Search
Info
Warning
Danger

Study Resources (Accounting)

1) Telephone networks are fundamentally different from computer networks. 2) Increasingly, voice, video, and data communications are all based on Internet technology. 3) To create a computer network, you must have at least two computers. 4) An NOS must reside on a dedicated server computer in order to manage a network. 5) A hub.
3 Views
View Answer
11) In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment. 12) Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire. 13) Fiber-optic cable is more expensive and harder to install than wire media. 14).
1 Views
View Answer
85) Why is software quality important to security? What specific steps can an organization take to ensure software quality? 86) Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is.
0 Views
View Answer
61) Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best describes ________ applications. A) operational CRM B) analytical CRM C) operational SCM D) analytical SFA 62) Operational CRM applications include tools for: A) identifying buying patterns. B) calculating CLTV. C) salesforce automation. D) pinpointing unprofitable customers. 63) Analytical CRM.
0 Views
View Answer
41) Which supply chain planning function determines how much product is needed to satisfy all customer demands? A) Distribution management B) Replenishment planning C) Demand planning D) Order planning 42) Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in.
0 Views
View Answer
51) You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? A) one-to-many B) one-to-one C) many-to-many D) many-to-one 52).
0 Views
View Answer
21) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) hub. B) switch. C) router. D) NIC. 22) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet.
0 Views
View Answer
31) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Microwave B) LAN C) WAN D) MAN 32) Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) Peer-to-peer B) Wireless C) LAN D) Ring 33) Which type of.
0 Views
View Answer
61) ________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies 62) Currently, the protocols used for secure information transfer over the.
0 Views
View Answer
31) A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the: A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain. 32) A company's organizations and processes for distributing and delivering products to the final customers is.
0 Views
View Answer
71) The floppy disk used by earlier generation PCs for portable storage has now been largely replaced by: A) CDs. B) flash drives. C) DVDs. D) hard disks. 72) Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit. 73) A(n).
0 Views
View Answer
86) You are an IT consultant advising a building inspection company that conducts home inspections throughout your state. The company wishes to switch to primarily mobile computing, so that inspectors can finalize reports without having to return to the office, but they are not sure what will suit their needs..
0 Views
View Answer
41) Access is a: A) DBMS for small handheld computing devices. B) popular open-source DBMS. C) DBMS for midrange computers. D) DBMS for desktop systems. 42) In clustering, a data mining tool will: A) find new groupings within data. B) find related predictions from existing values. C) find several events grouped by time. D) find new associations. 43) MySQL is.
0 Views
View Answer
89) Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used? 90) How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more .
0 Views
View Answer
11) The distributed nature of cloud computing makes it somewhat easier to track unauthorized access. 12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. 13) An acceptable use policy defines the acceptable level.
1 Views
View Answer
1) Enterprise systems include analytical tools. 2) Supply chain management systems are a type of enterprise system. 3) Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers. 4) The upstream portion of the supply chain consists of the organizations and processes for.
3 Views
View Answer
21) From your reading of the chapter's opening case, Cannondale implemented new information systems in order to achieve which of the main six business objectives? A) Customer and supplier intimacy B) Operational excellence C) Survival D) Improved decision making 22) A suite of integrated software modules for finance and accounting, human resources, manufacturing and.
0 Views
View Answer
61) A set of self-contained services that communicate with each other to create a working software application is called: A) Web services. B) enterprise integration. C) SOA. D) ERP. 62) ChicagoCrime.org, which combines Google Maps with crime data for the city of Chicago, is an example of: A) cloud computing. B) SOA. C) a widget. D) a mashup. 63) ________.
0 Views
View Answer
51) ________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. A) SCM B) SFA C) ERM D) PRM 52) ________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation. A) SCM B) SFA C) ERM D) PRM 53) Customer relationship.
0 Views
View Answer
41) Evil twins are: A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to.
0 Views
View Answer
81) Describe the five major categories of IT infrastructure and provide an example of each. 82) An international ad hoc group of climatologists and oceanographers needs to set up a system to analyze massive amounts of data on ocean temperatures, collected hourly by hundreds of ships worldwide. What types of hardware.
0 Views
View Answer
51) Application controls: A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and.
0 Views
View Answer
71) Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. A) intersection relations B) referential integrity rules C) entity-relationship diagrams D) foreign keys 72) A DBMS is special software for creating, storing, organizing, and accessing data from a database. 73) A physical view shows data as it is organized on the.
0 Views
View Answer
71) A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) switch B) firewall C) server D) network operating system/NOS 72) A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. 73) Prior to the development.
0 Views
View Answer
70) Smaller firms may outsource some or many security functions to: A) ISPs. B) MISs. C) MSSPs. D) CAs. 71) A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: A) war driving. B) sniffing. C) cybervandalism. D) driveby tapping. 72) Malicious software programs referred to as spyware.
0 Views
View Answer
51) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless 52) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact.
5 Views
View Answer
21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms" 22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability.
0 Views
View Answer
71) ________ consists of a set of interdependent software modules that support basic internal business processes for finance and accounting, human resources, manufacturing and production, and sales and marketing. A) SCM software B) PRM software C) Enterprise software D) Service platforms 72) A company's supply chain describes how raw materials are transformed into finished products.
0 Views
View Answer
1) Smartphones have the same security flaws as other Internet-connected devices. 2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. 3) Viruses can be spread through e-mail. 4) The term cracker is used to identify a hacker whose specialty is breaking.
4 Views
View Answer
41) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. 42) Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically.
0 Views
View Answer