Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Software Engineering Expert

Indicate whether the statement is true or false.

1. Channel bandwidth refers to the diameter of the telecommunications media.

2. Modems convert analog signals to digital signals for transmission over a network.

3. A personal area network is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building.

4. Application programs interact with systems software, and the systems software directs computer hardware to perform the necessary tasks.

5. Sequential access storage devices allow data to be accessed more quickly than direct access storage devices.

6. The technology infrastructure is a set of shared IS resources that form the foundation of each computer-based information system.

7. When organizing a database, key considerations include determining what data to collect, who will have access to it, how they might want to use it, and how to monitor database performance.

8. Disruptive change often results in new, successful companies and offers consumers the potential of new products and services at reduced costs and superior performance.

Multiple Choice: Identify the choice that best completes the statement or answers the question.

9. ________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU.

a. Main memory
b. The ALU
c. Registers
d. The CPU

10. One advantage of proprietary software versus off-the-shelf software is that _____

a. the initial cost is lower
b. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs
c. the software is likely to meet the basic business needs that are common across organizations
d. being involved in the development offers control over the results

11. _____ consists of computer programs that govern the operation of the computer.

a. Hardware
b. Applications
c. Software
d. Telecommunications

12. With _____ , the software engineer drags and drops graphical objects such as buttons and menus onto the application form.

a. assembly language
b. visual programming
c. machine code
d. fourth generation language

13. The _____ is a description that involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user.

a. entity relationship diagram
b. schema
c. data model
d. data manipulation language

14. A ________ is s field or set of fields in a record that uniquely defines the record.

a. attribute
b. primary key
c. key
d. data item

15. RAID storage devices provide organizations with data storage that is _____.

a. fault tolerant
b. extremely low cost
c. exceedingly fast
d. unlimited in storage capacity

16. _____ consists of computer equipment used to perform input, processing, and output activities.

a. Information technology
b. Telecommunications
c. Technology infrastructure
d. Hardware

17. The ________ is the heart of the operating system and controls its most critical processes.

a. user interface
b. kernel
c. utility programs
d. boot up disk

18. The goal of the _____ phase of systems development is to gain a clear understanding of the problem to be solved or opportunity to be addressed.

a. systems analysis
b. systems design
c. systems investigation
d. systems implementation

19. The smallest piece of data used by a computer is the _____.

a. entity
b. bit
c. byte
d. character

20. The ability of an organization to achieve its goals is often a function of the organization's _____

a. overall structure
b. ability to change
c. culture
d. all of the above

21. With the _____ basic processing alternative, processing devices are placed at various remote locations and each device is isolated and does not communicate with any other processing device.

a. distributed processing
b. centralized processing
c. file processing
d. decentralized processing

22. Total cost of ownership includes these costs

a. cost to acquire an item
b. end-user costs
c. technical support costs
d. all of the above

23. As long as the tables in a relational database share one common _____, the tables can be linked to provide useful information and reports.

a. primary key
b. characteristic
c. file
d. attribute

24. _____ are the most powerful computers with the fastest processing speed and highest performance.

a. Blade servers
b. Mainframe computers
c. Workstations
d. Supercomputers

25. ______ is a measure of the extent to which a system achieves its goals.

a. Efficiency
b. Performance rate
c. Reliability
d. Effectiveness

26. Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.

a. roll up
b. slice and dice
c. drill down
d. extract data

27. With network management software, a network manager can _____

a. monitor the use of individual computers as well as shared hardware devices
b. ensure compliance with software licenses
c. scan for licenses
d. all of the above

28. _____ is a measure of how widely technology is spread throughout an organization.

a. Technology infusion
b. Technology diffusion
c. Technology acceptance
d. Technology adoption

29. _____ is a network that connects users and their computers in a geographical area that spans a campus or a city.

a. Metropolitan area network
c. Wide Area network
b. Local area network
d. Personal area network

30. Green computing is focused at the efficient and environmentally responsible _____ of IS related products.

a. design and manufacture
b. disposal
c. operation
d. all of the above

31. _____ investigates the additional profits or benefits that are generated as a percentage of the investment in IS technology.

a. Net present value
b. Earnings growth
c. Return on investment
d. Market share

32. With a VPN ______

a. users are often provided a token that displays a constantly changing password
b. users can gain wide area network access
c. users can gain access to an organization's private network
d. all of the above

33. A database is a collection of integrated and related _____.

a. fields
b. records
c. attributes
d. files

34. The area covered by one or more interconnected wireless access points is commonly called a(n) _____.

a. reception area
b. coverage zone
c. hot spot
d. access area

35. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

a. cloud computing
b. parallel computing
c. grid computing
d. none of the above

36. The _____ is a device that combines data from multiple data sources into a single output signal that carries multiple channels.

a. transmission media
b. multiplexer
c. modem
d. switch

37. A(n) ______ enables users to share a certain number of outside lines to make telephone calls to people outside the organization.

a. DSL
b. modem
c. Wi-MAX
d. PBX

38. _____ is an important component of every information system that helps organizations to achieve their goals.

a. Hardware
b. Feedback mechanism
c. Software
d. Data

39. A type of memory whose contents are not lost if the power is turned off is said to be _____.

a. multicore
b. RAM
c. nonvolatile
d. none of the above

40. ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

a. user view
b. data definition language
c. schema
d. data manipulation language

41. An operating system with _____ capabilities allows a user to run more than one application at the same time.

a. networking capability
b. memory management
c. hardware independence
d. multitasking

42. The idea of ________ is to constantly seek ways to improve business processes and add value to products and services.

a. reengineering
b. disruptive change
c. process redesign
d. continuous improvement

43. After a computer system is started, portions of the operating system are transferred to _____ as they are needed.

a. the CPU
b. the back-up rescue disk
c. memory
d. none of the above

44. If an industry has low entry and exit costs and the technology needed to start and maintain a business is commonly available, this creates ________.

a. a threat of new entrants
b. increased bargaining power of customers and suppliers
c. a threat of substitute products and services
d. all of the above

45. _____ is (are) considered to be the most important element in a computer-based information system.

a. Hardware
b. Procedures
c. Software
d. People

46. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called ______.

a. cloud computing
b. service oriented architecture
c. rapid application development
d. Software as a Service

47. The _____ are low-cost, centrally managed computers with no extra drives or expansion slots and limited capabilities.

a. netbook computer
b. thin client computer
c. laptop computer
d. desktop computer

48. The process of defining relationships among data to create useful information requires ______

a. an information system.
b. knowledge
c. intelligence
d. intuition

49. A risk involved with using an application service provider is that _____

a. sensitive information could be compromised
b. a disaster could disable the ASP's data center
c. the ASP could be incapable of keeping its servers and network up and running consistently
d. all of the above

50. Customer relationship management programs help companies manage _____

a. programs to retain loyal customers
b. marketing and advertising
c. finished product inventory
d. a. and c.

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M91597010
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Software Engineering

Write review on this article with apa formatgovernment

Write review on this article with APA format. Government surveillance is a major issue in the United States and globally. Surveillance refers to any collection and processing of personal data, whether, identifiable or no ...

Proposaldesign of an efficient gps tracking system tag for

Proposal Design of an efficient GPS Tracking System (tag) for monitoring small species IMPLEMENTING EMBEDDED SYSTEMS USING SYSML Task Using PapyrusSysML Software (Downloadable online - Evaluation Copy- Latest Version) Mo ...

Write reply to this article with references with apa

Write reply to this article with references with APA bibliography. Hate Crimes Over the past couple of years, hate crimes have been on the rise in America's largest cities. Studies show that there were sharp spikes in th ...

The research paper for this course is about some of the

The research paper for this course is about some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commerci ...

In this assignment you will answer the following review

In this assignment, you will answer the following review questions from the reading materials of the module/week. 1. "What are the key components of a typical P2P application? Describe their functions." 2. "What are the ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

Write review on this article with apa formatalthough

Write review on this article with APA format. Although computer crimes are being seen in our society more and more each day, it is still difficult to prosecute people who commit these crimes mainly because everything is ...

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

Instructionsprivacy-preserving data miningdata mining

INSTRUCTIONS PRIVACY-PRESERVING DATA MINING Data mining technology can be exploited to reveal sensitive information from the original data. Thus it is important to preservethe privacy of the parties that the data refer t ...

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As