Signin/Signup
Signin/Signup
Info
Warning
Danger

Accounting Answers, Flashcards, Essays and Textbook Solutions

The hard task of handling college homework is one of the most common challenges in the path of student success. No student ever says, "Hey I love homework! Give me more!" (However nerdy they are) Yet, it is an unavoidable part of your college experience.

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
84) A ________ is a computing device that prevents unauthorized network access. A) firewall B) payload C) cookie D) hot site 85) A(n) ________ is a computer program that replicates itself. A) spyware B) virus C) cookie D) adware 86) ________ are viruses that masquerade as useful programs or files. A) Spyware programs B) Worms C) Cookies D) Trojan horses 87) A(n) ________ is.
4 Views
View Answer
54) With ________ installation, organizations implement an entire system/business process on a limited portion of the business. A) parallel B) phased C) pilot D) plunge 55) Dorex Manufacturing builds an ERP system to streamline its business activities. After being tested, the company implements the system only in the procurement department. This is an example of.
6 Views
View Answer
Multiple Choice 1) A ________ is a network of activities for accomplishing a business function. A) workgroup B) task force C) business portfolio D) business process 2) In swimlane format, ________ are specific tasks that need to be accomplished as part of a business process. A) repositories B) resources C) activities D) databases 3) A ________ is a subset of the.
23 Views
View Answer
48) A digital dashboard is a(n) ________. A) electronic input device used in business intelligence systems B) information system that is used to enter data into databases C) visualization that is customized for a particular user D) digital device in the central processing unit of a BI system 49) A(n) ________ analysis is used to.
7 Views
View Answer
100) Describe how BI information systems supported the decision-making process. 101) Describe the MapReduce technique. 102) Describe the risks associated with missing data and data silos. 103) Describe the major risks faced by businesses from business intelligence users. .
4 Views
View Answer
21) Information systems and information technology are not the same. 22) Information systems can be bought whereas information technology cannot. 23) Strong passwords have a maximum of five characters. 24) Good passwords contain a complete dictionary word. 25) If your password is complex, it is ideal to write the password on a piece of.
7 Views
View Answer
68) Which of the following is an example of unsupervised data mining? A) OLAP analysis B) RFM analysis C) market basket analysis D) regression analysis 69) Which of the following is true about unsupervised data mining? A) Activities are different from a reporting activity. B) Analysts do not create a model before running the analysis. C) Statistical analysis.
6 Views
View Answer
1) BPM is a cyclical process for systematically monitoring, modeling, creating, and implementing business processes. 2) The effectiveness objective of an organization determines how well a process uses its resources. 3) In the BPM activity of creating process components, the team designs changes to the business process at a depth sufficient for.
18 Views
View Answer
74) How can individuals safeguard their data from being misused? A) by storing passwords in personal mails B) by using the same password for all email accounts C) by removing temporary Internet files D) by enabling Web sites to store cookies 75) Which of the following is a senior management's function to safeguard against security.
8 Views
View Answer
21) Market basket analysis predicts cross-selling opportunities. 22) With unsupervised data mining, analysts typically create a model or hypothesis before running the analysis. 23) Dashboards can be used to monitor business processes and indicate abnormal conditions with clear signs. 24) The decision-making process is one of the most frequently occurring processes in an.
5 Views
View Answer
108) What is biometric authentication? What are its advantages and disadvantages? 109) Describe how SSL/TLS works when a system communicates securely with a Web site. 110) Describe some data safeguards taken against security threats. 111) Describe the importance of position definitions as human safeguards for employees. 112) How do organizations use incident response plans.
10 Views
View Answer
1) A typical business intelligence database is large in volume. 2) BI systems are reducing their capacity to help businesses identify important patterns in data. 3) The objective of most business intelligence processes is to inform. 4) The efficiency objective of business intelligence is to inform someone in the business. 5) BI systems.
23 Views
View Answer
71) A company creates a Facebook page to improve its public image and connect with its customers. By doing this, the company is attempting to build ________. A) employee capital B) human capital C) social capital D) traditional capital 72) Which of the following is a major objective of building social capital? A) ensuring timely delivery.
7 Views
View Answer
31) Data is knowledge derived from information. 32) Average wage is knowledge that can be derived from the data of individual wages. 33) As long as information is relevant and timely, it need not always be complete. 34) Data delivered with active graphics need not be cross-checked for accuracy. 35) Accurate information is.
8 Views
View Answer
78) Because of the massive volume of Big Data, it has to be processed using the ________. A) traditional technique B) relational database C) SQL database D) MapReduce technique 79) ________ is an open-source program supported by the Apache Foundation that implements MapReduce on potentially thousands of computers. A) Hadoop B) HTTP Server C) Struts D) ActiveMQ 80).
5 Views
View Answer
21) Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework. A) computer side to the human side B) data side to the procedures side C) human side to the computer side D) software side to the hardware side 22) Which of the following statements is true of.
5 Views
View Answer
58) An OLAP report that displays information using three dimensions is called a(n) ________. A) warehouse B) dashboard C) cluster D) info cube 59) An organization uses a business intelligence system to predict products that tend to be purchased together. This is an example of a(n) ________ process. A) reporting B) information extracting C) evaluating D) data mining 60) Which.
4 Views
View Answer
38) A credit card provider uses a software to determine the likelihood of customers defaulting on their payments. The software assigns a credit score to each customer based on their past transactional records. This software is an example of a ________ system. A) project management B) business intelligence C) collaboration D) budgeting 39) Which of.
5 Views
View Answer
Multiple Choice 1) "The number of transistors per square inch on an integrated chip doubles every 18 months." This observation is known as ________ Law. A) Murphy's B) Moore's C) Amdahl's D) Metcalfe's 2) Which of the following statements states Moore's Law? A) A computer becomes obsolete within 18 months. B) The number of transistors per square inch.
17 Views
View Answer
31) Which of the following characteristics would weaken a password? A) containing a complete dictionary word B) containing both upper- and lowercase letters C) containing the numbers 9 and 3 D) containing three special characters 32) Which of the following is the weakest password? A) B33rmu9 B) Qw37^T1bb?as C) 3B47qq<3>5!7bdE D) As60$T1dd?dc 33) Which of the following is considered a.
5 Views
View Answer
21) Which of the following is true about the management and use of information systems? A) An employee must be a programmer to manage information systems. B) Information systems must be adapted to changing requirements. C) Information systems need not be maintained after development. D) Organizations with dynamic business environments do.
6 Views
View Answer
44) During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate. A) component creation B) monitoring C) modeling D) process implementation 45) During the modeling activity of BPM, teams build an as-is model which ________. A) simulates the ideal situation B) designs new business processes C) documents.
10 Views
View Answer
92) Describe with an example how social media listening helps organizations improve business processes. 93) Define traditional capital and human capital. 94) What is social capital? 95) What are the three objectives of building social capital? 96) What is meant by "the strength of a relationship" in the context of social capital? How can.
7 Views
View Answer
11) According to the business process modeling notation standard, an activity with a boxed plus sign inside it indicates a ________. A) subprocess B) data flow C) sequence flow D) data repository 12) Which of the following statements is true about business process modeling notation? A) Sequence flows are indicated by dashed lines. B) Data flows are.
16 Views
View Answer
64) In the context of the sources of threats, computer crime involves ________. A) poorly designed procedures B) intentional destruction of data C) natural events and disasters D) poorly written applications 65) ________ refers to a social engineering attack in which someone deceives by pretending to be someone else. A) Pretexting B) Keylogging C) Sniffing D) Denial of service 66).
6 Views
View Answer
21) In an IS framework, software and procedure components are both sets of instructions. 22) Procedures act as the bridge between the computer and human sides of the five-component framework of an IS. 23) Automation is the process in which instructions for humans are transferred to instructions for hardware. 24) Automation moves work.
5 Views
View Answer
11) Effective collaboration is all about being nice to your team members. 12) When business was stable, professionals avoided experimenting in fear of failure. 13) Experimentation only increases the fear of failure. 14) If you are provided with an unfamiliar program and are asked to use it, you are being tested on.
6 Views
View Answer
11) When a pilot implementation fails, the failure is contained within a boundary. 12) Parallel installation is also called direct installation. 13) The work done during the maintenance activity of the SDLC process is either to fix the system or to adapt it to changes in requirements. 14) The nature of the SDLC.
9 Views
View Answer
94) What is BPM? What are the basic activities in BPM? 95) Describe the modeling activity of BPM. 96) List the activities in the SDLC process. 97) Explain the importance of the requirements determination stage of the SDLC process. 98) Briefly describe the tasks in the implementation activity of the SDLC process. 99) What is.
8 Views
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*