Chap 8, 11, 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ is the collective and individual experience applied to solving problems.

Wisdom

Data mining and big data analytics are examples of​ ________.

a business analytics toolset

A strong foundation in database technology is required for​ ________.

business intelligence and analytics

​Databases, data​ warehouses, data​ marts, and analytic platforms are part of the​ ________.

business intelligence infrastructure

From an information technology​ perspective, ________ includes the infrastructure for​ warehousing, integrating,​ reporting, and analyzing data from the business environment.

business intelligence​ (BI)

according to the balanced scorecard​ framework, a​ firm's ________ strategic objectives include accident ratios and equipment downtown.

business process

Viruses differ from worms because worms​ ________.

can operate on their own without attaching to other computer program files

The​ ________ model of management describes the five traditional functions of managers as​ planning, organizing,​ coordinating, deciding, and controlling.

classical

Business intelligence users can be grouped into two​ types: _______ who comprise​ _______ of​ employees, and​ _______ who comprise​ ________ of employees.

power​ users; 20%; casual​ users; 80%

What type of analytics uses statistical​ analysis, data mining​ techniques, historical​ data, and assumptions about future conditions to predict future trends and behavior​ patterns?

predictive

FedEx has been using​ ________ to develop models of how customers will respond to price changes and new services.

predictive analytics

The knowledge management value chain begins with the​ ________.

procurement

Regarding business intelligence and analytics​ capabilities, a(n)​ ________ could include submitting financial documents to the SEC using XBRL​ (industry-specific requirements).

production report

A form of encryption that uses two keys is called​ ________.

public key

When thinking about​ security, controls​ ________.

refer to policies and procedures that ensure the safety of an​ organization's assets.

A decision where only part of the problem has an obvious answer is an example of​ a(n) ________ decision.

semi-structured

Examining college admission scores in addition to interviewing the applicant is an example of​ a(n) ________ decision.

semi-structured

A​ company's marketing managers meet to create a new marketing plan. According to​ Leila, this is an example of​ _____ decision making.

semistructured

Asking what happens to mining profits if the price of silver drops by 5 percent is an example of​ ________.

sensitivity analysis

______ help(s) ensure that important network traffic receives high​ priority, and​ less-critical network traffic receives lower priority.

Deep packet inspection​ (DPI)

________ are data files used to identify and protect online transactions using a trusted third party.

Digital certificates

Which below is the correct definition of​ "war driving"?

Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic

Identifying​ ________ is a way for managers to determine how to measure the effectiveness of an organization

KPIs

How is a knowledge asset different from a physical​ one?

Knowledge is not subject to the law of diminishing returns as physical assets are.

A​ ________ is a software program that mimics another program and often causes damage.

Trojan horse

MasterCard having a duplicate computer center in multiple cities is an example of​ ________ in case operations at one location are disrupted.

disaster recovery planning

Which of the knowledge management​ systems' IS activities involve search​ engines?

disseminate

Regarding business intelligence and analytics​ capabilities, a(n)​ ________ allows moving from a​ high-level summary to a​ micro-level view.

drill down

When the data in a message is converted from plain text to cipher​ text, a process called​ _________ is used.

encryption

A manager interested in a system that can organize and disseminate knowledge throughout the organization is likely interested in​ a(n) ________.

enterprise content management system

the acronym ESS stands for​ ________.

executive support system

​A(n) ________ system is a​ decision-making tool that follows a series of​ IF-THEN-ELSE rules.

expert

FAQs and product manuals are examples of​ _____ knowledge.

explicit

what are the two major components of knowledge​ management?

explicit and tacit

According to the balanced scorecard​ framework, a​ firm's ________ strategic objectives include cash flow and return on equity.

financial

A combination of hardware and software that prevents unauthorized users from accessing a network is called a​ ________.

firewall

IS security firewalls are an example of a​ ________.

gatekeeper

________ algorithms were inspired by biological systems that examine optimal solutions for a given problem based on big data.

genetic

Mapping areas of the country with higher RSV rates is an example of a​ ________.

geographic information systems​ (GIS)

A​ ________ is an interactive​ computer-based system for facilitating the solution of unstructured problems by a set of decision makers.

group​ decision-support system​ (GDSS)

Someone who intends to gain unauthorized access to a computer system is considered to be a​ ________

hacker

The​ ________ role is NOT one of the activities that managers are expected to perform in an organization.

high velocity

If someone loads a program that tracks everything you​ type, the specific spyware is​ a(n) ________.

key logger

The acronym KPI stands for​ ________.

key performance indicator

A scientist who works to create information for organizations is considered​ a(n) ________ worker.

knowledge

To transform information into​ _________, resources are used to discover​ patterns, rules, and context.

knowledge

to transform information into​ ________, a firm must expend additional resources to discover​ patterns, rules, and contexts.

knowledge

Expert systems model human knowledge in a structure known as​ a(n) ________.

knowledge base

Neural networks are used for​ ________.

knowledge discovery

Based on the information in this​ video, _____ tools are used to collect and store employee knowledge and to make that knowledge available to​ employees, customers, and others who need it.

knowledge management

_______ represents an​ organization's business processes that are designed to​ create, store,​ transfer, and apply knowledge.

knowledge management

​A(n) ________ is a major type of KM which includes specialized workstations that enable​ scientists, engineers, and other knowledge workers to create and discover new knowledge.

knowledge work systems

Neural networks​ ________ to distinguish between valid and fraudulent credit purchases.

learn from patterns in data

neural networks are now being used by companies​ (e.g., Visa​ International) to detect credit card fraud by​ ________.

learning from patterns in transaction data

_______ systems are used by both organizations and universities to​ manage, deliver, and assess learning and training content.

learning management

Canvas and Blackboard are examples of​ ________.

learning management systems

________ refers to identifying patterns in very large database without explicit programming but with significant human training.

machine learning

​________ is the study of how computers can potentially improve without human programming.

machine learning

According to the DHS agent portrayed in this​ video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware

The multidimensional analysis tool in spreadsheets is called a​ ________.

pivot table

A manager that is considered to be a​ "super user"​ ________.

wants to create their own reports and use more sophisticated analytics

​_________ describes the collective and individual experience of applying knowledge.

wisdom

independent computer programs that copy themselves from one computer to others over a network are called​ ________.

worms

The law that requires financial institutions to ensure confidentiality of customer data is called the​ ________

​Gramm-Leach-Bliley Act

Storing past experiences in the form of cases is a KM method called​ ________.

​case-based reasoning​ (CBR)

the single largest threat to the Internet is​ _____.

​denial-of-service attacks

A(n) ________ is a major type of KM that​ collects, stores, and disseminates digital content and knowledge

​enterprise-wide KMS

A​ ________ is a program that monitors information traveling over a network and​ ________.

​sniffer; is never legitimately used

Studies of actual managerial performance indicate that managers perform work at a pace of​ _______ different activities each day.

600

which of the following usually happens in a​ denial-of-service attack?

A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.

What would describe proper use of the​ firm's information resources and computing​ equipment, including desktop and laptop​ computers, wireless​ devices, telephones, and the​ Internet?

Acceptable use policy

________ allows scientists the ability to create graphical renditions of DNA.

Augmented Reality

Design engineers​ (knowledge workers) often use​ ________ as a routine aspect of their work.

CAD

________ allows for the automated creation of designs using advanced graphics software.

CAD

What is​ GDSS?

Group decision support systems

If you work in the health care​ industry, your firm will need to comply with which Act​ below?

HIPAA

_______ was passed in 1996 to protect medical records.

HIPAA

_______ feature(s) monitor the network at its most vulnerable points.

Intrusion detection systems

A massive online course available to the general public is called a​ ________ .

MOOC

What are​ MOOCs?

Massive open online course

Which list below contains the analytic functionalities that BI systems​ deliver?

Production​ reports, parameterized​ reports, dashboards/scorecards, ad hoc​ query/search/report creation, and drill down.

A type of malware that takes advantage of poorly coded Web applications is called​ ________.

SQL injection attacks

________ is a method for encrypting network traffic on the web.

SSL

In​ 2002, the​ ________ Act was passed to help protect investors with new financial statements reforms.

Sarbanes-Oxley

What are knowledge work​ systems?

Specialized systems for discovering and creating new knowledge.

All of the following are methods of authentication EXCEPT​ ________.

TCP/IP

Which of the knowledge management​ systems' IS activities involve data​ mining?

acquire

Regarding business intelligence and analytics​ capabilities, a(n)​ ________ allows users to generate their own reports based on searches.

ad hoc query

Formalizing​ standards, rules, and procedures to ensure that the​ organization's general and application security controls are properly executed and enforced is​ a(n) ________ control.

administrative

Data which are not visible to the average user are called​ ________.

ambient data

Organizational learning is the result of knowledge​ ________.

applications

The use of computers​ (hardware and​ software) to emulate human behavior is called​ ________.

artificial intelligence​ (AI)

A risk​ ________ determines the level of risk to an organization if an activity or process is not properly controlled.

assessment

An information systems​ ________ examines a​ firm's overall security environment and determines if the organization is properly prepared to address threats.

audit

Use of MRI and CAT technologies during​ image-guided surgery are considered​ _______

augmented reality

​________ is used to ensure the person is who​ he/she claims to be.

authentication

Hackers flooding a network server with many thousands of false communication requests is called​ _____

a​ denial-of-service attack

Using your handprint to access a safe deposit box is an example of​ ________ authentication

biometric

In March​ 2016, a high ranking political figure received an email indicating that his account had been compromised and that he should follow the enclosed link to reset his Google password. This was an example of​ ________.

click fraud

A​ ________ is an informal social network of professionals and employees within and outside the firm who have similar​ work-related activities and interests.

communities of practice

When a manager is provided all the facts necessary to support a​ decision, the​ ______ dimension of information quality is satisfied.

completeness

The career field that deals with collection and examination of computer data for legal evidence is called​ ________.

computer forensics

is the scientific​ collection, examination,​ authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

computer forensics

A​ firm's ________ should include an awareness of computer forensics.

contingency planning process

According to the balanced scorecard​ framework, a​ firm's ________ strategic objectives include customer loyalty and customer retention.

customer

SQL injection attacks are related to​ ________.

databases

The classical model of management includes the managerial functions of​ planning, organizing,​ coordinating, controlling, and​ _____________.

deciding

A​ manager's ________ role includes handling disputes.

delusional

A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.

denial of service

Regarding the​ decision-making process,​ ________ includes examining alternatives to solve the problem.

design

When a decision maker outlines and investigates several potentially useful solutions to a​ problem, the​ ________ stage of​ decision-making is being performed.

design

________ consists of processes and tools to identify the valid users of a system.

identity management

Regarding the​ decision-making process,​ ________ includes making the chosen solution work.

implementation

_______ represents an​ organization's business processes that are designed to​ create, store,​ transfer, and apply knowledge.

increases

Knowledge workers usually have​ ________ as a routine aspect of their work.

independent judgement

Which of the following is NOT a requirement of a knowledge work​ system?

inference engine

​A(n) ________ examines the​ firm's overall security including controls governing individual systems.

information systems audit

A​ manager's ________ role includes obtaining the most​ up-to-date information.

informational

All of the following are general controls EXCEPT​ ________ controls.

input

Regarding the​ decision-making process,​ ________ includes discovering and understanding problems occurring in the organization.

intelligence

The iPhone voice Siri is a type of​ ________.

intelligent agent

When someone uses a software program to carry out a specific task using a learned knowledge​ base, this is an example of​ a(n)________.

intelligent agents

​A(n) ________ is a major type of KM which provides tools for discovering patterns and applying knowledge to discrete decisions.

intelligent technique

When managers act as​ leaders, motivating,​ counseling, and supporting their​ subordinates, they are performing the​ ___________ role.

interpersonal

​________ includes computer​ viruses, worms, and Trojan horses.

malware

Business strategy is considered part of the​ ________.

managerial users and methods

MIS, DSS, and ESS are part of the​ ________.

managerial users and methods

Behavioral models suggest that the actual actions of managers are​ ________ than previously believed.

more informal

​A(n) ________ network learns from identifying patterns in large datasets.

neural

The most commonly used authentication technique used for end users is​ ________

password

If someone sends you an email trying to appear as a normal site that you commonly visit to obtain unauthorized​ information, the person is​ ________.

phishing

how a​ _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers

spoofer

Not allowing credit if an​ individual's credit score is below 600 is an example of​ a(n) ________ decision

structured

What types of decisions are​ repetitive, routine, and involve a definite procedure for​ handling?

structured

last​ quarter's sales figures are considered​ ________ knowledge.

structured

A lead chef quitting at a restaurant and taking his secret recipes with him or her is considered​ ________ knowledge.

tacit

the knowledge an employee has in his mind that has not been documented is called​ _______

tacit knowledge

A unified threat management system does NOT include​ a(n) ________.

token

Public key encryption uses​ ________ key(s).

two

Information in​ folders, messages,​ memos, proposals,​ emails, graphics, electronic slide​ presentations, and even videos created in different formats and stored in many locations is considered​ ________ knowledge.

unstructured

a​ company's decision to introduce a new product is an example of​ ____

unstructured

which types of decisions are made at the executive level of an​ organization?

unstructured

Senior executives determining​ five-year goals is an example of​ a(n) ________ decision.

unstructured (provide Judgement)

A decision about whether or not to enter a new market would be characterized as​ ________ and is the responsibility of​ _______ management.

unstructured; senior

A report showing an​ employee's age as a negative number is useless because it lacks​ ________.

validity


Conjuntos de estudio relacionados

Milady - Chapter 11 - Disorders and Diseases of the Skin

View Set

World History - Chapter 1.1-1.2 Quiz Review

View Set