Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
and devices used to process and record knowledge, or in some other way enhances
business transactions the knowledge management process.
MANAGEMENT INFORMATION PROJECT: A temporary endeavor
SYSTEM: An organized collection of undertaken to create a unique product,
people, procedures, software, databases, and service, or result.
devices that provides routine information to
SYSTEM ACQUISITION: The process
managers and decision makers
used to obtain the information system
INFORMATION SILO: An isolated resources needed to provide the services
information system not easily capable of necessary to meet a specific set of needs.
exchanging information with other
OPEN SOURCE SOFTWARE: Software
information systems.
that is distributed for free, with access
ENTERPRISE RESOURCE permitted to the source code so that it can be
PLANNING (ERP) SYSTEM: A system studied, changed, and improved by software
that supports an organization’s routine professionals at the various user
business processes, maintains records about organizations—with no maintenance
those processes, and provides extensive charges.
reporting and data analysis capabilities. wide
SYSTEM DEVELOPMENT: The activity
range of applications, practices, and
of building information systems to meet
technologies for the extraction,
users’ needs.
transformation, integration, visualization,
analysis, interpretation, and presentation of CYBERCRIMINAL: A computer hacker
data to support improved decision making. who is motivated by the potential for
monetary gain; cybercriminals hack into
BUSINESS ANALYTICS: The extensive
computer systems to steal, often by
use of data and quantitative analysis to
transferring money from one account to
support fact-based decision making within
another or by stealing and reselling credit
organizations.
card numbers, personal identities, and
DATA SCIENTIST: A person who financial account information.
understands the business and the business
CYBERTERRORISM: The intimidation of
analytics technology, while also recognizing
a government or a civilian population by
the limitations of their data, tools, and
using information technology to disable
techniques; a data scientist puts all of this
critical national infrastructure (e.g., energy,
together to deliver real improvements in
transportation, financial, law enforcement,
decision making with an organization.
emergency response) to achieve political,
KNOWLEDGE MANAGEMENT religious, or ideological goals.
SYSTEM (KMS): An organized collection
ETHICS: A set of beliefs about right and
of people, procedures, software, databases,
wrong behavior. Ethical behavior conforms
and devices that stores and retrieves
to generally accepted social norms—many
knowledge, improves collaboration, locates
of which are almost universally accepted.
knowledge sources, captures and uses
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER
16. The two fundamental strategies for ORGANIZATION: A group of people that
system acquisition are: . is structured and managed to meet its
mission or set of group goals.
a. customize an existing package and
acquire open source software VALUE CHAIN: A series (chain) of
b. use a standard software package or activities that an organization performs to
customize software transform inputs into outputs in such a way
that the value of the input is increased
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER
supply chain: A key value chain whose downsizing: Reducing the number of
primary activities include inbound logistics, employees to cut costs.
operations, outbound logistics, marketing
and sales, and service. culture: A set of major understandings and
assumptions shared by a group, such as
supply chain management (SCM): The within an ethnic group or a country.
management of all the activities required to
get the right product into the right organizational culture: The major
consumer’s hands in the right quantity at the understandings and assumptions for a
right time and at the right cost—from the business, corporation, or other organization.
identification of suppliers and the
acquisition of raw materials through organizational change: How forprofit and
manufacture and customer delivery. nonprofit organizations plan for, implement,
and handle change.
virtual team: A group of individuals whose
members are distributed geographically, but soft side of implementing change: The work
who collaborate and complete work through designed to help employees embrace a new
the use of information systems. information system and way of working.
computing power, memory, and storage logical servers, each acting as its own
for most business computing tasks. dedicated machine
c. nettop computer
d. workstation APPLICATION SOFTWARE:
Programs that help users solve particular
14. Servers offer great scalability, the computing problems
ability to increase the processing
capability of a computer system so it can SPHERE OF INFLUENCE: The
handle more users, more data, or more scope of the problems and opportunities
transactions in a given period. that the software addresses.
16. Which of the following is not a goal WORKGROUP: Two or more people
of green computing? who work together to achieve a common
a. Enable the safe disposal or recycling goal.
of computers and computer-related
equipment. WORKGROUP SPHERE OF
b. Allow companies to lower their INFLUENCE: The sphere of influence
power-related costs that helps workgroup members attain
c. Reduce the use of hazardous material. their common goals.
d. Reduce the cutting down of trees
and other foliage. ENTERPRISE SPHERE OF
INFLUENCE: The sphere of influence
17. Green computing is about saving the that serves the needs of an organization
environment; there are no real business in its interactions with its environment.
benefits associated with this program.
True or False? False OPERATING SYSTEM (OS): A set
of computer programs that controls the
computer hardware and acts as an
CHAPTER 4 Software and interface to application software
Mobile Applications
KERNEL: The heart of the operating
SYSTEM SOFTWARE: Software that system that controls the most critical
includes operating systems, utilities, and processes of the OS
middleware that coordinate the activities
and functions of the hardware and other USER INTERFACE: The element of
programs throughout the computer the operating system that allows people
system.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER
a.IBM z/os
COMPILER: A special software b.Windows 10
program that converts the programmer’s c.MAC iOS
source code into the machine-language d. Linux
instructions, which consist of binary
digits.
6. A(n) virtual server simulates a
SINGLE-USER LICENSE: A computer’s hardware architecture in
software license that permits you to software so that a single server can
install the software on one or more run operating systems and software
computers, used by one person designed for other architectures, or
run several operating systems
CHAPTER 4: SELF-ASSESSMENT simultaneously on one system.
TEST
7. Proprietary software is one-of-a-
1. The two main categories of software kind software designed for a specific
are . application and owned by the
a. enterprise and workgroup company, organization, or person
b. operating system and application that uses it.
c. application and system
d. utilities and operating system
8. Cloud computing refers to the use of
2. Application software that enables computing resources, including
users to develop a spreadsheet for software and data storage, on the
tracking their exercise and eating Internet, rather than on local
habits is software for the workgroup computers.
sphere of influence. True or False?
False
9. Software that enables users to
3. . The heart of the operating system improve their personal effectiveness,
that controls its most critical increasing the amount of work they
processes is called the kernel can do and its quality, is called
________ .
a.workgroup software
4. Software applications use the OS by b.enterprise software
requesting services through a(n) c.utilitysoftware
________ . d. personal application software
a. integrated development
environment
b. application program interface 10. Each programming language has its
c. utility program own set of rules, called the syntax of
d. software development kit the language.
7. The process of detecting and then 13. The Data Management Association has
correcting or deleting incomplete, incorrect, defined 10 major functions of data
inaccurate, or irrelevant records that reside management, with the core component being
in a database is called data cleansing, data .
cleaning, or data scrubbing. a. data quality management
b. data security management
8. Because the DBMS is responsible for c. data governance
providing access to a database, one of the
first steps in installing and using a relational d. data architecture management
database involves “telling” the DBMS the
A number of available tools and
logical and physical structure of the data and
technologies allow organizations to take
relationships among the data in the database.
advantage of the opportunities offered by
This description of an entire database is
big data.
called a(n) schema.
14. A(n) NoSQL database provides a means
9. A(n) data steward is an individual
to store and retrieve data that is modeled
responsible for the management of critical
using some means other than simple two-
data elements, including identifying and
dimensional relations used in relational
acquiring new data sources; creating and
databases.
maintaining consistent reference data and
master data definitions; and analyzing data
for quality and reconciling data issues.
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER
15. Hadoop has two primary components—a MESH NETWORK: A network that uses
data processing component and a distributed multiple access points to link a series of
file system called . devices that speak to each other to form a
network connection across a large area.
a. MapReduce and HDFS
PERSONAL AREA NETWORK (PAN):
b. TaskTracker and JobTracker
A network that supports the interconnection
c. Key-value and graph of information technology devices close to
one person.
d. SQL and NoSQL
LOCAL AREA NETWORK (LAN): A
network that connects computer systems and
16. An in-memory database is a database devices within a small area, such as an
management system that stores the entire office, home, or several floors in a building.
database in random access memory to
METROPOLITAN AREA NETWORK
provide fast access.
(MAN): A network that connects users and
their computers in a geographical area that
spans a campus or city.
CHAPTER 6 NETWORKS AND CLOUD
COMPUTING WIDE AREA NETWORK (WAN): A
network that connects large geographic
COMPUTER NETWORK: The
regions.
communications media, devices, and
software connecting two or more computer CLIENT/SERVER ARCHITECTURE:
systems or devices. An approach to computing wherein multiple
computer platforms are dedicated to special
COMMUNICATIONS MEDIUM: Any functions, such as database management,
material substance that carries an electronic printing, communications, and program
signal to support communications between a execution.
sending and a receiving device.
CHANNEL BANDWIDTH: The rate at
NETWORK TOPOLOGY: The shape or
which data is exchanged, usually measured
structure of a network, including the in bits per second (bps)
arrangement of the communication links and
hardware devices on the network. BROADBAND COMMUNICATIONS:
High-speed Internet access that is always on
STAR NETWORK: A network in which all
and that is faster than traditional dial-up
network devices connect to one another access.
through a single central device called the
hub node. WIRELESS COMMUNICATION: The
transfer of information between two or more
BUS NETWORK: A network in which all points that are not connected by an electrical
network devices are connected to a common conductor.
backbone that serves as a shared
communications medium. NEAR FIELD COMMUNICATION
(NFC): A very short-range wireless
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER
2. refers to the rate at which data can be communications conventions called the
exchanged and is measured in bits per Internet protocol or TCP/IP.
second.
7. Every computer on the Internet has an
a. Communications frequency assigned IP address for easy identification.
True/False
b. Channel bandwidth
8. A is a Web address that specifies the
c. Communications wavelength
exact location of a Web page using letters
d. Broadband and words that map to an IP address and the
location on the host.
3. indicates how the communications links
and hardware devices of the network are a. Universal Resource Locator
arranged.
b. Uniform Reference Locator
a. Communications protocol
c. Universal Web address
b. Transmission media
d. Uniform Resource Locator
c. Network topology
9. Many Web sites use CSS to define the
d. None of the above design and layout of Web pages, and XML
to define the content, and HTML to join the
4. Twisted-pair wire, cable, coaxial cable, content with the design. True/False
and fiber optic cable are all examples of
guided communications media. True/False 10. The use of social media in business is
called .
5. Systems software that controls the
computer systems and devices on a network a. social journalism
and allows them to communicate with one
b. blogging
another is called .
c. business wikis
a. network operating system
d. Enterprise 2.0
b. mobile device management software
11. A(n) intranet is an internal corporate
c. network-management software
network built using Internet and World
d. software-defined networking Wide Web standards and products.
Organizations are using the Internet of
Things (IoT) to capture and analyze streams
Together, the Internet and the World Wide of sensor data to detect patterns and
Web provide a highly effective anomalies—not after the fact, but while they
infrastructure for delivering and accessing are occurring—in order to have a
information and services. considerable impact on the event outcome.
6. The Internet transmits data in packets 12. There can be many issues with simply
from one computer to another using a set of receiving and recognizing usable sensor data
resulting in sensor data lacking time stamps
IT APPLICATION TOOLS IN BUSINESS ACCOUNTING REVIEWER