Question 1a is a professional who is relatively well


Question 1:A ________ is a professional who is relatively well educated and creates, modifies, and/or synthesizes knowledge as a fundamental part of his/her job.

  1. Webmaster 
  2. Technician 
  3. Knowledge Worker
  4. CIO


Question 2:A global information systems strategy is characterized by ________ systems

  1. distributed
  2. centralized 
  3. decentralized 
  4. homogeneous


Question 3:________ is/are combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings.

  1. Information Systems
  2. Routers 
  3. Business 
  4. Technology


Question 4:Companies setting up entire factories in China is an example of

  1. on-shoring 
  2. offshoring
  3. in-sourcing 
  4. outsourcing


Question 5:In the last few decades, it has often been observed that while IS expenditures (salaries, number of IS staff, etc.) have risen, productivity has not increased at the same rate. This observation is referred to as

  1. the "productivity paradox"
  2. the cost of doing business 
  3. inflation 
  4. underperformance


Question 6:________ software is the collection of software that controls the basic functions of the computer. That is, it coordinates the interaction between hardware devices, peripherals, application software, and users.

  1. systems
  2. intergration
  3. command 
  4. applications


Question 7:Procedures that different computers follow when they transmit and receive data are called

  1. modems 
  2. controls 
  3. protocols
  4. networks


Question 8:Which network is a private network used for communications with business partners?

  1. Intranet
  2. Extranet 
  3. Internet 
  4. E-Net


Question 9:Web-based collaboration tools need all of the following EXCEPT what?

  1. Email Account
  2. Browser 
  3. Internet Connection 
  4. All of the above are needed


Question 10:________ are a type of virus that target networks and take advantage of operating system security holes to replicate endlessly.

  1. Brute-force 
  2. Worms
  3. Manipulation 
  4. Denial of Service


Question 11:________ attacks occur when electronic intruders deliberately attempt to prevent legitimate users from using that service.

  1. Information modification 
  2. Man in the Middle 
  3. Brute-force 
  4. Denial of Service


Question 12:Some spam e-mail includes ________, which are attempts to trick financial account and credit card holders into giving away their authorization information.

  1. phishing
  2. tricking 
  3. luring 
  4. freaking


Question 13:At the managerial level, ________ managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization.

  1. personnel 
  2. operational 
  3. functional
  4. executive


Question 14:Knowledge that reflects processes and procedures that are located in a person's mind is called

  1. best practices 
  2. implicit knowledge 
  3. explicit knowledge 
  4. tacit knowledge


Question 15:________ systems consist of technology and the people needed to consolidate information and to support managers at the highest level of the organization.

  1. Management Information 
  2. Transaction Processing 
  3. Decision Support 
  4. Executive Information


Question 16:If packaged applications cannot meet the requirements of the business, the managers must conduct a ________ analysis to ensure that taking the custom application approach will prove worthwhile to the company.

  1. earned value 
  2. cost-benefit
  3. what-if 
  4. None of the above


Question 17:After the conceptual model has been completed using an entity-relation diagram, it can be easily translated into a physical data model in a

  1. form 
  2. report 
  3. file 
  4. database management system


Question 18:Currently, ________ costs constitute the majority of overall systems costs.

  1. software
  2. user 
  3. management 
  4. hardware


Question 19:One of the fastest growing "information" crimes in recent years has been

  1. computer theft 
  2. information resource theft 
  3. identity theft
  4. information theft


Question 20 :Software piracy is a(n)

  1. Ethical issue 
  2. Economic problem 
  3. Crime 
  4. All of the above

Solution Preview :

Prepared by a verified Expert
Finance Basics: Question 1a is a professional who is relatively well
Reference No:- TGS01519874

Now Priced at $10 (50% Discount)

Recommended (92%)

Rated (4.4/5)