Fill This Form To Receive Instant Help
Homework answers / question archive / Shanghai University - MANAGEMENT 6 INFO 530 Exam 1 (Midterm) Directions: Write your answers to the exam on the answer sheet that was provided with the exam
Shanghai University - MANAGEMENT 6
INFO 530 Exam 1 (Midterm)
Directions: Write your answers to the exam on the answer sheet that was provided with the exam. Identify the letter of the choice that best completes the statement or answers the question, or write True / False where appropriate. When completed please send the answer sheet by the due date and time to the email address provided in the Exam 1 Information.
MULTIPLE CHOICE. Please choose the one alternative that best completes the statement or answers the question. Each question is worth 1 point.
a. profits |
c. cost reduction initiatives |
b. goals |
d. quality improvement measures |
a. forecasting |
c. output |
b. feedback |
d. processing |
a. Information technology |
c. Telecommunications |
b. Technology infrastructure |
d. Hardware |
a. Hardware |
c. Applications |
b. Software |
d. Telecommunications |
a. Hardware |
c. Procedures |
b. Software |
d. People |
a. ISO seven layer model |
c. IP |
b. TCP |
d. Wi-Fi |
a. bits |
c. bytes |
b. messages |
d. packets |
online customers requesting access to information or
assets
1)
Answer: b . goals
Information is a collection of facts and figures that are organized and processed such that they have added value to the raw facts. It allows the decision maker of an organization to achieve their goal.
2)
Answer: b . feedback
3)
Answer: d . Hardware
The hardware refers to any physical part of the computer system which consists of a circuit board or other electronics. There are some input and output devices that perform input and output operations.
4)
Answer: b . Software
5)
Answer: d . People
People are the important element that is required to operate the computer based information system. They can create the computer software, use it and choose how it can be applied. The computer systems would not be able to run without the people.
9)
Answer: c . end-user license agreement
10)
Answer: a .
11)
Answer: c .
Data independence allows the same data to be used at multiple places. It is the best
approach for keeping data hidden in a program.
This is of two types: Logical data
12)
Answer: d . attribute
Primary key is the attribute of any table to uniquely identified the data from table. In a relational database primary key is used to mapping. On the first table it is known as primary key but on the other table it is known as foreign key.
14)
Answer: d .
SQL also know as structured query language is developed for managing the data,
specially in the relational database (RDBMS).
It consist of simple English commands to manipulate the data such as drop and alter
15)
Answer: d .
Database administrator
16)
Answer: b .
Modem
17)
Answer: b .
A hotspot is defined as a zone that provides internet or VPN access using a wireless node. Suppose, if someone wants to have internet access in an isolated location and has a laptop then he/she can get connected to the internet by using the local hotspot.
18)
Answer: b .
Wifi is defined as a technology that provides access to the internet with the help of the radio waves. Also, there is a brand by the name 'wifi' that uses a logo on the products to indicate its approval to the product's security, interoperability etcetera.
19)
Answer: c .
Internet Protocol can be described as a protocol that allows transfer of packets from one network to another. The address of the source and the destination of the data packet that needs to be transferred is written on the header of the packet which is encapsulated by the internet protocol.
20)
Answer: d . packets
Description:
21)
Answer: b .
Performing business projects electronically over a computer is the new technology which helped in maximizing the accuracy of order processing in bulk. This process includes batch creation, then credit/debit card payment, shipping label creation and printing order.
22)
Answer: d .
Authentication is the method of recognizing the identity of the user by comparing its credential with the credentials in the authorized user database. Access to the secure information is granted if the credentials match with the credential in the database.
23)
Answer: c .
Intelligence stage is the first stage where all the problems are first recognized and described. This stage is followed by the design stage and choice stage where the solutions of these problems are found and a particular action is taken.
24)
Answer: d .
In decision making of problem-solving process, first is intelligence stage in which we recognized the possible problem and its opportunity. Then in design stage, we produce alternative solutions and find how they can be achieved. And then comes the choice stage where we choose an action.
25)
Answer: d .
MIS
26)
Answer: c .
27)
Answer: c .
In the structure problem the goal is clearly defined. Hence some time it will create a problem to manipulate as well as obtained the data.
28)
nswer: d .
Knowledge base
29)
nswer: d .
Knowledge base
30)
Answer: b .
All of the options given above, are part of a knowledge based expert system. Among these components, explanation facility, which is a subsystem, explains the steps which were taken to reach the result.
31)
Answer: b .
Augmented reality is the interaction between real-world environment and computer-induced information. Primarily it combines a person's perception of the real world with the digital world. In GPS, it adds different spots on our smartphone's screen.
32)
Answer: d .
According to NITA-U (national information and technology authority -uganda) the company should see following thing before buying computer products for the organization.