Exam 6: Integrated Enterprise Systems and Cloud Computing

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

For optimal effectiveness, the accounting system needs to be

(Multiple Choice)
4.9/5
(36)

SAP provides two formats for employees to enter time. They are

(Multiple Choice)
5.0/5
(38)

When you enter data into a cloud-based system, the data is not stored in a database.

(True/False)
4.7/5
(36)

Why are firewalls placed between each tier of the integrated enterprise system?

(Essay)
4.7/5
(39)

When a system allows the copying information from an existing document, such as a purchase order, it saves time and reduces the opportunity for error.

(True/False)
4.9/5
(35)

Define the SaaS (Software-as-a-Service)level of cloud computing.

(Essay)
4.8/5
(40)

Business Process Management involves

(Multiple Choice)
4.8/5
(36)

Define the IaaS (Infrastructure-as-a-Service)level of cloud computing.

(Essay)
4.8/5
(34)

What does the user tier consist of?

(Multiple Choice)
4.8/5
(32)

In the early 1980s, data was shared between personal computers using

(Multiple Choice)
4.7/5
(27)

Automated business processes automate

(Multiple Choice)
4.8/5
(34)

The ________ cloud service level lets an enterprise out source software applications.

(Short Answer)
4.8/5
(34)

What are the tiers in a silo computer system?

(Short Answer)
4.9/5
(38)

Which of the following is NOT a cloud service level?

(Multiple Choice)
4.7/5
(42)

The ________ cloud service level lets an enterprise out source the platform (programing languages, operating systems, networks, servers, and storage)needed to deploy or develop applications (software).

(Short Answer)
4.8/5
(33)

________ is designed for small and midsize businesses seeking an integrated solution that goes beyond accounting-only software.

(Short Answer)
4.9/5
(31)

Each time data is rekeyed, it presents another opportunity for errors to enter the system.

(True/False)
4.8/5
(30)

The firewall program is like a communication policeman monitoring traffic to and from the servers, preventing unauthorized access.

(True/False)
4.8/5
(39)

Custom programs that connected separate systems is sometimes called ________.

(Short Answer)
4.8/5
(30)

What is a local area network (LAN)?

(Essay)
4.9/5
(48)
Showing 21 - 40 of 99
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)