Engineering Homework Help
Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having
Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having
problems tracking the inventory levels for its stores. It is planning to implement an Oracle database system to replace this legacy system. Which of the following most supports Bringes’ decision to replace its legacy system with an Oracle database system?
Conversion cost required for the implementation of an Oracle database system is not supported by the IT budget.
Maintenance of an Oracle database system is more expensive than the legacy system presently in use.
Bringes’ channel partners use a database system that supports the Oracle database system.
Implementing an Oracle database system will require Bringe to hire additional specialized personnel to manage it.
Partial implementation of the Oracle database system can create more problems than it is likely to solve.
QUESTION 32
Which of the following statements best describes the productivity paradox of technology investment?
As investment in technology increases, productivity decreases steadily.
The productivity of any technology is directly proportional to the investment in that technology.
While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use.
The productivity of an information system is in no way related to the investment in the technology.
While it is easy to identify and quantify the intangible benefits of an information system, it is not easy to quantify the tangible benefits.
QUESTION 33
A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________.
performance metric
critical performance initiative
key performance indicator
critical factor
critical performance indicator
QUESTION 34
Which of the following statements is true about a mashup?
It is used to disseminate information to a narrow audience.
It is the process of allowing companies to use everyday people as a cheap labor force.
It is used to increase brand awareness through the network effect.
It is an application or a Web site that uses data from one or more service providers.
It is a small interactive tool used for a single purpose.
QUESTION 35
________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.
Cybersquatting
Logic bombing
Spear phishing
Hacktivism
Bot herding
QUESTION 36
Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the payment to the customer’s credit card. This process of selling a product or service is known as the ________ process.
make-to-stock
order-to-cash
time-to-market
procure-to-pay
make-to-order
QUESTION 37
Which of the following statements about a just-in-time strategy is true?
Companies using this strategy allow suppliers to manage the manufacturer’s inventory levels based on pre-established service levels.
Retailers using this strategy allow suppliers to maintain ownership of inventory within their warehouses or stores until items are scanned at the point of sale.
Companies using this strategy try to optimize their ordering quantities such that parts or raw materials arrive just when they are needed for production.
Companies using this strategy maintain large inventories of supplies, parts, warehousing resources, and extra workers to meet production contingencies.
A manufacturer or retailer using this strategy shares real-time sales data with suppliers who maintain inventory levels based on pre-established agreements.
QUESTION 38
A dataset comprised of extremely large amounts of complex data would best be described as ________.
network data
big data
extreme data
mega data
a database
QUESTION 39
When a company uses a fingerprint recognition system instead of access cards, it helps the company prevent unauthorized physical access. Which of the following technologies is used for authentication here?
access-control software
passwords
smart cards
encryption
biometrics
QUESTION 40
In the context of GPS-enabled location-based services, the ability to determine the basic geographic position of a cell phone is an example of ________ service.
tracking
reintegration
navigation
location
mapping
QUESTION 41
An enterprise license is also known as a(n) ________ license.
click-wrap
volume
implied
shrink-wrap
shareware
QUESTION 42
Amazon.com took crowdsourcing mainstream with its micro-task marketplace called ________.
Citizen Science
Smart Mob
Click Workers
Mechanical Turk
Crowd Fixing
QUESTION 43
Companies implementing ________ enterprise resource planning (ERP) can benefit from scalability and agility.
in-memory
hard drive
subsidiary
cloud-based
internal-drive
QUESTION 44
Which of the following occurred in the 1946-1958 generation of computing?
The mainframe era began.
The internetworking era ended.
The mainframe era ended and the personal computer era began.
The personal computer era ended and the interpersonal computing era began.
The interpersonal computing era ended and the internetworking era began.
QUESTION 45
________ customer relationship management (CRM) systems help to create mass e-mail marketing campaigns wherein each consumer receives an individualized e-mail based on their prior purchase history.
Structured
Collaborative
Integrated
Analytical
Operational
QUESTION 46
Which of the following statements is true about companies pursuing a click-only business strategy?
These companies operate in both physical and virtual arenas.
These companies approach business activities by operating in physical locations.
These companies conduct business electronically in cyberspace.
These companies are only involved in export business activities.
These companies choose to operate their business activities solely in the traditional manner.
QUESTION 47
________ is a group meeting-based process for requirements collection.
Human-computer interface
Joint application design
Computer-aided design
Total ownership
Reverse engineering
QUESTION 48
When we consider entities as tables, each row is a ________.
form
field
record
bot
query
QUESTION 49
________ is the process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how a proposed information system should function.
Data modeling
End-user development
Requirements collection
External acquisition
Beta testing
QUESTION 50
Which of the following is likely to have the suffix “.com” after the domain name in its URL?
The Federal Reserve
Microsoft
The World Wide Fund for Nature
Massachusetts Institute of Technology
UNICEF
QUESTION 51
________ testing is performed by actual users of the system.
Developmental
Alpha
Beta
Evolutionary
Comparative
QUESTION 52
Identify the software that is cost effective, since the vendor that builds the application spreads out the development costs by selling copies to a large number of users?
bespoke software
custom software
corrected software
adapted software
packaged software
QUESTION 53
________ refers to the process of identifying, quantifying, and presenting the value provided by a system.
Deploying a software product
Testing a process
Refining a prototype
Making a business case
Making a prototype
QUESTION 54
Subprocesses of the procure-to-pay process include ________.
creating customer records
speeding up the collection process
collecting the payment
price and terms negotiations
creating customer satisfaction
QUESTION 55
The term urbanization is best described as ________.
the movement of rural populations to urban areas
the movement of urban areas to the country
the movement of people between cities
the loss of people in major cities
the expansion of city boundaries
QUESTION 56
Which of the following statements is true about key-indicator reports?
They highlight situations that are out of the normal range.
They answer unplanned information requests to support a non-routine decision.
They help analyze why a key indicator is not at an appropriate level or why an exception occurred.
They are produced at predefined intervals to support routine decisions.
They provide a summary of critical information on a recurring schedule.
QUESTION 57
In electronic commerce, ________ is defined as the percentage of single-page visits.
showrooming
bounce rate
value chain analysis
freecycling
exit rate
QUESTION 58
The Computer Fraud and Abuse Act of 1986 prohibits ________.
the use of external devices to provide access and information to companies’ confidential information
stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information
access to companies’ extranets when outsourcing work to clients overseas
signing contracts with consultants outside the United States to process information
accessing company intranet and confidential information from public computers
QUESTION 59
Which of the following statements is true about peer production?
A guest is a person who can only view the digital information.
The creator is responsible for publishing new information.
Anyone can help in producing or improving the final outcome.
Only editors have the right to develop new content.
It is also known as an enterprise content system.
QUESTION 60
Which of the following types of information systems supports the coordination of suppliers, product or service production, and distribution?
intelligent system
collaboration system
electronic commerce system
supply chain management system
geographic information system