ISA EXM 1 Quiz Study Questions
The way a business can monitor the whole organization by viewing multiple inputs being processed and transformed to produce outputs while gathering feedback. -systems thinking -competitive advantage -strategy -the 5 forces
-systems thinking
What is clickstream analytics? -The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order. -A two-dimensional representation of data in which values are represented by colors. -Uses clickstream data to determine the efficiency of the site for the users and operates at the server level. -Uses clickstream data to determine the effectiveness of the site as a channel-to-market.
The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order.
How do sustaining technologies lead to future growth from existing investments? -they enable the company to raise prices on existing products. -They enable a company to open new markets and destroy old ones. -They produce improved products in an established market. -They position companies expecting future growth from new investments.
They produce improved products in an established market.
What is a firewall expected to accomplish? -all of these are correct -examines each message that wants entrance to the network -detects computers communicating with the Internet without approval -blocks messages without the correct markings from entering the network
all of these are correct
There are many downtime-related threats to an organization's intellectual assets . From the list below, what is not considered a threat according to the text? -loss of power -loss of internet connectivity -terrorism -flood -all of these are threats to intellectual assets
all of these are threats to intellectual assets
Chloe needs to log into the HR system to update the employee headcount figures. She types in her User ID and Password in the sign-on page of the HR application. What concept below describes this protection technique? -encryption -authorization -intrusion detection -authentication
authentication
____________ is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs. -workflow -streamlining -business process modeling -automation
automation
in the required reading, Human values in the loop : Design principles for ethical AI, Deloitte described 3 core principles when thinking about the ethical use of AI. Which one of these is not a principle? -impact -bias -justice -autonomy
bias
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making? -knowledge -suppliers intelligence -business intelligence -strategy
business intelligence
is a standardized set of activities that accomplishes a specific task. -business strategy -knowledge process -business process -business outcome
business process
What is a graphic description of a process, showing the sequence of process tasks, that is developed for a specific purpose and from a selected viewpoint? -business process -business process engineering -business process model -business process matrix
business process model
___________sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. -explicit knowledge -crowdfunding -crowdsourcing -tacit knowledge
crowdfunding
_________ is a new way of doing things that initially does not meet the needs of existing customers. -disruptive tech -innovator's dilemma -sustaining tech -digital darwinism
disruptive tech
_______________________ scrambles information into an alternative form that requires a key or password to decrypt the information -2-factor authentication -spyware -content filtering -encryption -none of these
encryption
is the confirmation or validation of an event or object. -fact or data -information -information tech -BI
fact or data
What refers to the level of detail in the model or the decision-making process? -visualization -digital dashboard -granularity -none of these are correct
granularity
___________ are measurements that evaluate results to determine whether a project is meeting its goals. -metrics -best practices -ROI -BPMN
metrics
_________ is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. -management system -knowledge system -open system -closed system
open system
Which of the following best describes Web 1.0? -intelligent applications -machine based learning -static text-based information websites -all are characteristics of Web 1.0
static text-based information websites
Decision making in organizations occur at 3 levels. What level has an external focus on the industry with an emphasis on a multi-year view? -managerial -none of the above -strategic -operational
strategic
The factor that significantly contributed to people's needs to use information systems to make decisions is ______. -impossible to answer because it depends on the industry -the amount of information people must understand to make good decisions is increasing exponentially -the amount of information people must understand to make good decisions has remained unchanged. -the amount of information people must understand to make good decisions is decreasing exponentially.
the amount of information people must understand to make good decisions is increasing exponentially
What is porters 5 forces model
the framework for analyzing a company's competitive environment
Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry. -structured -uncertain -supply side -transactional
transactional
is the technique used to execute the business strategy. -SWOT analysis -value chain -the 5 forces model
value chain
What allows users to access the WWW? -HTTP -web browser -Web 3.0 -HTML
web browser