Filters
Question type

Study Flashcards

How are operations support systems used

Correct Answer

verifed

verified

Operations support systems are...

View Answer

A WAN (wide area network) allows companies to share information with those outside the organization by linking computers over a relatively large geographical area.

Correct Answer

verifed

verified

All of the following are disadvantages of cloud computing except:


A) By using cloud computing companies are able to match technology available with their exact needs.
B) A disruption in work can occur if the Internet is unavailable.
C) Company data might become available to unauthorized individuals or criminals.
D) A computer service crash could occur at a company's service providers' facilities.

Correct Answer

verifed

verified

A firm's _____ department will coordinate sales activities and handle customer-relationship management.


A) operations
B) accounting
C) finance
D) marketing

Correct Answer

verifed

verified

SCENARIO-BASED Consuela Alvarez is an information system (IS) manager for Metro Hospital, a major medical facility specializing in the care of infants and children. She supervises a total of ten people in processing the hospital’s information needs. She works long hours and always receives an “excellent” rating from upper management. Alvarez has worked for Metro in this capacity for six years and is quite happy with her job. -When she needs to channel information to company accountants (though not to other internal or external departments), Alvarez probably needs an enterprise resource planning system.

Correct Answer

verifed

verified

Define artificial intelligence.

Correct Answer

verifed

verified

First used in 1956, the term a...

View Answer

Sal Mineo relies on _____ data that's generated by the company itself rather than provided by outside sources.


A) published government
B) syndicated
C) internal
D) external

Correct Answer

verifed

verified

_____ refers to the science of developing computer systems that can mimic human behavior.


A) Artificial intelligence
B) Cybersimian intelligence
C) Artificial intellect
D) Animatronic intellect

Correct Answer

verifed

verified

It's the ability to apply database knowledge to business situations that makes IS professionals particularly valuable to organizations.

Correct Answer

verifed

verified

In most large organizations, the senior management team includes a _____ who oversees information and telecommunications systems.


A) chief information technology officer (CITO)
B) chief information officer (CIO)
C) vice president of information and telecommunications
D) chief Information manager

Correct Answer

verifed

verified

A firm's _____ department will record sales and payments and track the company's performance.


A) marketing
B) accounting
C) finance
D) operations

Correct Answer

verifed

verified

A _____ has no significant physical presence, relying on third parties to produce, warehouse, price, and deliver the products that it sells over the Internet.


A) virtual company
B) quasi company
C) ghost competitor
D) leanandmean competitor

Correct Answer

verifed

verified

Operations managers supervise information flow among all database applications.

Correct Answer

verifed

verified

What is data mining

Correct Answer

verifed

verified

Data mining is the process of ...

View Answer

An expert system is an example of an artificial intelligence application that has been commercially successful.

Correct Answer

verifed

verified

A(n) _____ system provides senior managers with customized strategic information presented in a convenient format.


A) management information
B) executive information
C) decision support
D) flexible planning

Correct Answer

verifed

verified

SCENARIO-BASED Just about everybody is familiar with the amazing success that eBay has enjoyed during the last few years. It’s spawned eBay stores across the country, and executives plan to roll out more creative business practices in the near future. -eBay is concerned about all of the following forms of data security except _____.


A) creditcard theft
B) password theft
C) firewall duplication
D) privacy invasion

Correct Answer

verifed

verified

The battle against technology crime is near the top of the FBI's list of priorities, ranking behind only the war against _____ and _____.


A) terrorism / espionage
B) terrorism / poverty
C) drugs / espionage
D) terrorism / drugs

Correct Answer

verifed

verified

Piracy is a prevalent form of computer crime.

Correct Answer

verifed

verified

To identify and turn away undesirable visitors, the hotel-casino industry uses _____ systems, which rely on facerecognition technology.


A) digital camera-surveillance
B) digital hidden camera
C) digital visage imaging
D) digital facial print

Correct Answer

verifed

verified

Showing 121 - 140 of 170

Related Exams

Show Answer