(+) Save a GPA. Donate your notes with us.

Loading...

Quiz Facts 2, Business - Management Information Systems

1
A key component of the Sarbanes-Oxley Act was enacted to ensure the integrity of IT infrastructure in use within an organization
2
Data inconsistency is a major problem caused by information silos at the department level
3
Response time is extremely important when implementing email
4
Which of the following is the fastest growing form of location-based service in 2015?
5
List at least four difficult problems for management in the development of the international information system. Which do you see as the most problematic, and why?
6
An essential component of many buffer overflow attacks is the transfer of execution to code supplied by the attacker and often saved in the buffer being overflowed. This code is known as _________
7
The term social engineering refers to misrepresenting oneself to trick others into revealing information
8
When considering network protocols, why is the multilayer OSI model still important?
9
One partial solution to high monitoring costs is ________ pricing
10
Objects have ________, which are computer programs that perform some task
11
Design decisions and artifacts that concern components arrive from two opposite directions architectural and generalization
12
Policies are separated by implementation to take advantage of ________
13
A ________ is the key circuitry component that all internal devices connect to within a computer's case
14
12. A __________ language provides a uniform interface to the database for users and applications
15
What do we mean by "building block"?
16
The command used to save all the changes made to the database is which of the following?
17
The difference in the scope of databases is reflected in the:
18
________ is an example of PII
19
A help-desk information system has answers to questions that only a true user of an account or system would know
20
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making
21
Which of the following companies use a transaction fee revenue model?
22
The component of a database that makes it self-describing is the:
23
Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations
24
Buffer overflows can be found in a wide variety of programs, processing a range of different input, and with a variety of possible responses
25
The ________ selects instructions, processes them, performs arithmetic and logicalcomparisons, and stores results of operations in memory
26
Whereas OLAP uses data to create a theoretical hypothesis, data mining uses the data to identify patterns that may relate to a potential business problem
27
Briefly describe remote data management client-server systems
28
When determining the size of a fact table, estimating the number of possible values for each dimension associated with the fact table is equivalent to:
29
The results generated in the map phase are combined in the ________ phase
30
Write an SQL query for the HAPPY INSURANCE database that will, for each agent, retrieve the name of the agent and the name of his or her supervisor. (The name of the agent will be retrieved even if he or she has no supervisor.)
31
The unit of data exchanged between two peer MAC entities using the services of the physical layer is a(n) ____________
32
Explain the benefits of an enterprise resource planning (ERP) application to multinational organizations
33
The ________ is responsible for determining if an intrusion has occurred
34
The simple interfaces used in virtual worlds enable quick customer visits
35
All of the following statements about MapReduce are true EXCEPT
36
Goal decides the relevance of activities in a use case
37
A(n) ________ is a set of components that interact to achieve some purpose or goal
38
One major advantage of using decision tables over other methods is that tables help the analyst ensure completeness
39
An independent data mart is filled with data extracted from the operational environment without the benefit of a data warehouse
40
There is a common trap in writing a correlated subquery, which will cause no rows to ever be displayed in the results
41
Partial specialization means that some instances of supertype do not belong to any of the
42
Most popular network management products support the SNMP protocol
43
The two lower-level layers of the OSI and TCP/IP models are the:
44
Explain the difference between operational and informational systems as well as the primary factors that contribute to the need for separation
45
Social technologies change industry structure by shifting programming and editorial decisions to consumers and creating substitute entertainment products
46
Define business process. What might be a business process used at a hospital?
47
All of the following are common criteria to consider when selecting off-the-shelf software EXCEPT:
48
Explain why questionnaires are the most traceable tool for the verification of requirements
49
One means of processing an SQL Server database is to save groups of SQL Server DBMS commands in a text file and then process this file in the Microsoft SQL Server Management Studio
50
The distance between two corresponding points in adjacent cycles is the ________
51
An Enterprise Resource Planning (ERP) solution does not include ________
52
Gathering requirements is an ongoing process
53
When multiple categories or levels of data are defined, the requirement is referred to as __________ security
Welcome to Sciemce, where you can ask questions and receive answers from other members of the community.
...