Ch 1-4 Ch 5-6 Ch 7-8 CH 10
10

b.Information System
Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organizations
a.IT Infrastructure
b.Information System
c.Data Management Environment
d.Networked Environment
10
c.Outsourcing
The practice of contracting custom software development to an outside firm is commonly referred to as
a.Service-Oriented Architecture
b.Scaling
c.Outsourcing
d.Application Integration
10

a.LAN
Which type of network is used to connect digital devices within a half-mile or 500-meter radius?
a.LAN
b.WAN
c.MAN
10
d.Information Ethics
What isn’t a unique point of E-Commerce
a.Global Reach
b.Better Customer Service
c.Richness
d.Information Ethics
10
a.Enterprise Architecture
_______ _______how an organization builds, deploys, uses and shares its IT assets
a.Enterprise Architecture
b.Technology Deployment
c.Technology Usage
d.ERP
20
a. Transactional Data
What is______ encompasses all raw facts contained with a business process.

a. Transactional Data
b.Analytical Information
c.Knowledge
d.None of the Above
e.All of the Above
20
a.Software as a Service (SaaS)
Salesforce.com is a good example of a firm using a ________.
a.Software as a Service (SaaS)
b.Software Package
c.Service-level agreement (SLA)
d.Software Outsourcing
20
d.Social Engineering
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
a.Pharming
b.Phishing
c.Sniffing
d.Social Engineering
20
d.Long Tail Marketing
_______ allows marketers to inexpensively find potential customers for product where demand is low.
a.Agile Development
b.Social Graph
c.Behaviour Targeting
d.Long Tail Marketing
20

b.Business Continuity Planning
_____Indicates how an organization will restore interrupted critical functions within a pre-determined time
a.Restoration
b.Business Continuity Planning
c.Reconstruction
d.Throughpu
30
d.Enterprise Resource Planning
_____ integrates all departments and functions throughout an organization into a single information system.

a.Information System
b.Enterprise Architecture
c.Enterprise Resource Production
d.Enterprise Resource Planning
30

a.Are too expensive to redesign
Legacy systems are still used because they _____
a.Are too expensive to redesign
b.Can only be run on the older mainframe computers
c.Contain valuable data that would be lost during redesign
30
a.Hierarchical
In a _________ model, data is organization into a tree-like structure that puts data in a parent-child relationship.
a.Hierarchical
b.Relational
c.Agile
d.SDLS
30
a.Freemium Model
_____ provide content for free while charging a premium for advance or special features
a.Freemium Model
b.No Cost Model
c.Micropayment Model
d.Service Rendered Model
30
c.Virtual-Added Network (VAN)
A private network, provided by a third party, for exchanging information through a high capacity, secure connection.
a.Virtual Private Network (VPN)
b.Local Area Network (LAN)
c.Virtual-Added Network (VAN)
d.Wide Area Network (WAN)
40
a.Instant Messaging
Which of the following would NOT be considered a disruptive technology?
a.Instant Messaging
b.PCs
c.E-mail
d.Internet Telephony
40
d.Susceptibility to data inconsistency
Which of the following is a main disadvantage to a distributed database system?
a.Requires more expensive computers
b.Lack of flexibility
c.Poor responsiveness to local users
d.Susceptibility to data inconsistency
40
a.Content Management System
A _____ _____ ______ system provides tools to manage creating, storing, editing and publishing information in a collaborative environment.
a.Content Management System
b.Web CMS
c.Internet Management System
d.Content System
40

b.Cost Transparency
The ability for the consumer to discover the actual cost is
a.Price Transparency
b.Cost Transparency
c.Spending Transparency
d.Costing Quotient
40
a.VoIP
_______ is a TCP/IP technology used to transmit voice calls over long-distance telephone lines.
a.VoIP
b.ToIP
c.Voice Transition
d.Voice Usage
50
d.Marketing
Which is NOT a common core ERP component for internal operations?
a.Accounting and Finance
b.Production and Materials Management
c.Human Resources
d.Marketing
50
b.Relational DBMS
The type of logical database model that treats data as if they were stored in two-dimensional tables is the
a.Pre-digital DBMS
b.Relational DBMS
c.OODMBS
d.Hierarchical DBMS
50
b.Information Politics
________________ is the political struggle over ownership of information posted in the enterprise portal
a.House of Cards
b.Information Politics
c.Information Struggle
d.Information Competition
50
b.PIPEDA
_____ is a Federal security act that applies to all organizations
a.Security Act
b.PIPEDA
c.R.S.O
d.Security of Information Act
50

a.Geographical Information System
____ ______ ______ consists of hardware, software, and data that provide location information for display on a multi-dimensional map.
a.Geographical Information System
b.Global Positioning System
c.Wireless Metropolitan Area
d.Virtual Private Network






ITM100 Jeopardy

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline