Search
Info
Warning
Danger

Study Resources (Accounting)

21) ________ data is highly summarized. A) Coarse B) Missing C) Clickstream D) Dirty 22) Clickstream data is ________. A) inconsistent B) too coarse C) too fine D) dirty data 23) Generally, it is better to have data that is ________ than data that is ________. A) random; specific B) inconsistent; unintegrated C) too fine; too coarse D) problematic; dirty 24) The more attributes there.
0 Views
View Answer
True or False 1) Systems development has a broader scope than computer program development. 2) Information systems involve people and procedures, so they can never be off-the-shelf. 3) Systems development is easy and risk-free. 4) The bigger the system and the longer the project, the more the requirements change. 5) One of the major challenges.
0 Views
View Answer
31) ________ is the application of statistical techniques to find patterns and relationships among data and to classify and predict. A) Data encryption B) Data warehousing C) Data mining D) Data compression 32) Which term is used as a synonym for data mining? A) OLAP B) neural networks C) market-basket analysis D) knowledge discovery in databases 33) In unsupervised data.
0 Views
View Answer
11) ________ occurs when a person gains unauthorized access to a computer system. A) Usurpation B) Spoofing C) Hacking D) Phishing 12) A problem in a customer billing system that occurs due to errors made during software installation is a case of ________ resulting from ________. A) faulty service; human error B) distributed denial of service; malicious.
0 Views
View Answer
21) Data warehouses and data marts are expensive to create, staff, and operate. 22) KDD is synonymous with data mining. 23) With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. 24) Regression analysis is used to find groups of similar customers from customer order and demographic.
0 Views
View Answer
9) Describe the development group of a firm's IS department. 10) What are tangible and intangible benefits? 11) How can one justify IS and IT projects? 12) Describe the responsibilities of a system analyst, a computer technician, and a network administrator.              13) What are a user's rights in relation to the IT department? 14).
0 Views
View Answer
11) The ________ approach is the classical process used to develop information systems. A) rapid application development (RAD) B) object-oriented design (OOD) C) systems development life cycle (SDLC) D) extreme programming (XP) 12) The initial step in the first phase of the SDLC is to ________. A) assess the feasibility of the project B) define the goals.
0 Views
View Answer
11) The cost feasibility of a systems development project is usually expressed in exact figures or terms. 12) Organizational feasibility concerns how long it will take to complete the project. 13) Systems analysts are IT professionals who understand both business and technology. 14) User involvement is redundant throughout the systems development process. 15) Interviews.
0 Views
View Answer
31) A ________ monitors, maintains, fixes, and tunes computer networks. A) technical writer B) network programmer C) PQA test engineer D) network administrator 32) A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and so on, and is required to have an entrepreneurial attitude. A) system.
0 Views
View Answer
Multiple Choice 1) E-commerce is the buying and selling of goods and services ________. A) over private and public computer networks B) in restricted markets using cyber intermediaries C) using intermediaries such as dealer and agents D) that cannot be sold via traditional distribution channels 2) Which of the following has enabled thin-client applications to have.
3 Views
View Answer
True or False 1) Knowledge of the responsibilities and duties of the IS department helps one become an effective consumer of the IS department's resources. 2) You need to know about the functions of the IS department to be a better informed and effective manager or executive. 3) One of the responsibilities of.
1 Views
View Answer
21) If a company's IS-related programs are not developed in-house, then the development group within its IT department will be staffed primarily by ________. A) test engineers B) systems analysts C) technical writers D) programmers 22) The development group in a company's IT department is staffed primarily by programmers, test engineers, technical writers, and.
0 Views
View Answer
21) In a pilot installation, a new system is installed in phases across the organization. 22) In a direct installation, the organization shuts off the old system and starts the new system. 23) All commercial software products are shipped with known failures. 24) Projects that spend little time documenting requirements are sometimes said.
0 Views
View Answer
11) Sales between a supplier and a retail consumer are ________ transactions. A) B2C B) B2B C) B2G D) C2C 12) Jackson Enterprises sells products online to the state-run Environmental Protection Agency. This is a ________ transaction. A) B2B B) B2C C) B2G D) C2C 13) Amazon.com, REI.com, and LLBean.com are examples of companies that use ________ information systems. A).
1 Views
View Answer
11) Contrary to popular belief, isolation of departmental applications cannot be held responsible for disjointed business processes. 12) Information silos can result in increased cost for an organization. 13) One way to fix informational silos is to eliminate data that are duplicated and storing a single copy of the data in a.
0 Views
View Answer
True or False 1) 1,000,000 bytes equal one gigabyte. 2) One kilobyte consists of 1,000 bytes. 3) A terabyte is larger than a petabyte in terms of computer storage. 4) A typical low-resolution photograph is equal to 1 terabyte. 5) Data-mining systems integrate data from multiple sources, processing it by sorting, grouping, and averaging, and.
0 Views
View Answer
Multiple Choice 1) The process of creating and maintaining information systems is called ________. A) systems development B) program development C) systems definition D) computer design 2) Compared to program development, systems development is ________. A) narrower in focus B) less comprehensive C) broader in scope D) mostly technical in nature 3) Which of the following is true of systems development?.
2 Views
View Answer
31) The advantage of ________ installation is that if the system fails, the failure is contained within a limited boundary. A) phased B) parallel C) pilot D) plunge 32) In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) pilot B) parallel C) phased D) plunge 33).
0 Views
View Answer
21) The easiest and cheapest time to alter the information system is in the ________  phase of the SDLC. A) requirements analysis B) system definition C) component design D) implementation 22) In terms of software design, for ________, the team must determine candidate products and evaluate them against the requirements while for ________, the team.
0 Views
View Answer
True or False 1) E-commerce is the buying and selling of goods and services exclusively over public computer networks. 2) Merchant companies sell services provided by others. 3) In B2C e-commerce, sales are made between companies. 4) An electronic exchange is an example of a merchant company. 5) Gateway Corp. eliminated all its channel members.
0 Views
View Answer
11) Decision tree analysis is a technique used by ________ systems. A) knowledge management B) data-mining C) reporting D) expert 12) ________ systems improve decision making by using the discovered patterns and relationships to anticipate events or to predict future outcomes. A) Knowledge management B) Expert C) Reporting D) Data-mining 13) ________ compute(s) the correlation of items on past orders.
2 Views
View Answer
11) The IT department's principal manager is the ________. A) CIO B) CEO C) CTO D) COO 12) In organizations where primary information systems support accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical. A) CEO B) COO C) CFO D) CTO 13) In organizations that operate significant nonaccounting information systems, such.
1 Views
View Answer
Essay 1) What is the difference between a megabyte and a gigabyte? 2) What is a business intelligence system? 3) Describe the characteristics and advantages of reporting systems. 4) Explain the characteristics and advantages of data mining systems. 5) What are the characteristics and advantages of knowledge management systems? .
0 Views
View Answer
11) In the case of traditional software vendors, extensive testing and true beta programs precede every product release. 12) Traditional software companies use the term software as a service to mean that they will provide their software products via the cloud. 13) Reviews form the bulk of user-generated content. 14) Crowdsourcing combines social.
0 Views
View Answer
Multiple Choice 1) ________ is information containing patterns, relationships, and trends. A) Technical writing B) Raw data C) Business intelligence D) Internal communication 2) One ________ is equal to 103 bytes. A) petabyte B) gigabyte C) megabyte D) kilobyte 3) A type written page is about 2 ________. A) megabytes B) kilobytes C) terabytes D) petabytes 4) One megabyte is equal to ________ bytes. A) 1,000 B) 1,000,000,000 C).
5 Views
View Answer
31) Google pioneered Web 2.0 advertising. With its ________ software, vendors pay Google a certain amount for particular search words. A) AdSense B) Adware C) AdWords D) AdCap 32) A(n) ________ is a structure of individuals and organizations that are related to each other in some way. A) folksonomy B) electronic exchange C) social network D) crowdsource 33) Karl.
0 Views
View Answer
21) When HP Computers began to sell directly to the public, some retailers resented the competition and stopped carrying HP products in their stores. This is an example of ________. A) reintermediation B) channel conflict C) mashups D) the bullwhip effect 22) Which of the following expenses are likely to increase for manufacturers who use.
0 Views
View Answer
Multiple Choice 1) Which of the following is an example of a security threat resulting from malicious human activity? A) an employee who misunderstands operating procedures B) an employee who accidentally deletes customer records C) an employee who inadvertently installs an old database on top of the current one D) an employee who intentionally.
4 Views
View Answer