(+) Save a GPA. Donate your notes with us.

Loading...

Business - Management Information Systems Quizlevel5

1
The minimum requirements for the new system are called:
2
A Web-based marketplace in which one company sells to many business buyers from e-catalogs or auctions, frequently over an extranet, describes
3
The Security Parameters Index identifies a security association.
4
Data warehouses contain all data used to process daily transactions
5
An option box is used to select nonexclusive choices
6
In Oracle Database recovery facilities, control files are small files that describe the name, contents, and locations of various files used by Oracle Database
7
If A, B, C, and D are columns of the table whose composite primary key is A, Bwhile C and D are nonkey columnsthen B --> C is a partial functional dependency
8
Because DSL signals interfere with telephone signals, DSL data transmission and telephone conversations cannot occur simultaneously
9
Creating multiple variations of information goods and selling these to different market segments at different prices is called:
10
Personal effects, moveable property and goods, such as cars, bank accounts, wages, securities, a small business, furniture, insurance policies, jewelry, patents, and pets are all examples of _________
11
How does Michael Porter define support business activities?
12
A relation is in second normal form if every nonprimary key attribute is functionally dependent on the whole primary key
13
Which of the following is not an advantage of using a PERT diagram over a Gantt chart?
14
A widget is an element of user interface that displays an information arrangement changeable by the user, such as a window
15
NetBeans is an IDE
16
Automated tools that read program source code as input and create graphical and textual representations of design-level information such as program control structures, data structures, logical flow, and data flow are known as ________
17
Show a diagram that illustrates the principal activities in the process of the development of the database system
18
Lynn, the manager of a transportation company, goes through the product delivery schedule. She assigns territories to each executive of the delivery team, and also contacts the fleet supervisor to arrange trucks for transportation
19
Analytical tools are used to optimally utilize materials, equipment, and labor during the ________ process of supply chain planning
20
Some digital cash products emphasize their freedom from the constraints of the banking system and government regulation. In about 100 words, outline the problems that can arise from this freedom and how they might affect the usefulness of such a product
21
Policies should be written by ________
22
Rows can be removed from a table by using the SQL DELETE statement
23
Preventive maintenance adds little or no value to the organization and it simply focuses on removing defects from an existing system without adding new functionality
24
The first step in deploying new systems is _________
25
In public key encryption for authentication, the supplicant uses ________ to encrypt
26
Assume you are planning Web server computer capacity for a business that has 5000 business customers and sells about 1200 different products. Each customer buys between 10 and 50 items two or three times each month. The business has 300 employees, 200 of whom regularly interact with the company’s online sales system
27
Which of the following devices collects data directly from the environment for input into a computer system?
28
________ is a knowledge area that concerns contracts with outside vendors for services,materials, and outsourcing of functions
29
To set a column value to an initial value that is selected according to some complicated business logic, you would use the SQL DEFAULT constraint with the CREATE TABLE command
30
One common way to improve an activity is to add resources to it
31
A disadvantage of buying computer hardware is the initial cost of purchasing the equipment is often very high
32
System efficiency is the extent to which a system ________
33
Purchasing managers are the key players in the procurement process
34
IPv6 provides for 32-bit IP addresses
35
Which of the following is the correct order of phases in the systems development life cycle (SDLC)?
36
A decision tree analysis is a supervised data mining technique
37
A disadvantage of datagrams is that they can take alternative routes to get to their destination; if a link within a cloud is bad, congested, or unavailable for some reason, a datagram cannot be routed around it
38
Which of the following is not an example of a transaction broker?
39
A paradigm for electronic communications where a dedicated path is opened and maintained during the exchange is called _________
40
________ are organizations that conduct some e-commerce activities, usually as an additional marketing channel
41
Use of social media to recruit and evaluate potential employees is prohibited
42
Megan has downloaded a new gaming application on her smartphone. When she starts using it, she realizes that command icons and a navigation bar, intended for better user interface, block more than half the screen on her phone
43
By default, the identifier of the entity becomes the foreign key of the corresponding table
44
When indicating the multiplicity for a role, an infinite upper bound is denoted by a:
45
Costs associated with fraudulent transactions include
46
In RFM analysis, an R score of 5 shows that ________
47
Private industrial networks are direct descendants of:
Welcome to Sciemce, where you can ask questions and receive answers from other members of the community.
...