Category Archives: BIS 320 FINAL EXAM JULY 2017 VERSION

BIS 320 FINAL EXAM JULY 2017 VERSION

BIS 320 FINAL EXAM JULY 2017 VERSION

 

 

Buy Solutions: https://goo.gl/5seHje

 

BIS 320 FINAL EXAM JULY 2017 VERSION

BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION BIS 320 FINAL EXAM JULY 2017 VERSION

A major criterion in deciding the most important perspectives of a business problem is:

  • usefulness
  • implementation
  • organizational needs
  • change management

 

Which of the following can force a business and its competitors to compete on price alone?

  • Transparent marketplace
  • Poor process efficiency
  • High product differentiation
  • Demand control

 

Software used to apply the computer to a specific task for an end user is called:

  • data management software
  • network software
  • system software
  • application software

 

To show each level of a system’s design, its relationship to other levels, and its place in the overall design structure, structured methodologies use:

  • process specifications
  • high-level data flow diagrams
  • structured diagrams
  • low-level data flow diagrams

 

The most basic business database is comprised of:

  • five tables: for customers, employees, suppliers, parts, and sales
  • four tables: for customers, suppliers, sales, and employees
  • four tables: for customers, suppliers, parts, and sales
  • three tables: for suppliers, parts, and sales

 

In order to achieve maximum benefit from an enterprise software package, a business:

  • selects only the software that best matches its existing business processes
  • uses only the processes in the software that match its own processes
  • changes the way it works to match the software’s business processes
  • customizes the software to match all of its business processes

 

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called:

  • multiplexing
  • packet switching
  • ATM
  • packet routing

What are the relationships that the relational database is named for?

  • Relationships between fields and records
  • Relationships between databases
  • Relationships between entities
  • Relationships between rows and columns

 

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of:

  • accountability and control
  • system quality
  • information rights and obligations
  • property rights and obligations

 

Which of the following is one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

  • Identify the options you cannot reasonably take.
  • Assign responsibility.
  • Identify the prime dependents.
  • Identify and clearly describe the facts.

 

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called:

  • SEM
  • SEO
  • VPN
  • IAB

 

Which of the following collaboration tools would be appropriate for participants in separate locations who need to collaborate synchronously?

  • Team Room
  • Electronic meeting software
  • Group calendar
  • Blog

 

In a(n) ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods.

  • quantum
  • scalable
  • hybrid cloud
  • Autonomic

 

Microsoft® Excel® is an example of:

  • data management software
  • word processing software
  • presentation graphics
  • spreadsheet software

 

Virtualization:

  • allows smartphones to run full-fledged operating systems.
  • has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
  • can boost server utilization rates to 70% or higher.
  • allows one operating system to manage several physical machines.

 

Microsoft Word is an example of:

  • open-source software
  • word-processing software
  • software productivity suite
  • data management software

 

What is the most important benefit of an enterprise application?

  • Enabling speed of communicating
  • Enabling cost-effective, e-business processes
  • Enabling a company to work collaboratively with customers and suppliers
  • Enabling business functions and departments to share information

 

The oldest method for building information systems is:

  • the systems development lifecycle
  • prototyping
  • component-based development
  • object-oriented development

 

A VPN:

  • is an encrypted private network configured within a public network
  • is an Internet-based service for delivering voice communications
  • provides secure, encrypted communications using Telnet
  • is more expensive than a dedicated network

 

In choosing the best solution for a business problem, one of the most important considerations is:

  • change management
  • existing resources and skills
  • outcome measurement
  • employee training

 

Supply chain ________ systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.

  • execution
  • delivery
  • planning
  • demand

 

Which of the following statements about the Internet security is true?

  • The use of P2P networks cannot expose a corporate computer to outsiders.
  • VoIP is more secure than the switched voice network.
  • A corporate network with access to the Internet is more secure than one that provides access.
  • Instant messaging can provide hackers access to an otherwise secure network.

 

Which of the following statements is true about cloud computing?

  • It consists of three types of services: cloud infrastructure, cloud platform, and cloud software.
  • It removes the concern about data and systems security for businesses.
  • It prevents smaller firms to use resources previously affordable.
  • It relies on the help desk as the method for delivering services to users.

 

The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?

  • Richness
  • Interactivity
  • Ubiquity
  • Personalization/customization

 

An independent computer program that copies itself from one computer to another over a network is called a:

  • Trojan Horse
  • Pest
  • Worm
  • Bug

 

Microsoft® PowerPoint® is an example of which type of software that provides more control over text and graphic placement in the layout of a page than word processing software?

  • presentation graphics
  • word processing software
  • data management software
  • spreadsheet software

 

Which of the following is a characteristic of an effective PowerPoint® Presentation slide?

  • Multiple complete sentences filling the slide with text
  • Three to five bullets per slide summarizing key points for the presenter
  • Extensive animation and sound effects
  • Embedded tables with fonts less than 12pt.

 

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

  • peer-to-peer network
  • PAN
  • campus area network
  • domain-based LAN

 

The most successful solutions or methods for achieving a business objective are called:

  • best processes
  • core processes
  • benchmarks
  • best practices

 

Specific security challenges that threaten corporate servers in a client/server environment include:

  • unauthorized access; errors; spyware
  • tapping; sniffing; message alteration; radiation
  • theft, copying, alteration of data; hardware or software failure
  • hacking; vandalism; denial of service attacks

 

 

 

Advertisements