Embry riddle MGT221 9.7 – Course Assessment: Final Exam
Question
Question 1 4 pts
What does the term information technology refer to?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 2 4 pts
Define “Computer Peripherals” and give specific examples.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 3 4 pts
In a few words, explain the concept of knowledge management.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 4 4 pts
Give examples of common strategies of a virtual company.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 5 4 pts
In a few words, define Enterprise Collaboration Systems.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 6 4 pts
What are 2 of the main advantages of RAID?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 7 4 pts
Define a data warehouse.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 8 4 pts
Define “open systems”, and briefly mention their advantages.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 9 4 pts
What is the difference between Frame-based knowledge, Object-based knowledge, and Rule-based knowledge?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 10 4 pts
Define e-Commerce.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 11 4 pts
In a few words, define a business model.
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 12 4 pts
What is CRM?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 13 4 pts
Why are business end users frequently added to system development teams?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 14 4 pts
What are “functional requirements”?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 15 4 pts
In IT security, what is a cracker?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 16 4 pts
In IT security, what is a sniffer?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 17 4 pts
What health issue are commonly related to the use of information technology in the workplace?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 18 4 pts
What is software piracy?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 19 4 pts
What is an e-Commerce architect?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 20 4 pts
How do companies apply a chargeback system?
Keyboard Shortcuts
Font Sizes Paragraph
p
Flag this Question
Question 21 2 pts
In an information system context, which one of the following would be the most applicable description of application software?
It controls and supports the operations of a computer.
None of the choices are correct.
It consists of operating instructions for people who will use an information system.
It consists of programs that direct particular processing activities.
Flag this Question
Question 22 2 pts
Developing a relationship with a customer such that the customer cannot afford to switch suppliers is an example of:
Locking in the customer
None of the above is correct
Monopolistic enterprise
Growth strategies
Flag this Question
Question 23 2 pts
The function of an output device is to:
Perform the arithmetic and logic functions required in computer processing
Store the data and program instructions needed for processing
Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users
Convert data into an electronic machine-readable form for direct entry into a computer system
Flag this Question
Question 24 2 pts
How do you best define a network?
The usefulness or utility that comes from linking computers together
A group of individuals linked via hardware and software
Computers linked together via cabling or wireless technology
An interrelated or interconnected chain, group, or system
Flag this Question
Question 25 2 pts
Artificial intelligence is a science and technology based on:
Computer science
Biology and psychology
All of the choices are correct.
Linguistics and mathematics
Flag this Question
Question 26 2 pts
A company that enters the _______________ quadrant of a strategic positioning matrix must capitalize on a high degree of customer and competitor connectivity and use of IT.
global market penetration
cost and efficiency improvements
performance improvement in business effectiveness
product and service transformation
Flag this Question
Question 27 2 pts
All of the following are done during the systems investigation stage of application development, except:
Develop logical models of the current system.
Develop a project management plan and obtain management approval.
Conduct a feasibility study.
Determine how to address business opportunities and priorities.
Flag this Question
Question 28 2 pts
What is/are the most commonly used security technology at large companies.
Biometrics
Antivirus software
Intrusion-detection systems
Smart cards
Flag this Question
Question 29 2 pts
Good ergonomic design considers tools, tasks, the workstation, and _______________.
the users
the software
previous injuries
the environment
Flag this Question
Question 30 2 pts
The chief information officer is a(n) _______________ level IT manager.
strategic
departmental
tactical
operational
Use the following coupon code:
COCONUT