Ans Doc332Y

CLICK HERE TO DOWNLOAD THIS ANSWER INSTANTLY

A ________ is a professional who is relatively well educated and creates, modifies, and/or synthesizes knowledge as a fundamental part of his/her job.
Answer Webmaster
Technician
Knowledge Worker
CIO
5 points
Question 2
A global information systems strategy is characterized by ________ systems
Answer distributed
centralized
decentralized
homogeneous
5 points
Question 3
________ is/are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings.
Answer Information Systems
Routers
Business
Technology
5 points
Question 4
Companies setting up entire factories in China is an example of
Answer on-shoring
offshoring
in-sourcing
outsourcing
5 points
Question 5
In the last few decades, it has often been observed that while IS expenditures (salaries, number of IS staff, etc.) have risen, productivity has not increased at the same rate. This observation is referred to as
Answer the “productivity paradox”
the cost of doing business
inflation
underperformance
5 points
Question 6
________ software is the collection of software that controls the basic functions of the computer. That is, it coordinates the interaction between hardware devices, peripherals, application software, and users.
Answer systems
intergration
command
applications
5 points
Question 7
Procedures that different computers follow when they transmit and receive data are called
Answer modems
controls
protocols
networks
5 points
Question 8
Which network is a private network used for communications with business partners?
Answer Intranet
Extranet
Internet
E-Net
5 points
Question 9
Web-based collaboration tools need all of the following EXCEPT what?
Answer Email Account
Browser
Internet Connection
All of the above are needed
5 points
Question 10
________ are a type of virus that target networks and take advantage of operating system security holes to replicate endlessly.
Answer Brute-force
Worms
Manipulation
Denial of Service
5 points
Question 11
________ attacks occur when electronic intruders deliberately attempt to prevent legitimate users from using that service.
Answer Information modification
Man in the Middle
Brute-force
Denial of Service
5 points
Question 12
Some spam e-mail includes ________, which are attempts to trick financial account and credit card holders into giving away their authorization information.
Answer phishing
tricking
luring
freaking
5 points
Question 13
At the managerial level, ________ managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.
Answer personnel
operational
functional
executive
5 points
Question 14
Knowledge that reflects processes and procedures that are located in a person’s mind is called
Answer best practices
implicit knowledge
explicit knowledge
tacit knowledge
5 points
Question 15
________ systems consist of technology and the people needed to consolidate information and to support managers at the highest level of the organization.
Answer Management Information
Transaction Processing
Decision Support
Executive Information
5 points
Question 16
If packaged applications cannot meet the requirements of the business, the managers must conduct a ________ analysis to ensure that taking the custom application approach will prove worthwhile to the company.
Answer earned value
cost-benefit
what-if
None of the above
5 points
Question 17
After the conceptual model has been completed using an entity-relation diagram, it can be easily translated into a physical data model in a
Answer form
report
file
database management system
5 points
Question 18
Currently, ________ costs constitute the majority of overall systems costs.
Answer software
user
management
hardware
5 points
Question 19
One of the fastest growing “information” crimes in recent years has been
Answer computer theft
information resource theft
identity theft
information theft
5 points
Question 20
Software piracy is a(n)
Answer Ethical issue
Economic problem
Crime
All of the above