You want to model the growth of the sales of three different products over the past six years. You want to emphasize the growth of the total amount of sales in addition to the relative growth rates of each of the products. Which type of chart should you use?

Clustered column chart

Stacked column chart

100% stacked column chart

Pie chart


What is the best strategy for designing a PowerPoint presentation for the first time for your organization?

Choose the template that you used for the class that you did the best in at college.

Use the 5-star rating to find the most well-liked template.

Ask around to see if there is a standard template for the organization.

Use the Blank Presentation template just to be safe.


Nonmerchant companies

sell services that they provide

include B2C, B2B, and B2G transactions

take title to the goods they sell

arrange for the purchase and sale of goods


Which of the following is considered to be input hardware?

Video Display





A ________ connects computers at different geographic locations.






Which of the following statements is TRUE with regard to system maintenance?

All commercial software products are shipped with known failures.

All organizations track system failures and enhancements using word-processing documents.

Software developers usually club enhancement requests and failures together.

IS personnel prioritize system problems on a first-come-first-served basis


When creating a presentation, it is most important to consider making the text






The CPU has a small amount of very fast memory called

a cache

the main memory

a data channel

serial bus


On a spreadsheet you have just opened, the projected sales are listed by departments. You have just summed up the projected sales by each department for year 2009 using a SUMIF function. To copy the same formulas over to use for year 2010, what types of referencing should you use?


Use absolute referencing to refer to the column containing department names, but relative referencing for the rest.

Use relative referencing to refer to the column containing department names, but mixed referencing for the rest.

Use relative referencing to refer to the column containing department names, but relative referencing for the rest.

Use absolute referencing to refer to the column containing department names, but mixed referencing for the rest.


In the Web 2.0 world, the value of a site increases

with users and use

over time

as the investments in it increase



A grocery scanning checkout system is an example of

a vertical-market software

a one-of-a-kind application

an operating system

a horizontal market software


Which of the following is true of VPN?

Remote access is difficult in case of VPN.

One disadvantage of VPN is that it does not encrypt messages.

It is a virtual, private pathway over a public or shared network from the client to the server.

VPN communications are secure even though they are transmitted over the public Internet.


System that tracks changes to documents and provides features and functions to accommodate concurrent work.

Workspace management

Content regulation

Workflow regulation

Version management


Projects that spend so much time ________ are sometimes said to be in analysis paralysis.

on project scheduling

documenting requirements

in the system definition phase of the SDLC

designing system components


The easiest and cheapest time to alter the information system is in the ________ phase of the SDLC.


requirements analysis

component design

system definition


In making a financial plan, you have decided to assume sales will grow by 10% from this year’s sales. The information for this year’s sales is contained in cell B5. The correct formula you should type into a cell to calculate next year’s sales is






To locate something in the database, one must type in the keyword into the ________ of the application.

data column


query form

data entry form


The broadest definition of ________ includes viruses, worms, Trojan horses, spyware, and adware.






Mark recently received an e-mail from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of






Most homes and small businesses use ________ because they receive more data than they transmit.






If you were writing a report and wanted the bottom of the third page—after the title page and the table of contents—to say Page 1, what would you need to insert?

A section break

A header

A delimiter

A table


Which of the following is true regarding an incident-response plan?

The plan should identify critical personnel and their off-hours contact information.

The plan should be simple enough to ensure a fast response with limited practice.

The plan should require minimal training on the part of employees.

The plan should provide decentralized reporting of all security incidents.


The best way to apply a previously created style to the current document is to

click on the style; then select each line you want changed

select all paragraphs you want changed and click on the style

click on the style; then select all paragraphs you want changed

select each line you want changed and click on the style


Which of the following is true of Web 2.0?

Its supporting technologies include HTTP and HTML.

It is supported by telephones, faxes, and EDIs.

It makes use of user-generated content and is flexible.

It is a primitive interorganizational information system


During the ________ phase of the SDLC process, developers construct, test, and install the components of the information system.

database design

requirements analysis

feasibility assessment



Which of the following systems for sharing content provides version control?

Google Docs

Microsoft SharePoint

Windows Live SkyDrive

File Transfer Protocol


Which of the following is TRUE of in-house custom-developed software?

The developing company pays the adaptation costs itself.

The organization has to tailor its applications to the software.

They are less expensive than off-the-shelf software.

They are easy and comparatively cheap to make


Which of the following stands true for enterprise DBMS products?

Paradox is an example of an enterprise DBMS product.

Most of the enterprise DBMS products are out of business today.

Enterprise DBMS products are designed for small and simple database applications.

Enterprise DBMS products support many—perhaps thousands—of users and many different database applications


Which of the following statements is true regarding position sensitivity?

It enables security personnel to prioritize their activities in accordance with the possible risk and loss.

It applies to new employees only.

It is documented only for high-sensitivity positions.

It is a type of data safeguard.


Which of the following is TRUE of thick-client applications?

All other things being equal, thin-client applications are preferred over thick-client applications.

With a thick-client application, a system administrator must install the new version on each user computer.

A thick-client application is an application program that need not be preinstalled on the client.

A thick-client application does not require preinstallation of client codes.




Related Questions

Accounting : Ppt 2...

RISK ANALYSIS, LEADERSHIP &EVALUATIONNAMEINSTITUTIONINTRODUCTIONElectronic Equipment Venture is a company in the electronicsmanufacturing industry. T...

Political Science : Chain Of Command...

Running Head: CHAIN OF COMMAND1Chain of commandNameInstitutionCHAIN OF COMMAND2Chain of commandIntroductionA chain of command (COC) denotes the seque...

Health & Medical : Pharmacology Assignment...

Running Head: PHARMACOLOGY DISCUSSIONPharmacology DiscussionNameInstitution AffiliationDate1PHARMACOLOGY DISCUSSION2The Steady-State Level of a DrugT...

Powerpoint : T856 Psychology.edited...

1Running head: PSYCHOLOGYPsychologyStudent NameInstitutionCourseDue Date2PSYCHOLOGYPart 1: Power DistancePower distance represents the extent that ma...

Science : Advanced Business Writing 2...

advanced business writingby Advanced Business Writing Advanced Business WritingSubmission date: 28-Jan-2019 11:32AM (UT C-0700)Submission ID: 1069673...

Writing : Reading Questions...

All students in this class agree to abide by the principles of academic integrity. All cases ofdishonesty in this course, including cheating on exami...

If you didn't find the right answer

Ask Your Questions, We'll notify you once someone answers it