Reference no: EM13758429
Question 1: A business that selects a differentiation strategy would ________.
Question 2: ________ information is information that directly pertains both to the context and to the subject.
Question 3: In a database, a table, which is a group of similar rows, is also called a ________.
Question 4: The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.
Question 5: ________ is a suite of software applications that consolidates existing systems by providing layers of software that connect applications together.
Question 6: Normal processing procedures for system users are ________.
Question 7: Which of the following is an open-source operating system?
Question 8: Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?
Question 9: ________ is the dynamic social media process of employing users to participate in product design or product redesign.
Question 10: Each stage of the value chain not only adds value to the product but also ________.
Question 11: One of the important functions of a DBMS is to provide the necessary tools for ________.
Question 12: Which of the following is true of a VPN (virtual private network)?
Question 13: Which of the following departments in an organization is supported by information systems applications such as recruitment and compensation?
Question 14: Which of the following statements is true about cloud services?
Question 15: The first phase in the customer life cycle involves ________.
Question 16: Which of the following is a technical safeguard against security threats?
Question 17: An internal information system built using Web services ________.
Question 18: The two strength factors that relate to all three competitive forces are ________ and customer loyalty.
Question 19: Which of the following is true of Web services?
Question 20: With HTTPS, data are encrypted using a protocol called the ________.
Question 21: Why is it important for business professionals to take an active role in developing and managing information systems?
Question 22: Which of the following is a major problem posed by multi-user processing of a database?
Question 23: Which of the following elements of a database application provides security, data consistency, and special-purpose processing?
Question 24: Which of the following is a characteristic of workgroup information systems?
Question 25: Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it?
Question 26: ________ is an international standard language that is used for processing a database.
Question 27: Which of the following statements is true of social CRM?
Question 28: ________ is a popular enterprise DBMS product from IBM.
Question 29: Which of the following is a valid reason for a company to create a new information system?
Question 30: Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework.
Question 31: Which of the following statements is true with regard to system maintenance?
Question 32: Security systems ultimately depend on the behavior of its ________.
Question 33: The number of bits to represent a single character is referred to as a ________.
Question 34: Because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________.
Question 35: Which of the following is the most complete and accurate definition of information technology?
Question 36: As a result of Moore's Law, ________.
Question 37: Which of the following elements of a database application helps in the insertion of new data and the deletion of existing data?
Question 38: ________ is a major issue faced by companies when implementing enterprise systems.
Question 39: Which of the following statements is true of the financial losses due to computer security threats?
Question 40: Compared to program development, systems development is ________.
Question 41: Which of the following is a characteristic of good information?
Question 42: Which of the following statements is true of social networking problems?
Question 43: In organizations where primary information systems support only accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical.
Question 44: Using https instead of http ________.
Question 45: Which of the following distinguishes information systems from information technology?
Question 46: Normal processing procedures for operations personnel are ________.
Question 47: Computers represent data using binary digits, called ________.
Question 48: What is a VPN (virtual private network)?
Question 49: Which of the following statements is true of customer relationship management (CRM) systems?
Question 50: The fact that Joe works 9 hours per day is an example of ________.