INFO 3130 Final Exam Review
Which of the following is NOT a step in the problem-solving process? a. solution evaluation and choice b. implementation c. solution analysis d. problem identification e. solution design
Solution analysis
Shipping a product to a customer is an example of a business process. a. True b. False
True
The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:
Websites must disclose their information practices before collecting data.
NORA is:
a data analysis technology that finds hidden connections between data in disparate sources.
due process
laws are well known and understood with an ability to appeal to higher authorities ex: apple & FBI
Which type of software is created and updated by a worldwide community of programmers and is available for free? a. open source b. mashups c. apps d. software packages e. outsourced
open source
Which of the following is a file storage and synchronization service for cloud storage, file sharing, and collaborative editing? a. Apple FaceTime b. Google+ c. Salesforce Chatter d. Google Hangouts e. Google Drive
Google Drive
Which of the following gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA
The four major functions of a business include manufacturing/production, sales/marketing, finance/accounting, and _________________. a. big data b. purchasing c. human resources d. instructional design e. customer relations
Human resources
Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.
True
Enterprise Systems often include transactions with customers and vendors. a. True b. False
True
Enterprise systems often include transactions with customers and vendors. a. True b. False
True
In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers. a. true b. false
True
In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company. a. True b. False
True
People, organizations, and information technology are all dimensions of information systems. a. True b. False
True
The dimensions of information systems are management, organizations, and information technology. a. true b. false
True
The most common form of IT-enabled organizational change is automation.
True
With in-memory computing, a computer's primary memory (RAM) is used for processing. a. True b. False
True
All of the following are current hardware platform trends except a. green computing b. virtualization c. cloud computing d. Unix
Unix
Fuzzy logic can describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules. a. True b. False
a. True
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network. a. True b. False
a. True
In general, for digital goods, the marginal cost of producing another unit is about zero. a. True b. False
a. True
In-memory computing relies on a computer's main memory for storing data. a. True b. False
a. True
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. a. True b. False
a. True
Structured decision making is most prevalent at lower organizational levels. a. True b. False
a. True
Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs. a. True b. False
a. True
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. a. True b. false
a. True
With in-memory computing, a computer's primary memory (RAM) is used for processing. a. True b. False
a. True
A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective? a. customer intimacy b. operational excellence c. survival d. improved reporting
Survival
If a competitor to your business introduces an effective product or service (i.e., when Citibank first introduced the ATM), your need to follow is considered an example of the business driver: a. improved decision making b. operational excellence c. new products, services, and business models d. survival e. customer and supplier intimacy
Survival
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. a. True b. False
a. True
In a relational database, a record is referred to in technical terms as a(n) a. Tuple b. Entity c. Field d. Row
a. Tuple
Among the eight unique features of e-commerce, which is related to the ability to interact with web technology everywhere? a. Ubiquity b. Universal Standards c. Global Reach d. Interactivity e. Richness
a. Ubiquity
Which of the following is not a potential "switching cost"? a. Upgrading software b. New documentation c. Employee training d. New hardware
a. Upgrading software
Enterprise software is built around thousands of predefined business processes that reflect: a. best practices b. government regulations c. cutting edge workflow analyses d. the firms organization e. industry benchmarks
a. best practices
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication. a. biometric b. data c. smart card d. chemistry e. token
a. biometric
Business processes are analyzed, simplified, and redesigned in a. business process redesign b. automation c. rationalization of procedures d. paradigm shifts
a. business process redesign
The measurement of the number of customers who stop using or purchasing products or services from a company is called ________. a. churn rate b. switching rate c. switching costs d. CLTV e. Cost per lead
a. churn rate
Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers. a. True b. False
b. False
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. a. True b. False
b. False
Knowledge residing in the minds of employees that has not been documented is called explicit knowledge. a. True b. False
b. False
Over 80% of U.S. Internet users access the Internet via mobile devices. a. True b. False
b. False
Some healthcare facilities create maps to visually show where health risks like RSV are concentrated. This is an example of a ______________ information system. a. Geodesic b. Geographic c. Case d. Map e. Country
b. Geographic
__________________ reports allow users to enter several variables (i.e., region and date) to produce a decision making report. a. Inductive b. Predictive c. Parameterized d. Drill-down e. Integrated
c. Parameterized
The principal liaison between the information systems groups and the rest of the organization is a(n): a. programmer b. information systems manager c. systems analyst d. CIO e. CSO
Systems Analyst
_________________ are information systems professionals who help bridge the relationships between programmers and end users to identify requirements for improved systems. a. Systems analysts b. HTML programmers c. Database Developers d. CIOs e. E-Marketers
Systems Analysts
You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? a. TPS b. TPS with DSS capabilities c. TPS with MIS capabilities d. TPS with ESS capabilities
TPS with MIS capabilities
All of the following are approaches to building information systems, except
Test & Deploy
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system. a. Identity Theft b. Farming c. Ransomware d. Spam e. Phising
c. Ransomware
The most prominent data manipulation language today is a. Access b. DB2 c. SQL d. Crystal Reports
c. SQL
Knowledge that already exists inside a firm in the form of formal reports or presentations is categorized as ________. a. Semi-structured knowledge b. Unstructured knowledge c. Structured knowledge d. Tacit knowledge e. Explicit knowledge
c. Structured knowledge
privacy
claim to be left alone, free from surveillance or interference from other people/orgs/govts
profiling
combining data and info from multiple sources to create detailed descriptions of people
non obvious relationship awareness
combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
Which of the following business problems is NOT a problem in the technology dimension? a. complexity of task b. incompatibility of old systems c. rapid technological change d. outdated software e. inadequate database capacity
complexity of task
maintaining boundaries
computing, internet use lengthens work day, infringes on personal time ex: working from home
systems design
create design specifications
pros to end user development
created quickly, user friendly
Which of the following is an example of a cross-functional business process? a. identifying customers b. creating a new product c. assembling a product d. paying creditors
creating a new product
The percentage of gross domestic product of the United States that is produced by the knowledge and information sectors is estimated to be about ________ a. 85 b. 65 c. 25 d. 45
d. 45
What is the primary difference between 3G and 4G cellular systems? a. 3G systems have poor security b. 4G systems are digital c. 3G systems are not compatible with text messaging d. 4G systems have greater transmission speeds e. 3G systems are unable to handle web browsing
d. 4G systems have greater transmission speeds
Sending customers to a website for a referral fee is called the _____________ model. a. Subscription revenue b. Freemium revenue c. Google review d. Affiliate revenue e. Transaction fee revenue
d. Affiliate revenue
Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply chain? a. Exponential effect b. Logistics effect c. Replenishment effect d. Bullwhip effect e. Ripple effect
d. Bullwhip effect
Enterprise software includes a database and thousands of predefined ________________. a. Supplier lists b. Spreadsheets c. Training programs d. Business processes e. Customer lists
d. Business processes
eBay is an example of a. B2C e-commerce b. B2B e-commerce c. M-commerce d. C2C e-commerce
d. C2C e-commerce
Reducing the business process layers in a distribution channel is called a. BPR b. Network effects c. Market segmentation d. Disintermediation
d. Disintermediation
In cloud computing, resources are said to be "pooled" because: a. organizations offer their services to each other free of charge b. organizations use the public internet to create the appearance of a private connection c. organizations use open source standards in the cloud d. organizations share the same physical hardware through virtualization e. cloud computing enables users to modify a programs source code
organizations share the same physical hardware through virtualization
3) project management group
oversees specific projects
2) info sys steering committee
review and approaches plans for sys in all divisions
The U.S. Department of Commerce developed a(n) ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.
safe harbor
The order fulfillment process involves which of the following functional areas of the business? a. sales, human resources, and manufacturing and production b. human resources, accounting, and service c. sales, human resources, accounting d. sales, accounting, manufacturing and production e. manufacturing and production, human resources, and accounting
sales, accounting, manufacturing and production
advantages to prototyping
useful if there are uncertainty in requirements/design likely to fulfill end-user requirements
internet challenges to privacy
*cookies*(tiny files downloaded by website to visitor's hard drive to track visits) *web beacons/bugs*(tiny graphics embedded in email and webpages to monitor who is reading message) *spyware*(tracks keystrokes)
The HIPAA Act
outlines medical security and privacy rules.
An example of raw data from a national chain of automobile stores would be a. an average of 13 toyotas are sold daily in Kentucky b. 30 percent increase in Toyota RAV4 sales during September in Kentucky c. 1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky d. all of the above
1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky
Which of the following choices may lead to competitive advantage: 1. new products, services, and business models; 2. charging less for superior products; 3. responding to customers in real time? a. 1 only b. 1 and 2 c. 2 and 3 d. 1, 2, and 3
1, 2, and 3
Hardware and software acquisition costs account for about ________ percent of TCO. a. 20 b. 40 c. 60 d. 80
20
runaway projects
30-40% of IT projs, exceed schedule & budget, fail to preform as specified
Copyright is protected throughout the life of the author plus an additional ______ years after the author's death.
70
Which of the following projects is the riskiest?
A project that managers are concerned will affect their roles and job descriptions
The introduction of new information technology has:
A ripple effect, raising new ethical, social, and political issues
A feasibility study determines whether a system solution is achievable from a
All of the Above: Organizational standpoint, Technical standpoint, Financial standpoint
At what stage of the systems development process are information/user requirements established?
Analysis
The six stages of the system development process, in the correct order, are:
Analysis, Design, Programming, Testing, Conversion, Production & Maintenance
A ________ is a senior manager who oversees the use of IT in the firm. a. COO b. CIO c. CEO d. CKO e. CFO
CIO
Which of the following protects the authors of a book from having their work copied by others?
Copyright law
When a firm does something in which they are a world-class leader, that activity would be considered to be a _____________ for the company. a. primary activity b. benchmark c. strategic advantage d. core competency e. best practice
Core competency
An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business driver: a. New products, services, and business models b. Operational Excellence c. Improved decision making d. Survival e. Customer and Supplier intimacy
Customer and Supplier Intimacy
A location specified to include IT infrastructure such as storage, security, and system backup is called a: a. data management b. SQL site c. Service center d. data mine e. data center
Data center
Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
Which of the following is NOT an example of disruptive technologies? a. iPad b. Digital Television c. Software as a Service d. Uber
Digital Television
Which of the following entities is NOT a part of the firm's environment? a. stockholders b. suppliers c. competitors d. customers e. employees
Employees
Principles of right and wrong that you use to make choices are called _____________.
Ethics
You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution? a. CRM b.Enterprise System c. Extranet d. Intranet
Extranet
Management information systems typically support non-routine decision making. a. true b. false
False
Transaction processing systems are most commonly used by the senior management level of an organization. a. True b. False
False
Which of the following statements represents a responsibility of the sales and marketing functional area? a. checking for quality b. producing bill of materials c. managing cash accounts d. paying creditors e. identifying customers
Identifying customers
A manager upset that he or she is not receiving forecasts, sales projections, or appropriate dashboards is expressing frustration for having a poor ______________ business driver: a. New products, services, and business models b. Operational Excellence c. Improved decision making d. Survival e. Customer and Supplier intimacy
Improved decision making
If you want to collect data (i.e., photos) from someone and use the data, you must obtain _____________.
Informed consent
Which of the following would not be considered a disruptive technology? a. instant messaging b. e-mail c. internet telephony d. PCs
Instant messaging
Which of the following is the BEST description of intellectual property?
Intangible property created by individuals or corporations
Which of the following is FALSE about the digital divide in the U.S.?
It is based only on having fair access to digital technology.
Business processes are analyzed, simplified, and redesigned in
business process redesign.
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant's categorical imperative
Which of the following is not a type of output device? a. Speakers b. Cathode ray tube c. Ink jet printer d. Keyboard e. Sensor
Keyboard
Which of the following is an example of a popular open source operating system? a. DOS b. Linux c. Mac OS d. Windows 10 e. DBMS
Linux
A system will be reviewed by both users and technical specialists to determine how well it has met its original objectives and to decide whether any revisions or modifications are required during which phase?
Maintenance
Tracking your movements without consent is most related to the trend, ___________, where technology trends raise ethical issues.
Mobile device growth impact
___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits. a. Customer and Supplier intimacy b. improved decision making c. operational excellence d. competitive advantage e. new products, services, and business models
Operational Excellence
Walmart exemplifies the power of information systems coupled with excellent business practices and supportive management to achieve which of the following? a. new business models b. customer intimacy c. operational excellence d. competitive advantage e. survival
Operational excellence
In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is a. middle management b. service workers c. production management d. operational management
Operational management
Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?
Privacy Act of 1974
Which of the following restricts the information the U.S. federal government can collect and regulates what it can do with the information?
Privacy Act of 1974
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of ________.
Property rights and obligations
Which of the five moral dimensions of the information age does spamming involve?
Quality of life
The process of creating workable information systems in a very short period of time is called:
RAD
Business processes are collections of a. informal practices and behaviors b. formalized and documented practices c. routines d. rights and privileges
Routines
A ________ is a sophisticated computer used for tasks requiring extremely rapid and complex calculations with thousands of variables, millions of measurements a. supercomputer b. grid computer c. workstation d. personal computer
Supercomputer
Which of the following types of computer is used for weather forecasting on a national or worldwide scale? a. Mainframe b. Server c. Minicomputer d. Supercomputer e. PC
Supercomputer
Which of the following is the biggest risk in using end-user development to create a new information system?
The system may not be able to scale up to handle larger amounts of data.
Which of the following best describes how new information systems result in legal gray areas?
They result in new situations that are not covered by old laws
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
Trade secret
Which system is typically a major source of data for other systems? a. Transaction processing systems b. management information systems c. executive support systems d. decision support systems
Transaction processing systems
A business model describes how a company produces, delivers, and sells a product or service to create wealth. a. True b. False
True
A test plan includes all the preparations for the series of tests to be performed on the system.
True
Craigslist is an example of: a. C2C e-commerce b. B2B e-commerce c. B2C e-commerce d. B2G e-commerce e. M- commerce
a. C2C e-commerce
________ help media firms store and manage unstructured digital data such as photographs, images, videos, and audio files. a. Digital asset management systems b. CMS c. LMS d. CAD e. Knowledge networks
a. Digital asset management systems
Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? a. ERP systems b. Groupware c. CRM software d. Application software e. Process management software
a. ERP systems
The balanced scorecard method is based on __________ dimensions of a firm's performance. a. Four b. Three c. Six d. Two e. Five
a. Four
Geoadvertising sends ads to users based on their: a. GPS locations b. Social media presence c. Shopping preferences d. User addresses e. Website behaviors
a. GPS locations
________ services can tell you the price of a house you are looking at or about special exhibits at a museum you are passing. a. Geo information b. Geo social c. Location-based d. Geo positioning e. Geo advertising
a. Geo information
Business processes supported by enterprise systems related to travel expense reporting are associated with __________________. a. Human resource processes b. Sales and marketing processes c. Financial and accounting processes d. Manufacturing and production processes e. Web development processes
a. Human resource processes
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space whose primary need is to share documents? a. Peer-to-peer network b. PAN c. Domain-based LAN d. Campus area network e. WAN
a. Peer-to-peer network
The benefit of a consumer being able to look online to find a variety of different prices for the same product is called ___________________. a. Price transparency b. Global scale c. Cost transparency d. Information density e. Price check
a. Price transparency
A(n) __________ key uniquely identifies a row or record in a table. a. Primary b. Initial c. Domestic d. Secondary e. Foreign
a. Primary
Relational databases enforce ______________ integrity to ensure, for instance, that a teacher can't be assigned to a CLASS table unless they already exist in the TEACHER table. a. Referential b. Ethical c. Data flow d. Secondary e. Task Model
a. Referential
Knowledge that resides in the minds of employees that has NOT been documented is called ________. a. Tacit knowledge b. Corporate culture c. Structured knowledge d. Organizational memory e. Standard operating procedures
a. Tacit knowledge
A decision can be said to have improved if it can be made more quickly. a. True b. False
a. True
Computer worms spread much more rapidly than computer viruses. a. True b. False
a. True
Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. a. True b. False
a. True
Dashboards and scorecards are visual interfaces used to make a firm's information easier to review quickly. a. True b. False
a. True
Data governance deals with the policies and processes for managing the integrity and security of data in a firm. a. True b. False
a. True
Every record in a file should contain at least one key field. a. True b. False
a. True
Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization a. True b. False
a. True
The data dictionary serves as an important data management tool by a. creating an inventory of the data elements contained in the database b. presenting data as end users or business specialists would perceive them. c. maintaining data in updated form d. assigning attributes to the data
a. creating an inventory of the data elements contained in the database
Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of a. crowdsourcing b. long-tail marketing c. prediction markets d. behavioral targeting
a. crowdsourcing
Data mining is a tool for allowing users to: a. find hidden relationships in data b. quickly compare transaction data gathered over many years c. summarize massive amounts of data into much smaller, traditional reports d. obtain online answers to ad hoc questions in a rapid amount of time e. perform multidimensional data analysis
a. find hidden relationships in data
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as a. hotspots b. wireless hubs c. hot points d. touch points
a. hotspots
The concern that the structure of data is consistent within an information source reflects which quality dimension of information? a. integrity b. accuracy c. consistency d. validity
a. integrity
Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes a/an a. learning management system b. employee enrichment system c. organizational learning system d. investment workstation
a. learning management system
Hadoop is a(n): a. open-source software framework designed for distributing data-processing over inexpensive computers b. pre-configured hardware-software system designed for analyzing big data c. data mining platform designed for storing and analyzing big data produced by web communications and transactions d. high-speed platform used to analyze large data sets e. NoSQL database technology that stores both data and procedures acting on the data as objects
a. open-source software framework designed for distributing data-processing over inexpensive computers
The effort required to locate a suitable product is called: a. search costs b. price discrimination c. market entry costs d. shopping costs e. menu costs
a. search costs
In a relational database, the three basic operations used to develop useful sets of data are a. select, project, and join b. select, project, and where c. select, from, and join d. select, join, and where
a. select, project, and join
Expertise and experience of organizational members that has not been formally documented best describes a. tacit knowledge b. wisdom c. data d. information
a. tacit knowledge
The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain. a. true b. false
a. true
A __________ is a unique type of malware that replicates itself from one computer to another. a. Worm b. Repeater c. Bug d. Bacteria e. Snail
a. worm
responsibility
accepting the potential costs, duties, for decisions
? more tech trends that raise ethical issues
advances in data analysis techniques - companies can analyze vast quantities of data gathered on individuals for: profiling, nonobvious relationship awareness, mobile device growth
outsourcing advantages
allows org flexibility in IT needs
balancing power
although computing decentralizing, key decision making remains centralized
Linux is a. primarily concerned with the tasks of end users b. designed for specific machines and specific microprocessors c. an example of an open-source software d. especially useful for processing numeric data e. the operating system for the Macintosh computer
an example of an open-source software
In a parallel conversion strategy, the new system
and the old are run together.
In the traditional systems development lifecycle, end users:
are limited to providing information requirements and reviewing the technical staff's work.
A ________ in a database represents a single character such as a letter or number. a. Bit b. Byte c. Megabit d. Kilobyte e. File
b. Byte
Tools that record customer activities at websites and store them in a log for further analysis are called ________. a. Filtering tools b. Clickstream tracking tools c. Collaborative filtering tools d. Customer tracking tools e. Personalization tools
b. Clickstream tracking tools
Twitter and Facebook are both examples of the _____________ Internet Business Model. a. E-tailer b. Community Provider c. Transaction Broker d. Portal e. Market Creator
b. Community Provider
Selling a customer with a checking account a home improvement loan is an example of a. Direct marketing b. Cross-selling c. Cross-channel promotions d. Operational CRM
b. Cross-selling
The stage of the decision-making process where identifying and exploring potential solutions takes place is in the ____________ phase. a. Solution b. Design c. Choice d. Intelligence e. Implementation
b. Design
In a student database, a collection of related attributes such as LastName, FirstName, and Student# creates a(n) _______________. a. Record b. Entity c. File d. Bit e. Database
b. Entity
Which of the following is a critical security function of senior management in an organization? a. Monitoring potential malicious activity continuously b. Establishing the security policy and managing risk c. Safeguarding computer hardware and software d. Developing IS security software e. Managing security programs on a real-time basis
b. Establishing the security policy and managing risk
An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. a. True b. False
b. False
An example of the content provider business model is Barnesandnoble.com, a retailer of printed books. a. True b. False
b. False
Disintermediation provides major benefits to the distributor. a. True b. False
b. False
DoS attacks are used to destroy information and access restricted areas of a company's information system. a. True b. False
b. False
rapidity of change
businesses may not have enough time to respond to global competition
What is the first step you should take in managing data for a firm? a. Normalize the data before importing to a database b. Identify the data needed to run the business c. Audit your data quality d. Cleanse the data before importing it to any database e. Back up the data
b. Identify the data needed to run the business
If two people are trading coins and one has far more knowledge about the hobby than the other, this is called _________________. a. Knowledge management b. Information asymmetry c. Price transparency d. Information density e. E-tailing
b. Information asymmetry
Business processes supported by enterprise systems related to quality control are associated with __________________. a. Financial and Accounting processes b. Manufacturing and production processes c. Web development processes d. Sales and marketing processes e. Human resources processes
b. Manufacturing and production processes
A field identified in a table as holding the unique identifier of the table's records is called the: a. Identifying field b. Primary key c. Key field d. Primary field e. Foreign key
b. Primary key
A supply chain driven by actual customer orders or purchases follows which model? a. Replenishment-driven model b. Pull-based model c. Build-to-stock model d. Push-based model e. Just-In-Time model
b. Pull-based model
Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables? a. Open source DBMS b. Relational DBMS c. Pre-digital DBMS d. Two-tiered DBMS e. Hierarchical DBMS
b. Relational DBMS
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. a. Benchmarking b. Security c. Algorithms d. Controls
b. Security
Which of the following is not an example of the benefits enterprise systems provide to firms? a. Products are shipped to stores more quickly b. The cost of information systems falls, making the firm more productive c. There is more accurate sales information for managers to analyze d. When products are ordered, the manufacturing and logistics teams are notified immediately
b. The cost of information systems falls, making the firm more productive
Which of the following best illustrates the relationship between entities and attributes? a. The entity PRODUCT with the attribute CUSTOMER b. The entity CUSTOMER with the attribute ADDRESS c. The entity ADDRESS with the attribute CUSTOMER d. The entity PRODUCT with the attribute PURCHASE e. The entity CUSTOMER with the attribute PRODUCT
b. The entity CUSTOMER with the attribute ADDRESS
Business intelligence (BI) differs from Business analytics (BA) because BA focuses more on ___________________________. a. Data management b. Tools and techniques for analyzing data c. Data warehousing d. Integrating e. SQL
b. Tools and techniques for analyzing data
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the a. Suppliers internal supply chain b. Upstream portion of the supply chain c. External supply chain d. Downstream portion of the supply chain
b. Upstream portion of the supply chain
Which of the following statements about the Internet security is not true? a. A corporate network without access to the Internet is more secure than one provides access. b. VoIP is more secure than the switched voice network. c. The use of P2P networks can expose a corporate computer to outsiders. d. Instant messaging can provide hackers access to an otherwise secure network.
b. VoIP is more secure than the switched voice network.
In a telecommunications network architecture, a protocol is: a. a system by which packets are sent over different networks. b. a standard set of rules and procedures for control of communications in a network. c. the main computer in a telecommunications network. d. a device that handles the switching of voice and data in a local area network. e. a communications service for microcomputer users.
b. a standard set of rules and procedures for control of communications in a network.
The Internet is based on which three key technologies? a. client/server computing, packet switching, and HTTP b. client/server computing, packet switching, and the development of communications standards for linking networks and computers c. TCP/IP, HTML, and HTTP d. TCP/IP, HTTP, and packet switching
b. client/server computing, packet switching, and the development of communications standards for linking networks and computers
E-commerce refers to the use of any networking technologies to transact business. a. true b. false
b. false
Data mining is a tool for allowing users to a. summarize massive amounts of data into much smaller, traditional reports b. find hidden relationships in data c. obtain online answers to ad-hoc questions in a rapid amount of time d. quickly compare transaction data gathered over many years
b. find hidden relationships in data
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that a. are not secure because the technology to secure them did not exist at the time the files were created. b. have the potential to be accessed by large numbers of people and by groups outside of the organization. c. are frequently available on the Internet d. are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.
b. have the potential to be accessed by large numbers of people and by groups outside of the organization.
Through what channel did e-commerce first evolve? a. online book sales b. online advertising sales c. internet portals d. internet service providers
b. online advertising sales
Digital subscriber lines: a. operate over coaxial lines to deliver Internet access. b. operate over existing telephone lines to carry voice, data, and video. c. are very-high-speed data lines typically leased from long-distance telephone companies. d. have up to twenty-four 64-Kbps channels e. are based on radio signals of various frequencies
b. operate over existing telephone lines to carry voice, data, and video.
Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of a. interest b. practice c. knowledge d. professionals
b. practice
The logical view a. presents an entry screen to the user b. presents data as they would be perceived by end users c. shows how data are organized and structured on the storage media d. allows the creation of supplementary reports
b. presents data as they would be perceived by end users
A secure website that links a large firm to its suppliers and other key business partners is called a(n): a. e-hub b. private industrial network c. exchange d. net marketplace e. marketspace
b. private industrial network
An example of phishing is a. sending bulk e-mail that asks for financial aid under a false pretext. b. setting up a fake medical Web site that asks users for confidential information. c. pretending to be a utility company's employee in order to garner information from that company about their security system. d. setting up bogus Wi-Fi hot spots
b. setting up a fake medical Web site that asks users for confidential information.
A keylogger is a type of a. Trojan horse b. Spyware c. worm d. virus
b. spyware
Which of the following statements best describes the term business intelligence? a. Information systems involved in business decisions making b. the infrastructure for collecting and managing business data c. software developed exclusively for business management d. the tools and techniques used to analyze and understand business data
b. the infrastructure for collecting and managing business data
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.
behavioral targeting
need to efficiently target online ads to users
behavioral targeting ex: google, facebook
Which of the following BEST describes a pivot table? a. A type of relational database b. A tool for performing sensitivity analysis c. A spreadsheet tool that displays two or more dimensions of data in a convenient format d. A graphical display of summarized data e. A chart tool that can rotate columnar data quickly and visually
c. A spreadsheet tool that displays two or more dimensions of data in a convenient format
A characteristic or quality describing an entity is called a(n): a. Field b. Key field c. Attribute d. Tuple e. Table
c. Attribute
You are answering phones for a local utilities provider and are speaking with an extremely angry customer. Because your company manual advises employees to transfer hostile calls to a superior, you do this. What quality dimension of decisions does your action reflect? a. Coherence b. Justice c. Due process d. Accuracy e. Fairness
c. Due process
ERP stands for_________ a. Enterprise resource production b. Entrepreneurship resource planning c. Enterprise Resource Planning d. Efficient Resource Production e. Enterprise Reengineering Planning
c. Enterprise Resource Planning
A schematic of the entire database that describes the relationships in a database is called a(n): a. Field key diagram b. Intersection relationship diagram c. Entity-Relationship diagram d. Data dictionary e. Data definition diagram
c. Entity-Relationship diagram
Which organization helps define the overall structure of the Internet? a. HTTP b. ICANN c. IAB d. None (no one "owns" the Internet) e. W3C
c. IAB
Which of the following best describes the importance of creating an accurate data model for your business's database? a. It is unnecessary, as a well-designed database should not require one. b. It is not essential, as the data model itself is modified by the database continuously. c. It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. d. It is somewhat important, as the type of data model will define what kinds of data will be stored. e. It is essential, as table relationships cannot be created without an accurate data model.
c. It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.
Which of the following is not a characteristic of packet switching? a. Packets travel independently of each other b. Packets are routed through many different paths c. Packet switching requires point-to-point circuits d. packets include data for checking transmission errors e. packet switching makes efficient use of a networks communications capacity
c. Packet switching requires point-to-point circuits
Which of the following is NOT one of the characteristics of enterprise applications that cause challenges in implementation? a. They cause integration difficulties as every vendor uses different data and processes b. They are complex and time consuming to implement c. They support "best practices" for each business process and function d. They require sweeping changes to business processes to work with the software e. They introduce "switching costs," making the firm dependent on the vendor
c. They support "best practices" for each business process and function
The 802.11 set of standards is known as: a. WSN b. WLAN c. Wi-Fi d. Bluetooth e. WiMax
c. Wi-Fi
A company needing a network to connect its offices in Montana, Idaho, and Utah would require a: a. local area network b. regional area network c. wide area network d. metropolitan area network e. tristate area network
c. Wide area network
The "Internet of Things" refers to: a. the rise in mobile gaming b. the trend away from playform-independent web applications to mobile-device specifics apps c. a vision of a pervasive web in which common objects are connected to and controlled over the Internet. d. the increasing focus on shopping as the major user activity on the Internet. e. the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text.
c. a vision of a pervasive web in which common objects are connected to and controlled over the Internet.
Which of the following Internet business models does Amazon.com use? a. market creator b. content provider c. e-tailer d. portal
c. e-tailer
Which of the following businesses uses the content provider Internet business model? a. eBay b. Google c. iTunes d. Facebook
c. iTunes
Compared to traditional markets, digital markets have a. equivalent copying costs b. higher marginal costs per unit c. lower distributed delivery costs d. similar inventory costs
c. lower distributed delivery costs
The data _______________ language would allow you to retrieve information from the database (i.e., using the SELECT, FROM, WHERE commands). a. ask b. definition c. manipulation d. creation e. question
c. manipulation
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________. a. multiplexing b. client server c. packet switching d. software defined network (SDN) e. circuit switching
c. packet switching
The logical view of a database: a. allows the creation of supplementary reports b. presents an entry screen to the user c. presents data as they would be perceived by end users d. shows the relationships between entities and attributes e. shows how data are organized and structured on the storage media
c. presents data as they would be perceived by end users
Which of the following is not one of the main problems with a traditional file environment? a. lack of flexibility in creating ad-hoc reports b. poor security c. program-data independence d. data inconsistency
c. program-data independence
In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a ______________. a. group b. database c. record d. file e. field
c. record
Education being represented by .edu and business represented by .com are examples of: a. predicate logic b. IP addresses c. top level domains d. second level domains e. Internet extensions
c. top level domains
tangible benefits
can be qualified with money value deal with labor and space
intangible benefits
cannot be immediately quantified, but may lead to quantifiable gains in the future (ex: better customer service) influence decision making
If an organization's requirements conflict with the software package chosen and the package cannot be customized, the organization should:
change its procedures.
Improving the tracking of employee training could involve adopting enterprise software focused on _______________________. a. Sales force automation b. Customer service c. Partner relationship management d. Employee relationship management e. Spreadsheets
d. Employee relationship management
A(n) ________ system has capabilities for classifying, organizing, and managing knowledge and making it available throughout the enterprise. a. Neural network b. Genetic algorithm c. Expert system d. Enterprise content management e. Database management system
d. Enterprise content management
What is the name of the organization responsible for assigning public IP addresses? a. ISO b. ISOC c. CERN d. ICANN e. IEEE
d. ICANN
The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? a. Richness b. Customization c. Interactivity d. Information density
d. Information density
To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use a. CAD system b. Fuzzy logic systems c. Virtual reality systems d. Intelligent agents
d. Intelligent agents
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers. a. Textlogger b. Cryptologger c. SS Logger d. Keylogger e. Cryptolocker
d. Keylogger
Organizations have institutional knowledge that needs to be stored, transferred, and applied as part of a _______________ strategy. a. Transfer management b. Intelligent management c. Wisdom management d. Knowledge management e. Learning management
d. Knowledge management
At its most basic level, a(n) _________ simply consists of two computers that are connected together. a. Server b. Application c. RFID d. Network e. Oracle
d. Network
Which of the following enables users to view the same data in different ways using multiple dimensions? a. Big data b. Hadoop c. Data mining d. OLAP e. SQL
d. OLAP
Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience? a. Personalization/customization b. Information density c. Interactivity d. Richness e. Ubiquity
d. Richness
Establishing a risk level of malware threats to an organization is an example of _______________. a. Public Company Accounting Reform and Investor Protection Act b. Data anomies c. Affordable use d. Risk assessment e. Data redundancy
d. Risk assessment
In a table for customers, the information about a single customer would reside in a single: a. Field b. Table c. Column d. Row e. Entity
d. Row
The most popular data manipulation language and method to "question" a database is called ______________. a. Structured Question Language b. Standard Query Process c. Simple Question Language d. Structured Query Language e. Data Definition Language
d. Structured Query Language
Which of the following is an opportunity for threats to gain access to assets? a. Threat b. Target c. Safeguard d. Vulnerability e. Attack
d. Vulnerability
In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? a. com b. books c. none; there is no second-level domain in this name d. azimuth-interactive
d. azimuth-interactive
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect. a. whirlpool b. ripple c. network d. bullwhip e. just-in-time
d. bullwhip
In order to achieve maximum benefit from an enterprise software package, a business a. customizes the software to match all of its business processes b. uses only the processes in the software that match its own processes c. selects only the software that best matches its existing business processes d. changes the way it works to match the softwares business processes
d. changes the way it works to match the softwares business processes
The five classical functions of managers are planning, organizing, deciding, controlling, and a. leading b. managing c. negotiating d. coordinating
d. coordinating
In order, which are the value-adding steps in the knowledge business value chain? a. acquire, disseminate, apply, feedback, management and organizational activities b. data and information acquisition, store, disseminate, feedback, apply c. acquire, store, disseminate, apply, feedback d. data and information acquisition, acquire, store, disseminate, supply
d. data and information acquisition, acquire, store, disseminate, supply
Bandwidth is determined by: a. determining the lowest frequency on a channel b. calculating hertz per second c. calculating hertz per microsecond d. determining the difference between the highest and lowest frequency on a channel e. determining the highest frequency on a channel
d. determining the difference between the highest and lowest frequency on a channel
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. a. twenty b. ten c. four d. eight e. six
d. eight
Which of the following statements best describes the business value of improved decision making? a. improved decision making strengthens customer and supplier intimacy, which reduces costs b. improved decision making creates better products c. improved decision making enables senior executives to more accurately foresee future financial trends d. improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values
d. improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values
Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. a. entity-relationship diagrams b. intersection relations c. foreign keys d. referential integrity rules e. one-to-one ordering
d. referential integrity rules
Examining a map that depicts different colors based on flu outbreaks is an example of a digital ____________. a. SQL b. Operating System c. Dashboard d. Support e. transaction processing systems
dashboard
In its simplest form, ___________ represents streams of raw facts with limited usefulness until organized. a. data b. information c. output d. analyses e. instruction
data
crypto currency
digital currency that uses method of security to prevent counterfeiting (zero govt interference)
tech trends that raise ethical issues
doubling of computer power, rapidly declining data storage costs(org never deletes info), networking advances & the internet (accessing data from remote location),
Which of the following best describes the digital social graph? a. All of the online and offline relationships a person has b. All of a person's closest digital relationships c. A person's direct and indirect relationships d. A map of your 10 closest friends e. A mapping of all online social relationships
e. A mapping of all online social relationships
In a student database, a column called LastName would be an example of a(n) _____________. a. Database b. Record c. Entity d. File e. Attribute
e. Attribute
Businesses retailing products and services directly via the Internet to individual consumers best describes ________. a. B2B Electronic Commerce b. C2C Electronic Commerce c. M-Commerce d. Disintermediation e. B2C Electronic Commerce
e. B2C Electronic Commerce
Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as: a. DSS b. OLAP c. In-memory computing d. Data mining e. Business intelligence
e. Business intelligence
Which of the following is FALSE about Electronic Data Interchange (EDI)? a. EDI is a computer-to-computer exchange between two organizations of standard transactions such as invoices b. About 80% of online B2B commerce is based on EDI c. EDI supports the automatic transmission of transactions from one information system to another through a network d. Standards define the structure and information fields of electronic documents e. EDI is a larger firm using a secure website to link to its suppliers and other key business partners
e. EDI is a larger firm using a secure website to link to its suppliers and other key business partners
______________________ is a general security term that includes computer viruses, worms, and Trojan horses. a. Bugger b. Mindware c. Fair use d. Drive-by-download e. Malware
e. Malware
Which of the following is FALSE regarding public-key encryption? a. The sender encrypts the message with the recipient's public key b. The public key is shared using a directory c. The private key is kept secret d. It uses two keys that are mathematically related e. On receiving the message, the recipient uses the public key to decrypt it
e. On receiving the message, the recipient uses the public key to decrypt it
A ________ is a set of rules that programs on two communicating devices follow. a. packet b. codec c. signal d. URL e. protocol
e. Protocol
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? a. Demand planning b. Just-In-time strategies c. Bullwhip effect d. Continuous replenishment e. Safety stock
e. Safety stock
What are the three general business functions that CRM software serves? a. ERM, PRM, and CRM b. Sales, human resources, and finance and accounting c. Marketing, sales, and human resources d. Marketing, customer service, and human resources e. Sales, customer service, and marketing
e. Sales, customer service, and marketing
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n): a. Marketing channel b. Distribution channel c. Value chain d. Enterprise system e. Supply chain
e. Supply chain
Which of the following is NOT a function of the Internet service provider (ISP)? a. ISPs serve as your gateway to the Internet b. ISPs collect money from their customers and pay access fees c. The ISP provides a legitimate IP address d. ISPs receive communications from the Internet and pass them on to you e. The ISP provides applications services
e. The ISP provides applications services
T1 Lines: a. have up to twenty-four 64-Kbps channels b. operate over coaxial lines to deliver Internet access. c. are used in connection with satellite Internet access. d. operate over existing telephone lines to carry voice, data, and video. e. are high-speed, leased data lines providing guaranteed service levels.
e. are high-speed, leased data lines providing guaranteed service levels.
Exposing an individual to ads that are chosen and based on the online behavior of the individual is referred to as: a. long tail marketing b. clickstream advertising c. online profiling d. prediction marketing e. behavioral targeting
e. behavioral targeting
Which of the following is a key problem in managing knowledge? a. locating knowledge b. storing knowledge c. distributing knowledge d. sharing knowledge e. classifying knowledge
e. classifying knowledge
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising. a. fishing b. click-n-go c. evil twins d. mousing fraud e. click fraud
e. click fraud
Bandwidth is the: a. number of cycles per second that can be sent through a medium. b. number of packets sent per minute over a medium c. total number of bytes that can be sent though a medium per second d. number of frequencies that can be broadcast through a medium e. difference between the highest and lowest frequencies that can be accommodated on a single channel.
e. difference between the highest and lowest frequencies that can be accommodated on a single channel.
A(n) __________ is a popular way to describe relationships (i.e., one-to-one, one-to-many) in a relational database. a. Total Quality Management b. Six Sigma c. Task Model d. Data Flow Diagram e. Entity Relationship diagram
e. entity relationship diagram
A VPN: a. formats web pages with dynamic links to other documents b. is more expensive than a dedicated network c. is an Internet-based service for delivering voice communications d. provides secure, encrypted communications using Telnet. e. is an encrypted private network configured within a public network.
e. is an encrypted private network configured within a public network.
If you were building a network intended to service two buildings that were next to each other, you would construct a: a. Metropolitan area network b. block area network c. micro area network d. wide area network e. local area network
e. local area network
Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively. a. freemium b. subscription c. transaction fee d. mobile payment e. micropayment
e. micropayment
Market creators: a. provide an online meeting place where people with similar interests can communicate b. create revenue by providing digital content over the web c. save users money and time by processing online sales transactions d. sell physical products directly to consumers or individual business e. provide a digital environment where buyers and sellers can establish prices for products
e. provide a digital environment where buyers and sellers can establish prices for products
If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to assign network addresses and move packets of data to your different devices. a. database b. WAN c. swtich d. bandwidth e. router
e. router
Specific security challenges that threaten the communications lines in a client/server environment include: a. hacking, vandalism, and denial of service attacks b. errors, vandalism, and malware c. unauthorized access, errors, and spyware d. theft, copying, alteration of data, and hardware or software failure e. tapping, sniffing, message alteration, and radiation
e. tapping, sniffing, message alteration, and radiation
The child domain of the root is the: a. domain extension b. second-level domain c. base domain d. host name e. top-level domain
e. top-level domain
The six important business objectives of information system investment include all of the following except: a. competitive advantage b. employee morale c. improved decision making d. survival e. new products
employee morale
tech solutions to internet privacy challenges
encrypted solutions, cookies prevention, browser privacy, TOR anonymity network
end user development
end users create simple systems with little assistance to be user friendly difficult to mange the process & standards ex: wix
systems failure
fails to meet requirements, provide org any benefits, inaccurate data
A systems analysis includes a ________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.
feasibility study
patents
grants creator of invention an exclusive monopoly on ideas behind invention for 20 years
outsourcing disadvantages
hidden costs, opening up business to third party
1) corporate strategic planning group
responsible for firms strategic plan - long term
SaaS refers to a. supplying online access over networks to storage devices and storage area network technology b. managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the internet c. hosting and managing access to software applications delivered over the internet to clients on a subscription basis d. none of the above
hosting and managing access to software applications delivered over the internet to clients on a subscription basis
info sys development plan
identifies projects that will deliver the most value. links development to plan
systems analysis
identify problem, establish information requirements
Immanuel Kant's categorical imperative states that:
if an action is not right for everyone to take, it is not right for anyone to take.
if software fails, who is responsible?
if machine that harms - producer & operator if similar to original - difficult to hold creator responsible
The ethical "no free lunch" rule states that:
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
project management
includes all activities (scope, time, cost, quality, risk)
5 moral dimensions of the info age
information rights, property rights, accountability & control, system quality, quality of life
trade secrets to protect
intellectual work or product belonging to business not the public domain
for effective development plan -
inventory & document all applications. clear understanding of long/short term requirements. KPI's
__________________ are designed to capture critical processes, procedures, and experience to ensure this critical content isn't lost when someone leaves the organization. a. Management information systems b. knowledge management systems c. computer information systems d. information systems e. customer relationship management systems
knowledge management systems
Among fields such as accounting, finance, marketing, and others, which has undergone the most change because of technology in the past 5 years? a. finance b. engineering c. accounting d. psychology e. marketing
marketing
4) project team
responsible for individual sys proj
cons to prototyping
may skip over important steps may not accommodate large quantities of data/users may not undergo full testing
capital budgeting modules
measure value of investing in long term capital investments
accountability
mechanisms for identifying responsible parties
Compared to in-house hosting, cloud-based hosting ________. a. minimizes the risk of investing in technology that will soon become obsolete b. results in in-depth visibility of security c. provides better disaster-preparedness capabilities d. provides greater control over the location of data e. requires a significant amount of capital
minimizes the risk of investing in technology that will soon become obsolete
mobile application development
mobile sites/apps, smaller screens, multi-touch gestures, different memory/processing
FIP principles are based on the notion of the:
mutuality of interest between the record holder and the individual.
cons to end user development
not meant to process intense applications poor control/management/testing loss of control over data
FTC fair information practices principles
notice/awareness, choice/consent, access/participation, security, enforcement
When a cookie is created during a website visit, it is stored:
on the hard drive of the visitor's computer.
production & maintenance
operate, evaluate & modify
liability
permits individuals (and firms) to recover damages done to them
conversion
plan conversion, prepare documentation, train users and technical staff
Which of the following is NOT considered to be a typical people problem? a. difficulties of evaluating performance b. work environment c. wrong incentives d. political conflict e. lack of employee training
political conflict
rapid action development (RAD))
process of creating workable systems very quickly
copyright to protect
protecting intellectual property from being copied for the life of the author, plus 70 years
Acceptance testing:
provides the final certification that the system is ready to be used in a production setting.
dependance and vulnerability
public and private orgs more defendant on computer sys
info sys ethics
raise new ethical Q's, create opportunities for intense social change, new kinds of crime, silk road(dark web), bitcoin
A/an ________________________ is a document provided to potential external vendors allowing the vendor to compete with a proposal.
request for proposal (RFP)
changed management
required for successful system building. new sys have behavioral impacts. change breeds resistance
Which process develops a detailed description of the functions that a new information system must perform?
requirements analysis
european directive on data protection
requires companies to inform people when they collect info about them & disclose how it will be stored /used - *informed consent of customer*
fair info practices circa 1973
set of rules governing the collection & use of info, based on relationship of record holder & individual
According to the ________ rule, if an action cannot be taken repeatedly, it is not right to take at all.
slippery-slope/Descartes Rule of Change
agile development
speeds up programming & testing - develop breaks projects up into smaller sub projects (development sprints)
In what stage of systems development are design specifications created?
systems design
Unit testing
tests each program separately.
Which of the following statements about client/server computing is not true? a. the client provides the user interface b. the bulk of processing occurs on the client c. computing on the internet is based on the client/server model d. the client is normally a desktop or laptop computer e. the server provides security, remote access, and user authentication
the bulk of processing occurs on the client
When talking about changes related to information technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital platform, ________________________, and the growth of cloud computing. a. faster networks b. the growing use of big data c. home computing d. the internet e. improved application software
the growing use of big data
_______ gives money its value
the market
Which conversion process introduces the system first to a limited portion of the organization?
the pilot study strategy
Which is TRUE of a multi-tiered network? a. processing is handled by one large central computer b. the work of the entire network is centralized c. the work of the entire network is balanced over several levels of servers d. processing is split between clients and servers e. processing is handled by multiple, geographically remote servers
the work of the entire network is balanced over several levels of servers
mobile device growth
tracking of individual mobil phones/devices
____________ focus on day-to-day operations of a business including managing sales, payroll, and receipts. a. auto processing systems b. operational processing systems c. transaction processing systems d. big data systems e. spreadsheets
transaction processing systems
programming
translate design specifications into code
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. a. service-oriented b. on-demand c. grid d. multi-tiered client/server e. two-tiered client/server
two-tiered client/server
testing
unit & systems & acceptable test
real options pricing modules
use when futures revenues streams of IT projects are uncertain and expensive. test with small pilot projects
joint application design JAD
used to accelerate analysis & design brings end-users and specialists together
portfolio analysis
used to evaluate project options. based on risk & benefits. scoring models
Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of: a. virtualization b. it boosts server utilization rates to 70% or higher c. morphing d. customization e. multiplexing
virtualization
traditional systems lifecycle
waterfall approach, formal specifications & paperwork, lots of time, costly, inflexible