Advantage of proprietary software

Assignment Help Software Engineering
Reference no: EM13924124

Indicate whether the statement is true or false.

1. Channel bandwidth refers to the diameter of the telecommunications media.

2. Modems convert analog signals to digital signals for transmission over a network.

3. A personal area network is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building.

4. Application programs interact with systems software, and the systems software directs computer hardware to perform the necessary tasks.

5. Sequential access storage devices allow data to be accessed more quickly than direct access storage devices.

6. The technology infrastructure is a set of shared IS resources that form the foundation of each computer-based information system.

7. When organizing a database, key considerations include determining what data to collect, who will have access to it, how they might want to use it, and how to monitor database performance.

8. Disruptive change often results in new, successful companies and offers consumers the potential of new products and services at reduced costs and superior performance.

Multiple Choice: Identify the choice that best completes the statement or answers the question.

9. ________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU.

a. Main memory
b. The ALU
c. Registers
d. The CPU

10. One advantage of proprietary software versus off-the-shelf software is that _____

a. the initial cost is lower
b. the software is likely to be of high quality because many customer firms have tested the software and helped identify its bugs
c. the software is likely to meet the basic business needs that are common across organizations
d. being involved in the development offers control over the results

11. _____ consists of computer programs that govern the operation of the computer.

a. Hardware
b. Applications
c. Software
d. Telecommunications

12. With _____ , the software engineer drags and drops graphical objects such as buttons and menus onto the application form.

a. assembly language
b. visual programming
c. machine code
d. fourth generation language

13. The _____ is a description that involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user.

a. entity relationship diagram
b. schema
c. data model
d. data manipulation language

14. A ________ is s field or set of fields in a record that uniquely defines the record.

a. attribute
b. primary key
c. key
d. data item

15. RAID storage devices provide organizations with data storage that is _____.

a. fault tolerant
b. extremely low cost
c. exceedingly fast
d. unlimited in storage capacity

16. _____ consists of computer equipment used to perform input, processing, and output activities.

a. Information technology
b. Telecommunications
c. Technology infrastructure
d. Hardware

17. The ________ is the heart of the operating system and controls its most critical processes.

a. user interface
b. kernel
c. utility programs
d. boot up disk

18. The goal of the _____ phase of systems development is to gain a clear understanding of the problem to be solved or opportunity to be addressed.

a. systems analysis
b. systems design
c. systems investigation
d. systems implementation

19. The smallest piece of data used by a computer is the _____.

a. entity
b. bit
c. byte
d. character

20. The ability of an organization to achieve its goals is often a function of the organization's _____

a. overall structure
b. ability to change
c. culture
d. all of the above

21. With the _____ basic processing alternative, processing devices are placed at various remote locations and each device is isolated and does not communicate with any other processing device.

a. distributed processing
b. centralized processing
c. file processing
d. decentralized processing

22. Total cost of ownership includes these costs

a. cost to acquire an item
b. end-user costs
c. technical support costs
d. all of the above

23. As long as the tables in a relational database share one common _____, the tables can be linked to provide useful information and reports.

a. primary key
b. characteristic
c. file
d. attribute

24. _____ are the most powerful computers with the fastest processing speed and highest performance.

a. Blade servers
b. Mainframe computers
c. Workstations
d. Supercomputers

25. ______ is a measure of the extent to which a system achieves its goals.

a. Efficiency
b. Performance rate
c. Reliability
d. Effectiveness

26. Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.

a. roll up
b. slice and dice
c. drill down
d. extract data

27. With network management software, a network manager can _____

a. monitor the use of individual computers as well as shared hardware devices
b. ensure compliance with software licenses
c. scan for licenses
d. all of the above

28. _____ is a measure of how widely technology is spread throughout an organization.

a. Technology infusion
b. Technology diffusion
c. Technology acceptance
d. Technology adoption

29. _____ is a network that connects users and their computers in a geographical area that spans a campus or a city.

a. Metropolitan area network
c. Wide Area network
b. Local area network
d. Personal area network

30. Green computing is focused at the efficient and environmentally responsible _____ of IS related products.

a. design and manufacture
b. disposal
c. operation
d. all of the above

31. _____ investigates the additional profits or benefits that are generated as a percentage of the investment in IS technology.

a. Net present value
b. Earnings growth
c. Return on investment
d. Market share

32. With a VPN ______

a. users are often provided a token that displays a constantly changing password
b. users can gain wide area network access
c. users can gain access to an organization's private network
d. all of the above

33. A database is a collection of integrated and related _____.

a. fields
b. records
c. attributes
d. files

34. The area covered by one or more interconnected wireless access points is commonly called a(n) _____.

a. reception area
b. coverage zone
c. hot spot
d. access area

35. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

a. cloud computing
b. parallel computing
c. grid computing
d. none of the above

36. The _____ is a device that combines data from multiple data sources into a single output signal that carries multiple channels.

a. transmission media
b. multiplexer
c. modem
d. switch

37. A(n) ______ enables users to share a certain number of outside lines to make telephone calls to people outside the organization.

a. DSL
b. modem
c. Wi-MAX
d. PBX

38. _____ is an important component of every information system that helps organizations to achieve their goals.

a. Hardware
b. Feedback mechanism
c. Software
d. Data

39. A type of memory whose contents are not lost if the power is turned off is said to be _____.

a. multicore
b. RAM
c. nonvolatile
d. none of the above

40. ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

a. user view
b. data definition language
c. schema
d. data manipulation language

41. An operating system with _____ capabilities allows a user to run more than one application at the same time.

a. networking capability
b. memory management
c. hardware independence
d. multitasking

42. The idea of ________ is to constantly seek ways to improve business processes and add value to products and services.

a. reengineering
b. disruptive change
c. process redesign
d. continuous improvement

43. After a computer system is started, portions of the operating system are transferred to _____ as they are needed.

a. the CPU
b. the back-up rescue disk
c. memory
d. none of the above

44. If an industry has low entry and exit costs and the technology needed to start and maintain a business is commonly available, this creates ________.

a. a threat of new entrants
b. increased bargaining power of customers and suppliers
c. a threat of substitute products and services
d. all of the above

45. _____ is (are) considered to be the most important element in a computer-based information system.

a. Hardware
b. Procedures
c. Software
d. People

46. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called ______.

a. cloud computing
b. service oriented architecture
c. rapid application development
d. Software as a Service

47. The _____ are low-cost, centrally managed computers with no extra drives or expansion slots and limited capabilities.

a. netbook computer
b. thin client computer
c. laptop computer
d. desktop computer

48. The process of defining relationships among data to create useful information requires ______

a. an information system.
b. knowledge
c. intelligence
d. intuition

49. A risk involved with using an application service provider is that _____

a. sensitive information could be compromised
b. a disaster could disable the ASP's data center
c. the ASP could be incapable of keeping its servers and network up and running consistently
d. all of the above

50. Customer relationship management programs help companies manage _____

a. programs to retain loyal customers
b. marketing and advertising
c. finished product inventory
d. a. and c.

Reference no: EM13924124

Questions Cloud

Write a function which adds the two numbers : In C write a function which adds the two numbers. Test this function by calling from the main. In main, the user should be asked to provide the two numbers.
What are trade-offs involved when constructing a portfolio : Describe the difference between a price momentum strategy and an earnings momentum strategy.  What are the trade-offs involved when constructing a portfolio using a full replication versus a sampling method?
Overall risk profile of the company : Overall Risk Profile of the Company: Overall risk profile of ABC Company based on current economic and industry issues that it may face are described below-
What would happen if the ring, rather than ball, were heated : A metal ball can pass through a metal ring. When the ball is heated, however, it gets stuck in the ring. What would happen if the ring, rather than the ball, were heated?
Advantage of proprietary software : One advantage of proprietary software versus off-the-shelf software is that _____
Describe the method available to take advantage of forecast : To perform well over the next three to six months. As an active portfolio manager, describe the various methods available to take advantage of this forecast.
Precise terms between the issuer and the bondholder : Which of the following is a legal contract that outlines the precise terms between the issuer and the bondholder?
Compute average return differential with and without sign : Given the monthly returns that follow, how well did the passive portfolio track the S&P 500 benchmark? Find the R2, alpha, and beta of the portfolio. Compute the average return differential with and without sign.
Hokusai - sketching streams in real time : You will implement and experiment with several algorithms to approximate historical item counts in a space-efficient manner.

Reviews

Write a Review

Software Engineering Questions & Answers

  Explain how the traditional approach to modeling a use case

q1. describe how the traditional approach to modeling a use case differs from the object-oriented approach.q2. do you

  Program to calculate the average salary and years employed

Construct a program that determines how many consonants are in an entered string of fifty characters or less. Output the entered string and the number of consonants in the string.

  Explain importance of osi reference model

Discuss the importance of the OSI reference model for those responsible for network administration and network protocol development.

  Define a class called counter

Define a class called Counter. An object of this class is used to count things so it records a count that is a non-negative whole number. Include methods to set the counter to 0, to increase the counter by 1, and to decrease the counter by 1.

  Create inheritance hierarchy for customer-s bank account

Create inheritance hierarchy which a bank might use to represent customer's bank accounts. All customers at this bank can deposit money into their accounts and withdraw money from accounts.

  Assess how the carlson san approach would be implemented

Assess how the Carlson SAN approach would be implemented

  Develop user acceptance tests for the review

Develop User Acceptance Tests for the Review Content Query use case text description and create bug reports for any bugs you have identified in your executed tests.

  Why is the systems development life cycle important

Why is the systems development life cycle important

  Design an effective user interface for a consumer device

IS organizations will no longer need to develop a proprietary infrastructure; they can just rely on the internet. Therefore, they will again focus mainly on developing applications. Discuss and when Cone is interviewing people, what three things d..

  Software implementation and software quality

Work packages are divided into three functional areas - Software Engineering, Software Implementation and Software Quality. The software engineering requires all the necessary engineering research, design and planning effort along with the docume..

  Draw the cash-flow diagram for this situation

What will his annual payment be - construct a loan amortization table, similar to the one shown in table 6-2, showing the principal and interest seperated for the first 6 months of FunSoft's loan.

  Draw erd to track work orders and tasks of work orders

Draw an ERD. The database should track work orders and tasks of work orders. The following detailed information requirements should be represented by the ERD.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd