WE WRITE CUSTOM ACADEMIC PAPERS

100% Original, Plagiarism Free, Tailored to your instructions

Order Now!

Suffolk ISOM 310- What is the process of analyzing

QUESTION 1
1. What is
the process of analyzing data to identify trends, patterns, and other useful
information?

A. Data mining

B. Digging agent

C. Database modeling

D. Querying

E. Clustering
QUESTION 2
1. Which of
the following is basically the acquisition of software via a subscription
model?

A. BPaaS

B. SaaS

C. PaaS

D. IaaS

E. Virtualization

QUESTION 3
1. Each
computer attached to a network or the Internet has a unique address called a(n)
________.

A. IP address

B. local address

C. network address

D. PC address

E. Internet address

QUESTION 4
1. What are
cookies?

A. Small text files that store
information

B. Review IP address to track online
browsing

C. Hidden application to record
keystrokes

D. Malware designed to slow down your
PC

E. Program offered by an organization
which post rules

QUESTION 5
1. When you
click on a ___________ on your university’s homepage, your browser sends a
request to the Web server that houses the requested page.

A. HTTP

B. hyperlink

C. desktop

D. server

E. protocol

QUESTION 6
1. What is
the main difference between the initial set of web applications and Web 2.0?
2.
3. A. interactivity
4.
5. B. speed
6.
7. C. bandwidth requirements
8.
9. D. software requirements
10.
11. E. technology

QUESTION 7
1. The
fastest transmission speeds on cables for a wired network are ______________,
while ___________ are the slowest.

A. coaxial, fiber

B. fiber, copper

C. copper, coaxial

D. copper, fiber

E. fiber, coaxial

QUESTION 8
1. When
considering security threats it is very important to consider __________ and
__________ of the threat on the organization.

impact,
theft

prevalence,
impact

repudiation,
availability

authenticity,
availability

theft,
prevalence

QUESTION 9
1. Which
phase of SDLC begins the process?

Requirements

Planning

Development

Implementation

Maintenance

QUESTION 10
1. Encryption
is not only used to protect data transmissions, but it can also be used to:

lock
out users

protect
data on servers

identify
viruses

update
email

take
photographs
QUESTION 11
1. In
contrast to ________, ERP applications make accessing information easier by
providing a central information repository.

legacy
systems

custom
applications

off the shelf applications

data warehouses

database
management systems
QUESTION 12
1. What is
one of the core characteristics of the Internet that has contributed to its
rapid growth?

interoperability

addressing

Internet
Protocol

IPv4

fiber
optics
QUESTION 13
1. Biometrics
are primarily used for one of two things. What are they?

Authentication,
identification

Non-repudiation,
authentication

Fingerprint
recognition, iris recognition

Account
access, recognition

User
rights, printing services
QUESTION 14
1. What type
of architecture can be used in different systems with different technology
platforms?

A. Service Oriented Architecture

B. peer-to-peer

C. Software as a Service (SaaS)

D. Intranet

E. VPN
QUESTION 15
1. What is
the process of identifying, assessing and prioritizing the security risks an
organization may face?

Risk
management

Virus
Risk

Wi-Fi
Protected Access

Security

Preventative
Controls
1
QUESTION 16
1. An
important B2C enabler that allows for users that use a wide variety of
platforms to access businesses that also use different platforms is:

Interoperability

OS
specific

Platform
based

Bandwidth

E-business

QUESTION 17
1. What do
the operational components of a CRM accomplish?

Improve
day to day interactions with customers

Lower
overall cost of production

Identify
customer preferences

Automate
customer responses

Determine
product location

QUESTION 18
1. What type
of decision is routine and repetitive and often has well-defined procedures for
dealing with them?

Unstructured

Structured

Semi-structured

Unusual

Control
1 points
QUESTION 19
1. If a
virus is embedded in a legitimate file, they are often called a(n)__________.

worm

Trojan
horse

hack

theft

active
content

QUESTION 20
1. The AARP,
an organization that caters towards people over the age of 50, uses its
members’ information to place them into very small groups for the purpose of
identifying marketing opportunities.
This is an example of what?

Customer
profiling

Customer
segmentation

Customer
grouping

Client
profiling

Client
segmentation

QUESTION 21
1. In order
for you to enter the server room at your office you must have a key to the
room, and then you must have a proper user name and password to access the
server. All of the student files on the server are encrypted. What is this
called?

Layered
security

Overkill

Defense
in depth

Organizational
policy

Information
security

QUESTION 22
1. When
verifying that the solution solves the problem at hand, you must be sure that
the alternative meets all __________ and best meets the _________.

requirements,
goals

requirements,
needs

goals,
wants

solutions,
vision

problem,
definition

QUESTION 23
1. When you
shop online, what is an indication that the transaction is secure?

http://

https://

ftp://

smtp

POP3

QUESTION 24
1. Cloud
computing allows organizations to rent computing resources from providers
instead of having their own locally managed __________ and __________.

hardware,
software

hardware,
human resources

network,
software

Web
2.0, Web 3.0

websites,
servers

QUESTION 25
1. In
February of 2011 the Internet Assigned Number Authority (IANA) assigned the
last block of IPv4 addresses. What is the new address standard?

IPv5

IPv6

MAC
address

DARPA

virtual
address

QUESTION 26
1. When
considering decision making techniques/tools, which tool requires you to
evaluate each alternative against all other alternatives?

Pros/cons
analysis

Paired
comparison

Deep
research

Decision
Criteria

Requirements

QUESTION 27
1. What
allows one physical device such as a server or computer to operate as if it was
several machines?

Software
as a Service

Service
Oriented Architecture

virtualization

Web 2.0

unified
communications

QUESTION 28
1. Which of
the provides a cloud-based platform for running websites and databases and
executing programming languages?

BPaaS

SaaS

PaaS

IaaS

Virtualization

QUESTION 29
1. You have
been included on an IT task force for your university. The committee’s first
priority is wireless access on your campus. The task force chair keeps
discussing increasing enrollment numbers. What principle of architecture is the
chair most likely alluding to?

ease of
implementation

flexibility

control

scalability

security

QUESTION 30
1. After
reviewing table after table of data for your marketing research project, you
can no longer make much sense of most of the information. What type of tool
would be able to help you uncover trends in the data?

Dedicated
statistical software

DBMS

Document
management software

Data
visualization software

Reporting
tools

QUESTION 31
1. Methods
to improve a site’s ranking in search engine results are referred to as:

Search
engine optimization

Search
marketing

Conversion
rate

Pay per
click

Click
through ads

QUESTION 32
1. Auto
makers spend a significant amount of time and money developing new automobiles.
Often these auto makers create a working mock up for display and testing. What
methodology are these automakers using?

Prototyping

Modeling

Maintenance

Spiral
Model

Off the
shelf

QUESTION 33
1. A
connection that uses encryption and other channels to provide a secured channel
over an open wire connection is called a(n):

smpt
network

Symmetric
network

Virtual
private network

Bridged
network

Switched
network

QUESTION 34
1. Transaction
Processing Systems (TPS) can make decisions using predetermined rules and
processes. This is an example of a(n)
_________ decision of a(n) ____________ control.

unstructured,
operational

structured,
operational

semi-structured,
managerial

unstructured,
managerial

structured,
strategic

QUESTION 35
1. Many
cities across the Unites States are considering fiber networks that would
connect commercial and residential areas to a single network. This would be
what kind of network?

LAN

PAN

WLAN

WAN

CAN

QUESTION 36
1. ___________
are used to determine how well each alternative meets a particular goal or
requirement.

Analysis

Comparison

Criteria

Technique

Tool

QUESTION 37
1. EDI
refers to the _______________ sharing of information between two businesses in
a standard format.

electronic

paper

classified

organized

direct

QUESTION 38
1. Innovators
are working on Web 3.0. What type of new technology is expected from Web 3.0?

virtualization

instant
gratification

signatures

procedures

semantics

QUESTION 39
1. What is
the term for a computer or a router that controls access in and out of the
organization’s networks, applications, and computers?

Switch

Bridge

Gateway

Firewall

Hub

QUESTION 40
1. ___________
involves making sure that information or data can only be accessed by
individuals with authorized access.

Integrity

Availability

Confidentiality

Authenticity

Non-repudiation

QUESTION 41
1. ______________
software is software that allows users to access the underlying source code for
an application.

COTS

Custom-built

Developed

Open
source

Hybrid

QUESTION 42
1. Valerie
has decided to purchase her first home. Before she begins looking at houses,
she has chosen to review her budget, and has decided on a very specific number
that she is comfortable with for her monthly mortgage payment. What kind of
analysis has Valerie done?

What-if
analysis

Goal
seeking analysis

Paired
comparison

Pros/cons

Decision
Matrix

QUESTION 43
1. Your
national office of your student organization has established a Portal for you
to track news, memos, and download forms. What kind of system does this most
closely describe?

Decision
support system

DBMS

Reporting
tools

Document
management tools

Paired
comparison

s
QUESTION 44
1. A Web
merchant wants to ensure that people cannot deny that they entered into a
transaction, so they starting using digital signatures and encryption as part
of their transaction processing. This
is an example of what?

Integrity

Availability

Confidentiality

Authenticity

Non-repudiation
1
QUESTION 45
1. What is a
more recent and more powerful encryption algorithm widely available in most
routers?

WEP

WPA

https

Symmetric
encryption

Stealth

QUESTION 46
1. What is
the biggest challenge with ERP systems?

Customizing
it to the needs of the organization

Efficiency
of the system

Cost of
the implementation

Customer
support

Production
time lost

QUESTION 47
1. When
registering online for your classes you log onto to a website provided by your
university. The computer and web browser that you are using acts as a
_________, while the university computer acts as a ___________.

client,
server

server,
client

computer,
server

browser,
client

client,
application

QUESTION 48
1. The
Institutional Research department at your university gathers data on nearly
everything on campus. At first the department used spreadsheets to maintain the
data, but more sophisticated statistical methods are required for the data.
What type of tool does the Institutional Research department likely need?

Reporting
tools

What-if
analysis

Dedicated
statistical software

Data
visualization software

DBMS

QUESTION 49
1. What is
the second phase of Simon’s Information Systems and Decision model which
requires developing alternative approaches to bringing about the required
change?

Intelligence

Design

Choice

Implementation

Knowledge

QUESTION 50
1. You step
out of your office and miss a telephone call. When you sit at your desk you
notice that the voicemail light is blinking on your phone, you have a new
email, and you have a transcribed instant message on your computer screen in
the form of an Instant Message. Your organization has most likely adopted what
type of technology?

intranet

VPN

wireless

unified
communications

Web 3.0

QUESTION 51
1. What
describes a series of actions that result in an outcome for an actor?

Outsourcing

Use
case

Requirements

Planning

Development

QUESTION 52
1. ___________
involves making sure that data are consistent and complete.

Integrity

Availability

Confidentiality

Authenticity

Non-repudiation

QUESTION 53
1. Strategic
planning often involves _____________ decisions because it is very difficult to
anticipate the information needs of managers involved in strategic planning.

structured

flexible

controlled

strategic

unstructured

QUESTION 54
1. The
Internet has been the contributor to a global platform where organizations
across the world can compete for customers and gain access to new __________.

competitors

markets

revenues

employees

Media

QUESTION 55
1. Using a
unique username and a complicated password is one possible method to verify
that a user is who they say they are. What type of goal is this?

Non-repudiation

Authenticity

CIA

Availability

Privileges
1
QUESTION 56
1. Which of
the following is not a disadvantage of an ERP system?

They
require an enormous amount of work.

They
are expensive.

It may
not work better than the previous system.

They
may require redesigned business processes.

Users
may resist implementation.

QUESTION 57
1. What kind
of threat renders a system inoperative or limits its capability to operate?

Denial
of service

Unauthorized
access

Theft
and fraud

Forceful

Passive

QUESTION 58
1. When
using your cell phone, what type of transmission are you using?

infrared

Bluetooth

microwave

radio

cable
1
QUESTION 59
1. Search
engine results achieved by design and search engine optimization are known as
______.

Sponsored
links

Pay-per-click

Keyword
bidding

Search
engine optimization

Organic
links

QUESTION 60
1. You are
asked to provide your location and email address when downloading iTunes from
the Apple site. You are also prompted to check a box if you would like any
Apple News updates. This checkbox allows you to do what?

Opt-in

Create
account

Opt-out

Enable
cookie manager

Identify
data collection threat

QUESTION 61
1. What is a
primary focus of supply chain management (SCM)?

Inventory
cost reduction

Increased
level of customer support

Sales
tracking

Outsourcing
manufacturing

Unified
communication
1
QUESTION 62
1. ____________
refers to having some level of control over potential secondary uses of one’s
personal information.

Information
privacy

Information
security

Information
assurance

Data
collection threat

Accessibility

QUESTION 63
1. Which of
the following refers to security solutions that protect access to systems,
applications, or data by ensuring users or systems are authenticated and
allowed to have such access?

Physical
access controls

System access
controls

User
profiles

Logical
access controls

Account
management

QUESTION 64
1. Which of
the following allows companies to pass the operation of their computer systems
to another company?

BPaaS

SaaS

PaaS

IaaS

Virtualization

QUESTION 65
1. ____________
is when firms are able to maintain the lowest level of inventory while still
being able to fulfill demand.

Supply
Chain Management

Inventory
flow management

Just-in-time
inventory

Inventory
scheduling

Inventory
capacity management

QUESTION 66
1. What is
the most critical phase in the detailed decision making process?

Identify
and clearly define the problem

Determine
requirements and goals

Identify
alternatives

Define
the criteria

Select
a decision making technique

QUESTION 67
1. You have
received an email from your university IT department stressing that the IT
department will NEVER ask you for your username and password to your email
account. What type of scheme is the university most likely trying to protect
you from?

Phishing

Smurfing

Spoofing

Break-ins

Security
holes

QUESTION 68
1. Search
engine results where companies pay for placement are known as ______.

Sponsored
links

Pay-per-click

Keyword
bidding

Search
engine optimization

Organic
links

QUESTION 69
1. As the
amount of structure in a decision __________, the need for flexibility
__________ .

decreases,
increases

increases,
decreases

decreases,
decreases

increases,
increases

none of
the above

QUESTION 70
1. The
systems development committee has chosen to implement the new system in a
limited number of sites based on location. What type of integration plan is
being implemented here?

Direct
Changeover

Parallel
Operation

Phased
implementation

Pilot
Operation

Use
Case

QUESTION 71
1. A system
that has been accessed illegally is a victim of ___________.

theft
and fraud

unauthorized
access

careless
behavior

denial
of service

automation
tools

QUESTION 72
1. What term
is used to refer to someone (or something) pretending to be someone else (or
another computer)?

Phishing

Spoofing

Smurfing

Porting

Break-in

QUESTION 73
1. Privacy
of information is the ___________ of the ___________ collected by organizations
about the individuals using their services.

confidentiality,
information

collection,
data

protection,
knowledge

certification,
wisdom

privacy,
information

QUESTION 74
1. Statistical
analysis emphasizes ______________ models, while data mining tries to
____________ the models.

concludes,
organize

preexisting,
discover

definition,
explain

described,
structure

explicit,
recreate

QUESTION 75
1. Information
security is not just about technology, but also about management and _________
.

hardware

software

people

networks

policies

QUESTION 76
1. On a
recent trip to my local grocery store, I noticed that ping pong balls are
available for sale in the same aisle where beer and other spirits are sold.
What component of a CRM likely made the management at this store consider
placing these items next to each other?

Operational

Collaborative

Analytical

Direct

Unified

QUESTION 77
1. __________
refers to mass collaboration of information to solve a problem.

social
networking

collaborative
content

unified
communications

Really
Simple Syndication

Crowdsourcing

QUESTION 78
1. _______________
is a set of applications, technologies and processes for gathering, storing,
analyzing, and accessing data to help users make better decisions.

EIS

Business
intelligence

Data
mining

A
discussion database

Groupware

QUESTION 79
1. What are
the two types of cryptography systems used in encryption today?

Asymmetric,
symmetric

Accurate,
accessible

Threat,
solution

Analog,
digital

Private,
public

QUESTION 80
1. As a
manager at your University Bookstore, you often run weekly inventory reports
that give you lists of inventory on hand as well as inventory sold over the
past week. The reports are run from data stored within the database management
system (DBMS) of the Bookstore. What type of information retrieval tool are you
using when running the report?

Reporting
tools

Document
management tools

Decision
Support System

Decision
Matrix

Pro/cons
analysis

Our Service Charter

  1. Excellent Quality / 100% Plagiarism-Free

    We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
  2. Free Revisions

    We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
  3. Confidentiality / 100% No Disclosure

    We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
  4. Money Back Guarantee

    If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
  5. 24/7 Customer Support

    We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.

Excellent Quality
Zero Plagiarism
Expert Writers

Instant Quote

Instant Quote
Subject:
Type:
Pages/Words:
Single spaced
approx 275 words per page
Urgency (Less urgent, less costly):
Level:
Currency:
Total Cost: NaN

Get 10% Off on your 1st order!