K204 UMIS Exam
Nielsen's Law
Network connection speeds for high- end users will increase by 50 percent per year
Bell's Law
"a new computer class forms roughly each decade establishing a new industry."
sales and marketing, operations, manufacturing, customer service, human resources, accounting
Six workgroups include
To be considered a true ERP product must include
Supply chain, Manufacturing, CRM, Human resources, Accounting
IS issues within the executive staff and IT issues within the executive staff
The CIO is the representative for
high levels of rivalry
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.
database
The centerpiece of an ERP application is the:
Moore's Law
The number of transistors per square inch on an integrated chip double
find an appropriate trade off between the risk of loss and the cost of implementing safeguards
The overall goal of IS Security is to:
loss of control
The primary risk of peer-to-peer support in the context of social media and customer service is ________.
dynamic
The process a company goes through to determine whether or not to invest in a new location is a ____________ process.
query
The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keywords (criteria) into a ________ to obtain the information that she wants.
Kryder's Law
The storage density on magnetic disks is increasing at an exponential rate.
hardening
The term for taking in-depth measures to reduce a system's vulnerability to harm caused by the public is...
reporting, data mining, and Big Data.
The three fundamental categories of BI analysis are
iteration and feedback
The two key characteristics of collaboration are:
Metcalfe's Law
The value of a network is equal to the square of the number of users connected to it.
cost
To effectively manage risk, organizations must proactively balance the trade-off between risk and ___.
manage outsourcing relationships, develop operate and maintain applications, plan the use of IS to accomplish organizational goals and strategy
Which is a major function of the information system's department?
training employees on the successful use of the new system
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.
Which of the following is true for the relationship between business processes and information systems?
pay-per-click
Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?
outbound logistics
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
threat of new entrants
Which of these is one of Porter's 5 forces that determine industry structure?
relationship management
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products?
1:N
Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database?
procedure
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the ________ component of an information system.
activities
________ are collections of related tasks that receive inputs and produce outputs.
gap identification
________ is a major task when implementing enterprise systems.
business intelligence
________ is defined as information containing patterns, relationships, and trends.
crowdsourcing
________ is the dynamic social media process of employing users to participate in product design or product redesign.
repository
a collection of something;
Neural network
a computing system modelled after the human brain that is used to predict values and make classifications.
business process management (BPM)
a cyclical process for systematically creating, assessing, and altering business processes
a corpus of knowledge
a large set of related data and texts.
Process effectiveness
a measure of how well a process achieves organizational strategy
Process efficiency
a measure of the ratio of process outputs to inputs
the five component framework
a model of the components of an information system: computer hardware, software, data, procedures, and people.
business process
a network of activities that generate value by transforming inputs into outputs.
value chain
a network of value-creating activities
Information Age
a period in history where the pro- duction, distribution, and control of information is the primary driver of the economy.
Online analytical processing (OLAP)
a second type of reporting application, is more generic than RFM. this provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The defining characteristic of these reports is that they are dynamic. The viewer of the report can change the report's format—hence the term online.
algorithm
a set of procedures used to solve a mathematical problem, that best fits our situation.
Enterprise Social Network (ESN)
a software platform that sues social media to facilitate cooperative work of people within an organization
key
a strying of bits used to encrypt data, called a key bc it unlocks a message
RFM analysis
a technique readily implemented with basic reporting operations, is used to analyze and rank customers according to their purchasing patterns.
Big Data
a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.
worm
a virus that self-propagates using the internet or other computer network, spread faster than viruses
Pay per click revenue model
advertisers display ads to potential customers for free and pay only when the customer clicks
information system (IS)
an assembly of hardware, software, data, procedures, and people that produces information.
ERP system
an information system based on ERP technology, include functions of CRM systems but also incorporate accounting, manufacturing, inventory and human resources applications
Inherent processes
are predesigned procedures for using the software products, saved organizations from the expense, delays and risks of business process reengineering
What five forces determine industry structure?
bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, rivalry among existing firms
virus
computer program that replicates itself
Content data
data and responses to data that are contributed by users
Structured data
data in the form of rows and columns.
trade off
A ________ is a balancing of three critical factors: requirements, cost, and time.
datamart
A ___________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.
data model
A _____________ is a logical representation of a database that describes the data and relationships that will be stored in the database.
push publishing
A low inventory report that is automatically generated when the number of items reaches a certain number is an example of___________.
systems thinking
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
N:M
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
Enterprise Application Integration (EAI)
A suite of software applications that integrates existing systems by providing layers of software that connect applications together
Value of social capital
determined by the number of relationships in a social network, by the strength of those relationships and by the resources controlled by those related
asymmetric encryption
each sit has a public key for encoding messages and a private key for decoding
Workgroup Process
enable workgroups to fulfill the charter, purpose and goals of a particular group or department
packet filtering firewall
examines each part of a message and determines whether to let that part pass
Dynamic process
flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities
Structured processes
formally defined, standardized processes that involve day to day operations: accepting a return, placing an order, purchasing raw materials and so forth
firm infrastructure
general management, finance, accounting, legal, and government affairs.
technology
includes research and development, but it also includes other activities within the firm for developing new techniques, methods, and procedures.
Business intelligence (BI) systems
information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers.
Content management systems (CMS)
information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.
internal firewall
inside the organizational network
Information
knowledge derived from data, whereas data is defined as recorded facts or figures.
experimentation
making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have.
ransomware
malicious software that blocks access to a system or data until money is paid to the attacker
Operations
manages computing infrastructure, including individual computers, in house servers networks etc
Development
manages the process of creating new IS and maintain old ones
Customer life cycle
marketing, customer acquisition, relationship management and loss/churn
Conversion rate
measures the frequency that someone who clicks on an ad makes a purchase, likes a site, or takes some other action desired by the advertiser
Outsourcing relations
negotiate outsourcing agreements w other companies to provide equipment, applications and other services
Data administration
organization wide function that is in charge of developing data policies and enforcing data standards
encryption algorithms
procedures for encrypting data
spyware
programs installed on the user's computer without the user's knowledge or permission
human resources
recruiting, compensation, evaluation, and training of full-time and part-time employees.
Freemium
revenue model offers users a basic service for free and then charges a premium for upgrades or advanced features
symmetric encryption
same key is used to encode and decord
adware
similar to spyware in that it is installed without the user's permission and resides in the background and observes user behavior
perimeter firewall
sits outside the organizational network, first device that Internet traffic encounters
business analyst
someone who is well versed in Porter's models and in the organization's strategies and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies.
Enterprise information systems
support one or more enterprise processes, procedures are formalized and extensively documented; solutions to problems in these involve more than one work group or department
Workgroup information system
supports one or more processes within the workgroup
natural language processing (NLP)
the ability of a computer system to understand spoken human language
Artificial intelligence (AI)
the ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal.
Systems Thinking
the ability to model the components of the system to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
Business process reengineering
the activity of altering existing and designing new business processes to take advantage of new information systems
value
the amount of money that a customer is willing to pay for a resource, product, or service.
Data mining
the application of statistical techniques to find patterns and relationships among data for classification and prediction.
Digital Revolution
the conversion from mechanical and analog devices to digital devices
cost of the business process
the cost of the inputs plus the cost of the activities.
machine learning
the extraction of knowledge from data based on algorithms created from training data.
Human capital
the investment in human knowledge and skills for future profit'
Social capital
the investment in social relations with the expectation of returns in the marketplace
Capital
the investment of resources for future profit
MIS (management information systems)
the management and use of information systems that help organizations achieve their strategies.
business process design
the organizations should not automate or improve existing functional systems. Rather, they should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.
BI analysis
the process of creating business intelligence.
Knowledge management (KM)
the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital.
automation
the process of making systems operate without human intervention,
Data acquisition
the process of obtaining, cleaning, organizing, relating, and cataloging source data
Reporting analysis
the process of sorting, grouping, summing, filtering, and formatting structured data.
Encryption
the process of transforming clear text into coded, unintelligible text for secure storage or communication
information technology (IT)
the products, methods, inventions, and standards used for the purpose of producing information
Social media
the use of information technology to support the sharing of content among networks
margin of the business process
the value of the outputs minus the cost.
exception reports
these are produced when something out of predefined bounds occurs.
Interenterprise Processes
two or more independent organizations; supply chain management is the classic example of inter enterprise IS
ad blocking software
used to filter out advertising content and rarely see internet ads
sql injection attack
users enter a sql statement into a form in which they are supposed to enter a name or other data
Linkages
value intersections across activities
trojan horse
viruses that masquerade as useful programs or files
social capital
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
What Are Necessary Data Characteristics?
Accurate, Timely, Relevant, Just sufficient, Worth its cost
data warehouse
Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.
improve process quality, increase team strength
How does knowledge management (KM) benefit organizations?
Three aspects of RFM analysis include
How recently (R) a customer has ordered, how frequently (F) a customer ordered, how much money (M) the customer has spent.
entity
In a data model, a(n) ________ is something that a user wants to track.
Data
In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side?
Hardware
In the Five-Component Model, which component is the easiest to change?
define system
In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility?
technical safeguard
Malware protection can best be described as which of the following...
decrease
When a company tries to offer the same products at a lower cost they are trying to __________ a customer's buyer power.
location
Organizational structure may vary depending on all of the following except:
social media providers
Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are know as:
operations/manufacturing
Transforming inputs into the final products describes which primary activity?
Hacking
Unauthorized Data Disclosure; breaking into computers, servers or networks to steal data
Safeguard
Unauthorized Data Disclosure; measure that individuals or organizations take to block the threat from obtaining the asset
Pretexting
Unauthorized Data Disclosure; someone deceives by pretending to be someone else
Spoofing
Unauthorized Data Disclosure; someone pretending to be someone else
Wardrives
Unauthorized Data Disclosure; take computers with wireless connections through an area and search for unprotected wireless networks
Sniffing
Unauthorized Data Disclosure; technique for intercepting computer communications
Phising
Unauthorized Data Disclosure; uses pretexting via email
protect information assets, manage outsourcing relationships, develop operate and maintain applications
What are functions of the IS department?
human error, cyber terrorists, natural disasters
What are security threats?
starting, planning, doing, finalizing
What are the four phases of collaboration?
become informed, make decisions, solve problems, manage projects
What are the four primary purposes of collaborative teams?
protect databases and other organizational data
What do data safeguards do
to reduce risk
What is a reason for outsourcing
model processes; create components; implement processes; assess results
What is an accurate representation of the steps in the business process management cycle?
being able to give and receive critical feedback
What is the most important quality to have as a collaborator?
strategic
What type of decision requires the most collaboration?