DAC1 – Flashcards

Unlock all answers in this set

Unlock answers
question
What is the difference between data and information as they relate to business functions?
answer
Data is processed to get information.
question
What is business intelligence?
answer
Collective Information
question
Which business strategy is a large computer company using if it offers products with several appearances and screen interfaces?
answer
Differentiation
question
What is the difference between data and information in information systems?
answer
Information is processed data.
question
A company would like to implement a new software system. The company is looking for a system that will provide management functions of financial production , and distribution operations at the same time. Which system should this company use?
answer
Supply Chain Management
question
How do information systems support accounting functions?
answer
By automating inventory and customer management systems
question
Which type of computer system would an employee need to complete a project requiring a spreadsheet?
answer
Microcomputer
question
A computer's main memory is directly accessibly to the CPU and consists of random access memory(RAM), cache memory, and read-only memory(ROM). What is this Called
answer
Primary Storage
question
Which type of software application is most effective for analyzing small to medium sets of numbers?
answer
Spreadsheets
question
Which type of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices?
answer
Network Operating systems
question
What is a requirement of a field when it is in a table and is defined as the primary key?
answer
The field must have unique values
question
What is true of a relational database?
answer
It provides relational integrity for a database
question
A sales manager for a national chain wants to provide costumer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information?
answer
Data Warehouse
question
A database administrator is creating a new relational database table to track products brought in for warranty service. The warranty service table links to the customer information table so the repaired product can be shipped back to the right person. It also links to the parts table to track which parts were used to make the repairs. Which relational database feature is this an example of?
answer
Foreign Keys
question
Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles?
answer
WiFi
question
A real estate office has several divisions located in different states. Which type of network should the real estate company implement to connect their divisions?
answer
WAN
question
What is the primary networking standard used to communicate over the internet?
answer
HTTP
question
Which technology would allow a company to host a computer service on an encrypted internal network and restrict it to employees within the organization?
answer
Extranet
question
Which technology allows businesses to use network phone software to make calls to other network users?
answer
VoIP
question
Which application is utilized by both GPS and GIS?
answer
Location-based services
question
What is telematics?
answer
A form of telecommunication technology that is used to identify and track assets via radio frequency
question
What are three models of e-business?
answer
G2B G2C G2G
question
What type of ecommerce model is used when a company sells tires to automobile companies?
answer
B2B
question
Which e-business tool converts an audio broadcast to a file that can be played on a digital music player?
answer
Podcasting
question
What is the main challenge to growth encountered when e-business is used?
answer
Product or service limitations
question
Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function?
answer
Autonomic
question
A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts for the chief financial officer(CFO). Which decision support system should be the foundation for the new product?
answer
Business Intelligence
question
A company wants to find a technique that will provide the best value for a target variable. Which analysis should the company select?
answer
Optimization
question
A strategic team is using the aggregate results from the decision support system to support long -term decisions that require judgment. Which system is being used by the team?
answer
Executive information system
question
Simulating physical worlds Monitoring events Working from home Realistic training Managing personal data
answer
Virtual Reality Intelligent Agents Intelligent Agents Virtual Reality Intelligent Agents
question
An Internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which type of artificial intelligence technology should this provider use?
answer
Fuzzy Logic
question
Which investigative tool is used during the analysis phase of systems development to guide process improvement?
answer
Data flow diagram
question
Which risk is reduced when the investigation step is well executed during the planning and analysis phases of systems development?
answer
End user training failure
question
Which investigative activity must occur during the analysis phase of a project?
answer
Gathering the business requirements
question
Why would a company consider using a prototype when converting an existing order entry system to a web-based system?
answer
It support change through iteration
question
which term is used to describe a iterative approach to building a system?
answer
Prototyping
question
What can happen when project requirements are not clearly defined?
answer
It can lead to feature or scope creep.
question
What is a drawback of outsourcing system development projects?
answer
It leads to a loss of confidentiality
question
Which method measures the ease with which people perform transactions or find information?
answer
Usability
question
What measures computer speed?
answer
CPU
question
Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday?
answer
Plunge
question
A development team is creating a new reporting system to track vacation and expenses. Which conversion implementation should the team use if it uses the new vacation reporting module first and implements the expense reporting module two months later?
answer
Phased
question
A company has recently acquired a former distribution competitor in another country. The new subsidiary uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing the decision?
answer
Prohibitions against the transfer of certain technologies across national boundaries
question
A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software , so the company decided to create a new proprietary CRM solution to be used company-wide. The company proposes to use a multinational team to develop the new software. Why has the approach been proposed?
answer
It takes into account the needs of the end users.
question
An individual writes a program that will take over a computer for the purpose of launching attacks on additional computers Which type of threat is being used?
answer
Zombie
question
An individual writes software that collects personal data about a user from a computer and transmits the data over the Internet without user's knowledge. Which type of threat is this?
answer
Spyware
question
An employee downloads software that claims to improve computer performance. Instead it introduces system vulnerabilities. Which type of threat is this software?
answer
Trojan Horse
question
Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages?
answer
Antivirus software
question
Which security technique uses private key and public key pairs to protect sensitive information?
answer
Biometric security
question
A company wants to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take?
answer
Write guidelines for usage of technology
question
An employee works as an engineer at a software firm and often checks personal e-mails while a work. Due to the long hours at the office, the employee does not have any time to check e-mail at home and feels that these actions are acceptable even though it is against the company's Internet use policy. Which method could be used to appropriately discourage this employee's behavior?
answer
Offering an ethics training program
question
A contractor is bidding on a system to help a denial office schedule patient appointments and payments. Which law would the contractor need to understand?
answer
HIPAA
question
What is the federal bill that addresses computer monitoring of employees?
answer
ECPA 1986
question
Why would a school administration choose to utilize Microsoft Office?
answer
It integrates all department and functions into a single IT system
question
Why would a vendor choose to utilize electronic data interchange(FDI)?
answer
It permits secure transmission of business information
question
What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy?
answer
It would decrease errors in medications.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New