Advantage of proprietary software

Assignment Help Software Engineering
Reference no: EM13924124

Indicate whether the statement is true or false.

1. Channel bandwidth refers to the diameter of the telecommunications media.

2. Modems convert analog signals to digital signals for transmission over a network.

3. A personal area network is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building.

4. Application programs interact with systems software, and the systems software directs computer hardware to perform the necessary tasks.

5. Sequential access storage devices allow data to be accessed more quickly than direct access storage devices.

6. The technology infrastructure is a set of shared IS resources that form the foundation of each computer-based information system.

7. When organizing a database, key considerations include determining what data to collect, who will have access to it, how they might want to use it, and how to monitor database performance.

8. Disruptive change often results in new, successful companies and offers consumers the potential of new products and services at reduced costs and superior performance.

Multiple Choice: Identify the choice that best completes the statement or answers the question.

9. ________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU.

a. Main memory
b. The ALU
c. Registers
d. The CPU

10. One advantage of proprietary software versus off-the-shelf software is that _____

a. the initial cost is lower
b. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs
c. the software is likely to meet the basic business needs that are common across organizations
d. being involved in the development offers control over the results

11. _____ consists of computer programs that govern the operation of the computer.

a. Hardware
b. Applications
c. Software
d. Telecommunications

12. With _____ , the software engineer drags and drops graphical objects such as buttons and menus onto the application form.

a. assembly language
b. visual programming
c. machine code
d. fourth generation language

13. The _____ is a description that involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user.

a. entity relationship diagram
b. schema
c. data model
d. data manipulation language

14. A ________ is s field or set of fields in a record that uniquely defines the record.

a. attribute
b. primary key
c. key
d. data item

15. RAID storage devices provide organizations with data storage that is _____.

a. fault tolerant
b. extremely low cost
c. exceedingly fast
d. unlimited in storage capacity

16. _____ consists of computer equipment used to perform input, processing, and output activities.

a. Information technology
b. Telecommunications
c. Technology infrastructure
d. Hardware

17. The ________ is the heart of the operating system and controls its most critical processes.

a. user interface
b. kernel
c. utility programs
d. boot up disk

18. The goal of the _____ phase of systems development is to gain a clear understanding of the problem to be solved or opportunity to be addressed.

a. systems analysis
b. systems design
c. systems investigation
d. systems implementation

19. The smallest piece of data used by a computer is the _____.

a. entity
b. bit
c. byte
d. character

20. The ability of an organization to achieve its goals is often a function of the organization's _____

a. overall structure
b. ability to change
c. culture
d. all of the above

21. With the _____ basic processing alternative, processing devices are placed at various remote locations and each device is isolated and does not communicate with any other processing device.

a. distributed processing
b. centralized processing
c. file processing
d. decentralized processing

22. Total cost of ownership includes these costs

a. cost to acquire an item
b. end-user costs
c. technical support costs
d. all of the above

23. As long as the tables in a relational database share one common _____, the tables can be linked to provide useful information and reports.

a. primary key
b. characteristic
c. file
d. attribute

24. _____ are the most powerful computers with the fastest processing speed and highest performance.

a. Blade servers
b. Mainframe computers
c. Workstations
d. Supercomputers

25. ______ is a measure of the extent to which a system achieves its goals.

a. Efficiency
b. Performance rate
c. Reliability
d. Effectiveness

26. Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.

a. roll up
b. slice and dice
c. drill down
d. extract data

27. With network management software, a network manager can _____

a. monitor the use of individual computers as well as shared hardware devices
b. ensure compliance with software licenses
c. scan for licenses
d. all of the above

28. _____ is a measure of how widely technology is spread throughout an organization.

a. Technology infusion
b. Technology diffusion
c. Technology acceptance
d. Technology adoption

29. _____ is a network that connects users and their computers in a geographical area that spans a campus or a city.

a. Metropolitan area network
c. Wide Area network
b. Local area network
d. Personal area network

30. Green computing is focused at the efficient and environmentally responsible _____ of IS related products.

a. design and manufacture
b. disposal
c. operation
d. all of the above

31. _____ investigates the additional profits or benefits that are generated as a percentage of the investment in IS technology.

a. Net present value
b. Earnings growth
c. Return on investment
d. Market share

32. With a VPN ______

a. users are often provided a token that displays a constantly changing password
b. users can gain wide area network access
c. users can gain access to an organization's private network
d. all of the above

33. A database is a collection of integrated and related _____.

a. fields
b. records
c. attributes
d. files

34. The area covered by one or more interconnected wireless access points is commonly called a(n) _____.

a. reception area
b. coverage zone
c. hot spot
d. access area

35. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

a. cloud computing
b. parallel computing
c. grid computing
d. none of the above

36. The _____ is a device that combines data from multiple data sources into a single output signal that carries multiple channels.

a. transmission media
b. multiplexer
c. modem
d. switch

37. A(n) ______ enables users to share a certain number of outside lines to make telephone calls to people outside the organization.

a. DSL
b. modem
c. Wi-MAX
d. PBX

38. _____ is an important component of every information system that helps organizations to achieve their goals.

a. Hardware
b. Feedback mechanism
c. Software
d. Data

39. A type of memory whose contents are not lost if the power is turned off is said to be _____.

a. multicore
b. RAM
c. nonvolatile
d. none of the above

40. ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

a. user view
b. data definition language
c. schema
d. data manipulation language

41. An operating system with _____ capabilities allows a user to run more than one application at the same time.

a. networking capability
b. memory management
c. hardware independence
d. multitasking

42. The idea of ________ is to constantly seek ways to improve business processes and add value to products and services.

a. reengineering
b. disruptive change
c. process redesign
d. continuous improvement

43. After a computer system is started, portions of the operating system are transferred to _____ as they are needed.

a. the CPU
b. the back-up rescue disk
c. memory
d. none of the above

44. If an industry has low entry and exit costs and the technology needed to start and maintain a business is commonly available, this creates ________.

a. a threat of new entrants
b. increased bargaining power of customers and suppliers
c. a threat of substitute products and services
d. all of the above

45. _____ is (are) considered to be the most important element in a computer-based information system.

a. Hardware
b. Procedures
c. Software
d. People

46. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called ______.

a. cloud computing
b. service oriented architecture
c. rapid application development
d. Software as a Service

47. The _____ are low-cost, centrally managed computers with no extra drives or expansion slots and limited capabilities.

a. netbook computer
b. thin client computer
c. laptop computer
d. desktop computer

48. The process of defining relationships among data to create useful information requires ______

a. an information system.
b. knowledge
c. intelligence
d. intuition

49. A risk involved with using an application service provider is that _____

a. sensitive information could be compromised
b. a disaster could disable the ASP's data center
c. the ASP could be incapable of keeping its servers and network up and running consistently
d. all of the above

50. Customer relationship management programs help companies manage _____

a. programs to retain loyal customers
b. marketing and advertising
c. finished product inventory
d. a. and c.

Reference no: EM13924124

Questions Cloud

Write a function which adds the two numbers : In C write a function which adds the two numbers. Test this function by calling from the main. In main, the user should be asked to provide the two numbers.
What are trade-offs involved when constructing a portfolio : Describe the difference between a price momentum strategy and an earnings momentum strategy.  What are the trade-offs involved when constructing a portfolio using a full replication versus a sampling method?
Overall risk profile of the company : Overall Risk Profile of the Company: Overall risk profile of ABC Company based on current economic and industry issues that it may face are described below-
What would happen if the ring, rather than ball, were heated : A metal ball can pass through a metal ring. When the ball is heated, however, it gets stuck in the ring. What would happen if the ring, rather than the ball, were heated?
Advantage of proprietary software : One advantage of proprietary software versus off-the-shelf software is that _____
Describe the method available to take advantage of forecast : To perform well over the next three to six months. As an active portfolio manager, describe the various methods available to take advantage of this forecast.
Precise terms between the issuer and the bondholder : Which of the following is a legal contract that outlines the precise terms between the issuer and the bondholder?
Compute average return differential with and without sign : Given the monthly returns that follow, how well did the passive portfolio track the S&P 500 benchmark? Find the R2, alpha, and beta of the portfolio. Compute the average return differential with and without sign.
Hokusai - sketching streams in real time : You will implement and experiment with several algorithms to approximate historical item counts in a space-efficient manner.

Reviews

Write a Review

Software Engineering Questions & Answers

  Explain how architecting systems provide a means to deliver

the article is an overview of the topic of software architecture and contains several brief case studies in chapter 4.

  Describe functional and nonfunctional requirements

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

  Formal programming languages and natural languages

As we know that there are problems of understanding natural languages as opposed to formal programming languages. As an illustration of the complexities involved in the case of natural languages,.

  Evaluate the importance quality of service has to designers

Evaluate the importance quality of service has to designers. Choose two areas discussed in the textbook you would focus your attention to ensure quality of service for a team of designers that you were managing

  Why do companies fail at risk management

Why do companies fail at risk management? In responding to the question, draw from your own experiences, the text, the topic notes, the additional readings, and/or any additional sources that you research and cite.

  Question about vector or bitmap

When your customer hands you a job, how would you make the determination which type of graphic is the right selection, Vector or Bitmap, in your response,

  Web authoring application

Compare the drawbacks and benefits of using a Web authoring application, an HTML editor and a text editor for developing websites.

  Develop entity-relationship model to represent data

Develop an entity-relationship model representing the data that manager wants to store in database, based on following assumptions.

  Analysis assignment

As an analyst, pretend that you have been charged with the task of redesigning the interface for the student enrollment system at your college. Based on your research and readings, what type of prototyping interface design approach would you recom..

  Create a uml class diagram for a survey class

Create a UML Class Diagram for a Survey class - The Survey class will have a static class variable that stores the current respondent's ID. As respondents complete the survey, this value will be incremented by one.

  Answer the following questions using apa style and citing

answer the following questions using apa style and citing at least one credible source per answer with in-text and

  Analyzing variables, prompts and pseudocode

Demonstrate what the Personal Computer monitor will show when this program is executed with the following values used: 86, 55, and 100.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd