Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Physic
Q:
____________________ processing is a design option where processing tasks are divided among servers and workstations.
Q:
In the ____________________ phase of a project, strategies for fulfilling the system requirements are proposed.
Q:
A(n) __________________________________________ tool is a software application used to document system requirements.
Q:
A(n) ____________________ factor is a requirement that serves as part of a checklist for a development project.
Q:
The ____________________ phase of an IS development cycle is when the system requirements list is produced.
Q:
Most IS departments are supervised by a(n) ______________________________.
Q:
The ____________________ SDLC is shown in the figure above.
Q:
OLTP uses either a commit or a ____________________ strategy to ensure that transactions are processed correctly.
Q:
A decision ____________________ is a numerical representation of a realistic situation.
Q:
A(n) ____________________ report groups data and shows totals, and is used in tactical and strategic planning.
Q:
A decision ____________________ is a question or set of instructions describing data that must be gathered to make a decision.
Q:
A(n) ____________________ system shell is a software tool that contains an inference engine and a user interface used to enter facts and rules.
Q:
A(n) ____________________ network simulates the way a brain learns and processes information.
Q:
____________________ information is collected and stored in an information system using sources generated by the organization.
Q:
A(n) ____________________ program requires human intuition in order to solve a problem.
Q:
The ____ phase often accounts for 70% of an information system's total cost.a. planning c. maintenanceb. implementation d. design
Q:
Which of the following is NOT true about the maintenance phase of an IS?
a. It can continue for many years.
b. Costs peak in the middle of the phase.
c. It is over when the system is obsolete.
d. Changes continue to be made to the system.
Q:
During the maintenance phase, all of the following might occur EXCEPT:a. replacing hardware c. revising the interfaceb. upgrading software d. unit testing
Q:
____ testing is used to verify that a system works as required.a. Application c. Acceptanceb. Unit d. System
Q:
Unit and integration testing are usually performed in a ____.a. live system c. server farmb. test area d. LAN
Q:
____ testing is the process of trying out various sequences of input values and checking that the results are correct.a. Unit c. Applicationb. Integration d. System
Q:
A(n) ____ contains step-by-step instructions for accomplishing specific tasks using a new system.a. procedure handbook c. help deskb. system documentation d. RFP
Q:
The ____ design phase is when application specifications are developed that describe how the IS software interacts with users, stores and processes data, and formats reports.a. structured c. detailedb. concluding d. feature
Q:
An RFP asks vendors all of the following EXCEPT:
a. a formal price quotation for hardware and software.
b. to recommend hardware and software.
c. what the vendors qualifications are for implementing the solution.
d. Both B and C.
Q:
A decision ____ is a tool that can be created by spreadsheet software and used to evaluate solutions.a. query c. flowchartb. table d. diagram
Q:
Which of the following is NOT true about using a turnkey system as a software solution?
a. It takes little time to implement.
b. It contains hardware and software.
c. It requires extensive evaluation.
d. It can be tailored to meet the exact system requirements.
Q:
____ are checklists for a development project that are used at the end to determine if the goals were met.a. System Requirement Reports c. Data flow diagramsb. Success factors d. JADs
Q:
The ____ phase is when the list of system requirements is generated.a. planning c. analysisb. design d. implementation
Q:
The Figure above shows a(n) ____.a. SDLC c. CASEb. Data flow diagram d. System requirements report
Q:
A(n) ____ methodology focuses on the data an IS collects before working out ways to process that data.a. JAD c. object-orientedb. structured d. information engineering
Q:
The type of IS planning where end users and system analysts work together is called ____.a. Outsourcing c. SDLCb. CIO d. JAD
Q:
A(n) ____ is an information system that creates reports used to make routine business decisions.a. DSS c. MISb. POS d. OLTP
Q:
A ____ directly manipulates data and analyzes data from external sources in order to help people make decisions.a. MIS c. OLTPb. DSS d. POS
Q:
A(n) ____ report is a customized report generated to supply information on demand.a. ad hoc c. summaryb. exception d. None of the above
Q:
____ is a technique that expert systems use to work with imprecise data.a. Exceptions c. Strategyb. MIS d. Fuzzy logic
Q:
The Five Forces model includes all of the following EXCEPT:a. Threat of new entrants c. Becoming better at what a company doesb. Bargaining power of buyers d. Threat of substitute products or services
Q:
Which of the following is NOT one of the fundamental responses to competitive threats to an organization?
a. Become better at what it does
b. Recognizing that you need to make a decision
c. Create a new product
d. Change the industry
Q:
____ planning involves anticipating a organization's long range goals.a. strategic c. tacticalb. structured d. operational
Q:
Unusual network traffic might mean that the security of an IS has been breached.
Q:
Individual users of a system are often required to back up the data on their own workstations.
Q:
The primary source of information about an IS is the help desk.
Q:
When converting data from an old to a new system, a programmer typically writes conversion software to read the old data and convert it to the format used by the new system.
Q:
"Cutover" is another term for system conversion.
Q:
Unit testing ensures that all modules operate together correctly.
Q:
During the planning phase of an SDLC, new hardware and software is purchased.
Q:
If project team members do not know what hardware and software are needed, they can use an RFP to describe the problem and ask vendors how they would solve it.
Q:
An RFQ is a document that describes the IS problem and system requirements for its solution.
Q:
Little or no programming is required when using an application development tool.
Q:
Creating an IS from scratch can take years to program.
Q:
In the design phase, there is usually only one way to solve the problems of an IS and meet the system requirements.
Q:
The diagram shown in the figure above is used to determine application specifications for an IS.
Q:
A CASE tool is software used to document system requirements, diagram current and proposed information systems, schedule development tasks, and develop computer programs.
Q:
The system requirements of an IS are the criteria needed to solve any problems in the system.
Q:
Information engineering methodologies focus on data that has been processed by an information system.
Q:
In the plan shown in the above figure, one phase must be completed before the next phase can begin.
Q:
The figure above shows an SDLC.
Q:
A transaction is an exchange of goods, services, or funds.
Q:
A monthly sales summary is an example of a demand report.
Q:
An information system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization.
Q:
Deciding how much inventory to stock during the holidays is an example of a structured problem.
Q:
A major function of information systems is to help people make decisions in response to a problem.
Q:
Tactical planning means anticipating needs for long-range goals.
Q:
What are some steps to ensure that you are creating a good desktop video?
Q:
What are some of the advantages and disadvantages to using vector graphics?
Q:
What is the difference between resolution, density, and color depth when referring to bitmap graphics?
Q:
Describe some of the methods for retrieving images from a digital camera.
Q:
Sound units called ____________________ are strung together by speech synthesizers.
Q:
The audio clips in the figure above show different ____________________ rates of a sound file.
Q:
On a Web page, a video that uses the <embed> tag is called a(n) ____________________ video.
Q:
Video that starts to play a small segment on your computer while the rest is downloaded to your computer is called ____________________ video.
Q:
A(n) ____________________ is software that compresses a file when a desktop video is created, and decompresses the file when the video is played.
Q:
Most digital cameras provide a(n) ____________________ port to transfer images to a computer.
Q:
A(n) ____________________ video stores the video as a continuous track of magnetic patterns.
Q:
A(n) ____________________ video is constructed and displayed using a PC.
Q:
A(n) ____________________ is a series of frames.
Q:
The process of covering a wireframe with surface color in a 3-D image, as shown in the above figure, is called ____________________.
Q:
To convert a bitmap graphic into vector format, use ____________________ software.
Q:
A graphic that contains both bitmap and vector data is called a(n) ____________________.
Q:
A ____________________ is applied to create shading and three-dimensional effects in an image.
Q:
Web graphics in ____________________ format are automatically resized when displayed on different screens or when printed.