Filters
Question type

A major source of data for CRM is produced by loyalty programs.​

A) True
B) False

Correct Answer

verifed

verified

During the design phase of a SDLC, if the project team selects a solution that requires custom programming, the team's systems analysts will create a set of ________ specifications. ​

Correct Answer

verifed

verified

Which of the following is not a characteristic of a management information system?​


A) ​Collect, display, and modify transactions
B) ​Provides useful information for managerial activities
C) Increases managerial efficiency​
D) ​Produces routine and on-demand reports

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

System ___________ describes a system's features, hardware architecture, and programming.​

Correct Answer

verifed

verified

_______ applications provide optimal information when they encompass customer support, marketing, and sales.​


A) ​SCM
B) ​CRM
C) ​Supply chain
D) ​all of the above

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Detailed application specifications can be developed before or after selecting the hardware and software for an information system.​

A) True
B) False

Correct Answer

verifed

verified

Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.​

Correct Answer

verifed

verified

A(n) ___________ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.​


A) ​supply chain
B) ​payment gateway
C) ​​ecommerce application
D) payment processing routine​

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Data centers are designed to proactively reduce the risk of data loss that might occur as a result of a disaster.​

A) True
B) False

Correct Answer

verifed

verified

A(n) _________ tool is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs.​

Correct Answer

verifed

verified

A(n) _________ informs potential lenders that they must verify the identity of anyone attempting to open an account in your name.​

Correct Answer

verifed

verified

fraud alert​

A(n) ______________ rating of 150,000 hours means that, on average, a device could function for 150,000 hours before failing.​

Correct Answer

verifed

verified

MTBF​

The planning phase of a SDLC includes all of the following except _________.​


A) assembling the project team​
B) ​writing a requirements report
C) ​justifying the project
D) ​producing a project development plan

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

As the design phase of a SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly.​

A) True
B) False

Correct Answer

verifed

verified

Hacking accounts for about 90% of data breaches.​

A) True
B) False

Correct Answer

verifed

verified

Many organizations establish a(n) ____________staffed by technical support specialists who are familiar with the information system's software.

Correct Answer

verifed

verified

The goal of the planning phase for an information system project is to create a(n) ____________.​


A) ​iterative SDLC
B) ​systems analysis and design
C) ​project development plan
D) ​system development life cycle

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

C

Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?​


A) ​Corrective procedures
B) Preventive countermeasures​
C) ​Detection activities
D) ​Deterrents

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

An ecommerce ____________ is the software that handles ecommerce transactions.​

Correct Answer

verifed

verified

A(n) ___________ is a specialized facility designed to hold and protect computer systems and data.​

Correct Answer

verifed

verified

Showing 1 - 20 of 121

Related Exams

Show Answer