ISYS 363 Quiz 3 Flashcards
A ________ is any computer that may both request and provide services.
a. port
b. console
c. peer
d. host
e. client
c. peer
Which of the following statements is true about user agents?
a. They are agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines.
b. They are agents that search to find the best price for a particular product a user wishes to purchase.
c. They are agents that automatically perform a task for a user.
d. They are also known as Web spiders.
e. They are agents that continuously analyze large data warehouses to detect changes deemed important by a user.
c. They are agents that automatically perform a task for a user.
Which of the following statements is true about business intelligence?
a. It is an act of outsourcing tasks, traditionally performed by an employee or contractor, to an undefined, large group of people or community, through the use of information technology.
b. It is an organization’s process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people.
c. It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.
d. It is the use of human resources to gather and analyze information from external sources in order to make better business decisions.
e. It is the process by which a customer-owned mutual organization or cooperative changes legal form to a joint stock company.
c. It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.
The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________.
a. cloud engineered data
b. external network capability
c. packaged networking
d. rapid elasticity
e. narrow network access
d. rapid elasticity
Which of the following statements is true about a digital dashboard?
a. It is a system for creating, storing, analyzing, and managing geographically referenced information.
b. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.
c. It is the combination of various analysis techniques and interactive visualization to solve complex problems.
d. It can visualize features and relationships between features drawn from an underlying geographic database.
e. It is used to combine geographic, demographic, and other data for locating target customers.
b. It is used to support push reporting, exception reporting and alerts, and pull reporting usage models.
The standard method of specifying the format of Web pages is called ________.
a. Practical Extraction and Report Language (PERL)
b. Hypertext Markup Language (HTML)
c. Extensible Markup Language (XML)
d. Assembly Language (AL)
e. Structured Query Language (SQL)
b. Hypertext Markup Language (HTML)
A major benefit of social software is the ability to harness the “wisdom of crowds” that is also referred to as ________.
a. consensus democracy
b. preference elicitation
c. creative commons
d. collaborative filtering
e. collective intelligence
e. collective intelligence
Which of the following is an example of an operating system?
a. Mozilla Firefox
b. Safari
c. Microsoft Office
d. Ubuntu Linux
e. Microsoft Surface
d. Ubuntu Linux
________ involves standardizing the format of data retrieved from different systems.
a. Data mining
b. Clustering
c. Content mining
d. Data cleansing
e. Digitizing
d. Data cleansing
Which of the following is used to increase Web application performance?
a. Distributed computing
b. Trusted computing
c. Green computing
d. Content delivery networks
e. IP convergence
d. Content delivery networks
A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of ________ electronic commerce.
a. government-to-government
b. government-to-citizen
c. business-to-consumer
d. business-to-business
e. government-to-business
a. government-to-government
Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. The introduction of middlemen in business models is an example of ________.
a. gentrification
b. reintermediation
c. defalcation
d. disintermediation
e. remutualization
b. reintermediation
A ________ is a data warehouse that is limited in scope.
a. data model
b. metadata repository
c. data mart
d. compound data
e. data entity
c. data mart
Cloud-based collaboration tools ________.
a. allow for easy transferability of documents from one person to another
b. require users to frequently upgrade their software
c. are complex and time-consuming
d. have well-documented procedures for system complexities
e. reduce the risk of exposing sensitive corporate data
a. allow for easy transferability of documents from one person to another
When a Web site ensures privacy and security of the consumer’s data, ________ can be achieved.
a. reintermediation
b. structural firmness
c. functional convenience
d. disintermediation
e. representational delight
b. structural firmness