Embry riddle MGT221 9.7 – Course Assessment: Final Exam

| January 31, 2017

Question
Question 1 4 pts

What does the term information technology refer to?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 2 4 pts

Define “Computer Peripherals” and give specific examples.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 3 4 pts

In a few words, explain the concept of knowledge management.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 4 4 pts

Give examples of common strategies of a virtual company.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 5 4 pts

In a few words, define Enterprise Collaboration Systems.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 6 4 pts

What are 2 of the main advantages of RAID?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 7 4 pts

Define a data warehouse.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 8 4 pts

Define “open systems”, and briefly mention their advantages.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 9 4 pts

What is the difference between Frame-based knowledge, Object-based knowledge, and Rule-based knowledge?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 10 4 pts

Define e-Commerce.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 11 4 pts

In a few words, define a business model.

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 12 4 pts

What is CRM?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 13 4 pts

Why are business end users frequently added to system development teams?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 14 4 pts

What are “functional requirements”?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 15 4 pts

In IT security, what is a cracker?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 16 4 pts

In IT security, what is a sniffer?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 17 4 pts

What health issue are commonly related to the use of information technology in the workplace?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 18 4 pts

What is software piracy?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 19 4 pts

What is an e-Commerce architect?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 20 4 pts

How do companies apply a chargeback system?

Keyboard Shortcuts

Font Sizes Paragraph

p

Flag this Question

Question 21 2 pts

In an information system context, which one of the following would be the most applicable description of application software?

It controls and supports the operations of a computer.

None of the choices are correct.

It consists of operating instructions for people who will use an information system.

It consists of programs that direct particular processing activities.

Flag this Question

Question 22 2 pts

Developing a relationship with a customer such that the customer cannot afford to switch suppliers is an example of:

Locking in the customer

None of the above is correct

Monopolistic enterprise

Growth strategies

Flag this Question

Question 23 2 pts

The function of an output device is to:

Perform the arithmetic and logic functions required in computer processing

Store the data and program instructions needed for processing

Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users

Convert data into an electronic machine-readable form for direct entry into a computer system

Flag this Question

Question 24 2 pts

How do you best define a network?

The usefulness or utility that comes from linking computers together

A group of individuals linked via hardware and software

Computers linked together via cabling or wireless technology

An interrelated or interconnected chain, group, or system

Flag this Question

Question 25 2 pts

Artificial intelligence is a science and technology based on:

Computer science

Biology and psychology

All of the choices are correct.

Linguistics and mathematics

Flag this Question

Question 26 2 pts

A company that enters the _______________ quadrant of a strategic positioning matrix must capitalize on a high degree of customer and competitor connectivity and use of IT.

global market penetration

cost and efficiency improvements

performance improvement in business effectiveness

product and service transformation

Flag this Question

Question 27 2 pts

All of the following are done during the systems investigation stage of application development, except:

Develop logical models of the current system.

Develop a project management plan and obtain management approval.

Conduct a feasibility study.

Determine how to address business opportunities and priorities.

Flag this Question

Question 28 2 pts

What is/are the most commonly used security technology at large companies.

Biometrics

Antivirus software

Intrusion-detection systems

Smart cards

Flag this Question

Question 29 2 pts

Good ergonomic design considers tools, tasks, the workstation, and _______________.

the users

the software

previous injuries

the environment

Flag this Question

Question 30 2 pts

The chief information officer is a(n) _______________ level IT manager.

strategic

departmental

tactical

operational

Get a 30 % discount on an order above $ 50
Use the following coupon code:
COCONUT
Order your essay today and save 30% with the discount code: COCONUTOrder Now
Positive SSL