Exam 9: Enterprise Computing

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which type of security measure reduces the likelihood of a deliberate attack?​

(Multiple Choice)
4.9/5
(35)

A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.​

(Short Answer)
4.9/5
(38)

An information system progresses through several phases as it is developed, used, and finally retired. These phases are usually referred to as the _________.​

(Short Answer)
4.9/5
(32)

A DSS manipulates the data needed to make a decision as well as making a decision.​

(True/False)
4.8/5
(37)

A ____________ is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs.​

(Short Answer)
4.8/5
(39)

The term quality of service refers to the level of performance a computer system provides.​

(True/False)
4.9/5
(37)

Which type of problem requires human intuition as the basis for finding a solution.​

(Multiple Choice)
4.9/5
(35)

A widely accepted technique called __________ application design is based on the idea that the best information systems are designed when end users and systems analysts work together on a project as equal partners.​

(Short Answer)
4.8/5
(33)

Three key concepts ensure good quality of service include all of the following except _______ .​

(Multiple Choice)
5.0/5
(42)

A(n) _________ tool is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs.​

(Short Answer)
4.9/5
(36)

The maintenance phase of a SDLC includes all of the following except _________.​

(Multiple Choice)
4.7/5
(40)

A quality-of-service ____________ is a technique used for measuring a specific QoS characteristic.​

(Short Answer)
4.9/5
(27)

_________ documentation describes how to interact with the system to accomplish specific tasks.​

(Short Answer)
4.9/5
(40)

____________ testing is the process of trying out various sequences of input values and checking the results to verify that the application works as it was designed.​

(Short Answer)
4.8/5
(39)

Businesses use ___________ to maximize efficiency and profitability of their supply chain.​

(Short Answer)
4.7/5
(29)

__________ are the people who directly carry out the organization's mission.​

(Short Answer)
4.9/5
(42)

System ____________ refers to the process of deactivating an old information system and activating a new one.​

(Short Answer)
4.8/5
(44)

A(n) ____________ system collects, stores, and processes data to provide useful, accurate, and timely ?information, typically within the context of an organization.​

(Short Answer)
4.8/5
(26)

Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher.​

(True/False)
4.8/5
(36)

Expert systems are designed to deal with data that is imprecise or with problems that have more than one solution using a technique called __________.​

(Short Answer)
4.9/5
(36)
Showing 21 - 40 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)