.
answer
tangible benefits
question
System development can take place in-house or it can be outsourced to external companies
answer
true
question
____ refers to the use of computers to help manage manufacturing operations and control the machinery used in those processes.
answer
computer-aided manufacturing (CAM)
question
An emerging sport robotic application is the exoskeleton suit.
answer
false
question
____ are useful for identifying procedures and summarizing the decision making process for one step of a system.
answer
decision tables
question
The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.
answer
false
question
____ is a conceptual blueprint that defines the structure and operations of an enterprise (a business, organization, government agency, or other entity).
answer
enterprise architecture
question
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
answer
order entry systems
question
When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.
answer
artificial intelligence (AI)
question
Robots of the future are expected to have a less humanoid form than the household robots currently on the market.
answer
false
question
Typically, information systems are used to support business intelligence (BI).
answer
true
question
The information systems (IS) department is also called the information technology (IT) department.
answer
true
question
is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
answer
business intelligence
question
When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called
answer
EAI
question
In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, financial institutions, and other organizations.
answer
true
question
The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.
answer
incorrect - not request for quotation (RFQ)
question
An emerging type of system is the digital ecosystem, which is the collection of people, products, services, and business processes related to a digital element.
answer
true
question
is the phase of system development in which the current system and identified problems are studied in depth and the needs of system users are assessed.
answer
system analysis
question
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.
answer
customer profiling
question
Data mining used in conjunction with Web site data is referred to as Web mining
answer
true
question
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
answer
false
question
A company's ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.
answer
chief information officer (CIO)
question
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
answer
true
question
The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.
answer
false
question
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary might want to consider becoming a ____, as she would eventually like to manage networks for an organization and determine what changes, if any, are needed.
answer
network systems and data communications analyst
question
With a ____, both systems are operated in tandem until it is determined that the new system is working correctly, and then the old system is deactivated.
answer
parallel conversion
question
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
answer
false
question
Pharming ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize.
answer
false
question
The goal of SCM is to reduce operating and inventory costs while meeting delivery objectives and increasing profits; that is, to be able to deliver the right product to the right place, at the right time, and at the right price.
answer
true
question
The objective of ____ is to gather useful data about the system being studied.
answer
data collection
question
Two of the most common design and manufacturing systems are known as CAM and CAD.
answer
true
question
TPS transactions are typically processed using batch processing
answer
false
question
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.
answer
proximity cards
question
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.
answer
customer profiling
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?
answer
kill switch hard drives
question
Data mining used in conjunction with Web site data is referred to as Web mining.
answer
true
question
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.
answer
phased
question
A(n) ____ is an information system that provides decision makers with regular, routine, and timely information that is used to make decisions.
answer
management information system (MIS)
question
DSSs are most often used by middle and executive managers for unstructured decisions, which often need to be based on unpredictable events or incomplete knowledge.
answer
true
question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer
privacy policy
question
____ focuses on specifying what the new system will look like and how it will work.
answer
system design
question
____ refers to the complete malfunction of a computer system.
answer
system failure
question
Digital badges consist of icons that represent academic achievements or acquired skills
answer
true
question
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
answer
true
question
Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
answer
false
question
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
answer
false
question
Smartphones are prone to attacks and are known to have OS flaws.
answer
true
question
____ are designed to withstand much more physical abuse than conventional devices.
answer
ruggedized devices
question
To supplement backup procedures, businesses and other organizations should have a(n) ____.
answer
disaster recovery plan
question
Collecting in-depth information about an individual is known as ____.
answer
electronic profiling
question
The various types of communications systems that are in place at many organizations include e-mail, messaging, videoconferencing, ____, and telecommuting.
answer
collaborative (workgroup) computing
question
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.
answer
War driving
question
Antiglare screens are sometimes called ____.
answer
privacy filters
question
Braille printers print embossed output in Braille format on paper.
answer
true
question
An emotional health concern related to computer use is ____.
answer
an Internet addiction
question
Corporate integrity, as it relates to accounting practices and proper disclosure, is topic of personal character that has come to the forefront recently.
answer
false
question
Some human resources departments view college degrees from nonaccredited organizations as a form of digital manipulation.
answer
false
question
The goal of ____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self-expression.
answer
OLPC
question
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.
answer
DRM
question
To prevent sore or stiff neck, ____.
answer
place the monitor directly in front of you
question
The term ____ refers to the gap between those who have access to information and communications technology and those who do not.
answer
digital divide
question
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country but not in another. One example is ____.
answer
copyright law
question
To date, the MPAA has not pursued civil litigation against movie pirates.
answer
false
question
A(n) screen reader is a software program that reads aloud all text information available via the computer screen.
answer
true
question
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.
answer
one-third
question
In some countries, bootleg copies of music CDs and movie DVDs are sold openly.
answer
true
question
Although some publications allow the use of "photo illustrations," others have strict rules about digital manipulation— especially for news photojournalists
answer
true
question
Adding to the problem of unethical ____ is that, unlike film cameras, digital cameras don't have photo negatives that could be used to show what photographs actually looked like at the time they were taken.
answer
digital manipulation
question
Case 16-1 Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about his persistent eyestrain and aching back. To combat his eyestrain, Jack's doctor correctly advises him to ____.
answer
NOT use a footrest
question
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the ____ (ADA).
answer
americans with disabilities act
question
Case 16-2 Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services. Jill has poor eyesight. When proofreading her book, she can use a ____ that will read aloud whatever she has typed.
answer
screen reader
question
____ is the act of registering a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.
answer
cybersquatting
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New