Expert answer:information technology and society

Solved by verified expert:Question 1Magnetic stripe processing takes longer than an equivalent smart card transaction. True FalseQuestion 2 Online retailers should devote considerable attention to minimizing returns by providing sufficient information about a product so that consumers have a clear idea of what to expect when they make a purchase. True FalseQuestion 3 E-commerce Web sites can gather a wealth of data about prospects and customers through site registration, questionnaires, and the order-placement process. True FalseQuestion 4 The goal of an ERP system is to enable easy access to business data and to create efficient, streamlined work processes. True FalseQuestion 5Each industry has different business practices that make it unique. True FalseQuestion 6 During the late 1990s, many poor ideas for Web-related businesses were proposed and funded in a wave of “irrational exuberance” for all things associated with the ____ economy. dot-com net-based dot-net dot-bombQuestion 7 ____ is the exchange of goods and services between businesses via computer networks. B2C e-gov C2C B2BQuestion 8 ____ is the buying and selling of goods and/or services using a mobile device such as a cell phone, smartphone, PDA, or other such device. Handheld commerce Personal commerce Wireless commerce Mobile commerceQuestion 9 Search engine results that appear because of the payment of fees are called ____. targeted listings paid listings sponsored listings optimized listingsQuestion 10 The ____ data security standard is a multifaceted security standard that requires retailers to implement a set of security management policies, procedures, network architecture, software design, and other critical protective measures to safeguard cardholder data. Payment Standard Industry (PSI) Payment Card Industry (PCI) Payment Card (PC) Payment Industry (PI)Question 11 Many implementations of EMV cards and terminals confirm the identity of the cardholder by requiring the entry of a ____ rather than signing a paper receipt. Passtoken Token Personal Identification Number (PIN) PassphraseFlag this QuestionQuestion 12 2 pts“____” is a U.K. government-backed security measure that requires customers to present both a four-digit PIN and a bank card containing a smart chip in order to complete a purchase. Chip and Number Chip and PIN Chip and Phrase Chip and TokenFlag this QuestionQuestion 13 2 ptsAn ____ system is a set of core software modules that enable organizations to share data across the entire enterprise through the use of a common database and management reporting tools. enterprise resource enterprise enterprise planning enterprise resource planningQuestion 14The SAP ERP ____ software module supports managerial decision making by assigning manufacturing costs to products and cost centers for analysis of the organization’s profitability. sales and distribution controlling materials management financial accountingQuestion 15 A ____ system is an enterprise system that supports the processes performed by all the entities involved in creating or increasing the demand for an organization’s products and services. consumer relationship management client relationship management contact relationship management customer relationship managementQuestion 16 ____ involves the planning, executing, monitoring, and controlling of the supply chain major processes. Manufacturing management Supply management Supply chain management Supply-side managementQuestion 17 Organizations often employ ____ to make predictions about future conditions and then make adjustments in staffing, purchasing, financing, and other operational areas to better meet forecasted needs. BI BE DI CIQuestion 18 The ____ step in the ETL process updates the existing data warehouse with the data that have passed through the extract and transform steps. load log transform extractQuestion 19 ____ is a method to analyze multidimensional data from many different perspectives. Online analytical processing Online transaction analysis Online transaction processing Online database processingQuestion 20 The ____ is responsible for administering U.S. election laws regarding campaign funding. Federal Commerce Commission (FCC) Federal Funding Association (FFA) Federal Election Commission (FEC) Federal Trade Commission (FTC)Question 21 ____ involves trying various models and selecting the best one based on its ability to explain the variability in the existing data. Pattern observation Pattern management Pattern recognition Pattern identificationQuestion 22 ____ is an application of BI that enables the continuous and real-time analysis of operational data to measure actual performance and forecast future performance. Business performance management Business performance observation Business performance analysis Business performance monitoringQuestion 23 ____ BPM software provides built-in application programming interfaces to connect with each of the systems that a company uses to support a particular process and then monitors the process to identify bottlenecks and inefficiencies. Workflow designer Reporting and insight Process efficiency monitoring Reporting and designQuestion 24 When using the Plan-Do-Check-Act process, the problem-solving team selects the problem to be analyzed, clearly defines the problem, sets a measurable goal for the problem-solving effort, and gathers further data related to the problem in the ____ step. Check Do Act PlanQuestion 25 When using the Plan-Do-Check-Act process, the problem-solving team identifies systemic changes and training needs to ensure a full, successful implementation of the solution in the ____ step. Do Plan Act CheckQuestion 26 Electronic corporate directories are used in large organizations to find the right person with whom to collaborate on an issue or opportunity. True FalseQuestion 27 The strategic plan must take into account that the organization and everything around it has constant needs. True FalseQuestion 28 The UPS IT organization spends roughly $1 million per year and is always working on hundreds of IT-related projects. True FalseQuestion 29 Capital items typically have a useful life of several years. True FalseQuestion 30 Intel is making its Centrino laptop computers WiMAX-enabled and is partnering with Clearwire to push the technology even further ahead. True FalseQuestion 31 It is estimated that the bursting of the dot-com bubble wiped out $1 billion in market value of technology companies from March 2000 to October 2002. True FalseQuestion 32 The high cost of ERP software licenses has traditionally kept SMBs with small IT budgets from taking advantage of these powerful applications. True FalseQuestion 33 Dashboards are simple tools used to provide entry level personnel of the organization the information they need to make decisions. True FalseQuestion 34The use of BRMS can lead to faster and but less accurate implementation of necessary system changes. True FalseQuestion 35 The IPS sits directly in front of the firewall and examines all the traffic passing through it. True FalseQuestion 36 ____ are the key to ensuring that IT innovations pay off. Trained staff Technical skills Managers Technical staffQuestion 37____ enable a firm to meet fundamental objectives, such as increasing revenue, reducing costs, improving decision making, enhancing customer relationships, and speeding up their products’ time to market. Information systems Data systems Business systems Data technologyQuestion 38 A(n) ____ employs models and analytic tools to help users gain insights into data, draw conclusions from the data, and make recommendations. decision support tree decision system analytic support system decision support systemQuestion 39 A(n) ____ is a live Internet presentation that supports interactive communications between the presenter and the audience. Web conference E-conference Webcast WebinarQuestion 40 The ____ factor in the Unified Theory of Acceptance and Use of Technology is the belief that an organizational and technical infrastructure exists to support the system. facilitating conditions effort expectance social influence performance expectancyQuestion 41A successful enterprise IT system requires the ____ imposition of standards and procedures that spell out exactly how transactions must be conducted and how the supporting information must be captured, stored, and shared. top-down middle-tier upper-tier bottom-upQuestion 42 The threat of new competitors raises the level of ____. competition profitability production substitutesQuestion 43 According to the Boston Consulting Group growth-share matrix, ____ are low-growth business units or products that provide a solid foundation for the company by generating steady streams of cash and profits. stars question marks dogs cash cowsQuestion 44 A(n) ____ project implements changes to an existing system to enable operation in a different technology environment. enhancement maintenance mandatory innovationQuestion 45 UPS drivers use handheld wireless computers called ____ to capture package identification data, location information, and customer signatures. DIADs DEADs EDIADs DADsQuestion 46“____” in an IT project context means that the project met schedule and budget constraints and delivered all critical features and requirements. Completion Success Service CompetencyQuestion 47Five highly interrelated parameters define a project— ____. scope, cost, time, quality, and management needs scope, cost, time, management needs, and user expectations scope, cost, management needs, quality, and user expectations scope, cost, time, quality, and user expectationsQuestion 48____ is money spent to purchase assets that appear on the organization’s balance sheet and that are depreciated over the life of the asset. Assets Funds Principal CapitalQuestion 49 ____ items are nondepreciable items that are consumed shortly after they are purchased. Expense Asset Capital CostQuestion 50The project ____ are the people involved in the project or those affected by its outcome. stakeholders participants employees managersQuestion 52 Under ____ contracts, the buyer pays the provider for both the time and materials required to complete the contract. time and material cost-reimbursable lump-sum fixed-pricedQuestion 53____ is an arrangement in which one company contracts with another organization to provide services that could be provided by company employees. Outshoring Offshoring Service Level Agreement OutsourcingQuestion 54____ “frees up” a large amount of resources and management effort that can be redirected to other more strategic issues within the company. Streamlining Outsourcing Resourcing RestructuringQuestion 55 At least ____ months are required to gain experience with the service provider and work through various start-up issues so that a fair assessment can be made. three six nine twelveQuestion 56 ____ of an outsourcing contract involves formal and informal processes and rules to manage the relationship between the two organizations. Consensus Management Governance ControlQuestion 57Good ____ managers should have excellent communication, problem solving, and negotiation skills. governance project liaison relationshipQuestion 58 The ongoing tracking and measurement of important ____ enables the organization to use the data as feedback, so that each step in the outsourcing process can be improved based on the result of the project. metrics benchmarks contacts standardsQuestion 59 The ____ requires employers to use national standards for electronic healthcare transactions with insurers and healthcare providers, and requires that employers ensure the security and privacy of employee health data. Health Insurance Protection and Accuracy Act (HIPAA) Health Insurance Portability and Accuracy Act (HIPAA) Health Insurance Protection and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA)Question 60____ is a set of guidelines whose goal is to align IT resources and processes with business objectives, quality standards, monetary controls, and security needs. Project Management Book of Knowledge (PMBOK) IT Infrastructure Library (ITIL) Control OBjectives for Information and Related Technology (COBIT) Capability Model Maturity Integration (CMMI)Question 61 A ____ plan defines the people and procedures required to ensure timely and orderly resumption of an organization’s essential, time-sensitive processes with minimal interruption. business continuity business recovery business disaster disaster recoveryQuestion 62 A(n) ____ business function can be unavailable for several days in times of a major disaster without causing major problems. AAA A B AAQuestion 63 The telecommunications industry is highly competitive and companies are scrapping to gain a competitive edge through the introduction of ____ services. cutting-edge wireless-generation next-generation modern-edgeQuestion 64Each cell phone service provider establishes its own ____ to manage communications across a number of cells. OMTS MSTO TMSO MTSOQuestion 65____ is a key component of Intel’s broadband wireless strategy to deliver innovative mobile platforms for “anytime, anywhere” Internet access. WiBroad WiMAX WiFi WiWANQuestion 66 IBM defines ____ as “the transformation of key business processes through the use of Internet technologies.” e-transaction e-commerce e-processing e-businessQuestion 67Often large manufacturers that purchase goods and services from many small suppliers build a(n) ____ to manage their purchasing functions through a Web site. open marketplace closed company marketplace private company marketplace public company marketplaceQuestion 68Search engine results that appear because of the payment of fees are called ____. sponsored listings targeted listings optimized listings paid listingsQuestion 69 ERP software is designed to support how an organization using industry “____” conducts business. best practices agreements standards guidelinesQuestion 70 The SAP ERP ____ software module records all financial transactions in the general ledger accounts and generates financial statements for external reporting. financial accounting materials management sales and distribution controllingQuestion 71 The SAP ERP ____ software module plans and records quality control activities such as product inspections and material certifications. asset management project system production planning quality managementQuestion 72If the goal is to complete the project as quickly as possible and to minimize the risk of project failure, potential increases in ____ should be rejected. scope size complexity budgetQuestion 73 A data ____ is a database that stores large amounts of historical data in a form that readily supports analysis and management decision making. warehouse store storehouse analytics repositoryQuestion 74A(n) ____ process is used to pull data from these disparate data sources to populate and maintain the data warehouse. extract-transform-load extract-load-transform transform-load-extract transform-extract-loadQuestion 75 Data _____ can be built to summarize unit sales of a specific item on a specific day for a specific store. matrices marts cubes squaresQuestion 76____ involves the interactive examination of high level, summary data in increasing detail to gain insight into certain elements—sort of like slowly peeling off the layers of an onion to reach the core. Drill-through analysis Drill analysis Drill-up analysis Drill-down analysisQuestion 77 ____ is a BI tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. Data mining Data analyzing Data polling Data managingQuestion 78In the Balanced Scorecard, the ____ perspective describes the employee training and corporate cultural attitudes required for both individual and corporate self-improvement. Customer Financial Business Process Learning and GrowthQuestion 79____ “is a practice concerned with increasing awareness, fostering learning, speeding collaboration and innovation, and exchanging insights.” Information science Knowledge management Knowledge science Information managementQuestion 80____ is “personal knowledge embedded in individual experience and involves intangible factors, such as personal beliefs, perspective, and the value system. Explicit knowledge Overt knowledge Tacit knowledge Implicit knowledgeQuestion 81Organizations that fail to ____ will soon fall behind their competition. innovate conform rebel revertQuestion 82A ____ is software used to define, execute, monitor, and maintain the decision logic that is used by the operational systems to run the organization. business process management system business rule management system rule management system business management systemQuestion 83 Ethical behavior conforms to ____. generally accepted social norms family rules legal guidelines company normsQuestion 84Organizations need to define carefully employee ____ and to separate key responsibilities properly, so that a single person is not responsible for accomplishing a task that has high security implications. authorizations roles authentications privilegesQuestion 85 A ____ models normal behavior of a system and its users from reference information collected by various means. pattern-based intrusion detection system role-based intrusion detection system signature-based intrusion detection system behavior-based intrusion detection systemQuestion 86Creating a ____ of each compromised system on write-only media for later study, and as evidence, can be very useful. response plan network image forensic disk image network trace

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP