34
Name : Clas s: Dat e: Module 12 - Working in the Enterprise Multiple Choice 1. ______ information is available when the decision maker needs it. a . Timely b . Accessi ble c . Verifia ble d . Organiz ed ANSWER: b REFERENCES: 12-3 Information Systems in the Enterprise 2. A(n) ______ system is a set of hardware, software, data, people, and procedures that work together. a . information b . communicati ons c . business d . proficiency ANSWER: a REFERENCES: 12-3 Information Systems in the Enterprise 3. ______ information is useful only within a specific time period. a . Timely b . Accessi ble c . Verifia ble d Organiz Copyright Cengage Learning. Powered by Cognero. Page 1

jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

Multiple Choice

1. ______ information is available when the decision maker needs it.a. Timelyb. Accessiblec. Verifiabled. Organized

ANSWER: bREFERENCES: 12-3

Information Systems in the Enterprise

2. A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.a. informationb. communicationsc. businessd. proficiency

ANSWER: aREFERENCES: 12-3

Information Systems in the Enterprise

3. ______ information is useful only within a specific time period.a. Timelyb. Accessiblec. Verifiabled. Organized

ANSWER: aREFERENCES: 12-3

Information Systems in the Enterprise

4. ______ information is error free.a. Accurateb. Usefulc. Verifiabled. Organized

ANSWER: aREFERENCES: 12-3

Information Systems in the Enterprise

5. ______ information has meaning to the person who receives it.a. Accurateb. Usefulc. Verifiabled. Organized

ANSWER: b

Copyright Cengage Learning. Powered by Cognero. Page 1

Page 2: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

REFERENCES: 12-3Information Systems in the Enterprise

6. ______ information can be proved as correct or incorrect.a. Accurateb. Usefulc. Verifiabled. Organized

ANSWER: bREFERENCES: 12-3

Information Systems in the Enterprise

7. CAM and MRP are examples of information systems used in ______.a. human resourcesb. engineeringc. manufacturingd. sales

ANSWER: cREFERENCES: 12-4

Information Systems in the Enterprise

8. Which type of system enables and manages the publishing, modification, and access of various forms of documents and other files on a network or on the web?

a. CMSb. DMSc. TPSd. MIS

ANSWER: aREFERENCES: 12-5

Information Systems in the Enterprise

9. Which type of system's primary function is to store and manage a company's documents in a central library?a. CMSb. DMSc. TPSd. MIS

ANSWER: bREFERENCES: 12-5

Information Systems in the Enterprise

10. Which of the following MIS reports usually lists just transactions?a. Detailedb. Summaryc. Exceptiond. General

Copyright Cengage Learning. Powered by Cognero. Page 2

Page 3: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

ANSWER: aREFERENCES: 12-6

Information Systems in the Enterprise

11. Which of the following MIS reports usually includes tables and graphs?a. Detailedb. Summaryc. Exceptiond. General

ANSWER: bREFERENCES: 12-6

Information Systems in the Enterprise

12. Which of the following MIS reports identifies data outside of a normal condition?a. Detailedb. Summaryc. Exceptiond. General

ANSWER: cREFERENCES: 12-6

Information Systems in the Enterprise

13. A(n) ______ system captures and stores human knowledge and then imitates human reasoning and decision making.a. analyticalb. anthropomorphicc. decisiond. expert

ANSWER: dREFERENCES: 12-8

Information Systems in the Enterprise

14. A(n) ______ engineer develops AI-based machines and programs.a. cognitiveb. virtualc. intelligenced. systems

ANSWER: aREFERENCES: 12-15

Technology Careers

15. Which of the following is responsible for installing and maintaining operating system software?a. Program developerb. Systems analystc. Systems

programmerCopyright Cengage Learning. Powered by Cognero. Page 3

Page 4: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

d. Cloud architectANSWER: cREFERENCES: 12-15

Technology Careers

16. Which of the following is responsible for designing and developing information systems?a. Program developerb. Systems analystc. Systems

programmerd. Cloud architect

ANSWER: bREFERENCES: 12-15

Technology Careers

17. Which of the following is responsible for installing hardware and servers and troubleshooting hardware problems?a. Computer technicianb. Help desk technicianc. Network engineerd. Technical project manager

ANSWER: aREFERENCES: 12-16

Technology Careers

18. Which of the following serves as an interface between programmers/developers and management?a. Computer technicianb. Help desk technicianc. Network engineerd. Technical project manager

ANSWER: dREFERENCES: 12-16

Technology Careers

19. Which of the following jobs might use Google Cardboard to create storytelling tools?a. Game designerb. VR engineerc. Mobile technology

expertd. Mobile app developer

ANSWER: bREFERENCES: 12-17

Technology Careers

20. Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?a. Security system project manager

Copyright Cengage Learning. Powered by Cognero. Page 4

Page 5: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

b. Computer security specialistc. Computer security incident responderd. Security analyst

ANSWER: cREFERENCES: 12-17

Technology Careers

Critical Thinking QuestionsCase 12-1

You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job.

21. If you decide you want to administer a network, you should look for jobs within the ______ area.a. operationsb. managementc. strategyd. technical

supportANSWER: aREFERENCES: 12-12

Technology Careers

22. If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.

a. operationsb. managementc. strategyd. technical

supportANSWER: bREFERENCES: 12-12

Technology Careers

Critical Thinking QuestionsCase 12-2

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs.

23. One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?

a. Inspect electronic data to recover documents and filesb. Convert system design into an application development

languagec. Configure routers and firewallsd. SEO

Copyright Cengage Learning. Powered by Cognero. Page 5

Page 6: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

ANSWER: cREFERENCES: 12-17

Technology Careers

24. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job?

a. Inspect electronic data to recover documents and filesb. Convert system design into an application development

languagec. Configure routers and firewallsd. SEO

ANSWER: aREFERENCES: 12-17

Technology Careers

COGNITIVE ASSESSMENT

25. Which of the following best describes the function of a TPS?a. A TPS captures and processes data from business activities.b. A TPS generates information for problem solving.c. A TPS organizes documents using metadata.d. A TPS enables publishing of reports.

ANSWER: aREFERENCES: 12-6

Information Systems in the Enterprise

26. Which of the following best describes the function of an MIS?a. An MIS captures and processes data from business activities.b. An MIS generates information for problem solving.c. An MIS organizes documents using metadata.d. An MIS publishes documents to the web.

ANSWER: aREFERENCES: 12-6

Information Systems in the Enterprise

27. Which of the following is NOT true about DSSs?a. DSS stands for decision support system.b. Some DSSs are available to everyone on the web.c. Some DSSs include their own query language.d. A DSS uses data only from internal sources.

ANSWER: dREFERENCES: 12-8

Information Systems in the Enterprise

28. Which of the following best describes the users of a VPN?

Copyright Cengage Learning. Powered by Cognero. Page 6

Page 7: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

a. Web designers and others who need to create and share web content offline

b. Employees who work in other locations or who telecommutec. Telecommunications analystsd. Digital forensic examiners

ANSWER: bREFERENCES: 12-10

Technology Careers

29. Which of the following is NOT true about use of unlicensed software?a. Software publishers own the copyright to their products.b. Pirated software denies the publishers revenue.c. In most cases, the software owner can make as many copies as desired.d. Thirty-nine percent of software has been installed without proper

licensing.ANSWER: cREFERENCES: 12-13

Technology Careers

30. Which of the following best describes the role of a CRM specialist?a. Directs and implements an organization's use of Internet and social media marketing.b. Writes and develops web content and layouts so that they will appear at the beginning of search results.c. Integrates apps and data to provide an application that manages a company's relationships with

customers.d. Plans and designs software and apps that consider a user's reaction to a program and its interface.

ANSWER: cREFERENCES: 12-16

Technology Careers

31. Which of the following best describes the role of an SEO specialist?a. Directs and implements an organization's use of Internet and social media marketing.b. Writes and develops web content and layouts so that they will appear at the beginning of search results.c. Integrates apps and data to provide an application that manages a company's relationships with

customers.d. Plans and designs software and apps that consider a user's reaction to a program and its interface.

ANSWER: bREFERENCES: 12-16

Technology Careers

32. Which of the following best describes the role of a UX specialist?a. Directs and implements an organization's use of Internet and social media marketing.b. Writes and develops web content and layouts so that they will appear at the beginning of search results.c. Integrates apps and data to provide an application that manages a company's relationships with

customers.d. Plans and designs software and apps that consider a user's reaction to a program and its interface.

Copyright Cengage Learning. Powered by Cognero. Page 7

Page 8: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

ANSWER: dREFERENCES: 12-16

Technology Careers

33. Which of the following is NOT true about technology certifications?a. A certification demonstrated your knowledge in a specific area to employers or potential

employers.b. Authorized testing centers provide most certification exams for a fee.c. If you do not pass an exam, you may have to pay the fee again to retake it.d. Most certification programs require academic coursework.

ANSWER: dREFERENCES: 12-19

Technology Certifications

34. Which of the following best describes jailbreaking?a. When a hacker accesses a web database illegallyb. When a hacker identifies a network security threat and requests payment to solve

itc. When a user makes unauthorized modifications to a device's operating systemd. When a system receives a virus or hacking threat unless a fee is paid

ANSWER: cREFERENCES: 12-21

Technology Certifications

35. Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs.a. Specialistb. Expertc. Professionald. Administrator

ANSWER: aREFERENCES: 12-19

Technology Certifications

36. Data analysis certifications often contain the word ______ in their title.a. reasoningb. forensicsc. inquiryd. investigation

ANSWER: bREFERENCES: 12-19

Technology Certifications

37. Cisco certifications that test knowledge of installing, configuring, operating, and administering ______.a. networksb. software and apps

Copyright Cengage Learning. Powered by Cognero. Page 8

Page 9: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

c. intranetsd. operating systems

ANSWER: aREFERENCES: 12-20

Technology Certifications

38. Which of the following is responsible for answering technology-related questions?a. Computer technicianb. Help desk technicianc. Network engineerd. Technical project manager

ANSWER: bREFERENCES: 12-16

Technology Careers

39. A mobile ______ integrates and expands the company's initiatives for mobile users.a. strategistb. analystc. plannerd. developer

ANSWER: aREFERENCES: 12-17

Technology Careers

True / False

40. Information systems support daily, short-term, and long-range information requirements of users in a company.a. Trueb. False

ANSWER: TrueREFERENCES: 12-3

Information Systems in the Enterprise

41. To assist with sound decision making, information must have value.a. Trueb. False

ANSWER: TrueREFERENCES: 12-3

Information Systems in the Enterprise

42. Most information gains value with time.a. Trueb. False

ANSWER: FalseREFERENCES: 12-3

Copyright Cengage Learning. Powered by Cognero. Page 9

Page 10: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

Information Systems in the Enterprise

43. Human resources is an example of a functional unit.a. Trueb. False

ANSWER: TrueREFERENCES: 12-4

Information Systems in the Enterprise

44. An SFA information system is used in product development.a. Trueb. False

ANSWER: FalseREFERENCES: 12-4

Information Systems in the Enterprise

45. One advantage of ERP is complete integration of information systems across departments.a. Trueb. False

ANSWER: FalseREFERENCES: 12-5

Information Systems in the Enterprise

46. A DMS typically includes a CMS.a. Trueb. False

ANSWER: FalseREFERENCES: 12-6

Information Systems in the Enterprise

47. Bloggers use CMSs to post to their blogs and provide categories to posts.a. Trueb. False

ANSWER: TrueREFERENCES: 12-6

Information Systems in the Enterprise

48. Many people initially used the term, data processing, to refer to the functions of a DMS.a. Trueb. False

ANSWER: FalseREFERENCES: 12-6

Information Systems in the Enterprise

49. When you use a credit card to purchase an item, you are interacting with a CMS.

Copyright Cengage Learning. Powered by Cognero. Page 10

Page 11: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

a. Trueb. False

ANSWER: FalseREFERENCES: 12-6

Information Systems in the Enterprise

50. Most TPSs use OLTP because users need information immediately.a. Trueb. False

ANSWER: TrueREFERENCES: 12-6

Information Systems in the Enterprise

51. Inference rules are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system.

a. Trueb. False

ANSWER: TrueREFERENCES: 12-8

Information Systems in the Enterprise

52. Expert systems are a component of artificial intelligence.a. Trueb. False

ANSWER: TrueREFERENCES: 12-9

Information Systems in the Enterprise

53. Diagnostic software included with a computer or device assists technicians in identifying problems.a. Trueb. False

ANSWER: TrueREFERENCES: 12-13

Technology Careers

54. Educational requirements for help desk specialists are more stringent than they are for other careers in the technology field.

a. Trueb. False

ANSWER: FalseREFERENCES: 12-14

Technology Careers

55. A database analyst collects and analyzes evidence found on computers, networks, mobile devices, and databases.a. True

Copyright Cengage Learning. Powered by Cognero. Page 11

Page 12: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

b. FalseANSWER: FalseREFERENCES: 12-16

Technology Careers

56. Apps designed for a specific mobile platform or device generally will work on another without significant modification.

a. Trueb. False

ANSWER: FalseREFERENCES: 12-18

Technology Careers

57. Mobile web apps are actually websites that provide a user experience similar to native apps.a. Trueb. False

ANSWER: TrueREFERENCES: 12-18

Technology Careers

58. A hybrid app not only saves on development time and costs but also ensures a consistent user interface and fast performance on all devices.

a. Trueb. False

ANSWER: FalseREFERENCES: 12-19

Technology Careers

59. IBM, Microsoft, Novell, Red Hat, and Sun offer certifications that test knowledge of their operating systems.a. Trueb. False

ANSWER: TrueREFERENCES: 12-20

Technology Certifications

60. The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications.a. Trueb. False

ANSWER: FalseREFERENCES: 12-21

Technology Certifications

61. CISSP is an example of a security certification.a. Trueb. False

Copyright Cengage Learning. Powered by Cognero. Page 12

Page 13: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

ANSWER: TrueREFERENCES: 12-22

Technology Certifications

62. Dice and Monster are examples of career planning websites and apps.a. Trueb. False

ANSWER: TrueREFERENCES: 12-23

Job Searching and Career Planning

63. You should use a humorous name for your account profiles to ensure that you stand out to potential employers.a. Trueb. False

ANSWER: FalseREFERENCES: 12-24

Job Searching and Career Planning

64. You can use LinkedIn to follow companies to stay informed of their job opportunities.a. Trueb. False

ANSWER: TrueREFERENCES: 12-25

Job Searching and Career Planning

Completion

65. A(n) ______ is a set of components that interact to achieve a common goal.ANSWER: systemREFERENCES: 12-3

Information Systems in the Enterprise

66. ERP stands for Enterprise ______ Planning.ANSWER: ResourceREFERENCES: 12-4

Information Systems in the Enterprise

67. A typical enterprise consists of a wide variety of departments, centers, and divisions -- collectively known as ______ units.ANSWER: functionalREFERENCES: 12-3

Information Systems in the Enterprise

68. TPS stands for ______ processing system.ANSWER: transactionREFERENCES: 12-6

Copyright Cengage Learning. Powered by Cognero. Page 13

Page 14: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

Information Systems in the Enterprise

69. With ______ processing, the computer collects data over time and processes all transactions later, as a group.ANSWER: batchREFERENCES: 12-6

Information Systems in the Enterprise

70. MIS stands for ______ information system.ANSWER: managementREFERENCES: 12-6

Information Systems in the Enterprise

71. An IT ______, usually hired based on experience, provides technology services to his or her clients.ANSWER: consultantREFERENCES: 12-14

Technology Careers

72. When a company sends jobs overseas, outsourcing becomes ______.ANSWER: offshoring

off shoringREFERENCES: 12-15

Technology Careers

73. UX stands for user ______.ANSWER: experienceREFERENCES: 12-16

Technology Careers

74. A data ______  uses analytics and other Big Data techniques to interpret a company's data to better understand its performance.ANSWER: scientistREFERENCES: 12-16

Technology Careers

75. A(n) ______ app is written for mobile devices running a particular mobile phone operating system.ANSWER: nativeREFERENCES: 12-18

Technology Careers

76. ______ refers to hacking into products running Android and other operating systems.ANSWER: RootingREFERENCES: 12-21

Technology Certifications

77. Unmanned aerial vehicle/system are other terms for a(n) ______.ANSWER: droneREFERENCES: 12-22

Copyright Cengage Learning. Powered by Cognero. Page 14

Page 15: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

Technology Certifications

78. ______ is an online social network where professionals can create profiles and connect with coworkers and industry colleagues.ANSWER: LinkedInREFERENCES: 12-24

Job Searching and Career Planning

79. ______ is a popular hardware certification.ANSWER: A+REFERENCES: 12-20

Technology Certifications

Matching

Identify the letter of the choice that best matches the phrase or definition.

a. cloud architectb. database designerc. program and app developerd. web analytics experte. systems programmerf. web designerg. web developerh. computer techniciani. digital forensics examinerj. network administrator/engineerk. database administratorl. customer relationship management (CRM) specialistm. Internet/social media marketing specialistn. search engine optimization (SEO) experto. user experience (UX) designerREFERENCES: 12-15

12-1512-1512-1612-1512-1512-1512-1612-1612-1612-1612-1612-1612-16

Copyright Cengage Learning. Powered by Cognero. Page 15

Page 16: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

12-16

80. Identifies business requirements, strategies, and solutions for cloud storage and services that meet a company’s goals or needsANSWER: a

81. Designs the layout, navigation, and overall appearance of a website with a focus on user experienceANSWER: f

82. Directs and implements an organization’s use of Internet and social media marketing, including Facebook pages, Twitter feeds, blogs, and online advertisementsANSWER: m

83. Writes and develops web content and website layouts so that they will appear at the beginning of search results when users search for contentANSWER: n

84. Analyzes, develops, and supports the functionality of a websiteANSWER: g

85. Installs, maintains, and repairs hardware and serversANSWER: h

86. Integrates apps and data related to customer inquiries, purchases, support requests, and behaviors in order to provide a complete application that manages a company’s relationships with its customersANSWER: l

87. Installs, configures, and maintains LANs, WANs, wireless networks, intranets, Internet systems, and network softwareANSWER: j

88. Specifies, designs, implements, tests, and documents programs and apps in a variety of fields, includingrobotics, operating systems, animation, and applicationsANSWER: c

89. Installs and maintains operating system software and provides technical support to the programming staffANSWER: e

90. Plans and designs software and apps that consider a user’s reaction to a program and its interface, including its efficiency, its effectiveness, and its ease of useANSWER: o

91. Collects and measures Internet data, such as website traffic patterns and advertisingANSWER: d

92. Collects and analyzes evidence found on computers, networks, mobile devices, and databasesANSWER: i

93. Specifies the structure, interface, and requirements of a large-scale database; determines security and permissions for

Copyright Cengage Learning. Powered by Cognero. Page 16

Page 17: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

usersANSWER: b

94. Creates and maintains the data dictionary; monitors database performanceANSWER: k

Essay

95. Describe the information systems used by the following functional units: sales, engineering or product development, manufacturing, marketing, sales, and customer service.ANSWER: Students' answers should include information from Table 12-1:

Copyright Cengage Learning. Powered by Cognero. Page 17

Page 18: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

REFERENCES: 12-4Information Systems in the Enterprise

TOPICS: Critical Thinking

96. Describe the five components of information literacy.Copyright Cengage Learning. Powered by Cognero. Page 18

Page 19: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

ANSWER:• Digital literacy: Using computers, mobile devices, the Internet, and related technologies effectively is a necessity in business and society. Also important is an understanding of the general concerns of having computers in the world, including their integration in employment and education and their effects on national and personal security.• Library instruction: Undergraduates rarely seek the help of librarians when performing academic research. This lack of help may be due, in part, to the fact that the students misunderstand the role of the reference librarian. Information literate individuals use the librarians’ expertise in locating relevant sources. They also understand the necessity of using citations, how information is cataloged and organized, search strategies, and the process of locating and evaluating resources.• Media literacy: Skills needed to understand how mass communication and popular culture affect learning and entertainment include the ability to evaluate and analyze how music, film, video, television, and other nonprint media are used effectively to persuade and inform.• Numerical literacy: The ability to use basic math skills and interpret data is essential to solving problems and communicating information. Also important are understanding how data is gathered and presented in graphs, charts, and other visuals and how to interpret and verify information presented in media.• Traditional literacy: Individuals who can read and understand a variety of documents are likely to complete their educations, obtain employment, and participate in community groups. They also need to think critically about the material they have read and to express their thoughts by writing and speaking coherently.

REFERENCES: 12-9 - 12-10Information Systems in the Enterprise

TOPICS: Critical Thinking

97. Describe how telecommuting benefits employees and employers. List guidelines for setting up your home office for telecommuting.ANSWER: Telecommuting mutually benefits employers and employees. Employers do not have to pay for the

physical infrastructure (including office space and parking) for the employee, and telecommuters often work more hours than those who physically commute to an office. Employees benefit from not having to commute and from having a comfortable work environment. The following guidelines describe how to set up your home office for telecommuting:• Choose a location in your home that is free from noise and distractions. If your home is occupied by others during the hours you plan to telecommute, your office should be located away from potentially noisy areas. For example, an office next to a room where someone else is watching television may not be an ideal choice.• Make sure your office has a comfortable desk and chair. Although it may be tempting to sit on your couch with your laptop while you work, having a professional workspace will increase productivity.• Consider how you will store important documents: as paper copies in a file cabinet or digital documents in the cloud.• If required, verify your office has a sufficient Internet connection. Be sure your wireless network is encrypted. Consider setting up one network for business and another for personal use or by clients.• Make sure the office has a phone to place and receive calls and videoconferences. If you will be relying on a mobile phone, verify your phone can receive a strong signal and has a conveniently located charger and power outlet.• Use a headset with your phone to minimize background noise.• Obtain supplies that typically are found in an office setting, such as writing utensils, paper, tape, a stapler, paper clips, and sticky notes.• If your employer does not provide a computer for your use, make sure your computer is sufficiently equipped to complete your job tasks. Make sure you also have accessories, such as USB flash drives and other external storage media, if necessary.

Copyright Cengage Learning. Powered by Cognero. Page 19

Page 20: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

• Consider obtaining an all-in-one printer that can print, scan, and copy, as well as extra ink cartridges.REFERENCES: 12-11

Technology CareersTOPICS: Critical Thinking

98. List reasons why companies might outsource jobs. Describe pros and cons of outsourcing.ANSWER: Companies have a long history of outsourcing, or relying on outside companies to perform certain

tasks. Outsourcing enables companies to find workers with specialized experience and to control costs. When a company sends jobs overseas, outsourcing becomes offshoring. A skilled computer professional in the United States typically commands a higher salary than an IT worker in other countries. To remain competitive, many companies have chosen to send computer jobs abroad.

Proponents say that the United States has a long history of outsourcing all types of work when the economics of the situation demands it. Companies feel that they have a right to choose to send business tasks abroad if it saves costs. Foreign economies benefit when companies hire and pay workers a fair wage and provide benefits. American consumers benefit from the reduced cost of goods.

Opponents say that offshoring results in unemployment and harms the economy. Others are concerned that sensitive work, such as health record maintenance or weapons manufacturing, could place U.S. citizens at risk. Some experts state that the work done abroad should be easy to manage and quantifiable in order to ensure it meets company standards. Some companies have received negative press due to inefficiencies in call centers and customer support located abroad.

Government officials and lawmakers struggle with policies regarding offshoring, especially with regard to taxing workers. Politicians debate whether or not companies who keep business in the United States should receive tax breaks. Many argue that the United States should require companies who hire foreign workers to pay a fair salary and provide benefits comparable to those for American workers.

REFERENCES: 12-15Technology Careers

TOPICS: Critical Thinking

99. List recommended strategies for creating a professional online presence.ANSWER:

• Register a form of your name as a domain name and host a blog or website at that web address. If your name is not available or you do not have access to a web server, include your name as part of the web address for your website on a free service, such as Blogger or WordPress.• Avoid informal or humorous names for your account profiles, blog title, or domain name.• Include a photo of yourself that presents your best self.• Use a webcam to create a 30-second video in which you introduce yourself. In the video, summarize your skills and professional interests. Post the video on YouTube or another video sharing site and include a link to it on your blog or website.• Upload a PDF file of your resume, and include a link to it on your blog or website.• Include links to your LinkedIn and Twitter profiles on your blog or website.• Include links to any other publications, articles, videos, or digital content you have created.• Create consistent accounts on online social networks.• Post appropriate content to your blog, website, or online social networks regularly.• Before uploading your resume or publishing your blog or website, ask at least two people to proofread content for any spelling and grammar mistakes. Keep the language professional.

REFERENCES: 12-24Job Searching and Career Planning

Copyright Cengage Learning. Powered by Cognero. Page 20

Page 21: jprodriguez.netjprodriguez.net/csc100/questions/Module_12.docx  · Web viewUndergraduates rarely seek the help of librarians when performing academic research. This lack of help

Name:  Class:  Date:

Module 12 - Working in the Enterprise

TOPICS: Critical Thinking

100. List current FAA regulations for drones. Describe how the following use drones: commercial and media; scientific; military and law enforcement.ANSWER: Current FAA regulations state that drones can fly no higher than 400 feet, must stay within the

operator’s line of sight, and cannot venture over airports or populated areas. Newer FAA regulations require registration of both the drone and the operator; they also restrict flights crossing state lines.

Commercial and Media UseAmazon captured the media’s attention when it announced plans to deliver packages using drones. The FAA opposed this proposition, stating that drones had to be flown within sight of the operator and cannot drop cargo. Other commercial and media ventures, however, use drones for a variety of purposes. Insurance companies use drones to survey storm damage to buildings and property. Sports photographers capture aerial footage, especially for events such as hang gliding, snowboarding, and downhill skiing.

Scientific Use Their inexpensive cost makes drones ideal for cash-strapped or small-sized scientific or conservation-related use where the risk might be great, such as taking pictures in the eye of a hurricane. Farmers create aerial maps to manage crop watering and fertilizing. Conservationists track endangered species, secure protected nesting areas, and map natural resources. Scientists attach specialized diagnostic tools to measure solar reflectivity of the Amazon rain forest, use thermal imaging cameras to measure endangered plant temperatures, and measure hurricane pressures and temperatures.

Military, Law Enforcement, and Other Uses Military uses of drones include surveillance of areas into which it would be unsafe to send personnel, to supply deliveries to combat areas, and even to detonate weapons. Law and safety officials also use drones effectively. Medical personnel use drones to deliver supplies to remote regions and to retrieve medical samples. Firefighters locate forest fires with drones. Law enforcement can photograph a complex crime scene from above without contaminating evidence.

REFERENCES: 12-22Technology Certifications

TOPICS: Critical Thinking

Copyright Cengage Learning. Powered by Cognero. Page 21