× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
o
5
G
4
4
K
3
m
2
c
2
r
2
p
2
s
2
s
2
b
2
c
2
New Topic  
ridhima14598 ridhima14598
wrote...
Posts: 491
Rep: 0 0
6 years ago
Which of the following types of testing for information systems is conducted to assess how well a system performs under peak loads?
 
  A) stress testing
  B) parallel testing
  C) unit testing
  D) system testing

 Q. 2

Which of the following is a highly structured decision?
 
  A) creating a new product
  B) estimating the effect of changing costs of supply materials
  C) calculating the best trucking routes for product delivery
  D) granting credit to a customer
  E) forecasting new industry trends

 Q. 3

To forecast trends in your supplier's industry that could affect your firm over the next five years, you would use a(n)
 
  A) ESS.
  B) TPS.
  C) MIS.
  D) DSS.
  E) KMS.

 Q. 4

Explain how e-marketing information systems track customer behavior.
 
  What will be an ideal response?

 Q. 5

A field or a group of fields that make a record unique in a table is called a(n) ________.
 
  A) primary key
  B) autonumber
  C) central entity
  D) attribute record

 Q. 6

Which of the following is involved in the integration testing process for information systems?
 
  A) checking the functionality of small modules of code during the development phase
  B) testing a new system's interfaces with other software components it links to
  C) determining whether a project is complete as specified by the end user
  D) conducting tests to assess how well a system performs under peak loads
Read 26 times
2 Replies

Related Topics

Replies
wrote...
6 years ago
Ans. to #1

A

Ans. to #2

D

Ans. to #3

A

Ans. to #4

Technically, e-marketing software tracks customer behavior by embedding in the HTML email a web beacon or web bug, which is a tiny, invisible image, typically a single pixel with a unique identifier. The image is actually located on the e-marketing server, and when the customer opens the message, a request is sent from the recipient's computer to retrieve the invisible image and download it. The request includes the date, time, and IP address of the computer making the request, and the unique identifier links the request to the customer's email address as well.

Ans. to #5

A

Ans. to #6

B
ridhima14598 Author
wrote...
6 years ago
Thank you, thank you, thank you!
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  677 People Browsing
Related Images
  
 6691
  
 303
  
 759
Your Opinion
What percentage of nature vs. nurture dictates human intelligence?
Votes: 436