One advantage of proprietary software versus off-the-shelf


Indicate whether the statement is true or false.

1. Channel bandwidth refers to the diameter of the telecommunications media.

2. Modems convert analog signals to digital signals for transmission over a network.

3. A personal area network is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building.

4. Application programs interact with systems software, and the systems software directs computer hardware to perform the necessary tasks.

5. Sequential access storage devices allow data to be accessed more quickly than direct access storage devices.

6. The technology infrastructure is a set of shared IS resources that form the foundation of each computer-based information system.

7. When organizing a database, key considerations include determining what data to collect, who will have access to it, how they might want to use it, and how to monitor database performance.

8. Disruptive change often results in new, successful companies and offers consumers the potential of new products and services at reduced costs and superior performance.

Multiple Choice: Identify the choice that best completes the statement or answers the question.

9. ________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU.

a. Main memory
b. The ALU
c. Registers
d. The CPU

10. One advantage of proprietary software versus off-the-shelf software is that _____

a. the initial cost is lower
b. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs
c. the software is likely to meet the basic business needs that are common across organizations
d. being involved in the development offers control over the results

11. _____ consists of computer programs that govern the operation of the computer.

a. Hardware
b. Applications
c. Software
d. Telecommunications

12. With _____ , the software engineer drags and drops graphical objects such as buttons and menus onto the application form.

a. assembly language
b. visual programming
c. machine code
d. fourth generation language

13. The _____ is a description that involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user.

a. entity relationship diagram
b. schema
c. data model
d. data manipulation language

14. A ________ is s field or set of fields in a record that uniquely defines the record.

a. attribute
b. primary key
c. key
d. data item

15. RAID storage devices provide organizations with data storage that is _____.

a. fault tolerant
b. extremely low cost
c. exceedingly fast
d. unlimited in storage capacity

16. _____ consists of computer equipment used to perform input, processing, and output activities.

a. Information technology
b. Telecommunications
c. Technology infrastructure
d. Hardware

17. The ________ is the heart of the operating system and controls its most critical processes.

a. user interface
b. kernel
c. utility programs
d. boot up disk

18. The goal of the _____ phase of systems development is to gain a clear understanding of the problem to be solved or opportunity to be addressed.

a. systems analysis
b. systems design
c. systems investigation
d. systems implementation

19. The smallest piece of data used by a computer is the _____.

a. entity
b. bit
c. byte
d. character

20. The ability of an organization to achieve its goals is often a function of the organization's _____

a. overall structure
b. ability to change
c. culture
d. all of the above

21. With the _____ basic processing alternative, processing devices are placed at various remote locations and each device is isolated and does not communicate with any other processing device.

a. distributed processing
b. centralized processing
c. file processing
d. decentralized processing

22. Total cost of ownership includes these costs

a. cost to acquire an item
b. end-user costs
c. technical support costs
d. all of the above

23. As long as the tables in a relational database share one common _____, the tables can be linked to provide useful information and reports.

a. primary key
b. characteristic
c. file
d. attribute

24. _____ are the most powerful computers with the fastest processing speed and highest performance.

a. Blade servers
b. Mainframe computers
c. Workstations
d. Supercomputers

25. ______ is a measure of the extent to which a system achieves its goals.

a. Efficiency
b. Performance rate
c. Reliability
d. Effectiveness

26. Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.

a. roll up
b. slice and dice
c. drill down
d. extract data

27. With network management software, a network manager can _____

a. monitor the use of individual computers as well as shared hardware devices
b. ensure compliance with software licenses
c. scan for licenses
d. all of the above

28. _____ is a measure of how widely technology is spread throughout an organization.

a. Technology infusion
b. Technology diffusion
c. Technology acceptance
d. Technology adoption

29. _____ is a network that connects users and their computers in a geographical area that spans a campus or a city.

a. Metropolitan area network
c. Wide Area network
b. Local area network
d. Personal area network

30. Green computing is focused at the efficient and environmentally responsible _____ of IS related products.

a. design and manufacture
b. disposal
c. operation
d. all of the above

31. _____ investigates the additional profits or benefits that are generated as a percentage of the investment in IS technology.

a. Net present value
b. Earnings growth
c. Return on investment
d. Market share

32. With a VPN ______

a. users are often provided a token that displays a constantly changing password
b. users can gain wide area network access
c. users can gain access to an organization's private network
d. all of the above

33. A database is a collection of integrated and related _____.

a. fields
b. records
c. attributes
d. files

34. The area covered by one or more interconnected wireless access points is commonly called a(n) _____.

a. reception area
b. coverage zone
c. hot spot
d. access area

35. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

a. cloud computing
b. parallel computing
c. grid computing
d. none of the above

36. The _____ is a device that combines data from multiple data sources into a single output signal that carries multiple channels.

a. transmission media
b. multiplexer
c. modem
d. switch

37. A(n) ______ enables users to share a certain number of outside lines to make telephone calls to people outside the organization.

a. DSL
b. modem
c. Wi-MAX
d. PBX

38. _____ is an important component of every information system that helps organizations to achieve their goals.

a. Hardware
b. Feedback mechanism
c. Software
d. Data

39. A type of memory whose contents are not lost if the power is turned off is said to be _____.

a. multicore
b. RAM
c. nonvolatile
d. none of the above

40. ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

a. user view
b. data definition language
c. schema
d. data manipulation language

41. An operating system with _____ capabilities allows a user to run more than one application at the same time.

a. networking capability
b. memory management
c. hardware independence
d. multitasking

42. The idea of ________ is to constantly seek ways to improve business processes and add value to products and services.

a. reengineering
b. disruptive change
c. process redesign
d. continuous improvement

43. After a computer system is started, portions of the operating system are transferred to _____ as they are needed.

a. the CPU
b. the back-up rescue disk
c. memory
d. none of the above

44. If an industry has low entry and exit costs and the technology needed to start and maintain a business is commonly available, this creates ________.

a. a threat of new entrants
b. increased bargaining power of customers and suppliers
c. a threat of substitute products and services
d. all of the above

45. _____ is (are) considered to be the most important element in a computer-based information system.

a. Hardware
b. Procedures
c. Software
d. People

46. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called ______.

a. cloud computing
b. service oriented architecture
c. rapid application development
d. Software as a Service

47. The _____ are low-cost, centrally managed computers with no extra drives or expansion slots and limited capabilities.

a. netbook computer
b. thin client computer
c. laptop computer
d. desktop computer

48. The process of defining relationships among data to create useful information requires ______

a. an information system.
b. knowledge
c. intelligence
d. intuition

49. A risk involved with using an application service provider is that _____

a. sensitive information could be compromised
b. a disaster could disable the ASP's data center
c. the ASP could be incapable of keeping its servers and network up and running consistently
d. all of the above

50. Customer relationship management programs help companies manage _____

a. programs to retain loyal customers
b. marketing and advertising
c. finished product inventory
d. a. and c.

Solution Preview :

Prepared by a verified Expert
Software Engineering: One advantage of proprietary software versus off-the-shelf
Reference No:- TGS01230468

Now Priced at $50 (50% Discount)

Recommended (96%)

Rated (4.8/5)

A

Anonymous user

2/16/2016 7:30:02 AM

For the given assignment, you have to write which sentences are true or which are false. Remember to describe the main reason or concepts to support your response. 1) The channel bandwidth signifies to the diameter of the telecommunications media. 2) Modems transform analog signals to digital signals for the transmission over a network. 3) A personal area network is a wireless network which connects information networking devices in a small area, like an office, home or some floors of a building. 4) Application programs interact by the systems software and the systems software directs computer hardware to carry the essential tasks. 5) Sequential access storage devices let data to be accessed faster as compare to direct access storage devices. 6) The technology infrastructure is a set of shared IS resources which form the base of each and every computer-based information system.