The marks are the actual grades which I got in the exam.
So, if any body wants me to do this work for him, kindly message me. Thanks
Question 1
10 out of 10 points
A business that selects a differentiation strategy would ________.
Question 2
10 out of 10 points
________ information is information that directly pertains both to the context and to the subject.
Question 3
10 out of 10 points
In a database, a table, which is a group of similar rows, is also called a ________.
Question 4
10 out of 10 points
The ________ group's purpose is to protect information assets by establishing standards and management practices and policies.
Question 5
10 out of 10 points
________ is a suite of software applications that consolidates existing systems by providing layers of software that connect applications together.
Question 6
10 out of 10 points
Normal processing procedures for system users are ________.
Question 7
10 out of 10 points
Which of the following is an open-source operating system?
Question 8
10 out of 10 points
Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?
Question 9
10 out of 10 points
________ is the dynamic social media process of employing users to participate in product design or product redesign.
Question 10
10 out of 10 points
Each stage of the value chain not only adds value to the product but also ________.
Question 11
10 out of 10 points
One of the important functions of a DBMS is to provide the necessary tools for ________.
Question 12
10 out of 10 points
Which of the following is true of a VPN (virtual private network)?
Question 13
10 out of 10 points
Which of the following departments in an organization is supported by information systems applications such as recruitment and compensation?
Question 14
10 out of 10 points
Which of the following statements is true about cloud services?
Question 15
10 out of 10 points
The first phase in the customer life cycle involves ________.
Question 16
10 out of 10 points
Which of the following is a technical safeguard against security threats?
Question 17
10 out of 10 points
An internal information system built using Web services ________.
Question 18
10 out of 10 points
The two strength factors that relate to all three competitive forces are ________ and customer loyalty.
Question 19
10 out of 10 points
Which of the following is true of Web services?
Question 20
10 out of 10 points
With HTTPS, data are encrypted using a protocol called the ________.
Question 21
10 out of 10 points
Why is it important for business professionals to take an active role in developing and managing information systems?
Question 22
0 out of 10 points
Which of the following is a major problem posed by multi-user processing of a database?
Question 23
10 out of 10 points
Which of the following elements of a database application provides security, data consistency, and special-purpose processing?
Question 24
10 out of 10 points
Which of the following is a characteristic of workgroup information systems?
Question 25
10 out of 10 points
Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it?
Question 26
10 out of 10 points
________ is an international standard language that is used for processing a database.
Question 27
10 out of 10 points
Which of the following statements is true of social CRM?
Question 28
10 out of 10 points
________ is a popular enterprise DBMS product from IBM.
Question 29
10 out of 10 points
Which of the following is a valid reason for a company to create a new information system?
Question 30
10 out of 10 points
Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework.
Question 31
10 out of 10 points
Which of the following statements is true with regard to system maintenance?
Question 32
10 out of 10 points
Security systems ultimately depend on the behavior of its ________.
Question 33
10 out of 10 points
The number of bits to represent a single character is referred to as a ________.
Question 34
10 out of 10 points
Because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________.
Question 35
10 out of 10 points
Which of the following is the most complete and accurate definition of information technology?
Question 36
10 out of 10 points
As a result of Moore's Law, ________.
Question 37
0 out of 10 points
Which of the following elements of a database application helps in the insertion of new data and the deletion of existing data?
Question 38
10 out of 10 points
________ is a major issue faced by companies when implementing enterprise systems.
Question 39
10 out of 10 points
Which of the following statements is true of the financial losses due to computer security threats?
Question 40
10 out of 10 points
Compared to program development, systems development is ________.
Question 41
10 out of 10 points
Which of the following is a characteristic of good information?
Question 42
10 out of 10 points
Which of the following statements is true of social networking problems?
Question 43
10 out of 10 points
In organizations where primary information systems support only accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical.
Question 44
10 out of 10 points
Using https instead of http ________.
Question 45
10 out of 10 points
Which of the following distinguishes information systems from information technology?
Question 46
10 out of 10 points
Normal processing procedures for operations personnel are ________.
Question 47
10 out of 10 points
Computers represent data using binary digits, called ________.
Question 48
10 out of 10 points
What is a VPN (virtual private network)?
Question 49
10 out of 10 points
Which of the following statements is true of customer relationship management (CRM) systems?
Question 50
10 out of 10 points
The fact that Joe works 9 hours per day is an example of ________.