Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
BIS 320 Final Exam July 2017 Version
1. A major criterion in deciding the most important perspectives of a business problem is:
usefulness
implementation
organizational needs
change management
2. Which of the following can force a business and its competitors to compete on price alone?
Transparent marketplace
Poor process efficiency
High product differentiation
Demand control
3. Software used to apply the computer to a specific task for an end user is called:
data management software
network software
system software
application software
4. To show each level of a system’s design, its relationship to other levels, and its place in the overall design structure, structured methodologies use:
process specifications
high-level data flow diagrams
structured diagrams
low-level data flow diagrams
5. The most basic business database is comprised of:
five tables: for customers, employees, suppliers, parts, and sales
four tables: for customers, suppliers, sales, and employees
four tables: for customers, suppliers, parts, and sales
three tables: for suppliers, parts, and sales
6. In order to achieve maximum benefit from an enterprise software package, a business:
selects only the software that best matches its existing business processes
uses only the processes in the software that match its own processes
changes the way it works to match the software’s business processes
customizes the software to match all of its business processes
7. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called:
multiplexing
packet switching
ATM
packet routing
8. What are the relationships that the relational database is named for?
Relationships between fields and records
Relationships between databases
Relationships between entities
Relationships between rows and columns
9. In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:
accountability and control
system quality
information rights and obligations
property rights and obligations
10. Which of the following is one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
Identify the options you cannot reasonably take.
Assign responsibility.
Identify the prime dependents.
Identify and clearly describe the facts.
11. The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called:
SEM
SEO
VPN
IAB
12. Which of the following collaboration tools would be appropriate for participants in separate locations who need to collaborate synchronously?
Team Room
Electronic meeting software
Group calendar
Blog
13. In a(n) ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods.
quantum
scalable
hybrid cloud
Autonomic
14. Microsoft® Excel® is an example of:
data management software
word processing software
presentation graphics
spreadsheet software
15. Virtualization:
allows smartphones to run full-fledged operating systems.
has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
can boost server utilization rates to 70% or higher.
allows one operating system to manage several physical machines.
16. Microsoft Word is an example of:
open-source software
word-processing software
software productivity suite
data management software
17. What is the most important benefit of an enterprise application?
Enabling speed of communicating
Enabling cost-effective, e-business processes
Enabling a company to work collaboratively with customers and suppliers
Enabling business functions and departments to share information
18. The oldest method for building information systems is:
the systems development lifecycle
prototyping
component-based development
object-oriented development
19. A VPN:
is an encrypted private network configured within a public network
is an Internet-based service for delivering voice communications
provides secure, encrypted communications using Telnet
is more expensive than a dedicated network
20. In choosing the best solution for a business problem, one of the most important considerations is:
change management
existing resources and skills
outcome measurement
employee training
21. Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.
execution
delivery
planning
demand
22. Which of the following statements about the Internet security is true?
The use of P2P networks cannot expose a corporate computer to outsiders.
VoIP is more secure than the switched voice network.
A corporate network with access to the Internet is more secure than one that provides access.
Instant messaging can provide hackers access to an otherwise secure network.
23. Which of the following statements is true about cloud computing?
It consists of three types of services: cloud infrastructure, cloud platform, and cloud software.
It removes the concern about data and systems security for businesses.
It prevents smaller firms to use resources previously affordable.
It relies on the help desk as the method for delivering services to users.
24. The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
Richness
Interactivity
Ubiquity
Personalization/customization
25. An independent computer program that copies itself from one computer to another over a network is called a:
Trojan Horse
Pest
Worm
Bug
26. Microsoft® PowerPoint® is an example of which type of software that provides more control over text and graphic placement in the layout of a page than word processing software?
presentation graphics
word processing software
data management software
spreadsheet software
27. Which of the following is a characteristic of an effective PowerPoint® Presentation slide?
Multiple complete sentences filling the slide with text
Three to five bullets per slide summarizing key points for the presenter
Extensive animation and sound effects
Embedded tables with fonts less than 12pt.
28. Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?
peer-to-peer network
PAN
campus area network
domain-based LAN
29. The most successful solutions or methods for achieving a business objective are called:
best processes
core processes
benchmarks
best practices
30. Specific security challenges that threaten corporate servers in a client/server environment include:
unauthorized access; errors; spyware
tapping; sniffing; message alteration; radiation
theft, copying, alteration of data; hardware or software failure
hacking; vandalism; denial of service attacks
- @
- 177 orders completed
- ANSWER
-
Tutor has posted answer for $28.00. See answer's preview
* A ***** criterion ** ******** the most ********* ************ ** * business ******* ***************************************** *********** *********** ***** ** *** ********* *** ***** * ******** *** its *********** ** ******* ** ***** ***************** *************** ******* ************** ******* ********************* ******** ******** **** ** ***** *** computer ** * ******** **** for an *** **** ** called:data ********** *************** ************** ******************* ********* ** **** **** level of * system’s ****** *** relationship ** ***** ****** and its place ** *** ******* design ********* ********** methodologies *********** ************************ **** flow ****************** diagramslow-level data flow ********* The **** basic ******** ******** ** ********* ******* ******* *** ********* ********* ********* ***** and ********* ******* for ********* ********* sales *** ************* ******* for ********* ********* ***** *** ********** ******* *** suppliers ***** *** ****** In ***** ** ******* ******* ******* from ** ********** ******** ******* * **************** **** *** ******** **** **** matches its ******** business ************* **** *** ********* ** the ******** **** match its *** **************** *** *** ** ***** ** ***** the ************ business processescustomizes the software ** match *** ** *** business ********** *** ****** ** ******* digital ******** into ******* ************ **** ***** ********* ************* paths and ************ **** at ***** ************ ** ************************* ****************** ******** **** *** *** ************* that the ********** ******** ** ***** ***************** ******* fields and ******************** between ********************** ******* ********************* ******* rows *** ******** ** the information age the *********** that individuals *** ************* have ********** ****** ** ************ ******** **** ****** *** ***** ********* of:accountability and ************* ****************** rights and obligationsproperty rights *** ************* Which of *** following ** *** of the five ***** ********* ** *** ******* ** * ******* *** ********* ** ******* issue?Identify *** options *** ****** reasonably ********** ********************** the ***** dependentsIdentify and clearly describe *** ******* *** ******* ** ********* ********** to **** * *** **** achieve a ****** ranking **** *** ***** ****** ******* ** ********************* ***** ** *** ********* ************* ***** ***** ** appropriate *** ************ ** separate ********* *** **** ** *********** ****************** RoomElectronic meeting softwareGroup calendarBlog13 ** a(n) ******** ********* ***** ********* use their *** ************** *** essential computing ***** *** ***** ****** cloud ********* *** less critical operations or ********** ********** ****** **** ******** **************************** **************** *********** Excel® ** ** ******* of:data ********** softwareword ********** ******************** ******************* ********** Virtualization:allows smartphones ** *** ************ operating ********** ******* ************** manufacturers to ****** *** **** of transistors ** the width of an ******* ***** ****** utilization rates to *** ** ************ one ********* system ** ****** ******* ******** machines16 Microsoft **** ** ** example ************** *********************** softwaresoftware productivity suitedata ********** ********** **** is *** **** ********* ******* of ** enterprise ******************** ***** ** ********************* ************** ********** ***************** a ******* ** **** *************** with customers *** ***************** ******** functions *** *********** ** ***** ************* *** oldest method *** ******** *********** ******* ****** systems *********** *********************************** developmentobject-oriented development19 * ****** an ********* ******* network configured ****** a public ********* ** ************** service *** ********** ***** communicationsprovides secure ********* communications ***** ******** **** ********* than * ********* ********* ** ******** *** best ******** *** * ******** problem *** ** the most ********* considerations ********* managementexisting ********* *** ************* ******************* ********** ****** ***** ******** ******* ****** the **** ** ******** ******* distribution ******* *** ********** ** ****** **** ******** *** ********* ** *** right ********* ** *** most ********* *************************************** ***** of *** following statements ***** *** Internet ******** is ******** *** of P2P ******** ****** expose a ********* ******** ** ************* ** **** secure **** *** ******** ***** ******** ********* ******* with ****** to *** Internet ** **** ****** **** one **** ******** ************* messaging *** ******* hackers ****** ** ** otherwise secure ********* Which ** *** following ********** ** **** ***** ***** ************ ******** ** ***** ***** ** ********* ***** ************** cloud ******** *** cloud ********** ******* *** ******* about **** *** ******* ******** for ************ prevents smaller ***** ** *** ********* previously ************ relies ** *** help **** ** *** ****** *** delivering services ** ******* *** act ** engaging ********* ** a ****** **** dynamically ******* *** experience ** the ********** describes ***** ********* of e-commerce *********************************************************************** ** independent computer ******* **** ****** ****** **** *** computer to ******* **** a ******* ** ****** ******** HorsePestWormBug26 Microsoft® PowerPoint® is an example of ***** type ** ******** **** ******** more control **** **** *** ******* placement ** the layout ** * **** **** **** processing ********************* ************ ********** ************ ********** ******************* ********** ***** of *** following is * ************** ** an effective ************ ************ ************** ******** ********* filling the slide **** textThree ** **** ******* *** slide *********** *** ****** *** *** presenterExtensive ********* and ***** *************** ****** with ***** **** **** ****** ***** **** ** ******* ***** be most *********** *** a ******** ********* of three ********* *** a ******* located ** *** **** office ***** whose ******* need is ** ***** ********************** **************** area ******************* ***** *** **** ********** solutions ** methods *** ********* * business objective are *********** processescore *********************** practices30 ******** ******** ********** **** ******** corporate servers ** a ************* environment ******************** ******* ******* *************** sniffing; message *********** ************** copying alteration of data; ******** ** ******** *************** ********** ****** ** ******* ***********