A(n) ____ is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision making.Select one:a. TPSb. MISc. DSSd. Virtual reality systemQuestion 2Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textAnswer, a German software company, is one of the leading suppliers of ERP software.Question 3Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textSystems analysis defines the problems and opportunities of the existing system.Select one:TrueFalseQuestion 4Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion text____ is an example of application software that allows you to accomplish specific tasks such as word processing or tabulating numbers.Select one:a. Systems softwareb. Windows 7c. Microsoft Office 2010d. Windows VistaQuestion 5Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textHiring an outside company to perform some or all of a systems development project is called ____.Select one:a. virtual realityb. offshoringc. systems investigationd. outsourcingQuestion 6Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textA(n) Answer is a formal collection of people and other resources established to accomplish a set of goals.Question 7Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion text____ are responsible for scheduling, hardware maintenance, and preparing input and output.Select one:a. Data-entry operatorsb. System operatorsc. Web operatorsd. Local area network operatorsQuestion 8Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textImproved productivity can result in faster customer response, lower costs, and increased customer satisfaction.Select one:TrueFalseQuestion 9Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textBecause IS hardware and software are costly, a specialized Answer group manages computer hardware and software acquisitions.Question 10Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textAn organization ____ uses its information system to gain a competitive advantage.Select one:a. almost neverb. sometimesc. oftend. nearly alwaysQuestion 11Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textHardware refers to the ____ components of a computer that perform the input, processing, storage, and output activities of the computer.Select one:a. actualb. logicalc. mechanicald. physicalQuestion 12Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe components responsible for processing – the CPU and memory – are housed together in the same box or cabinet, called the chip set.Select one:TrueFalseQuestion 13Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textIn computers, usually ____ bits together form a byte of data or a single character.Select one:a. 2b. 4c. 8d. 10Question 14Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textSecondary storage is also called ____.Select one:a. permanent storageb. primary storagec. main memoryd. volatile memoryQuestion 15Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textGrid computing is high-powered data processing performed in support of our country’s electric grid.Select one:TrueFalseQuestion 16Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThere are free Web-based productivity software suites that require no installation on the computer.Select one:TrueFalseQuestion 17Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion text____ is a powerful operating system originally developed by AT&T for use on minicomputers but now runs on workstations, servers, and mainframe computers.Select one:a. z/OSb. AIXc. Unixd. LinuxQuestion 18Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe ____ operating system from Microsoft is sometimes called “Vista done right” and includes improved home networking capabilities.Select one:a. Windows 7b. Leopardc. Windows XPd. LinuxQuestion 19Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textAfter a computer system is started, portions of the operating system are transferred to ____ as they are needed.Select one:a. the CPUb. memoryc. the back-up rescue diskd. none of the aboveQuestion 20Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textMost software products are protected by neither copyright protection or licensing provisions.Select one:TrueFalseQuestion 21Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textToday, most organizations use the database approach to data management, where multiple information systems share a pool of related data.Select one:TrueFalseQuestion 22Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textOracle is currently the market leader in general purpose databases, with about three-fourths of the multibillion dollar database market.Select one:TrueFalseQuestion 23Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion text____ is a visual approach to developing database requests.Select one:a. Concurrency controlb. Query by examplec. Data definition languaged. Data manipulation languageQuestion 24Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textA(n) ____ contains a subset of data for a single aspect of a company’s business and are used by smaller groups who want to access detailed data for business analysis.Select one:a. OLTP databaseb. data warehousec. data martd. data mineQuestion 25Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textOne of the first steps in installing and using a large database involves “telling” the DBMS the logical and physical structure of the data and the relationships among the data for each user.Select one:TrueFalseQuestion 26Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textAutomated Clearing House and Wire Transfers are two forms of electronic funds transfer.Select one:TrueFalseQuestion 27Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion text____ is NOT a frequency commonly used for wireless communications.Select one:a. infraredb. microwavec. radiod. ULFQuestion 28Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe National Do Not Call Registry ____.Select one:a. includes fewer than 10 mi
llion peopleb. is designed to stop unsolicited calls from advertisers, salespeople, and political campaignsc. has actually resulted in an increase in the number of unwanted calls to consumersd. none of the aboveQuestion 29Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textTelecommunications devices relay signals between computer systems and transmission media.Select one:TrueFalseQuestion 30Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe process of translating an analog signal to a digital signal is called modulation.Select one:TrueFalseQuestion 31Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textPackets on the Internet ____.Select one:a. include chunks of datab. carry the address of its sender and receiver hostc. follow the IP protocold. all of the aboveQuestion 32Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textCitizens of the continent ____ make up the largest percentage of Internet.Select one:a. Asiab. North Americac. Europed. South AmericaQuestion 33Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textMore than 750 million computers supporting over 2 billion users make up today’s Internet.Select one:TrueFalseQuestion 34Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textContent streaming is a means of transferring large media files over the Internet so that the data stream of voice and pictures plays more or less continuously as the file is being downloaded.Select one:TrueFalseQuestion 35Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe ____ is responsible for managing IP addresses and Internet domain names.Select one:a. United Nationsb. ICANNc. FTCd. none of the aboveQuestion 36Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe practice of market segmentation divides the pool of potential suppliers into subgroups usually defined in terms of demographic characteristics.Select one:TrueFalseQuestion 37Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textA(n) ____ tag is an HTML code, not visible on the displayed Web page, that contains keywords representing your Web site’s content.Select one:a. HTMLb. metac. HTTPd. identifierQuestion 38Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe two most widely used Web server software packages are Apache HTTP Server and Microsoft Internet Information Services.Select one:TrueFalseQuestion 39Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textBlind networks and premium blind networks are two forms of mobile advertising networks.Select one:TrueFalseQuestion 40Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe handheld devices used for m-commerce have few, if any, limitations that complicate their use.Select one:TrueFalseQuestion 41Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textRole-based system access means that only people who fill or used to fill a certain role can access a specific system.Select one:TrueFalseQuestion 42Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textIf a court determines that a patent infringement is intentional, it can award up to ____ to the patent holder.Select one:a. $10 millionb. $250,000 per infringementc. three times the amount of damages claimed by the patent holderd. $150,000Question 43Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.Select one:a. Privacy Act of 1974b. USA Patriot Actc. Gramm-Leach-Bliley Actd. Electronic Communications Privacy ActQuestion 44Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe ____ required all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data.Select one:a. USA Patriot Actb. Freedom of Information Actc. Gramm-Leach-Bliley Actd. none of the aboveQuestion 45Not yet answeredMarked out of 1.00.com/theme/image.php/anomaly/core/1358276119/i/unflagged” alt=”Not flagged”>Flag questionQuestion textThe Identity Theft and Assumption Deterrence Act of 1998 assigns responsibility to the Department of Homeland Security for helping identity theft victims to restore their credit and ease the impact of the imposter.Select one:TrueFalse

"Get 15% discount on your first 3 orders with us"
Use the following coupon
"FIRST15"

Order Now