Midterm Answers

pullfarmInternet and Web Development

Nov 3, 2013 (3 years and 7 months ago)

100 views

a disaster could disable the ASP’s data center

a threat of new entrants

a threat of substitute products and services

a. and c.

ability to change

access area

all of the above

all of the above

all of the above

all of the above

all of the above

all of the
above

all of the above

an information system.

Applications

assembly language

attribute

attribute

attributes

being involved in the development offers control over the results

bit

Blade servers

boot up disk

byte

centralized processing

character

characteristi
c

cloud computing

cloud computing

continuous improvement

cost to acquire an item

coverage zone

culture

Data

data definition language

data item

data manipulation language

data manipulation language

data model

decentralized processing

design and manufacture

desktop computer

disposal

disruptive change

distributed processing

drill down

DSL

Earnings growth

Effectiveness

Efficiency

end
-
user costs

ensure compliance with software licenses

entity

entity relationship diagram

exceedingly fast

extract data

extremely
low cost

fault tolerant

Feedback mechanism

fields

file

file processing

files

finished product inventory

fourth generation language

grid computing

Hardware

Hardware

Hardware

Hardware

hardware independence

hot spot

increased bargaining power of customers and

suppliers

Information technology

intelligence

intuition

kernel

key

knowledge

laptop computer

Local area network

machine code

Mainframe computers

Market share

marketing and advertising

memory

memory management

Metropolitan area network

modem

modem

monitor the use of individual computers as well as shared hardware devices

multicore

multiplexer

multitasking

Net present value

netbook computer

networking capability

none of the above

none of the above

none of the above

nonvolatile

operation

overall
structure

parallel computing

PBX

People

Performance rate

Personal area network

primary key

primary key

Procedures

process redesign

programs to retain loyal customers

RAM

rapid application development

reception area

records

reengineering

Registers

Reliability

Return on investment

roll up

scan for licenses

schema

schema

sensitive information could be compromised

service oriented architecture

slice and dice

Software

Software

Software

Software as a Service

Supercomputers

switch

systems analysis

systems

design

systems implementation

systems investigation

technical support costs

Technology acceptance

Technology adoption

Technology diffusion

Technology infrastructure

Technology infusion

Telecommunications

Telecommunications

the ASP could be incapable of
keeping its servers and network up and running consistently

the back
-
up rescue disk

The CPU

the CPU

the initial cost is lower

the software is likely to be of high quality because many customer firms have tested the software and
helped identify its bugs

the

software is likely to meet the basic business needs that are common across organizations

thin client computer

transmission media

unlimited in storage capacity

user interface

user view

users are often provided a token that displays a constantly changing pa
ssword

users can gain access to an organization’s private network

users can gain wide area network access

utility programs

visual programming

Wide Area network

Wi
-
MAX

Workstations