Final Flashcards
Which of the following input techs has been historically used for entering text and numbers on computers?
QWERTY keyboard
Which of the following encoding formats is the standard coding for e-mail over the internet?
MIME
A _____ is a type of program that translates a program’s source cose into machine language and executes one statement at a time
interpreter
which of the following scanning techs is used by the banking industry to read data, account numbers, bank codes, and check numbers on preprinted checks?
magnetic ink character recognition
A(n) ______ occurs if a read/write head for some reason touches one of the disks in a hard drive, leading to a loss of data.
head crash
a group of inexperienced computer operators cause the loss of valuable info. this info loss can be classified as one caused due to _____
accidents
wikileaks is a famous not-for-profit whistle-blowing website. mastercard and visa stopped payments to wikileaks after a series of leaks by the site. an anon group attacked the websites of both mastercard and visa reacting to this. these attackers, who tried to protect wikileaks, can be called ______
hacktivists
which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?
honeypot
the official website of the iranian govt was made unreachable by foreign activists seeking to help the opposition parties during the 2009 iranian election protests. web sites belonging to many iranian news agencies were also made unreachable by the activists. this cyber protest is an example of a(n) ______ attack
denial of service
identify the term that represents the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.
cybersquatting
a break even analysis
identifies at what point tangible benefits equal tangible costs
which of the following is true for tangible costs?
they are relatively easy to quantify
processing logic is often expressed in ______, which is independent of the actual programming language being used
pseudocode
the total cost of ownership of a system refers to _______
the total cost of acquisition and all costs associated with use and maintenance of a system
system efficiency is the extent to which a system _____
enables people to do things faster or at lower cost
the gap between those individuals in our society who are computer literate and have access to info resources like the internet and those who do not is referred to as the _____
digital divide
info accessibility focuses on ___
defining what info a person or org has the right to obtain about others
doing things faster is associated with info systems for _____
automating
______ decisions can be programmed directly into operational info systems so sthat they can be made with little or no human intervention
structured
_____ is the process of analyzing an org’s activities to determine where value is added to products and/or services and what costs are incurred for doing so
value chain analysis
which of the following statements is true about firms pursuing a home replication strategy?
the focus their domestic customers’ needs and wants and merely export their products to generate additional sales
____ are techs, products, or services that eventually surpass the existing dominant tech or product in a market
disruptive innovations
the prediction that the number of transisters on a chip would double about every 2 years is known as _____
moores law
companies following a ____ business strategy choose to operate solely in the traditional physical markets
brick and mortar
the ability to independently learn new techs as they emerge and assess their impact on your work and life is called _______
computer fluency
which of the following refers to having certain functions performed by the same company but in a different country?
offshoring
____ are activities orgs perform in order to reach their business goals, including core activities that transform inputs and produce outputs, and supporting activities that enable the core activities to take place
business processes
the managerial level of the org is also known as the ______ level
executive
with reference to assessing value for the IS infrastructure, architectural value is derived from ______
an investment’s ability to extend the infrastructure’s capabilities to meet business needs today and in the future
________: the hardware, software, communication and collaboration networks, data, facilities, and human resources used by orgs to support their decision making, business processes, and competitive strategy
info system infrastructure
any input your computer receives is digitized and then is processed by the CPU. which of the following explains the meaning of the word “digitized” in the preceding sentence?
translated into binary code
using _____, multiple virtual machines, each with its own applications, can be configured to run on one single computer, enabling the IT service providers to better utilize their resources
virtualization
procedures that different computers follow when they transmit and receive data are called:
protocols
there are two forms of transmission media used in networks: cable and _____ media
wireless
electronic commerce is used to conduct business with business partners such as suppliers and intermediaries. this form of EC is commonly referred to as ____ electronic commerce
business to business
which of the following actions explains mass customization?
firms tailor their products and services to meet a customer’s particular needs on a large scale
_______ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers
reintermediation
prior to the introduction of the internet and web, the secure communication of proprietary info in business to business electronic commerce was facilitated using _____
electronic data interchange