Save Time & improve Grades
- Questions Asked
- Experts
- Total Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!
Question 1 A useful guideline to protect corporate computers from criminal hackers is to ____. Install antivirus software on all computers Avoid creating frequent backups of critical data Remove any firewall that may have been installed between your corporate network and the Internet Enable several guest accounts Question 2 The ability to ____ is a characteristic of a MIS system. Barrier to communication provide reports with fixed and standard formats allow users to develop systems use external data stored in the computer system Question 3 All of the following are problem associated PowerPoint presentations except a. Speaker read the slides b. The text is too small c. Speaker talks too long. d. Poor use of colors Question 4 One of the functional units likely to benefit from use of a customer relationship management system is ____. Software development Quality control Marketing Product analysis Question 5 ____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process. B2C B2B C2C G2C Question 6 The Privacy Act of 1974 applies to all of these except____. deals with the protection of communications while in transit from sender to receiver applies only to certain federal agencies Socialnetworking requires all financial institutions to protect and secure customers’ nonpublic data from unauthorized use or access Question 7 The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation. USA Patriot Act Privacy Act of 1974 Gramm-Leach-Bliley Act Electronic Communications Privacy Act Question 8 ____ is summary of what has been accomplished in the past or an update on a project. Term paper Email Prospectus Report Question 9 A ____ is a type of malware that executes when specific conditions occur. Trojan horse Worm Logic bomb Virus Question 10 The second level in the capability maturity model is ____. Defined Managed Repeatable optimized Question 11 The first stage in the problem solving process during which one identifies and defines potential problems or opportunities is the ____ stage. Design Intelligence Choice Monitoring Question 12 The haptic interface, relays the sense of ____ in the virtual world. Taste Touch Sight sound Question 13 Graphic files that can be used in animation are ____. GIF MP3 ISDB WMV Question 14 Data flow diagrams ____. Are interactive are used to model data entities and their relationships Are linear Are required Question 15 ____ can process many pieces of data at the same time and learn to recognize patterns. Natural language processing systems Neural networks Voice recognition systems Learning systems Question 16 ____ reports are a set of reports developed to provide certain information upon request. Exception Scheduled drill-down demand Question 17 During the ____ stage of the problem solving process, you develop alternative solutions to the problem and evaluate their feasibility. Choice Implementation Intelligence design Question 18 For many businesses, robots are used to do the three Ds, dull, dirty, and ____. Dynamic Devastating Dangerous dingy Question 19 Roughly ____ of U.S. employers monitor their employees Web surfing activities. 50% less that 20% 25% 75% 4 points Question 20 ____ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire. Child Online Protection Act Platform for Privacy Protection Freedom of Information Act IRCA 4 points Question 21 The ____ is not a component of the typical DSS? model base user interface database inference engine Question 22 A small program hidden in a network or computer system that records identification numbers and passwords is called a(n) ____. Trojan horse. logic bomb password sniffer rootkit Question 23 The training of end users is an important task in the ____ phase of a systems development project. predesign systems maintenance and review systems design systems implementation
Ask a question
Experts are online
Answers (1)
Excelsior BUS221 Final Exam (Perfect Answer)
Answer Attachments
1 attachments —