ISYS 363 Quiz 3 Flashcards

1
Q

A ________ is any computer that may both request and provide services.

a. port
b. console
c. peer
d. host
e. client

A

c. peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements is true about user agents?

a. They are agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines.
b. They are agents that search to find the best price for a particular product a user wishes to purchase.
c. They are agents that automatically perform a task for a user.
d. They are also known as Web spiders.
e. They are agents that continuously analyze large data warehouses to detect changes deemed important by a user.

A

c. They are agents that automatically perform a task for a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following statements is true about business intelligence?

a. It is an act of outsourcing tasks, traditionally performed by an employee or contractor, to an undefined, large group of people or community, through the use of information technology.
b. It is an organization’s process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people.
c. It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.
d. It is the use of human resources to gather and analyze information from external sources in order to make better business decisions.
e. It is the process by which a customer-owned mutual organization or cooperative changes legal form to a joint stock company.

A

c. It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________.

a. cloud engineered data
b. external network capability
c. packaged networking
d. rapid elasticity
e. narrow network access

A

d. rapid elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements is true about a digital dashboard?

a. It is a system for creating, storing, analyzing, and managing geographically referenced information.
b. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.
c. It is the combination of various analysis techniques and interactive visualization to solve complex problems.
d. It can visualize features and relationships between features drawn from an underlying geographic database.
e. It is used to combine geographic, demographic, and other data for locating target customers.

A

b. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The standard method of specifying the format of Web pages is called ________.

a. Practical Extraction and Report Language (PERL)
b. Hypertext Markup Language (HTML)
c. Extensible Markup Language (XML)
d. Assembly Language (AL)
e. Structured Query Language (SQL)

A

b. Hypertext Markup Language (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A major benefit of social software is the ability to harness the “wisdom of crowds” that is also referred to as ________.

a. consensus democracy
b. preference elicitation
c. creative commons
d. collaborative filtering
e. collective intelligence

A

e. collective intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an example of an operating system?

a. Mozilla Firefox
b. Safari
c. Microsoft Office
d. Ubuntu Linux
e. Microsoft Surface

A

d. Ubuntu Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ involves standardizing the format of data retrieved from different systems.

a. Data mining
b. Clustering
c. Content mining
d. Data cleansing
e. Digitizing

A

d. Data cleansing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is used to increase Web application performance?

a. Distributed computing
b. Trusted computing
c. Green computing
d. Content delivery networks
e. IP convergence

A

d. Content delivery networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of ________ electronic commerce.

a. government-to-government
b. government-to-citizen
c. business-to-consumer
d. business-to-business
e. government-to-business

A

a. government-to-government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________.

a. gentrification
b. reintermediation
c. defalcation
d. disintermediation
e. remutualization

A

b. reintermediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ________ is a data warehouse that is limited in scope.

a. data model
b. metadata repository
c. data mart
d. compound data
e. data entity

A

c. data mart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud-based collaboration tools ________.

a. allow for easy transferability of documents from one person to another
b. require users to frequently upgrade their software
c. are complex and time-consuming
d. have well-documented procedures for system complexities
e. reduce the risk of exposing sensitive corporate data

A

a. allow for easy transferability of documents from one person to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a Web site ensures privacy and security of the consumer’s data, ________ can be achieved.

a. reintermediation
b. structural firmness
c. functional convenience
d. disintermediation
e. representational delight

A

b. structural firmness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements is true about electronic commerce?

a. All forms of electronic commerce involve business firms.
b. Electronic commerce between businesses and their employees is impossible.
c. Business-to-business electronic commerce is by far the largest form of electronic commerce in terms of revenues.
d. Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce.
e. Electronic commerce is limited to transactions between businesses and consumers.

A

c. Business-to-business electronic commerce is by far the largest form of electronic commerce in terms of revenues.

17
Q

Which of the following statements is true about key-indicator reports?

a. They provide a summary of critical information on a recurring schedule.
b. They answer unplanned information requests to support a non-routine decision.
c. They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
d. They are produced at predefined intervals to support routine decisions.
e. They highlight situations that are out of the normal range.

A

a. They provide a summary of critical information on a recurring schedule.

18
Q

Some search engines offer to elevate a page’s position in the organic results after paying a fee. This is known as ________.

a. e-information
b. paid inclusion
c. paid analysis
d. e-reintermediation
e. e-subscription

A

b. paid inclusion

19
Q

In addition to being used for communication and collaboration, organizational intranets are widely used for enabling employee self-service for administering benefits, managing retirement plans, or other human resources-based applications through employee ________.

a. entities
b. plans
c. portals
d. tools
e. channels

A

c. portals

20
Q

Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement.

a. pay-per-conversion
b. click-per-visit
c. pay-per-sale
d. pay-per-refresh
e. pay-per-click

A

e. pay-per-click

21
Q

Which of the following statements is true about an IP address?

a. It can be used to navigate to particular Web addresses.
b. Each number separated by periods can have any number between 0 and 999.
c. The format of an IP address is a 64-bit numeric address.
d. It is written as eight numbers separated by periods.
e. It is written as a number with a period at the end.

A

a. It can be used to navigate to particular Web addresses.

22
Q

Which of the following statements is true about an information system?

a. Its design goal is to enhance performance.
b. It is primarily used by online customers, clerks, salespersons, and administrators.
c. Its primary purpose is to run the business on a current basis.
d. Its design goal is to enhance ease of access and use.
e. It consists of narrow and simple updates and queries.

A

d. Its design goal is to enhance ease of access and use.

23
Q

________ is the process of grouping related records together based on having similar values for attributes.

a. Inferencing
b. Normalization
c. Slicing and dicing
d. Clustering
e. Data mining

A

d. Clustering

24
Q

With respect to the online consumer’s hierarchy of needs, identify the most critical characteristic of a Web site.

a. descriptive link text
b. representational delight
c. functional convenience
d. structural firmness
e. cross-platform compatibility

A

d. structural firmness

25
Q

Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________.

a. the companies have already decided when to launch their next product
b. the product is designed to last only for a certain life span
c. the companies do not enter markets that have the risk of product obsolescence
d. the product is designed to avoid obsolescence
e. the product is designed in such a way as to extend its life span

A

b. the product is designed to last only for a certain life span

26
Q

What is one of the main topics discussed in the Google and Facebook data center videos shown or mentioned in class?

a. How sophisticated their database algorithms are when analyzing profiles and searches to only show the most relevant ads.
b. How they are practicing green computing by leveraging airflow and innovative cooling systems through the data center to reduce their power consumption and cooling expenses.
c. All of these.
d. How they leverage cloud computing to achieve faster database results.

A

b. How they are practicing green computing by leveraging airflow and innovative cooling systems through the data center to reduce their power consumption and cooling expenses.

27
Q

Which of the following statements is true about peer production?

a. The creator is responsible for publishing new information.
b. A guest is a person who can only view the digital information.
c. It is also known as an enterprise content system.
d. Anyone can help in producing or improving the final outcome.
e. Only editors have the right to develop new content.

A

d. Anyone can help in producing or improving the final outcome.

28
Q

Which of the following is a mechanism for consumer-to-consumer transactions?

a. e-tendering
b. e-auctions
c. e-filing
d. e-integration
e. e-tailing

A

b. e-auctions

29
Q

An electronic ________ is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.

a. tag cloud
b. folksonomy
c. meeting system
d. data interchange
e. fund transfer

A

c. meeting system

30
Q

________ is an example of an electronic communication tool.

a. Google Talk
b. Apple FaceTime
c. Microsoft Outlook
d. Google Docs
e. MS SharePoint

A

c. Microsoft Outlook