Answered You can hire a professional tutor to get the answer.

QUESTION

Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having

Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having

problems tracking the inventory levels for its stores. It is planning to implement an Oracle database system to replace this legacy system. Which of the following most supports Bringes' decision to replace its legacy system with an Oracle database system?

Conversion cost required for the implementation of an Oracle database system is not supported by the IT budget.

Maintenance of an Oracle database system is more expensive than the legacy system presently in use.

Bringes' channel partners use a database system that supports the Oracle database system.

Implementing an Oracle database system will require Bringe to hire additional specialized personnel to manage it.

Partial implementation of the Oracle database system can create more problems than it is likely to solve.

QUESTION 32

Which of the following statements best describes the productivity paradox of technology investment?

As investment in technology increases, productivity decreases steadily.

The productivity of any technology is directly proportional to the investment in that technology.

While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.

The productivity of an information system is in no way related to the investment in the technology.

While it is easy to identify and quantify the intangible benefits of an information system, it is not easy to quantify the tangible benefits.

QUESTION 33

A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________.

performance metric

critical performance initiative

key performance indicator

critical factor

critical performance indicator

QUESTION 34

Which of the following statements is true about a mashup?

It is used to disseminate information to a narrow audience.

It is the process of allowing companies to use everyday people as a cheap labor force.

It is used to increase brand awareness through the network effect.

It is an application or a Web site that uses data from one or more service providers.

It is a small interactive tool used for a single purpose.

QUESTION 35

________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.

Cybersquatting

Logic bombing

Spear phishing

Hacktivism

Bot herding

QUESTION 36

Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the payment to the customer's credit card. This process of selling a product or service is known as the ________ process.

make-to-stock

order-to-cash

time-to-market

procure-to-pay

make-to-order

QUESTION 37

Which of the following statements about a just-in-time strategy is true?

Companies using this strategy allow suppliers to manage the manufacturer's inventory levels based on pre-established service levels.

Retailers using this strategy allow suppliers to maintain ownership of inventory within their warehouses or stores until items are scanned at the point of sale.

Companies using this strategy try to optimize their ordering quantities such that parts or raw materials arrive just when they are needed for production.

Companies using this strategy maintain large inventories of supplies, parts, warehousing resources, and extra workers to meet production contingencies.

A manufacturer or retailer using this strategy shares real-time sales data with suppliers who maintain inventory levels based on pre-established agreements.

QUESTION 38

A dataset comprised of extremely large amounts of complex data would best be described as ________.

network data

big data

extreme data

mega data

a database

QUESTION 39

When a company uses a fingerprint recognition system instead of access cards, it helps the company prevent unauthorized physical access. Which of the following technologies is used for authentication here?

access-control software

passwords

smart cards

encryption

biometrics

QUESTION 40

In the context of GPS-enabled location-based services, the ability to determine the basic geographic position of a cell phone is an example of ________ service.

tracking

reintegration

navigation

location

mapping

QUESTION 41

An enterprise license is also known as a(n) ________ license.

click-wrap

volume

implied

shrink-wrap

shareware

QUESTION 42

Amazon.com took crowdsourcing mainstream with its micro-task marketplace called ________.

Citizen Science

Smart Mob

Click Workers

Mechanical Turk

Crowd Fixing

QUESTION 43

Companies implementing ________ enterprise resource planning (ERP) can benefit from scalability and agility.

in-memory

hard drive

subsidiary

cloud-based

internal-drive

QUESTION 44

Which of the following occurred in the 1946-1958 generation of computing?

The mainframe era began.

The internetworking era ended.

The mainframe era ended and the personal computer era began.

The personal computer era ended and the interpersonal computing era began.

The interpersonal computing era ended and the internetworking era began.

QUESTION 45

________ customer relationship management (CRM) systems help to create mass e-mail marketing campaigns wherein each consumer receives an individualized e-mail based on their prior purchase history.

Structured

Collaborative

Integrated

Analytical

Operational

QUESTION 46

Which of the following statements is true about companies pursuing a click-only business strategy?

These companies operate in both physical and virtual arenas.

These companies approach business activities by operating in physical locations.

These companies conduct business electronically in cyberspace.

These companies are only involved in export business activities.

These companies choose to operate their business activities solely in the traditional manner.

QUESTION 47

________ is a group meeting-based process for requirements collection.

Human-computer interface

Joint application design

Computer-aided design

Total ownership

Reverse engineering

QUESTION 48

When we consider entities as tables, each row is a ________.

form

field

record

bot

query

QUESTION 49

________ is the process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how a proposed information system should function.

Data modeling

End-user development

Requirements collection

External acquisition

Beta testing

QUESTION 50

Which of the following is likely to have the suffix ".com" after the domain name in its URL?

The Federal Reserve

Microsoft

The World Wide Fund for Nature

Massachusetts Institute of Technology

UNICEF

QUESTION 51

________ testing is performed by actual users of the system.

Developmental

Alpha

Beta

Evolutionary

Comparative

QUESTION 52

Identify the software that is cost effective, since the vendor that builds the application spreads out the development costs by selling copies to a large number of users?

bespoke software

custom software

corrected software

adapted software

packaged software

QUESTION 53

________ refers to the process of identifying, quantifying, and presenting the value provided by a system.

Deploying a software product

Testing a process

Refining a prototype

Making a business case

Making a prototype

QUESTION 54

Subprocesses of the procure-to-pay process include ________.

creating customer records

speeding up the collection process

collecting the payment

price and terms negotiations

creating customer satisfaction

QUESTION 55

The term  urbanization is best described as ________.

the movement of rural populations to urban areas

the movement of urban areas to the country

the movement of people between cities

the loss of people in major cities

the expansion of city boundaries

QUESTION 56

Which of the following statements is true about key-indicator reports?

They highlight situations that are out of the normal range.

They answer unplanned information requests to support a non-routine decision.

They help analyze why a key indicator is not at an appropriate level or why an exception occurred.

They are produced at predefined intervals to support routine decisions.

They provide a summary of critical information on a recurring schedule.

QUESTION 57

In electronic commerce, ________ is defined as the percentage of single-page visits.

showrooming

bounce rate

value chain analysis

freecycling

exit rate

QUESTION 58

The Computer Fraud and Abuse Act of 1986 prohibits ________.

the use of external devices to provide access and information to companies' confidential information

stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information

access to companies' extranets when outsourcing work to clients overseas

signing contracts with consultants outside the United States to process information

accessing company intranet and confidential information from public computers

QUESTION 59

Which of the following statements is true about peer production?

A guest is a person who can only view the digital information.

The creator is responsible for publishing new information.

Anyone can help in producing or improving the final outcome.

Only editors have the right to develop new content.

It is also known as an enterprise content system.

QUESTION 60

Which of the following types of information systems supports the coordination of suppliers, product or service production, and distribution?

intelligent system

collaboration system

electronic commerce system

supply chain management system

geographic information system

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question