The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention. Answer humanlike interface adaptability mobility reactivity

Question 27

____ conferencing includes an audio link but no video capability.

Answer

Real-time computer

Multicast

Analog

Desktop

Question 28

The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention.

Answer

humanlike interface

adaptability

mobility

reactivity

Question 29

____ systems have been one of the most successful artificial intelligence related technologies.

Answer

Management information

Supply chain management

Agent

Expert

Question 30

Intelligent agents demonstrate ____, the capability to select problems or situations that need attention and act on them.

Answer

adaptability

collaborative behavior

mobility

reactivity

Question 31

____ is an example of an expert system that can be applied to various financial applications.

Answer

DENDRAL

ASIMO

Shyster

PortBlue

Question 32

Some banks use a(n) ____ system to qualify customers for loans, using parameters from past customers stored in a database.

Answer

case-based reasoning

artificial neural network

natural language processing

decision support

Question 33

The size and complexity of the human language has made developing ____ systems difficult.

Answer

natural-language processing

genetic algorithm

artificial neural network

personal language

Question 34

When using a(n) ____, IS personnel time is freed up to focus on applications, such as customer relationship management and financial information systems, that are more strategically important to the organization.

Answer

application service provider model

quick response code

cave automatic virtual environment

avatar

Question 35

With the ____ model, users don’t need to be concerned with new software versions and compatibility problems because the application service providers offer the most recent version of the software.

Answer

CAVE

virtual reality

radio frequency identification

SaaS

Question 36

The ____ component of a virtual reality system is an input device that captures and records movements of the user’s feet as the user turns in different directions.

Answer

walker

central coordinating processor and software system

manual navigation control

visual and aural

Question 37

One advantage of grid computing is _____, meaning more nodes can be added for additional computing power without affecting the network’s operation.

Answer

improved reliability

simulation

scalability

immersion

Question 38

Within the context of virtual reality technology,_____ refers to allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.

Answer

networked communication

full-body immersion

telepresence

interaction

Question 39

Bluetooth can be used to create a ____, to communicate among computerized devices.

Answer

personal area network

local area network

wide area network

metropolitan area network

Question 40

____ component of a virtual reality system enable users to see and hear the virtual world.

Answer

Walker

Central coordinating processor and software system

Manual navigation control

Visual and aural system

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

E-procurement is an example of the ____ B2B e-commerce model. Answer seller-side marketplace buyer-side marketplace third-party exchange marketplace trading partner agreement

Question

Question 1

____ usually works with a smart card.

Answer

E-cash

E-wallets

E-checks Micropayments

Question 2

E-procurement is an example of the ____ B2B e-commerce model.

Answer

seller-side marketplace

buyer-side marketplace

third-party exchange marketplace trading partner agreement

Question 3

Mobile commerce (m-commerce) is based on the ____ protocol.

Answer

extensible authentication

wired equivalent

wireless application

Wi-fi protected

Question 4

____ is a method for improving the volume or quality of traffic to a Web site.

Answer

Extensive markup language

Search engine optimization

Ad impression technology

Agent technology

Question 5

____ introduced the value chain concept.

Answer

Tim Berners-Lee

Michael Porter

Abraham Maslow

Frederick Taylor

Question 6

One of the issues with GIS is that too much ____ can prevent flexibility in responding to local preferences and even time differences.

Answer

regulation

control

standardization

coordination

Question 7

____ present(s) a challenge when designing and implementing global databases.

Answer

Local regulations

Different character sets

Intellectual property laws

Telecommunications infrastructure

Question 8

Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support the _____ structure.

Answer

multinational

global

transnational

international

Question 9

Companies creating separate Web sites for each country in which they do business is called _____ of a Web site.

Answer

standardization

localization

centralization

regionalization

Question 10

Tyco Corporation is an example of the ____ type of global organization.

Answer

multinational

global

international

transnational

Question 11

A ____ shows a process at a more general level and is helpful for showing top management and the task force how a process works.

Answer

data flow diagram

flowchart

context diagram

conceptual data model

Question 12

____ centers on a structured workshop in which users and system professionals come together to develop an application.

Answer

XP

JAD

SOA

RAD

Question 13

____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users.

Answer

XP

RAD

JAD

SOA

Question 14

With ____ outsourcing, the organization chooses an outsourcing company in a neighboring country.

Answer

onshore

nearshore

offshore

homeshore

Question 15

A ____ prototype shows users how a particular task that was not technically feasible can be done.

Answer

proof-of-concept

computer-aided

requirements-based

selling

Question 16

____ feasibility assesses a system’s costs and benefits.

Answer

Economic

Technical

Operational

Scheduling

Question 17

During the ____ phase, the systems designer must define the problem the organization faces, taking care not to define symptoms rather than the underlying problem.

Answer

planning

requirements-gathering and analysis

design

implementation

Question 18

____ are common examples of e-marketplaces.

Answer

Auctions

Internet service providers

E-distributors

Web-based CRMs

Question 19

Transaction data for a CRM system might be gathered using ____.

Answer

a RFID chip

grocery store loyalty cards

inventory numbers

reverse auctions

Question 20

A company can purchase a(n) ____ package that might include services from different vendors, but the e-distributor coordinates them into one package for customers.

Answer

enterprise resource planning

online auctions

maintenance, repair, and operations

electronic data interchange

Question 21

Overseeing order transmissions are part of the ____ flow in a manufacturing firm’s SCM system.

Answer

product

information

location

finances

Question 22

Information technologies and ____ play a major role in implementing an SCM system.

Answer

auctions

SDLC modules

CASE tools

the Internet

Question 23

____ decisions, or programmable tasks, can be automated because a well-defined standard operating procedure exists for these types of decisions.

Answer

Structured

Semistructured

Unstructured

Automated

Question 24

The ____ acts as a liaison between users and designers.

Answer

managerial designer

technical designer

model builder

database builder

Question 25

Which of the following geographic objects of a GIS is most likely used to show the location of an airport?

Answer

Points

Lines

Areas

Regions

Question 26

The ____ component includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.

Answer

user interface

DSS engine

model base

modeling and simulati

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

A database _______ is responsible for data storage, manipulation, and retrieval. Answer program index system engine

Question 18

A database _______ is responsible for data storage, manipulation, and retrieval.

Answer

program

index

system

engine

Question 19

_______ has created decency concerns, because these e-mails often contain explicit language or nudity.

Answer

Phishing

Spoofing

Sniffing

Spamming

Question 20

In the context of the important concepts regarding Web and network privacy, _______ refers to issues involving both the user’s and the organization’s responsibilities and liabilities.

Answer

phishing

nonrepudiation

spoofing

accountability

Question 21

You make two copies of a software package you just bought for personal use, in case the original software fails and you need a backup. This action is ________.

Answer

illegal and unethical

legal but unethical

illegal but ethical

legal and ethical

Question 22

In the context of the important concepts regarding Web and network privacy, ________is a method for binding all the parties to a contract.

Answer

phishing

nonrepudiation

cybersquatting

synchronous

communication

Question 23

Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of _______.

Answer

cybersquatting

the digital divide

a virtual organization

telecommuting

Question 24

Which of the following is a type of access control?

Answer

Steel encasements

Passwords

Firewalls

Identification badges

Question 25

_______ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

Answer

Intrusion detection systems

Proxy servers

Physical security measures Biometric security measures

Question 26

Which of the following is a physical security measure?

Answer

Electronic trackers

Passwords

Firewalls

Signature analysis

Question 27

_______ security measures use a physiological element to enhance security measures.

Answer

Physical

Social

Biofeedback

Biometric

Question 28

A(n) _______ is often used so remote users have a secure connection to the organization’s network.

Answer

biometric security system

intrusion detection system

virtual private network

terminal resource network

Question 29

A _______ travels from computer to computer in a network, but it does not usually erase data.

Answer

Trojan program

worm

virus backdoor

Question 30

_______ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company’s information systems are secure.

Answer

Script kiddies

Black hats

White hats

Hex editors

Question 31

The amount of data that can be transferred from one point to another in one second is called _______.

Answer

bandwidth

controller

router

protocol

Question 32

The Transmission Control Protocol (TCP) operates at the OSI model’s _______ layer.

Answer

Data link

Physical

Transport

Network

Question 33

The _______ layer of the OSI model serves as the window through which applications access network services.

Answer

Application

Presentation

Network Data link

Question 34

The _______ topology is costly and difficult to maintain and expand.

Answer

star

mesh

ring

bus

Question 35

The most common n-tier architecture involves _______ tiers.

Answer

two

three

four

five

Question 36

A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.

Answer

podcast

RSS feed

blog wiki

Question 37

Which of the following protocols is used for retrieving messages?

Answer

SMTP

POP

HTTP

VoIP

Question 38

A(n) ____ is the address of a document or site on the Internet.

Answer

TLD

URL

IP

DNS

Question 39

The Federal Express Tracking System allows customers to enter a package’s tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.

Answer

intranet

Internet

extranet

DMZ

Question 40

A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.

Answer

podcast

RSS feed

blog

wiki

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

The purpose of an information system’s ________ component is generating the most useful type of information for making decisions. Answer process internal data external data database

Question

Question 1

The purpose of an information system’s ________ component is generating the most useful type of information for making decisions.

Answer

process

internal data

external data

database

Question 2

Management information system’s (MIS) ________ include programs developed in-house.

Answer

human elements

data processes

hardware components

software components

Question 3

Microsoft Access is an example of ________ in an information system.

Answer

internal data

external data

database management system

knowledge base management system

Question 4

A typical PDA includes a(n) ________.

Answer

external monitor

calendar

mouse

external keyboard

Question 5

The output of an information system is ________.

Answer

data

a database

a process

information

Question 6

Transistor was the major technology used during the _______ generation of hardware.

Answer

first

second

third

fourth

Question 7

In a(n) _______ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.

Answer

EBCDIC

Unicode

ASCII extended

ASCII

Question 8

Computers and communication systems use ________ to represent and transfer information between computers and network systems.

Answer

Optical character reader (OCR)

light pens

data codes

Magnetic ink character recognition (MICR)

Question 9

________ is a function performed by control programs that controls the transfer of data among parts of a computer system, such as exchange of information between the CPU and I/O devices.

Answer

Job management

Resource allocation

Data management

Communication

Question 10

A _______ is the size of a character.

Answer

nibble

bit

byte

word

Question 11

A(n) _______ is a type of memory that stores data sequentially.

Answer

RAM

magnetic tape

optical disk

RAID

Question 12

Data in a data warehouse can be differentiated from data in a database in that the former _______.

Answer

captures raw transaction data

is used for capturing and managing transactions

comes from a variety of sources

only keeps recent activity in memory

Question 13

The _______ approach to setting up a distributed DBMS combines fragmentation and replication.

Answer

optimization

allocation

encapsulation

normalization

Question 14

Which of the following is true of a database?

Answer

Complex requests can be difficult to handle.

More storage space is required.

Programs and data are interdependent.

More information can be generated from the same data.

Question 15

_______ gives users subtotals of various categories.

Answer

Summary data

Raw data

Open data

Metadata

Question 16

A _______ key uniquely identifies every record in a relational database.

Answer

secondary

foreign

primary

surrogate

Question 17

A _______ operation searches data in a table and retrieves records based on certain criteria.

Answer

project

join

find

select

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart.
After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.

Write a five to eight (5-8) page paper in which you:
Analyze the new system and determine the design issues with this new system.
Describe how you would correct the design issues with the system to make the restaurant managers happy.
Create a design plan that:
Lists and explains the tasks associated with improving this interface.
Contains at least six (6) tasks.
Includes realistic time estimates for each task to be completed.
Analyzes the development of the system in your plan.
Analyzes the testing of the system in your plan.
Analyzes the implementation of the system in your plan.
Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.
Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
Describe the usability properties of interactive systems.
Describe the inherent design issues across HCI environments
Develop an interface `
Use technology and information resources to research issues in human-computer interaction.
Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Choose one of the following options for your summary: A 2- to 3-minute podcast using the software of your choice, such as Sound Recorder or Audacity to create your audio file and save as a MP3 or WAV.

You are hired as a research coordinator by the new hospital in town. One mission of the hospital is to work hard in preventing health issues by using new technologies created by health conscious engineers. Your task is to review health-related videos and articles and provide a summary of current technology being used in the medical field to prevent health issues for the hospital stakeholders.

Your summary must include:

  • A summary of at least three health-related technologies
  • The advantages of each one, including how it helps in preventing a health issue
  • An explanation of how robots and artificial intelligence can benefit hospitals

Choose one of the following options for your summary:

  • A 2- to 3-minute podcast using the software of your choice, such as Sound Recorder or Audacity to create your audio file and save as a MP3 or WAV.
  • A 2- to 3-minute video delivered as an MP4 or MOV file.
  • Infographic delivered as a PDF.  You may use any Microsoft® Office product or free sites such as Piktochart, Easel.ly, or Canva to create an infographic.
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Think about a national or international issue that matters to you and write your own speech for that issue, using the Rogerian style of argumentation.  How would you win over the other side?  You don’t need to use citations, but please do not create statistics or ‘facts.’  You might also find this video on the Rogerian form helpful:https://www.youtube.com/watch?v=Z9knvRXU8zQ&feature=youtu.be. 

Recall the two presidential speeches that were given by both President Obama and President Reagan, respectively:
Obama, Barack. “The American Promise.” American Rhetoric. n.d. Web. Jan. 6, 2012.

Reagan, Ronald. “Acceptance of Republican Nomination for President at the 1980 Republican National Convention in Detroit, Michigan.” American Experience. PBS. WGBH Educational Foundation. n.d. Web. Jan. 6, 2012.
Note that these two presidents used the Rogerian method of argumentation to not only win over those who agreed with their viewpoints, but also to win over those who held different views.
Think about a national or international issue that matters to you and write your own speech for that issue, using the Rogerian style of argumentation.  How would you win over the other side?  You don’t need to use citations, but please do not create statistics or ‘facts.’  You might also find this video on the Rogerian form helpful:https://www.youtube.com/watch?v=Z9knvRXU8zQ&feature=youtu.be. 
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Analyze the primary accounting issues which form the crux of the litigation or fine for the firm, and indicate the impact to the firm as a result of litigation or fine. Provide support for your rationale.

Assignment 2: Litigation, Censures, and Fines

Due Week 7 and worth 280 points

 

Research the Internet for recent litigation, censures, and fines involving national public accounting firms.  Examples of litigation cases against national public accounting firms include fines by regulatory authorities and censures by professional societies.

 

Write a three to four (3-4) page paper in which you:

  1. Analyze the primary accounting issues which form the crux of the litigation or fine for the firm, and indicate the impact to the firm as a result of litigation or fine. Provide support for your rationale.
  2. Examine the key inferences of corporate ethics related to internal controls and accounting principles which lead to the litigation or fine for the accounting firm.
  3. Evaluate the primary ethical standards of the accounting organization’s leadership and values which contributed to approval of the accounting issues and thus created the litigation or fines in question.
  4. Identify specific conduct violations committed by the organization and accounting firm in question. Next, create an argument supporting the actions against the organization and accounting firm, based on the current professional code of conduct for independent auditors and management accountants.
  5. Make a recommendation as to how regulators and professional societies may prevent this type of behavior in question for the future. Provide support for your rationale.
  6. Use two (2) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.

 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

  • Analyze business situations to determine the appropriateness of decision making in terms of professional standards and ethics.

·        Use technology and information resources to research issues in accounting.

  • Write clearly and concisely about accounting using proper writing mechanics.
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Develop the following financial sections of your NAB company’s Business Plan. Note:Attach the MS Word document to the discussion thread. Sources and use of funds Plan assumptions Break-even analysis

Due Week 7 and worth 80 points

Important Notes

  • This exercise is considered an academic writing exercise. Quality of response, grammar, and punctuation are considered in your overall grade.
  • This exercise does not require the use of APA format or a cover page.
  • This exercise uses the “Business Plan Financials” MS Excel template. Use the “Business Plan Financials Guide” to assist you in completing the required worksheets. (Both documents are also available in the Course Required Files in Week 1.)
  • It is recommended that students construct their deliverable(s) using MS Word / MS Excel and then attach the document(s) to the discussion thread submission area in Blackboard.

Use the “NAB Company Portfolio” (see: Course Required Files in Week 1) for reference. Provide the following information below.

  1. For year one of your NAB company’s Business Plan, complete the Income Statement, Cash Flow Projections, and Balance Sheet sections from the “Business Plan Financials” MS Excel template (see: Course Required Files in Week 1). Note:Attach the MS Excel worksheet to the discussion thread.
    • Hints: Your marketing costs should already be included as you created your Marketing Budget in Week 4 and those will be filled in automatically.
    • Hints: Use the figures you arrived at in the operations and technology sections of your plan to help fill out your financial forms.
    • Hints: Work through the worksheets in order. The excel worksheets will automatically enter the numbers into your Income Statement.
  1. Develop the following financial sections of your NAB company’s Business Plan. Note:Attach the MS Word document to the discussion thread.
    1. Sources and use of funds
    2. Plan assumptions
    3. Break-even analysis
  2. Provide constructive feedback to at least one (1) classmate’s post.see bellow

The statement of cash flows is very important to investors because it shows how much actual cash a company has generated. Wiley & Sons state,

 

“The Three Elements of the Statement of Cash Flows

Because companies can generate and use cash in several different ways, the statement of cash flows is separated into three sections: cash flows from operating activities, from investing activities, and from financing activities.

 

The cash flows from operating activities section shows how much cash the company generated from its core business, as opposed to peripheral activities such as investing or borrowing. Investors should look closely at how much cash a firm generates from its operating activities because it paints the best picture of how well the business is producing cash that will ultimately benefit shareholders.

 

The cash flows from investing activities section shows the amount of cash firms spent on investments. Investments are usually classified as either capital expenditures–money spent on items such as new equipment or anything else needed to keep the business running–or monetary investments such as the purchase or sale of money market funds.

 

The cash flows from financing activities section includes any activities involved in transactions with the company’s owners or debtors. For example, cash proceeds from new debt, or dividends paid to investors would be found in this section.

 

Free cash flow represents the amount of excess cash a company generated, which can be used to enrich shareholders or invest in new opportunities for the business without hurting the existing operations; thus, it’s considered “free”(Wiley & Sons, 2004, 2005, course 107).

 

Cash from Operations – Capital Expenditures = Free Cash Flow

 

Income statement. The most important financial statement for the majority of users is likely to be the income statement, since it reveals the ability of a business to generate a profit. Also, the information listed on the income statement is mostly in relatively current dollars, and so represents a reasonable degree of accuracy.

 

Balance sheet. The balance sheet is likely to be ranked third, since it does not reveal the results of operations, and some of the numbers listed in it may be based on historical costs, which renders the report less informative.

 

Statement of cash flows. A possible candidate for most important financial statement is the statement of cash flows, because it focuses solely on changes in cash inflows and outflows.

 

Bragg, S. (2014, March 15). Which financial statement if the most important?Retrieved from http://www.accountingtools.com/questions-and-answers/which-financial-statement-is-the-most-important.html

 

Wiley & Sons, (2004, 2005). Introductions to Financial Statements. Retrieved fromhttp://news.morningstar.com/classroom2/course.asp?docId=142913&page=1&CN=sample

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"