Final Review I S 300

¡Supera tus tareas y exámenes ahora con Quizwiz!

A​ ________ is a chart that lists project activities such as start and completion dates. A. Gantt B. DML C. GIS D. pie chart E. PERT

A. Gantt

​________ may be used in order to speed up requirements determination and initial system design. A. Joint application design B. Rapid instructional technology C. Software standards D. Software express E. Joint development process

A. Joint application design

​________ focuses on a specific measure of quality of 3.4 defects per million opportunities. A. Six sigma B. Sensitivity analysis C. A key performance indicator​ (KPI) D. Total quality management​ (TQM) E. A pivot table

A. Six sigma

The​ ________ strategy focuses on having components arriving exactly at the time they are needed. A. just-in-time B. instructional design C. bullwhip D. software E. ERD

A. just-in-time

The acronym KPI stands for​ ________. A. key performance indicator B. key performance instances C. key performance information D. key performance installations E. key performance infrastructure

A. key performance indicator

To transform information into​ _________, resources are used to discover​ patterns, rules, and context. A. knowledge B. skills C. data D. information E. instruction

A. knowledge

A project in which the user requirements are clear and stable is considered​ a(n) ________ project. A. structured B. redundant C. unstructured D. mandatory E. high-risk

A. structured

Last​ quarter's sales figures are considered​ ________ knowledge A. structured B. cloud computing C. database D. semi-structured E. tacit

A. structured

The first phase in the systems development process is​ ________. A. systems analysis B. programming C. systems design D. conversion E. testing

A. systems analysis

A decision about whether to enter a new market would be characterized as​ ________ and is the responsibility of​ ________ management. A. unstructured; senior B. unstructured; middle C. semistructured; middle D. structured; operational E. structured; middle

A. unstructured; senior

________ is a consequence of poor project management. A. Training B. Failure to obtain anticipated benefits C. Database utilization D. Scope E. Conducting a feasibility study

B. Failure to obtain anticipated benefits

​________ feature(s) monitor the network at its most vulnerable points. A. Antivirus software B. Intrusion detection systems C. A sensor network D. Network address translation E. Unified threat management systems

B. Intrusion detection systems

Project management deals several major variables. Which of the following is the correct​ list? A. Scope, time, and cost B. Scope, time,​ cost, quality, and risk C. ​Time, cost,​ quality, and risk D. Scope, time,​ cost, quality,​ estimation, and risk E. Scope, time,​ cost, and risk

B. Scope, time,​ cost, quality, and risk

The most common form of organizational change is​ ________. A. a paradigm shift B. automation C. rationalization D. redesign E. sensitivity analysis

B. automation

Buying a gold coin from a leading online company​ (e.g., APMEX) is an example of​ ________ electronic commerce. A. traditional sales B. business-to-consumer (B2C) C. traditional marketing D. business-to-business (B2B) E. consumer-to-consumer (C2C)

B. business-to-consumer (B2C)

Craigslist is an example of a massive​ ________ electronic commerce organization. A. traditional marketing B. consumer-to-consumer (C2C) C. business-to-consumer (B2C) D. business-to-business (B2B) E. traditional sales

B. consumer-to-consumer (C2C)

An example of​ ________ includes a company being sold infrastructure as a service​ (IaaS) at the same time they purchased software as a service​ (SaaS) from a cloud services vendor. A. cross join B. cross-selling C. production selling D. knowledge selling E. commission selling

B. cross-selling

The two most important management challenges when building an​ e-commerce site include knowing how to choose the right technology and​ ________. A. hiring mostly web developers B. developing a clear understanding of your business objectives C. proved extensive training D. creating a mobile site E. locating headquarters in a large city

B. developing a clear understanding of your business objectives

Neural networks are now being used by companies​ (e.g., Visa​ International) to detect credit card fraud by​ ________. A. using spreadsheets B. learning from patterns in transaction data C. creating a database D. intranet technologies E. writing XML

B. learning from patterns in transaction data

Questions related to how you can induce change in local units to conform to international requirements is addressed in the international IS architecture​ ________ dimension. A. corporate global strategies B. management and business processes C. technology platform D. global environment business drivers and challenges E. communication structure

B. management and business processes

Smaller projects have​ a(n) ________ failure rate than larger projects A. unknown B. smaller C. similar D. larger E. dramatically larger

B. smaller

Examining college admission scores as the sole criteria for admission is an example of​ a(n) ________ decision. A. semi-structured B. structured C. good D. unstructured E. networking

B. structured

Enterprise applications include high​ ________, making it difficult to change vendors. A. meta data B. switching costs C. usage of cloud computing D. usage of analytics E. success rates

B. switching costs

Increased​ productivity, lower operational​ costs, and lower computer expenses are all considered​ ________ because they are quantifiable. A. intangible benefits B. tangible benefits C. ad hoc committees D. IS failures E. steering committees

B. tangible benefits

The organizational change model that focuses on achieving quality as a primary goal of all individuals within an organization is​ ________. A. six sigma B. total quality management​ (TQM) C. sensitivity analysis D. a pivot table E. a key performance indicator​ (KPI)

B. total quality management​ (TQM)

​A(n) ________ is an Internet business model where users save time and money by processing online sales transactions and generating a fee for each transaction. A. community provider B. transaction broker C. content provider D. market creator E. e-tailer

B. transaction broker

Nike's contract suppliers are​ ________ in the supply chain. A. outside B. upstream C. owners D. optional E. downstream

B. upstream

A type of malware that takes advantage of poorly coded web applications is called​ ________. A. Conficker B. spyware C. SQL injection attacks D. Ransomware E. Storm

C. SQL injection attacks

A combination of hardware and software that prevents unauthorized users from accessing a network is called a​ ________. A. hotspot B. switch C. firewall D. server E. router

C. firewall

Project risk​ ________ if the project team lacks the required technical experience. A. dramatically decreases B. remains unknown C. increases D. decreases E. remains the same

C. increases

Examining college admission scores in addition to interviewing the applicant is an example of​ a(n) ________ decision. A. unstructured B. structured C. semi-structured D. good E. networking

C. semi-structured

Customer relationship management applications that track social networking data are related to the​ ________ aspect of customer relationships. A. accounting B. marketing C. service D. sales E. database

C. service

Related to social​ e-commerce, small world theory suggests you are only​ ________ link(s) from every other person on earth. A. fifty B. two C. six D. one E. one hundred

C. six

​E-commerce refers to the use of the​ ________ and​ ________ to transact business. A. DDL; DML B. advertising; marketing C. cash; credit D. Internet; Web E. spreadsheets; databases

D. Internet; Web

_________ describes the collective and individual experience of applying knowledge. A. Instruction B. Knowledge C. Information D. Wisdom E. Data

D. Wisdom

One challenge with training employees is that benefits are often​ ________ and difficult to quantify. A. steering committees B. free to the company C. ad hoc committees D. intangible E. tangible

D. intangible

The highest form of organizational change risk​ (are) ________. A. automations B. rationalizations C. sensitivity analyses D. paradigm shifts E. redesigns

D. paradigm shifts

If Politicit.com decides to quickly build a test system for its end users to​ evaluate, they are creating​ a(n) ________. A. systems analysis B. conversion C. systems design D. prototype E. programming

D. prototype

The phase of the systems development process when a feasibility study is conducted is​ ________. A. programming B. systems design C. testing D. systems analysis E. conversion

D. systems analysis

A lead chef quitting at a restaurant and taking her secret recipes with her is considered​ ________ knowledge. A. cloud computing B. database C. structured D. tacit E. semi-structured

D. tacit

Which of the knowledge management​ systems' IS activities involve data​ mining? A. Feedback B. Disseminate C. Store D. Apply E. Acquire

E. Acquire

________ avoid the problem of having databases in areas such as​ finance, human​ resources, sales and​ marketing, and manufacturing that are not capable of sharing information. A. Human resource systems​ (HRS) B. Quality control applications​ (QCA) C. Local area networks D. Data definition language​ (DDL) E. Enterprise resource planning​ (ERP) systems

E. Enterprise resource planning​ (ERP) systems

A​ ________ is a chart that depicts project tasks and their interrelationships. A. Gantt B. GIS C. DML D. pie chart E. PERT

E. PERT

A risk​ ________ determines the level of risk to an organization if an activity or process is not properly controlled. A. policy B. profile C. alignment D. audit E. assessment

E. assessment

Global communication and transportation technologies are an example of​ a(n) ________. A. business analytics toolset B. paradigm shift C. IS architecture D. sensitivity analysis E. business driver

E. business driver

Databases, data​ warehouses, data​ marts, and analytic platforms are part of the​ ________. A. BI and analytics for DSS platform B. user interface C. business analytics toolset D. managerial users and methods E. business intelligence infrastructure

E. business intelligence infrastructure

If top management is reluctant to implement a new​ system, it is probably wise to avoid a​ ________ implementation, which is the most aggressive approach. A. drop B. pilot C. parallel D. phased E. direct cutover

E. direct cutover

A company that is heavily centralized in the country​ (including production) of origin is considered​ ________ strategy. A. inter-border flow B. multinational C. franchiser D. data-flow E. domestic exporter

E. domestic exporter

Independent computer programs that copy themselves from one computer to others over a network are called​ ________. A. viruses B. Trojan horses C. Storm D. macro viruses E. worms

E. worms


Conjuntos de estudio relacionados

stat exam 3 (confidence intervals)

View Set

Psychology Chapter 6 Summative Quiz

View Set

Comprehensive Mental Health and Psychiatric Nursing NCLEX Practice Quiz #1: 75 Questions

View Set

Interactive Summary Module 5 Social Media

View Set