ISA 235 MC Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

According to the text, what is the difference between a business model and an e-business model?

A business model details how a company creates, delivers, and generates revenue; an e-business model does all of the same except on the Internet

There are many downtime-related threats to an organization's intellectual assets . From the list below, what is not considered a threat according to the text?

All are threats to intellectual assets: terrorism, flood, loss of internet connectivity, loss of power

When building a scalable Infrastructure system that can support new company developments, what are the key factors to consider?

Anticipating expected and unexpected growth, Understanding competitor products and services, Organizing and deploying additional resources

What area of information security focuses on preventing identity theft?

Authentication and authorization

Sami wants to log into the HR system to enter her boss' time for the week. After she successfully logs in, she clicks on the 'Time Entry' button and the system gives her an error preventing her from adding a new time sheet for her boss. What concept describes this protection technique?

Authorization

What is the e-business model that represents 80% of all online business and are typically more complex requiring greater security needs?

B2B

What refers to defects in the code of an information system?

Bugs

What involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment?

Business Process Modeling

During the Analysis phase, what refers to the specific business requests the system must meet to be successful?

Business Requirements

Which of the following is a cost of downtime in addition to lost revenue?

Cost of recovering the system and putting new procedures in place, Damage to customer trust, Decreased financial performance

Which of the following contains a subset of data warehouse information?

Data mart

_________ maintains information about various types of objects, events, people, and places

Database

__________ provides enterprise-wide support and data access for a firm's operations and business processes

Enterprise systems

A foreign key is a field (or group of fields) that uniquely identifies a given entity in a table

False

Absolute information security is achievable

False

An IP address is a simple network protocol that allows the transfer of files between two computers on the Internet

False

Each stage of the value chain accumulates costs and reduces the value of the product

False

Scalability measures how quickly a system performs a process or transaction

False

Supply chains are sets of interlinked business processes.

False

Technology solves business problems

False

The primary purpose of a data warehouse is to execute transactional processes

False

The three primary information security areas are 1) authentication and authorization, 2) policies and protections, and 3) detection and response

False

Virtualization is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem

False

When processes formerly done by people are moved to computers that perform the work through software, the activities are said to be systematized

False

_________ takes advantage of the available 75% of unused processing power of a computer and links thousands of individual computers around the world creating a(n) _______ that can process intensive tasks

Grid computing; virtual supercomputer

Why is estimating future growth a challenge for most companies?

Growth can occur if the company acquires new customers, Growth can occur if the company acquires new products, Growth can occur if the company acquires new markets.

Dividends at Miami can reduce its costs using e-business to streamline its business processes. Which of the following does not represent an example of Dividends reducing its costs through e-business?

Hiring more workers for the salad line

In terms of Big Data, what is variety?

Includes different forms of structured and unstructured data

What allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?

Integration

Which of the following would not be considered part of the complete characteristic of high-quality information?

Is each transaction represented only once in the information?

What is one of the biggest downsides associated with real-time information?

It continually changes

Critical success factors are fundamentals deemed essential for successful business where _________ measure the progress of those elements

Key performance indicators

Viruses, worms, and Trojan horses are what types of threats to security?

Malicious code

Which of the following statements is accurate regarding managers and the use of business intelligence?

Managers can use business intelligence to solve the problem of being data rich and information poor

Grace owns Phan Shin in town. Recently, Grace has noticed several customer complaints about charging errors. Grace decides to investigate the errors in his business payment process and finds that most of the inaccuracies occur during order taking. Grace decides to implement an electronic ordering system to help improve order efficiency and effectiveness. What method did Grace follow to solve his charging issues?

Modeled the As-Is process, fixed the errors, and then created the To-Be process

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

Outsourcing

Which of the following types of employees at Kroger will be likely to need data with the finest granularity?

Oxford Store Manager

Which implementation uses both the legacy system and new system until all users verifies that the new system functions correctly?

Parallel

Why does an organization need a business continuity plan? What does it do?

Plans which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems

What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?

Project Management

Of the four e-business challenges, which of the following is the most crucial challenge to consider before engaging in social media?

Protecting customer information

What describes a driver of the Information Age?

Raw facts that describe the characteristics of an event or object, Skills, experience, and expertise, coupled with information and intelligence, which creates a person's intellectual resources, Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making

Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal?

SCRUM

What kind of decisions are made when you have a few established processes to help evaluate potential solutions, but not enough to lead to a definite recommended decision?

Semi-structured decisions

The most secure procedures combine which of the following authentication and authorization techniques?

Something the user has, such as a smart card or token, Something that is part of the user, such as a fingerprint or voice signature, Something the user knows, such as a user ID and password

Which of the following best describes Web 1.0?

Static text-based information websites

What improves business process efficiencies by simplifying or eliminating unnecessary steps?

Streamlining

What is the systems development life cycle?

The overall process for developing information systems from planning and analysis through implementation and maintenance

A tunnel is a virtual, private pathway over a public or shared network from the virtual private network (VPN) client to the VPN server

True

Bring your own device means employees can use their personal mobile devices and computers to access enterprise data and applications

True

Changing schools, including transferring course credits and losing the personal relationships with fellow students is challenging. Changing schools provides an example of high switching costs

True

Encryption scrambles information into an alternative form that requires a key or password to decrypt

True

Improving the efficiency and effectiveness of its business processes improves a firm's value chain

True

Information technology's primary role in supply chain management is creating the integrations or tight process and information linkages between functions within a firm—such as marketing, sales, finance, manufacturing, and distribution—and between firms.

True

Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs

True

Packets directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets

True

Social media fundamentally changes the balance of power among users, their communities, and organizations

True

The basic connectivity of the Internet is governed by protocols that are defined according to an arrangement called TCP/IP Protocol architecture

True

How is Big Data different from regular data?

Types of data you can store, Volume of data available, How fast the data is created

What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance?

Waterfall methodology

What is an advantage of a data-driven website?

Web browsers are much easier to use than directly accessing the database by using a custom-query tool, It costs less to add a web interface in front of a DBMS than to redesign and rebuild the system to support changes, web interface requires few or no changes to the database model

_________ is a single unit of binary data routed through a network

a packet

What is transmission control protocol/Internet protocol (TCP/IP)?

a standard Internet protocol that provides the technical foundation for the public Internet as well as for large numbers of private networks

Which of these characteristics support an agile MIS infrastructure?

accessibility, availability, maintainability, portability, reliability, scalability, usability

Molly needs to log into the HR system. She types in her User ID and Password on the sign-on page of the HR application. What concept describes this protection technique?

authentication

____________ is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs

automation

We measure network performance in terms of ___________, the maximum amount of data that can pass from one point to another in a unit of time

bandwidth

What is a firewall expected to accomplish?

blocks messages without the correct markings from entering the network, examines each message that wants entrance to the network, detects computers communicating with the Internet without approval

What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?

business intelligence

__________ is a standardized set of activities that accomplishes a specific task

business process

What is a graphic description of a process, showing the sequence of process tasks, that is developed for a specific purpose and from a selected viewpoint?

business process model

What are the five elements that are needed to create a connected world or a network?

categories, providers, access technologies, protocols, and convergence

Which of the following occurs during data cleansing?

clean inaccurate data, clean redundant records, clean partial records

An MIS infrastructure is characterized as _________ and _________

clients; servers

A system is a/are _________ that link to achieve a common purpose. Systems thinking is a way of monitoring __________

collection of parts, the system as a whole

What is enterprise application integration (EAI)?

connects the plans, methods, and tools aimed at integrating separate enterprise system

Which of the following implies that aggregate or summary information is in agreement with detailed information?

consistency

LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions?

cost and geography

_________ sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet

crowdfunding

____________ occur when a system produces incorrect, inconsistent, or duplicate data

data integrity issues

What are two of the most common types of broadband access?

digital subscriber line and cable connection

_________ is a new way of doing things that initially does not meet the needs of existing customers

disruptive technology

______ is the confirmation or validation of an event or object

fact or data

Which of the following are examples of analytical information?

future growth analysis, sales projections, and product statistics

What refers to the level of detail in the model or the decision-making process?

granularity

Alex works for TTI Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. His tasks include cleaning and replacing CPUs and other internal components such as hard drives. What does Alex's role at TTI Specialists focus on fixing?

hardware

The primary difference between a data warehouse and a data mart is a data warehouses ________ where data marts _________

have a more organization-wide focus, have functional focus

One of the primary goals of a database is to eliminate redundant information. What does the elimination of information redundancy do for a database?

improves information quality, makes updating information easier, reduces disk space requirements

What are the three pressures/challenges driving the need for sustainable MIS infrastructures?

increases in electronic waste, energy waste, and carbon emissions

What are the three cloud computing service delivery models?

infrastructure as a service, software as a service, platform as a service

Which of the following is an example of a competitive strategy employed by a firm?

launching a unique product targeted at a section of consumers

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between what is

legal and ethical

A data warehouse is a _____ collection of information, gathered from many different _____ databases that supports business analysis activities and decision-making tasks

logical; operational

___________ are measurements that evaluate results to determine whether a project is meeting its goals

metrics

When evaluating the business value of disintermediation the more ________ that is/are cut from the distribution chain, the lower the product price

middlemen

The Internet is a hierarchical structure linking different levels of service providers. The three levels outlined in the book from the top down include:

national service provider, regional service provider, and internet service provider

_________ is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system

open system

Kaley is responsible for compiling, analyzing, and evaluating daily sales numbers to plan her order for the next day. What is an example of a piece of data Kaley would be using to successfully perform her job?

red roses product number is A4443

What is mobile device management (MDM)?

remotely controls smart phones and tablets, ensuring data security

What is a challenge for cloud computing that could cause employee performance to decrease?

required Internet connectivity

What is encryption?

scrambles information into an alternative form that requires a key or password to decrypt the information

Tina started her own online company, which specializes in selling items for Miami University's business school. She only operates online, so her MIS infrastructure needs to be fast, efficient, and accurate ensuring the best possible experience for her customers. Which of the following is a critical component in Tina's MIS infrastructure?

server, hardware and software, client

A customer name can be referred to in many ways (i.e.Full name, First name + Last Name) in a data warehouse. Ensuring customer name is referenced the same way is an example of _________

standardizing information

Decision making in organizations occur at 3 levels. What level has an external focus on the industry with an emphasis on a multi-year view?

strategic

The way a business can monitor the whole organization bu viewing multiple inputs being processed and transformed to produce outputs while gathering feedback

systems thinking

The factor that significantly contributed to people's needs to use information systems to make decisions is:

the amount of information people must understand to make good decisions is increasing exponentially

How do sustaining technologies lead to future growth from existing investments?

they produce improved products in an established market

Why do relational databases use primary keys and foreign keys?

to create logical relationships

Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry

transactional

___________ is the technique used to execute the business strategy

value chain

The goal of ______________ is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a _______________ or cost advantage

value chain analysis, product differentiation

What allows users to access the WWW?

web browser


Conjuntos de estudio relacionados

Example Test Questions from Class

View Set

UNRS 404 Exam 2 Study Guide from Slides

View Set

Chapter 9 The Era of Thomas Jefferson

View Set

Life and Health Certification Exam

View Set