Quiz Fall 5=Business - Management Information Systems - ScieMce

(+) Save a GPA. Donate your notes with us.

Loading...

Quiz Fall 5=Business - Management Information Systems

1
Systems development activities always take place in sequential order
2
In XML, schemas become the metadata
3
While adding information to the employee information database, Neil's computer crashed, and the entire database was erased. Which of the following types of viruses caused Neil's computer to crash?
4
Key logs provide the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions
5
Explain what a data dictionary is and why it can be a good idea to create one
6
Which of the following is a disadvantage for firms pursuing a multidomestic business strategy?
7
What is media richness?
8
If after the ERP project starts and it turns out that the hardware for supporting the volume of transactions was undersized then it may be necessary to ________ the contract
9
Information technology is the know-how, methods, tools, and materials used to support ________
10
What are operational processes?
11
The keyboard layout evolved from the typewriter. Why did this turn out to be a disadvantage?
12
Which of the following is NOT a guideline to use during the actual interview?
13
A group of Active Directory domains organized in a hierarchy is a ________
14
In Aster Limited, the HR department did not include interns as employees in their database, while the finance department included them. Such inconsistencies can be avoided through ________
15
Since the business environment involves considerable uncertainty, a manager cannot use modeling to estimate the risks resulting from specific actions
16
A specialized systems development life cycle is mainly required for ________
17
The fact that participating in an Internet auction means that you will need to purchase a computer, learn to use it, and pay for Internet access, is an example of ________ costs
18
Which of the following is a shortcoming of the extended value chain?
19
The purpose of a database is to ________
20
Things that an object knows are called ________
21
The client-server architecture (CSA) was made possible by ________
22
In SQL, a(n) ________ subquery is a type of subquery in which processing the inner query depends on data from the outer query
23
Business rules should be traceable
24
When a steering committee chooses a project it is referred as a bottom-up source
25
Which of the following is an example of reintermediation?
26
What are some of the most important considerations when choosing a database management system?
27
________ results in smaller and less complex systems that are easier to understand than larger, complicated systems
28
Object-oriented programming is the same as traditional procedural programming in that itexamines objects that are part of a system
29
The term modem stands for modulator/demodulator
30
Porter's five forces model is also referred to as the value chain model
31
Confidentiality, integrity, and awareness are the three components of the CIA security triad
32
Explain why the E-R model needed to be expanded into the enhanced E-R model
Welcome to Sciemce, where you can ask questions and receive answers from other members of the community.
...