Chat with us, powered by LiveChat EXCELSIOR BUS221/ BUS221 FINAL EXAM (ALL ARE CORRECT) | WriteDemy

Question 1

A useful guideline to protect corporate computers from criminal hackers is to ____.

Install antivirus software on all computers

Avoid creating frequent backups of critical data

Remove any firewall that may have been installed between your corporate network and the Internet

Enable several guest accounts

Question 2

The ability to ____ is a characteristic of a MIS system.

Barrier to communication

provide reports with fixed and standard formats

allow users to develop systems

use external data stored in the computer system

Question 3

All of the following are problem associated PowerPoint presentations except

a. Speaker read the slides

b. The text is too small

c. Speaker talks too long.

d. Poor use of colors

Question 4

One of the functional units likely to benefit from use of a customer relationship management system is ____.

Software development

Quality control

Marketing

Product analysis

Question 5

____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process.

B2C

B2B

C2C

G2C

Question 6

The Privacy Act of 1974 applies to all of these except____.

deals with the protection of communications while in transit from sender to receiver

applies only to certain federal agencies

Socialnetworking

requires all financial institutions to protect and secure customers’ nonpublic data from unauthorized use or access

Question 7

The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.

USA Patriot Act

Privacy Act of 1974

Gramm-Leach-Bliley Act

Electronic Communications Privacy Act

Question 8

____ is summary of what has been accomplished in the past or an update on a project.

Term paper

Email

Prospectus

Report

Question 9

A ____ is a type of malware that executes when specific conditions occur.

Trojan horse

Worm

Logic bomb

Virus

Question 10

The second level in the capability maturity model is ____.

Defined

Managed

Repeatable

optimized

Question 11

The first stage in the problem solving process during which one identifies and defines potential problems or opportunities is the ____ stage.

Design

Intelligence

Choice

Monitoring

Question 12

The haptic interface, relays the sense of ____ in the virtual world.

Taste

Touch

Sight

sound

Question 13

Graphic files that can be used in animation are ____.

GIF

MP3

ISDB

WMV

Question 14

Data flow diagrams ____.

Are interactive

are used to model data entities and their relationships

Are linear

Are required

Question 15

____ can process many pieces of data at the same time and learn to recognize patterns.

Natural language processing systems

Neural networks

Voice recognition systems

Learning systems

Question 16

____ reports are a set of reports developed to provide certain information upon request.

Exception

Scheduled

drill-down

demand

Question 17

During the ____ stage of the problem solving process, you develop alternative solutions to the problem and evaluate their feasibility.

Choice

Implementation

Intelligence

design

Question 18

For many businesses, robots are used to do the three Ds, dull, dirty, and ____.

Dynamic

Devastating

Dangerous

dingy

Question 19

Roughly ____ of U.S. employers monitor their employees Web surfing activities.

50%

less that 20%

25%

75%

4 points

Question 20

____ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire.

Child Online Protection Act

Platform for Privacy Protection

Freedom of Information Act

IRCA

4 points

Question 21

The ____ is not a component of the typical DSS?

model base

user interface

database

inference engine

Question 22

A small program hidden in a network or computer system that records identification numbers and passwords is called a(n) ____.

Trojan horse.

logic bomb

password sniffer

rootkit

Question 23

The training of end users is an important task in the ____ phase of a systems development project.

predesign

systems maintenance and review

systems design

systems implementation

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order