IS Exam
Your new boss lets you know that, if you choose to bring your personal laptop to work, you will be held responsible for any damage or information loss. This is an example of... An open-sourced project A BYOD policy A closed-source project A native application
A BYOD policy
What is true about the diagram below? Department--->Advisor--->Student Deptname. AdvisorName Student# ------------ --------------- ------------ Admin. Phone. Stu. name Phone. CampusAdd. HW1 Email. Emailadd. HW2 Midterm -A department may not have any adviser. -An adviser does not need to belong to any department. -There exists a many-to-many relationship between Adviser and Student. -Phone is a primary key for the Adviser entity.
A department may not have any adviser.
Which of the following statement is true about unsupervised data mining? -Neural networks are a popular unsupervised data mining application. -Data miners develop a model prior to the analysis and apply statistical techniques to data. -Unsupervised data mining requires tools such as regression analysis. -Analysts do not create a model or hypothesis before running the analysis.
Analysts do not create a model or hypothesis before running the analysis
Pokémon Go is a mobile application that uses the camera and GPS system of a user's phone to digitally superimpose imaginary creatures on top of real-world scenery. This is an example of... BYOD Augmented reality Virtual reality Internet of Things
Augmented reality
______ is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.
Big data
Best Buy has an approarch that involves greeting customers when they walk through the front doors, offering assistance when people begin browsing through their product offerings, assisting with payment through payment plans, and offering returns for products that didn't meet customer expectations. What is this approach known as? bargaining power of customers Cost Leader Strategy Public Relations Business Process
Business process
McDonald's chooses a division of labor where their staff is inexperienced and must be trained before they can serve the general public. Thus, they do not have to pay high salaries to their workers. What kind of strategy has McDonald's successfully employed? Product Differentiation Cost Leadership Early Adopter industry-wide
Cost Leadership
Garlicoin- which traded at a price as high as $2.11 per "coin" on January 29, 2018- is a digital only currency that was first developed as a bit of an online joke. It was able to gain real value because of its popularity- despite having no gold backing. What is Garlicoin an example of? Digital reality Internet of Things Cryptocurrency Stock
Cryptocurrency
You are tasked with helping a startup company create a new database. However, you do not know much about database processing. You choose to hire a vendor such as IBM or Microsoft to help through this process. What is this type of program called? Database Model Business Process Development Software Database Defined Querying Database Management System
Database management System
Many business students may question why a database is necessary for a business to track information. "Why not just use an Excel spreadsheet?" Which reason explains why database processing is a crucial feature for any business to utilize? -Databases can keep track of multiple themes. -Not every machine has access to Excel. -Databases have an online component that spreadsheets do not. -Databases are easier for entry-level employees to understand.
Databases can keep track of multiple themes.
Problematic operational data is termed as ______
Dirty Data
You own a company that outsources the manufacture of its product. The larger your order, the lower average cost per unit. What benefit does your company have in common with the cloud? The Internet of Things Economies of Scale Product Differentiation Ethernet
Economies of Scale
Similar to home electricity use, the cloud allows organizations to dynamically increase and decrease programmatically so that they only pay for the resources that they actually use. This is because cloud use is ____. Rigid Inelastic Elastic Static
Elastic
A lawyer with high-profile clients is concerned with the security of their data and wishes to maintain complete control over their data location. Under these circumstances, it would make sense for this legal office to store their data in the cloud. True False
False
You have been assigned the task of creating a data model for the organization you work for. You begin to research the various components of a data model and find that entities are the "verbs" of a model and attributes are the "nouns." True False
False
You have just begun working at a company who is starting to restructure their database. They have asked you to review the data model that was once used to build the database that is in effect today. However, you realize that the data model has two entities that were never added into the real database. Since they are not part of the actual database, it is not necessary to question if they should be incorporated when you meet with the IS department after your review. True False
False
Uber, a ride-sharing app, began offering their services much before other now popular ride-sharing apps such as Lyft and Juno. What strategy did Uber benefit from? Product Differentiation Establish Alliances Early High Switching Costs First Mover Advantage
First Mover advantage
Your startup company has begun making sales across the nation. You want to find out exactly how well the sales of your company has been doing by city. However, your data analyst tells you that they only have a system that can determine total sales by state. What problem is occurring with your startup's data? Granularity Inconsistent Data Dirty data Too Many Data Points
Granularity
A computer's CPU controls the flow of data according to its instructions. CPU's depend on a group of microchips located on the motherboard to process information. What is the CPU an example of? Software Firmware A byte Hardware
Hardware
A criminal investigator is working on a case involving cybercrime. They've been able to trace the origin of the suspicious activity to a local public library. Which of the following made this discovery possible? CDN TCP IP Address PAN
IP Address
After working closely with the operations team of your company, you notice that the value chain seems to be more integrated than ever. What concept from the textbook did your firm successfully utilize? activities linkages margin outputs
Linkages
iPhones come with a pre-downloaded application called "Weather-" in which information can be found on the current and predicted weather anywhere in the world. This application is only available to and compatible with iOS. What type of application is this an example of? Thin-client application Native application One-of-a-kind application Web application
Native application
When you begin entering data into the database you have created for your organization, you realize that information is poorly structured and will cause issues further down the road. Perhaps you should break up the information into more, well-structured tables. Which process should you most likely undergo to alleviate the database of future error? Database Redesign Normalization Database Integrity Database Process Remodel
Normalization
A baking company uses eggs, sugar, flour, chocolate chips, and water to create cookies. This is the ______ activity of their value chain. marketing outbound logistics inbound logistics operations
Operations
After a successful marketing campaign, your company has sold over 125,000 units of its automated flying car. However, you have no idea how you plan to ship all these huge cars. What primary activity is your issue derived from? Customer Service Operations/Manufacturing Outbound Logistics Inbound Logistics
Outbound Logistics
Apple's Airpods are able to utilize wireless network technology to connect to a user's cellular device and play high-quality audio. Which type of network is this an example of? MAN PAN WAN LAN
PAN
BI systems have 5 standard components. These are hardware, software, data, procedures, and _______. Machines People Programs Policies
People
You run Salt Lake's most successful diamond and jewelry store. One morning, you hear the news that overnight, one of the mines that your gems are harvested from has been detonated with C4. According to Porter's 5 Forces model, which threat is your jewelry store facing? Power of Customers Correct! Power of Suppliers Rivalry Threat of New Entrants
Power of suppliers
If you are asking questions such as, "How can we increase sales?" and, "How can we reduce food waste?" You are in the _________ task of Business Intelligence Systems. Informing Project Management Problem Solving Deciding
Problem Solving
________ requires the user to request business intelligence (BI) results.
Pull publishing
At the end of each year, Spotify, a digital musical service, sends a report to each of their listeners explaining how much time they spent listening to music, their favorite artists, songs, and albums. This is an example of _____ publishing. Pull Push
Push
_______ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
RFM
King Kong Construction implements DOMO Business Intelligence software to achieve optimal efficiency and cost in allocating workforce to construction projects. By doing this, King Kong has achieved competitive advantage by ___________________________________. creating a new product or service raising barriers of entry enhancing its products or services reducing cost via process implementations
Reducing cost via process implementations
Which programming language do businesses utilize to code inside a database? Python Java SQL PHP
SQL
University of Utah employees utilize Office 365 and its cloud capabilities to store and collaborate on files from multiple devices. This is an example of...SaaS (Software as a Service) Traditional On-Premises PaaS (Platform as a Service) IaaS (Infrastructure as a Service)
SaaS (Software as a Service)
The University of Utah has legally obtained the right to install Microsoft Office software on all of the computers available to students for use at the Marriot Library. This is an example of a... Open Source Application Closed Source Application PC Virtualization Site License
Site License
Content Delivery Networks are able to decrease load-time, increase reliability, and reduce the workload on the origin server. Which of the following characteristics of CDNs contributes to these benefits? -They hold specialized information that is frequently updated -They utilize Transmission Control Protocol (TCP) -They increase delivery costs -They are geographically distributed
They are geographically distributed
The United States Military requires a high-security, one of a kind application to fit their unique needs. Which of the following is NOT true about a one of a kind application? -They are typically closed source -They are relatively inexpensive to develop -They require maintenance -Only trusted programmers can make changes to the code
They are relatively inexpensive to develop
You are developing a new scheduling application for your personal business. The project has a relatively small budget and you don't believe it will increase appointments- merely the convenience of scheduling them. What type of application best suits your needs? Thick-client application Native application Thin-client application Social application
Thin-client application
After a piece of mail is addressed, the Postal system puts a "registered mail" sticker on the package. This sticker guarantees the delivery of the package. Similarly, after a packet of information is addressed on the Internet to a specific IP, what guarantees the timely and accurate delivery of the information packet? Domain Name IP Address Transmission Control Protocol (TCP) Domain Name System (DNS)
Transmission Control Protocol (TCP)
Before companies actually start on building a database, they often start out with a data model to determine which components are required for the database to be effective. True False
True
Netflix accounts for more than 30 percent of all Internet traffic in North America between 9 PM and 12 AM. Video streaming requires a relatively high amount of bandwidth to process. For this reason, Netflix most likely supports Net Neutrality. True False
True
You are the CFO of a large firm in Salt Lake City. You receive a report each quarter of all the data your Finance department has utilized for the past three months. It is likely that the data was obtained from a data mart. True False
True
Your boss wishes for you to find all customers who live out of state by using a SQL command within the database. Is this something that is possible to achieve through SQL? True False
True
Each year, you become excited when the new Apple iPhone releases. In your eyes, you would pay $2,000 for the latest and greatest Apple technology. What concept does this demonstrate? Margin Cost Value Profit
Value
Your local dentist utilizes a complex application that specifically tracks the status of teeth and the progression of abnormalities, such as cavities. What type of application is being used? Vertical market application Horizontal market application One-of-a-kind application Free application
Vertical market application
You are a small vendor that operates an online store. You decide to use cloud technology to help process orders/online activity and to store data. Which of the following is NOT a benefit of this decision? Small capital requirements Speedy development Visibility of security Known cost structure
Visibility of security
Snapchat is a social media application that is free to download and to use. What is Snapchat's monetized product? Freemium services Filters You are the product News/content
You are the product
Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________. r-educe costs -create a new product -lock in customers -raise barriers to market entry establish alliances
lock in customers
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________. key attribute functionally dependent record primary key foreign key
primary key