From 2000 through 2022, the highest internet growth has occurred in north america. true or false?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Show

    Home

    Subjects

    Solutions

    Create

    Log in

    Sign up

    Upgrade to remove ads

    Only ₩37,125/year

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (78)

    Computer literacy is understanding the role of information in generating and using business intelligence. True or False?

    False

    Data consists of raw facts and is a component of an information system. True or False?

    True

    Michael Porter's Five Forces Model analyzes an organization, its position in the marketplace, and how information systems could be used to make it more competitive. True or False?

    True

    All of the following are among the future outlook of information systems, except:
    a. Hardware and software costs will continue to decline
    b. The computer literacy of typical information system users will improve
    c. Computer criminals will become more sophisticated
    d. All of the above

    All of the above

    Information technologies are used to gain a competitive advantage by doing all of the following except:
    a. Providing business intelligence
    b. Helping in reducing cost of operations
    c. Replacing all key decision makers in the organization
    d. Delivering timely and accurate information

    c. Replacing all key decision makers in the organization

    All of the following are among the new IT-related jobs except:
    a. Systems analyst
    b. Search engine optimization specialist
    c. Social media/online-community manager
    d. Data scientist

    a. Systems analyst

    Application software can be commercial software or software developed in-house and is used to perform a variety of tasks on a personal computer. True or False?

    true

    Machine language is the first generation of computer languages and consists of a series of 0s and 1s representing data or instructions. True or False?

    true

    The arithmetic logic unit (ALU) performs only arithmetic operations. True or False?

    false

    Which of the following statements is false?
    a. The first generation of computers are identified by vacuum tube.
    b. The second generation of computers are identified by transistors.
    c. The third generation of computers are identified by miniaturization.
    d. The fourth generation of computers are identified by VLSI, personal computers, and optical discs.

    c. The third generation of computers are identified by miniaturization.

    All of the following are among the advantages of object-oriented programming except:
    a. Modularity
    b. Reuse of codes for other purposes
    c. Effective problem solving
    d. All of the above

    all of the above

    Which of the following statements is false?
    a. The first generation of computer languages is machine language.
    b. The second generation of computer languages is assembly language.
    c. The third generation of computer languages is high-level language.
    d. The fourth generation of computer languages is natural language processing.

    d. The fourth generation of computer languages is natural language processing.

    One of the main applications of database and database systems is database marketing. True or False?

    true

    A data hierarchy is the structure and organization of data, which involves fields, records, and files. True or False?

    true

    In a data warehouse environment, ETL refers to extraction, transformation, and language. True or False?

    false

    One of the following is not a type of mobile analytics:
    a. Installation analytics
    b. Performance analytics
    c. In-app analytics
    d. Advertising and marketing analytics

    a. Installation analytics

    One of the following is not among the 5 Vs of big data:
    a. Variety
    b. Value
    c. Veracity
    d. Variance

    value

    Tableau and Power BI are used for all of the following purposes except:
    a. Exploring and finding patterns in data
    b. Creating multiple charts to get meaningful insight in data
    c. Allowing analyzing data with different formats
    d. All of the above

    all of the above

    Replacing several underutilized smaller servers with one large server using a virtualization technique is one of the ways that green computing can be achieved. True or False?

    true

    Repetitive typing with thumbs or navigating through various pages and apps is causing a health issue for many smartphone users called "smartphone thumb," also called tendinitis. True or False?

    true

    Public information, posted by an organization or public agency, cannot be censored for public policy reason. True or False?

    false

    All of the following are among the potential drawbacks of telecommuting except:
    a. Potential legal issues about workers' injuries
    b. No regulated work routine
    c. Able to work in more pleasant surroundings
    d. Less interaction with coworkers

    c. Able to work in more pleasant surroundings

    Registering, selling, or using a domain name to profit from someone else's trademark is called:
    a. Cyberspinach
    b. Typosquatting
    c. Cybercrime
    d. Cybersquatting

    Cybersquatting

    One of the following is not among the important concepts regarding the Web and network privacy:
    a. Nonrepudiation
    b. Data integrity
    c. Accountability
    d. Acceptable use policies

    b. Data integrity

    Symmetric encryption is also called secret key encryption. True or False?

    true

    An intrusion detection system is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. True or False?

    false

    Keystroke loggers monitor and record keystrokes and can be software or hardware devices. True or False?

    true

    Software that gathers information about users while they browse the Web is called:
    a. Adware
    b. Virus
    c. Spyware
    d. Worm

    Spyware

    All of the following are a part of the CIA triangle except:
    a. Consistency
    b. Integrity
    c. Availability
    d. Confidentiality

    Consistency

    One of the following is not among the intentional threats:
    a. Denial-of-service attacks
    b. Access controls
    c. Social engineering
    d. Logic bombs

    Access controls

    In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. True or False?

    true

    To improve the efficiency and quality of digital communications, Time Division Multiple Access (TDMA) divides each channel into two time slots. True or False?

    false

    In the two-tier architecture of the client/server model, a client (tier one) communicates directly with the server (tier two). True or False?

    true

    Which of the following layer of the OSI model is responsible for formatting message packets:

    Presentation

    A typical data communication system includes all of the following components except:

    A local area network

    One of the following has the highest bandwidth of any communication medium:

    Fiber-optic cable

    The Internet of Things (IoT) refers to the physical objects that are connected to the Internet and, therefore, to all other physical objects. True or False?

    true

    A smart home does not use a voice command by devices such an Amazon's Alex. True or False?

    false

    IIoT are used to enhance manufacturing and industrial processes such as predictive maintenance and data analytics on the factory floors. True or False?

    true

    All of the following are correct except:
    a. An IoT device could be hijacked and then send spam e-mails
    b. An IoT device could be hijacked and then deployed into botnets and used for DDoS attacks
    c. IoT devices are vulnerable to the threat posed by the Shodan search engine
    d. They are all correct

    They are all correct

    In Windows 10, the Internet Explorer was replaced by:

    edge

    All of the following are features or applications of Web 2.0 except:

    Fiber-optic cable

    Webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so. True or False?

    false

    The merchant model transfers the old retail model to the e-commerce world by using the medium of the Internet. True or False?

    true

    Access through mobile devices is among the features of a successful government Web site. True or False?

    true

    All of the following are among the components of a social media information system except:

    all of the above

    All of the following could further expand voice-based e-commerce except:

    c. Firefox (Mozilla)

    All of the following are among the popular mobile marketing strategies except:

    a. Customer-based marketing

    Globalization has become an important factor in purchasing and the supply chain. True or False?

    true

    From 2000 through 2019, the highest Internet growth has occurred in North America. True or False?

    false

    Transborder data flow (TDF) restricts what type of data can be captured and transmitted in foreign countries. True or False?

    true

    All of the following organizations do business across national borders except:

    a. Domestic organizations

    All of the following are among the obstacles to using global information systems except:

    a. Well-established telecommunication infrastructures

    All of the following companies are among the key players for building and launching high-speed Internet satellites except:

    d. Cisco Systems

    When there is a lack of specifications, service-oriented architecture (SOA) is preferred to SDLC for designing a system. True or False?

    true

    Planning is the last phase of the SDLC process. True or False?

    false

    PERT and CPM techniques work by determining the "critical path" for the completion of a series of interrelated activities. True or False?

    true

    All of the following are included in SDLC except:

    a. IT project management

    One of the following is not a type of conversion method during the implementation process:

    d. Service-oriented architecture (SOA) conversion

    IT projects fail for all of the following reasons except:

    a. Support from top management

    Most ERP systems use a unified database to store data for various functions. True or False?

    true

    Personalization allows customers to modify the standard offering, such as selecting a different home page to be displayed each time you open your Web browser. True or False?

    true

    A reverse auction invites sellers to submit bids for products and services. True or False?

    true

    An SCM system coordinates all of the following functions except:

    c. Advertising finished products to customers

    IoT will assist SCM to achieve all of the following goals except:

    b. Enhance production process by finding the best worker

    A CRM system includes all of the following activities except:

    b. Production operations

    Contextual computing refers to a computing environment that is always present, can feel our surroundings, and—based on who we are, where we are, and whom we are with—offer recommendations. True or False?

    true

    Intelligent agents are also known as bots (short for robots). True or False?

    true

    In backward chaining, a series of "if-then-else" condition pairs are performed. True or False?

    false

    All of the following are among the benefits of integration of AI to DSS except:

    a. Adding deductive reasoning to traditional DBMS functions

    Robotic process automation offers all of the following advantages except:

    c. Increasing cost

    All of the following are among ethical issues of AI except:

    all of the above

    Fog computing and edge computing are the same. True or False?

    false

    Multicloud refers to using more than a single public cloud in an organization. True or False?

    true

    Quantum computing uses quantum mechanics that generates and manipulates quantum bits or qubits. True or False?

    true

    All of the following are among the advantages of edge computing except:

    d. All of the above

    All of the following are among the current business applications of VR systems except:

    b. Deep learning

    All of the following are among the alternatives when using cloud computing except:

    b. Edge cloud

    Sets with similar terms

    MIS 412--Chapter 5

    49 terms

    toreymal

    ISM Exam 2

    100 terms

    chessa_pieper

    AIS

    57 terms

    aobrien01

    Ecommerce Chapter 4

    51 terms

    apalani07

    Sets found in the same folder

    CIS 236

    111 terms

    abbareid2

    CIS 236 Final Exam

    36 terms

    noodle0904

    Video Quizzes

    9 terms

    StellieH

    Assignment: Module 3 Use It (Practice)

    12 terms

    StellieH

    Other sets by this creator

    Ch. 14 - AC 392

    129 terms

    Nat5757

    Ch. 13 - AC 392

    123 terms

    Nat5757

    Ch. 12 - AC 392

    111 terms

    Nat5757

    AC 391 Final Exam

    136 terms

    Nat5757

    Verified questions

    ADVANCED MATH

    Show that if w is a differentiable vector field on a surface S and $w(p) \neq 0$ for some $p \in S,$ then it is possible to parametrize a neighborhood of p by $\mathbf{x}(u, v)$ in such a way that $\mathbf{x}_{u}=w$.

    Verified answer

    ADVANCED MATH

    Working modulo 9 or 11, find the missing digits in the calculations below: (a) $51840 \cdot 273581=1418243 x 040 .$ (b) $2 x 99561=[3(523+x)]^{2} .$ (c) $2784 x=x \cdot 5569$ . (d) $512 \cdot 1 x 53125=1000000000 .$

    Verified answer

    ADVANCED MATH

    A total of 160 hours of labor are available each week at $15/hour. Additional labor can be purchased at$25/hour. Capital can be purchased in unlimited quantities at a cost of $5/tmit of capital. If K units of capital and L units of labor are available during a week, then L1/2K1/3 machines can be produced. Each machine sells for$270. How can the firm maximize its weekly profits?

    Verified answer

    ADVANCED MATH

    Determine whether the following definitions are stipulative, lexical, precising, theoretical, or persuasive. “Sound” means a compression wave, in air or some other elastic medium, having a frequency ranging (for humans) from 20 to 20,000 vibrations per second.

    Verified answer

    Other Quizlet sets

    INTRO TO MEDIA AND COMMUNICATIONS EXAM 1

    115 terms

    sunny_mucha

    research design exam 2

    127 terms

    graceconnolly7

    Lec 4: Vasoconstrictors

    69 terms

    taty_fortunePLUS

    BBO B-3 (copy)

    78 terms

    Jackson_Wright46

    Related questions

    QUESTION

    The maximum criminality of a relationship is the maximum number of instances of entity B that may be associated with each instance of entity A.

    15 answers

    QUESTION

    How do maintenance BOM differ from other BOMs?

    2 answers

    QUESTION

    Identify the computer software utility that allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data.

    11 answers

    QUESTION

    Which step below is not considered to be part of the data processing cycle?

    15 answers