Search Course Catalog

Any questions? Contact us!



1. (TCO A) Which of the following roles falls into the duties of an information systems manager?

2. (TCO B) Behavioral models of managers find that, from observation, managers

3. (TCO C) A field identified in a table as holding the unique identifier of the table’s records is called the

4. (TCO D) Corporate network infrastructure is simplified in a cloud computing environment because

5. (TCO E) Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers?

6. (TCO F) In which type of systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage are begun?

7. (TCO G) Which of the following best describes how new information systems result in legal gray areas?

1. (TCO A) You are starting a small bike messenger company. Given your type of services (hand-delivering packages within a small geographical area), could your firm be a digital firm? If so, what would make this a digital firm?

2. (TCO B) What is a GIS? Describe at least three ways in which a GIS could be used by modern business.

3. (TCO C) The small publishing company you work for wants to create a new database for storing information about all of its author contracts. What factors will influence how you design the database?

4. (TCO D) You have been hired by a small new web design firm to set up a network for its single office location. The network is primarily needed for exchanging files, accessing and managing beta websites on its web server, and connecting to the Internet. The firm hires many freelancers who come into the office on an ad-hoc basis and it does not have a lot of money to spend on infrastructure. What type of network will you recommend?

5. (TCO E) Distinguish between Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL), and Universal Description, Discovery, and Integration (UDDI).

6. (TCO F) Discuss the role and influence the user has in software development.

7. (TCO G) What are the security challenges faced by wireless networks?

Leave a Reply

You must be logged in to post a comment.