Archive for December, 2017

HY 1020 – Explain how the post-war economic collapse

HY 1020 – Explain how the post-war economic collapse

200w. Explain how the post-war economic collapse throughout several Western nations directly correlated to the rise of fascism in Europe. Include the role of key personalities in the changing social and political landscape.
 

HIS 102 – Explain why attempts to create a unified German state

HIS 102 – Explain why attempts to create a unified German state

1. Briefly explain why attempts to create a unified German state during the mid-nineteenth century failed. 

2. Summarize the main ideas of Friedrich Engels and Karl Marx, explaining where they are similar and where they differ.
 

HY 1020 – Describe how the evolution of political

HY 1020 – Describe how the evolution of political

200w. Describe how the evolution of political philosophies in the West caused, and eventually determined, the outcome of the Second World War. Be sure to include economic, social, and political factors in regard to the movement of armies, participation in the conflict, and the role of alliances.
 

HY 1020 – World War I was called the Great War

HY 1020 – World War I was called the Great War

200w. World War I was called the "Great War" and "the war to end all wars." Offer your interpretation of why it was neither, using specific examples from cultural, economic, political, and ideological developments between 1914 and 1918 to prove your point.
 

agreement

agreement

Suppose a home improvement business, Makle Construction, which is located in California, would like to be the partner of Capitol Home Improvement, LLC. You are responsible for preparing a draft of the agreement. You may see a sample partnering agreement at: .google.com/?gws_rd=ssl#q=sample+partnering+agreement+">https://www.google.com/?gws_rd=ssl#q=sample+partnering+agreement+ Edit this agreement and customize it to fit the needs of Makle Construction and Capitol Home Improvement, LLC
 

HRM517 Week 3 Case Study 1 Prioritizing Projects at D. D. Williamson (Chapter 2)

Case Study 1: Prioritizing Projects at D. D. Williamson (Chapter 2)

Due Week 3 and worth 240 points

Read the case titled: “Prioritizing Projects at D. D. Williamson” found in Chapter 2.

Write a four to six (4-6) page paper in which you: 1.Analyze the prioritizing process at D. D. Williamson. 2.Suggest two (2) recommendations to improve the prioritizing process. 3.Create a scenario where the implemented process at D. D. Williamson would not work. 4.Project five (5) years ahead and speculate whether or not D. D. Williamson will be using the same process. Justify your answer.5.Use at least four (4) quality (peer-reviewed) resources in this assignment.

Your assignment must: •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: •Assess organizational strategies that contribute to effective project management of human resources. •Use technology and information resources to research issues in managing human resource projects. •Write clearly and concisely about managing human resource projects using proper writing mechanics.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills. Click here to access the rubric for this assignmen

How did Luther, Zwingli, Calvin, and Henry VIII

How did Luther, Zwingli, Calvin, and Henry VIII

1. How did Luther, Zwingli, Calvin, and Henry VIII each challenge the Roman Catholic church?

2. Why was Charles V ultimately unable to prevent religious division in his lands?

3. How did the Protestant Reformation change the status and lives of women in Europe?

What impact did the adversities of the fourteenth century

What impact did the adversities of the fourteenth century

What impact did the adversities of the fourteenth century have on Christian practices? I already know the impacts it had on medicine and urban life, but I can't seem to find the answer to the impact it had on Christian practices.
 

STRAYER CIS109/ CIS109 WEEK 5 FINAL EXAM

Question

CIS109 Final Exam

Question 1

____ usually works with a smart card.

Answer

E-cash

E-wallets

E-checks Micropayments

Question 2

E-procurement is an example of the ____ B2B e-commerce model.

Answer

seller-side marketplace

buyer-side marketplace

third-party exchange marketplace trading partner agreement

Question 3

Mobile commerce (m-commerce) is based on the ____ protocol.

Answer

extensible authentication

wired equivalent

wireless application

Wi-fi protected

Question 4

____ is a method for improving the volume or quality of traffic to a Web site.

Answer

Extensive markup language

Search engine optimization

Ad impression technology

Agent technology

Question 5

____ introduced the value chain concept.

Answer

Tim Berners-Lee

Michael Porter

Abraham Maslow

Frederick Taylor

Question 6

One of the issues with GIS is that too much ____ can prevent flexibility in responding to local preferences and even time differences.

Answer

regulation

control

standardization

coordination

Question 7

____ present(s) a challenge when designing and implementing global databases.

Answer

Local regulations

Different character sets

Intellectual property laws

Telecommunications infrastructure

Question 8

Foreign exchange systems that allow traders and brokers from around the world to interact are an example of information systems that support the _____ structure.

Answer

multinational

global

transnational

international

Question 9

Companies creating separate Web sites for each country in which they do business is called _____ of a Web site.

Answer

standardization

localization

centralization

regionalization

Question 10

Tyco Corporation is an example of the ____ type of global organization.

Answer

multinational

global

international

transnational

Question 11

A ____ shows a process at a more general level and is helpful for showing top management and the task force how a process works.

Answer

data flow diagram

flowchart

context diagram

conceptual data model

Question 12

____ centers on a structured workshop in which users and system professionals come together to develop an application.

Answer

XP

JAD

SOA

RAD

Question 13

____ uses an iterative process that repeats the design, development, and testing steps as needed, based on feedback from users.

Answer

XP

RAD

JAD

SOA

Question 14

With ____ outsourcing, the organization chooses an outsourcing company in a neighboring country.

Answer

onshore

nearshore

offshore

homeshore

Question 15

A ____ prototype shows users how a particular task that was not technically feasible can be done.

Answer

proof-of-concept

computer-aided

requirements-based

selling

Question 16

____ feasibility assesses a system’s costs and benefits.

Answer

Economic

Technical

Operational

Scheduling

Question 17

During the ____ phase, the systems designer must define the problem the organization faces, taking care not to define symptoms rather than the underlying problem.

Answer

planning

requirements-gathering and analysis

design

implementation

Question 18

____ are common examples of e-marketplaces.

Answer

Auctions

Internet service providers

E-distributors

Web-based CRMs

Question 19

Transaction data for a CRM system might be gathered using ____.

Answer

a RFID chip

grocery store loyalty cards

inventory numbers

reverse auctions

Question 20

A company can purchase a(n) ____ package that might include services from different vendors, but the e-distributor coordinates them into one package for customers.

Answer

enterprise resource planning

online auctions

maintenance, repair, and operations

electronic data interchange

Question 21

Overseeing order transmissions are part of the ____ flow in a manufacturing firm’s SCM system.

Answer

product

information

location

finances

Question 22

Information technologies and ____ play a major role in implementing an SCM system.

Answer

auctions

SDLC modules

CASE tools

the Internet

Question 23

____ decisions, or programmable tasks, can be automated because a well-defined standard operating procedure exists for these types of decisions.

Answer

Structured

Semistructured

Unstructured

Automated

Question 24

The ____ acts as a liaison between users and designers.

Answer

managerial designer

technical designer

model builder

database builder

Question 25

Which of the following geographic objects of a GIS is most likely used to show the location of an airport?

Answer

Points

Lines

Areas

Regions

Question 26

The ____ component includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.

Answer

user interface

DSS engine

model base

modeling and simulation

Question 27

____ conferencing includes an audio link but no video capability.

Answer

Real-time computer

Multicast

Analog

Desktop

Question 28

The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention.

Answer

humanlike interface

adaptability

mobility

reactivity

Question 29

____ systems have been one of the most successful artificial intelligence related technologies.

Answer

Management information

Supply chain management

Agent

Expert

Question 30

Intelligent agents demonstrate ____, the capability to select problems or situations that need attention and act on them.

Answer

adaptability

collaborative behavior

mobility

reactivity

Question 31

____ is an example of an expert system that can be applied to various financial applications.

Answer

DENDRAL

ASIMO

Shyster

PortBlue

Question 32

Some banks use a(n) ____ system to qualify customers for loans, using parameters from past customers stored in a database.

Answer

case-based reasoning

artificial neural network

natural language processing

decision support

Question 33

The size and complexity of the human language has made developing ____ systems difficult.

Answer

natural-language processing

genetic algorithm

artificial neural network

personal language

Question 34

When using a(n) ____, IS personnel time is freed up to focus on applications, such as customer relationship management and financial information systems, that are more strategically important to the organization.

Answer

application service provider model

quick response code

cave automatic virtual environment

avatar

Question 35

With the ____ model, users don’t need to be concerned with new software versions and compatibility problems because the application service providers offer the most recent version of the software.

Answer

CAVE

virtual reality

radio frequency identification

SaaS

Question 36

The ____ component of a virtual reality system is an input device that captures and records movements of the user’s feet as the user turns in different directions.

Answer

walker

central coordinating processor and software system

manual navigation control

visual and aural

Question 37

One advantage of grid computing is _____, meaning more nodes can be added for additional computing power without affecting the network’s operation.

Answer

improved reliability

simulation

scalability

immersion

Question 38

Within the context of virtual reality technology,_____ refers to allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.

Answer

networked communication

full-body immersion

telepresence

interaction

Question 39

Bluetooth can be used to create a ____, to communicate among computerized devices.

Answer

personal area network

local area network

wide area network

metropolitan area network

Question 40

____ component of a virtual reality system enable users to see and hear the virtual world.

Answer

Walker

Central coordinating processor and software system

Manual navigation control

Visual and aural system

STRAYER CIS109/ CIS109 WEEK 5 MIDTERM EXAM

Question

CIS 109 Week 5 Midterm Exam? Intro Mgt. Info Systems

Exam consists of 40 multiple choice questions and covers the material in Chapters 1 through 7

Question 1

The purpose of an information system’s ________ component is generating the most useful type of information for making decisions.

Answer

process

internal data

external data

database

Question 2

Management information system’s (MIS) ________ include programs developed in-house.

Answer

human elements

data processes

hardware components

software components

Question 3

Microsoft Access is an example of ________ in an information system.

Answer

internal data

external data

database management system

knowledge base management system

Question 4

A typical PDA includes a(n) ________.

Answer

external monitor

calendar

mouse

external keyboard

Question 5

The output of an information system is ________.

Answer

data

a database

a process

information

Question 6

Transistor was the major technology used during the _______ generation of hardware.

Answer

first

second

third

fourth

Question 7

In a(n) _______ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number.

Answer

EBCDIC

Unicode

ASCII extended

ASCII

Question 8

Computers and communication systems use ________ to represent and transfer information between computers and network systems.

Answer

Optical character reader (OCR)

light pens

data codes

Magnetic ink character recognition (MICR)

Question 9

________ is a function performed by control programs that controls the transfer of data among parts of a computer system, such as exchange of information between the CPU and I/O devices.

Answer

Job management

Resource allocation

Data management

Communication

Question 10

A _______ is the size of a character.

Answer

nibble

bit

byte

word

Question 11

A(n) _______ is a type of memory that stores data sequentially.

Answer

RAM

magnetic tape

optical disk

RAID

Question 12

Data in a data warehouse can be differentiated from data in a database in that the former _______.

Answer

captures raw transaction data

is used for capturing and managing transactions

comes from a variety of sources

only keeps recent activity in memory

Question 13

The _______ approach to setting up a distributed DBMS combines fragmentation and replication.

Answer

optimization

allocation

encapsulation

normalization

Question 14

Which of the following is true of a database?

Answer

Complex requests can be difficult to handle.

More storage space is required.

Programs and data are interdependent.

More information can be generated from the same data.

Question 15

_______ gives users subtotals of various categories.

Answer

Summary data

Raw data

Open data

Metadata

Question 16

A _______ key uniquely identifies every record in a relational database.

Answer

secondary

foreign

primary

surrogate

Question 17

A _______ operation searches data in a table and retrieves records based on certain criteria.

Answer

project

join

find

select

Question 18

A database _______ is responsible for data storage, manipulation, and retrieval.

Answer

program

index

system

engine

Question 19

_______ has created decency concerns, because these e-mails often contain explicit language or nudity.

Answer

Phishing

Spoofing

Sniffing

Spamming

Question 20

In the context of the important concepts regarding Web and network privacy, _______ refers to issues involving both the user’s and the organization’s responsibilities and liabilities.

Answer

phishing

nonrepudiation

spoofing

accountability

Question 21

You make two copies of a software package you just bought for personal use, in case the original software fails and you need a backup.This action is ________.

Answer

illegal and unethical

legal but unethical

illegal but ethical

legal and ethical

Question 22

In the context of the important concepts regarding Web and network privacy, ________is a method for binding all the parties to a contract.

Answer

phishing

nonrepudiation

cybersquatting

synchronous

communication

Question 23

Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of _______.

Answer

cybersquatting

the digital divide

a virtual organization

telecommuting

Question 24

Which of the following is a type of access control?

Answer

Steel encasements

Passwords

Firewalls

Identification badges

Question 25

_______ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

Answer

Intrusion detection systems

Proxy servers

Physical security measures Biometric security measures

Question 26

Which of the following is a physical security measure?

Answer

Electronic trackers

Passwords

Firewalls

Signature analysis

Question 27

_______ security measures use a physiological element to enhance security measures.

Answer

Physical

Social

Biofeedback

Biometric

Question 28

A(n) _______ is often used so remote users have a secure connection to the organization’s network.

Answer

biometric security system

intrusion detection system

virtual private network

terminal resource network

Question 29

A _______ travels from computer to computer in a network, but it does not usually erase data.

Answer

Trojan program

worm

virus backdoor

Question 30

_______ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company’s information systems are secure.

Answer

Script kiddies

Black hats

White hats

Hex editors

Question 31

The amount of data that can be transferred from one point to another in one second is called _______.

Answer

bandwidth

controller

router

protocol

Question 32

The Transmission Control Protocol (TCP) operates at the OSI model’s _______ layer.

Answer

Data link

Physical

Transport

Network

Question 33

The _______ layer of the OSI model serves as the window through which applications access network services.

Answer

Application

Presentation

Network Data link

Question 34

The _______ topology is costly and difficult to maintain and expand.

Answer

star

mesh

ring

bus

Question 35

The most common n-tier architecture involves _______ tiers.

Answer

two

three

four

five

Question 36

A(n) ____ is an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.

Answer

podcast

RSS feed

blog wiki

Question 37

Which of the following protocols is used for retrieving messages?

Answer

SMTP

POP

HTTP

VoIP

Question 38

A(n) ____ is the address of a document or site on the Internet.

Answer

TLD

URL

IP

DNS

Question 39

The Federal Express Tracking System allows customers to enter a package’s tracking number and locate any package still in the system as well as prepare and print shipping forms, get tracking numbers, and schedule pickups. Federal Express is an example of a(n) ____.

Answer

intranet

Internet

extranet

DMZ

Question 40

A(n) ____ is a journal or newsletter that is updated frequently and intended for the general public.

Answer

podcast

RSS feed

blog

wiki

error: Content is protected !!