Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Saint MBA570 module 2 quiz
Question 1
A useful guideline to protect corporate computers from criminal hackers is to ____.
Install antivirus software on all computers
Avoid creating frequent backups of critical data
Remove any firewall that may have been installed between your corporate network and the Internet
Enable several guest accounts
Question 2
The ability to ____ is a characteristic of a MIS system.
Barrier to communication
provide reports with fixed and standard formats
allow users to develop systems
use external data stored in the computer system
Question 3
All of the following are problem associated PowerPoint presentations except
a. Speaker read the slides
b. The text is too small
c. Speaker talks too long.
d. Poor use of colors
Question 4
One of the functional units likely to benefit from use of a customer relationship management system is ____.
Software development
Quality control
Marketing
Product analysis
Question 5
____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process.
B2C
B2B
C2C
G2C
Question 6
The Privacy Act of 1974 applies to all of these except____.
deals with the protection of communications while in transit from sender to receiver
applies only to certain federal agencies
Socialnetworking
requires all financial institutions to protect and secure customers’ nonpublic data from unauthorized use or access
Question 7
The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.
USA Patriot Act
Privacy Act of 1974
Gramm-Leach-Bliley Act
Electronic Communications Privacy Act
Question 8
____ is summary of what has been accomplished in the past or an update on a project.
Term paper
Prospectus
Report
Question 9
A ____ is a type of malware that executes when specific conditions occur.
Trojan horse
Worm
Logic bomb
Virus
Question 10
The second level in the capability maturity model is ____.
Defined
Managed
Repeatable
optimized
Question 11
The first stage in the problem solving process during which one identifies and defines potential problems or opportunities is the ____ stage.
Design
Intelligence
Choice
Monitoring
Question 12
The haptic interface, relays the sense of ____ in the virtual world.
Taste
Touch
Sight
sound
Question 13
Graphic files that can be used in animation are ____.
GIF
MP3
ISDB
WMV
Question 14
Data flow diagrams ____.
Are interactive
are used to model data entities and their relationships
Are linear
Are required
Question 15
____ can process many pieces of data at the same time and learn to recognize patterns.
Natural language processing systems
Neural networks
Voice recognition systems
Learning systems
Question 16
____ reports are a set of reports developed to provide certain information upon request.
Exception
Scheduled
drill-down
demand
Question 17
During the ____ stage of the problem solving process, you develop alternative solutions to the problem and evaluate their feasibility.
Choice
Implementation
Intelligence
design
Question 18
For many businesses, robots are used to do the three Ds, dull, dirty, and ____.
Dynamic
Devastating
Dangerous
dingy
Question 19
Roughly ____ of U.S. employers monitor their employees Web surfing activities.
50%
less that 20%
25%
75%
4 points
Question 20
____ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire.
Child Online Protection Act
Platform for Privacy Protection
Freedom of Information Act
IRCA
4 points
Question 21
The ____ is not a component of the typical DSS?
model base
user interface
database
inference engine
Question 22
A small program hidden in a network or computer system that records identification numbers and passwords is called a(n) ____.
Trojan horse.
logic bomb
password sniffer
rootkit
Question 23
The training of end users is an important task in the ____ phase of a systems development project.
predesign
systems maintenance and review
systems design
systems implementation
- @
- 177 orders completed
- ANSWER
-
Tutor has posted answer for $18.00. See answer's preview
******** 1
* ****** ********* ** ******* ********* ********* from ******** ******* ** ** ____
******* antivirus ******** on *** **********
Avoid ******** ******** ******* ** ******** data
****** *** ******** **** *** **** **** installed ******* your ********* network and *** *********
****** several guest accounts
******** **
*** ******* to **** ** a ************** ** * *** *******
Barrier to **************
******* ******* **** ***** *** ******** ********
***** ***** to ******* ********
*** ******** data stored ** *** ******** *******
******** **
*** ** *** ********* are problem associated ********** ************* except
a Speaker read *** slides
* *** **** ** *** ******
c Speaker ***** *** long
* Poor use of colors
******** **
*** ** the functional units ****** ** ******* **** *** ** * customer relationship management ****** ** ____
******** ************
******* ********
**********
******* analysis
******** **
____ ** a ****** ** ********** **** involves electronic transactions ******* ********* and * ***** ***** ** ********** *** ********
B2C
B2B
C2C
G2C
******** **
*** ******* *** ** 1974 ******* ** *** ** ***** ***********
***** with *** protection ** ************** while in transit **** ****** to *********
applies **** ** certain ******* *********
*****************
******** all financial ************ ** ******* *** ****** **************** ********* **** from unauthorized *** ** access
Question 7
*** ____ ******** ********* companies ** **** **** ******** *********** ********* numbers ****** ******* a court order ** the *** claims that *** ******* are ******** ** a terrorism **************
*** ******* ****
******* *** ** *****
****************** Act
********** Communications Privacy ****
******** **
**** ** summary ** **** *** **** accomplished in *** **** ** ** ****** ** * project
**** ******
***********
*******
Question 9
A **** is * **** of ******* **** ******** **** ******** ********** ******
****** ******
*****
***** *****
******
******** ***
*** ****** ***** ** *** capability ******** ***** ** *****
********
********
***********
optimized
******** ***
*** ***** stage ** *** ******* solving ******* during ***** *** identifies *** ******* ********* ******** ** opportunities ** *** **** ******
Design
*************
*******
***********
******** ***
The ****** ********* ****** *** sense ** **** in *** ******* world
Taste
Touch
******
******
******** ***
******* files **** can ** **** in ********* *** *****
****
****
ISDB
****
******** ***
**** **** ******** *****
Are ************
are **** ** model **** ******** *** their relationships
*** *******
*** *********
******** 15
**** can ******* many ****** ** data at *** same **** and ***** ** ********* *********
******* language processing ********
Neural *********
***** *********** ********
******** ********
******** ***
____ ******* are * *** ** ******* ********* to ******* ******* *********** upon ********
**********
**********
***********
*******
******** ***
****** the **** stage ** the ******* solving ******* you ******* *********** solutions to the ******* *** evaluate ***** ************
*******
Implementation
*************
*******
Question ***
*** **** businesses ****** *** used to do *** three ** **** dirty *** *****
********
************
**********
******
******** ***
Roughly ____ ** US employers ******* ***** employees Web ******* activities
****
**** **** ****
****
****
4 points
Question 20
**** ** * ********* ********** that shields ***** **** ***** **** ** *** ******* the level ** ******* ********** **** *******
***** Online ********** ****
******** *** Privacy Protection
******* ** *********** ****
*****
* *******
Question ***
*** ____ is *** * ********* of the ******* DSS?
model *****
user **********
database
********* *******
Question ***
* ***** ******* ****** ** a ******* ** ******** system **** ******* identification numbers *** ********* ** called **** *****
****** ******
***** *****
******** sniffer
rootkit
******** ***
*** training ** *** ***** is ** ********* **** in *** **** ***** of a ******* *********** ********
**********
******* *********** *** review
systems *******
systems **************