Final

35 Questions  I  By Cody_fulton
Please take the quiz to rate it.

Computer Quizzes & Trivia

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    1.      is a technique for intercepting computer communications

  • 2. 
    1.      The primary purpose of the requirements analysis phase is to

  • 3. 
    1.      In which of the cases is the strength of competitive forces low?

  • 4. 
    1.      Which of the following is true of social networking problems?

  • 5. 
    1.      According to McAfee’s Enterprise 2.0 model, pushing enterprise content to users based on subscription and alerts is part of _

  • 6. 
    1.      Which of the following activities in the business intelligence process involves creating business intelligence? 

  • 7. 
    1.      Which of the following is considered a personal security safeguard?

  • 8. 
    1.       Information systems are never 

  • 9. 
    1.       The more attributes there are, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon? 

  • 10. 
    1.      __ are used to read, insert, modify, and delete data.

  • 11. 
    1.      Which of the following protocols is commonly used by LAN? 

  • 12. 
    1.      Which of the following is an example of a security threat resulting from malicious human activity?

  • 13. 
      A password _ a user.

  • 14. 
    1.      According to McAfee’s Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of __

  • 15. 
    1.       Which of the following is true of business intelligence systems?

  • 16. 
    1.      ___ feasibility concerns whether the new information system fits within a company’s customs, culture, charter, or legal requirements.

  • 17. 
    They seek conformity and want to convince others of the wisdom of their belief. 1.      With respect to the 5 components of SMIS, which of the following is true of application providers?

  • 18. 
    1.       A table is also called a file.

  • 19. 
    1.      When an individual uses the Internet, but not the web, he or she is using___

  • 20. 
    1.       A ___ is used to provide seamless flow of data across networks.

  • 21. 
    The initial step in the first phase of SDLC is to

  • 22. 
    1.      ___ is the application of social media to facilitate the cooperative work of people inside organizations.

  • 23. 
    1.       Which if the following is true of data warehouses?

  • 24. 
    1.      ___ refers to the process of moving the business activity from and old information to a new system.

  • 25. 
    1.       The purpose of a___is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by business intelligence tools.

  • 26. 
    1.      Social media _ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors

  • 27. 
    1.       Which of the following is true of the defenders of belief?

  • 28. 
    Users of smart cards are required to enter a _ to be authenticated

  • 29. 
    1.       Compared to the program development, systems development is 

  • 30. 
    1.        Normal processing procedures for operations personnel are

  • 31. 
    1.       According to Brooks’ Law, adding more people to a late project ___

  • 32. 
    1.      With respect to the five components of SMIS, which of the following is true of SM sponsors? .

  • 33. 
    1.       Organizations should protect sensitive data by storing it in_ form.

  • 34. 
    1.       A ___ is a facility for managing an organization’s business intelligence data.

  • 35. 
    1.      Which of the following operating systems is most commonly used?

Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.