Management Information Systems

¡Supera tus tareas y exámenes ahora con Quizwiz!

Porter's competitive forces model identifies ________ major forces that can endanger or enhance a company's position in a given industry.

5

________ is a communications control.

A firewall

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

Accuracy

What type of attack occurs when hackers gain access to a network for a prolonged period in order to continuously gain confidential information?

Advanced Persistent Threat

Yachting teams use ________ to chase boats in real time.

All of the choices are correct

________ is an example of efficiency.

Automating order entry

________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.

BPI

Chevron improved their business processes using ________.

BPR then BPI then BPM

Aadhaar is a ________ database.

Biometric

You live in a small town with only one large retailer. This means there is low ________.

Buyer Power

Obamacare was created to address the ________ approach.

Common Good

MIT Technology Review refers to 18-22-year-olds as Homo________.

Conexus

________ involves companies providing standard specifications for different consumer groups.

Consumer Segmentation

________ is the result of optimizing operations and supplier processes.

Cost reduction

________ is the result of optimizing the manufacturing and logistics processes.

Cycle and fulfillment time reduction

________ support(s) all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.

Dashboards

Which of the following is in the current order starting with the most elementary?

Data, information, knowledge

In addition to improving their pizzas, ________ improved its ordering process with digital technologies such as a voice-ordering chatbot and a robot delivery system.

Dominos

BI systems provide the input data for corporate databases.

False

Business managers and IT managers always have the same objectives.

False

Only computer science majors can become CIOs.

False

The IT infrastructure and IT platform are synonyms.

False

Wendy's was one of the first companies in the fast food industry to utilize self-serve kiosks.

False

What filters the incoming and outgoing traffic from your device to safeguard your network?

Firewall

Winemakers have turned to drones to combat ________.

Global Warming

________ consists of devices such as the processor, monitor, keyboard, and printer.

Hardware

Which of the following is an accuracy issue?

How can we ensure that the information will be processed properly and presented accurately to users?

Which of the following is a property issue?

How should we handle illegally copying copyrighted software?

________ is an example of effectiveness.

Increasing customer satisfaction

________ is organized so that it has meaning and value to the recipient.

Information

________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem.

Knowledge

Equifax hired ________ to help after they suffered two breaches in 2017.

Mandiant

________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers

Mass customization

________ is the largest book publisher and bookseller in the U.S. today.

McGraw-Hill

BI systems provide computer-based support primarily for ________.

Middle Managers

Wineries use drones equipped with sensors to detect ________.

Moisture

Which of the following is NOT an example of excellent alignment?

Organizations allow IT employees to develop overarching goals for the business.

________ are the product or service created by the process.

Outputs

________ are the instructions for combining components to process information and generate the desired output.

Procedures

Which of the following is NOT a benefit of IT?

Quantity of leisure time

The ________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

Rights

________ uses RFID to allow guests to make onboard purchases and access staterooms.

Royal Caribbean Cruises

Some are concerned that the use of Aadhaar's information will further impede ________.

Social Mobility

Compliance with government regulations is a ________ pressure.

Societal

Business executives often know little about IT, and IT executives understand the technology but may not understand the real needs of the business.

True

Data and information are synonyms.

True

Quizlet's community guidelines explicitly prohibit cheating.

True

Minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a ________ approach.

Utilitarian

The ________ approach states that an ethical action is the one that provides the most good or does the least harm.

Utilitarian

IBM developed ________ to answer questions on the quiz show Jeopardy!

Watson

________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service.

Watson

Which of the following is a privacy issue?

What information about individuals should be kept in databases, and how secure is the information there?

You don't lock your computer when you go to the restroom. This is ________ and is an ________ mistake.

a human error; unintentional

Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting ________ for your actions.

accountability

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Correct!

additional management support

The entire basis of a whaling attack is to ________.

appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses

A ________ site provides only rudimentary services and facilities.

cold

A ________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.

copyright

Which of the following is NOT an advantage of VPN?

cost

Companies purchase digital dossiers to ________.

create customer intimacy

________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.

customer satisfaction

________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.

cyberterrorism

The threat of new competitors will enter your market is high when entry is ________ and low when there are ________ barriers to entry.

easy; significant

A(n) ________ forecasts technology trends and evaluates and experiments with new technologies.

emerging technologies manager

What job role involves hacking to identify a network's vulnerabilities in order to fix them?

ethical hacker

Photo tagging is a type of ________ technology.

facial recognition

As anticipated by Aadhaar's opponents, the Supreme Court found that Aadhaar violates privacy rights.

false

Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary.

false

The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues.

false

Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.

few; many

________ is NOT an example of a data aggregator.

google

Your student ID is an example of something the user ________.

has

What is a dummy computer that is made to look vulnerable in order to deceive attackers?

honeypot

Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a ________ site.

hot

In the ________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution.

improve

The ________ manages IS services such as help desks, hot lines, training, and consulting.

information center manager

Axon uses ________ to analyze its video footage in order to encourage law enforcement to use video recordings for more investigative analysis.

machine learning systems

A ________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

patent

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ________.

phishing attack

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) ________ control.

physical

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is ________ and is ________.

piracy; illegal

In public-key encryption, the ________ key is used for locking and the ________ key is used for unlocking.

public; private

The video states that cyberattacks will _______________ in the near future.

quadruple

License plate reader companies maintain that only two groups can use their software to find the owner of a car: law enforcement agencies and ________ companies.

repossession

Dave and Darla are worried about their home's security as there have been a lot of robberies in the neighborhood lately. To ease their concern, they purchase insurance for their home and possessions. This is an example of ________. Correct!

risk transference

________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

social engineering

Keystroke loggers and screen scrapers are examples of ________.

spyware

The BYOD phenomenon is a ________ pressure.

technology

A ________ is an intellectual work that is not based on public information.

trade secret

Data aggregators can collect public and non-public information to create digital dossiers.

true

Due to its digital transformation, the New York Times had to reduce employee headcount.

true

Effectiveness focuses on doing the things that matter.

true

Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones.

true

It costs less to operating an internet application today than it did 15 years ago.

true

One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.

true

Passwords are a huge information security problem for all organizations.

true

Privacy advocates are not questioning whether Axon's software will transform the legal and lethal limits of policing but how it will change policing and who will profit the most from these changes.

true

Privacy rights apply to individuals, groups, and institutions.

true

The basic fiber infrastructure without service is called dark fiber.

true

The internet makes customers more powerful.

true

The origination of Aadhaar was from a benevolent place: identifying impoverished Indians so that they could be documented and therefore receive government benefits.

true

The right to privacy is recognized today in all the U.S. states and by the federal government, either by statute or in common law.

true

If humans are careless with laptops, this is an ________ error which could cause theft of equipment or information (an ________ error).

unintentional; intentional

A ________ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees.

whaling

Auditing ________ the computer means using a combination of client data, auditor software, and client and auditor hardware.

with


Conjuntos de estudio relacionados

Module 9 Review Quiz: Linux installation and configuration

View Set

Acupuncture Board Exams - Points and Meridians

View Set

Nutrition Exam 3 Practice Tests Chapters 10-14

View Set

Microbiology Final: Part 1 study

View Set

Sociology - Chapters 12, 13, 14 & 16

View Set

prep u w/ explan. Mgmt of Patients With Upper Resp Tract Disorders 105 quest.

View Set