Management Information Systems
Porter's competitive forces model identifies ________ major forces that can endanger or enhance a company's position in a given industry.
5
________ is a communications control.
A firewall
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
Accuracy
What type of attack occurs when hackers gain access to a network for a prolonged period in order to continuously gain confidential information?
Advanced Persistent Threat
Yachting teams use ________ to chase boats in real time.
All of the choices are correct
________ is an example of efficiency.
Automating order entry
________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.
BPI
Chevron improved their business processes using ________.
BPR then BPI then BPM
Aadhaar is a ________ database.
Biometric
You live in a small town with only one large retailer. This means there is low ________.
Buyer Power
Obamacare was created to address the ________ approach.
Common Good
MIT Technology Review refers to 18-22-year-olds as Homo________.
Conexus
________ involves companies providing standard specifications for different consumer groups.
Consumer Segmentation
________ is the result of optimizing operations and supplier processes.
Cost reduction
________ is the result of optimizing the manufacturing and logistics processes.
Cycle and fulfillment time reduction
________ support(s) all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
Dashboards
Which of the following is in the current order starting with the most elementary?
Data, information, knowledge
In addition to improving their pizzas, ________ improved its ordering process with digital technologies such as a voice-ordering chatbot and a robot delivery system.
Dominos
BI systems provide the input data for corporate databases.
False
Business managers and IT managers always have the same objectives.
False
Only computer science majors can become CIOs.
False
The IT infrastructure and IT platform are synonyms.
False
Wendy's was one of the first companies in the fast food industry to utilize self-serve kiosks.
False
What filters the incoming and outgoing traffic from your device to safeguard your network?
Firewall
Winemakers have turned to drones to combat ________.
Global Warming
________ consists of devices such as the processor, monitor, keyboard, and printer.
Hardware
Which of the following is an accuracy issue?
How can we ensure that the information will be processed properly and presented accurately to users?
Which of the following is a property issue?
How should we handle illegally copying copyrighted software?
________ is an example of effectiveness.
Increasing customer satisfaction
________ is organized so that it has meaning and value to the recipient.
Information
________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem.
Knowledge
Equifax hired ________ to help after they suffered two breaches in 2017.
Mandiant
________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers
Mass customization
________ is the largest book publisher and bookseller in the U.S. today.
McGraw-Hill
BI systems provide computer-based support primarily for ________.
Middle Managers
Wineries use drones equipped with sensors to detect ________.
Moisture
Which of the following is NOT an example of excellent alignment?
Organizations allow IT employees to develop overarching goals for the business.
________ are the product or service created by the process.
Outputs
________ are the instructions for combining components to process information and generate the desired output.
Procedures
Which of the following is NOT a benefit of IT?
Quantity of leisure time
The ________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
Rights
________ uses RFID to allow guests to make onboard purchases and access staterooms.
Royal Caribbean Cruises
Some are concerned that the use of Aadhaar's information will further impede ________.
Social Mobility
Compliance with government regulations is a ________ pressure.
Societal
Business executives often know little about IT, and IT executives understand the technology but may not understand the real needs of the business.
True
Data and information are synonyms.
True
Quizlet's community guidelines explicitly prohibit cheating.
True
Minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a ________ approach.
Utilitarian
The ________ approach states that an ethical action is the one that provides the most good or does the least harm.
Utilitarian
IBM developed ________ to answer questions on the quiz show Jeopardy!
Watson
________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service.
Watson
Which of the following is a privacy issue?
What information about individuals should be kept in databases, and how secure is the information there?
You don't lock your computer when you go to the restroom. This is ________ and is an ________ mistake.
a human error; unintentional
Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting ________ for your actions.
accountability
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Correct!
additional management support
The entire basis of a whaling attack is to ________.
appear as authentic as possible with actual logos, phone numbers, and various other details used in communications that come from fake email addresses
A ________ site provides only rudimentary services and facilities.
cold
A ________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.
copyright
Which of the following is NOT an advantage of VPN?
cost
Companies purchase digital dossiers to ________.
create customer intimacy
________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.
customer satisfaction
________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
cyberterrorism
The threat of new competitors will enter your market is high when entry is ________ and low when there are ________ barriers to entry.
easy; significant
A(n) ________ forecasts technology trends and evaluates and experiments with new technologies.
emerging technologies manager
What job role involves hacking to identify a network's vulnerabilities in order to fix them?
ethical hacker
Photo tagging is a type of ________ technology.
facial recognition
As anticipated by Aadhaar's opponents, the Supreme Court found that Aadhaar violates privacy rights.
false
Competitive intelligence and espionage are similar except that competitive intelligence crosses the legal boundary.
false
The traditional function of the MIS department centers on the idea that end users do not have the required technical expertise to address IT issues.
false
Supplier power is high when buyers have ________ choices from whom to buy and low when buyers have ________ choices.
few; many
________ is NOT an example of a data aggregator.
Your student ID is an example of something the user ________.
has
What is a dummy computer that is made to look vulnerable in order to deceive attackers?
honeypot
Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a ________ site.
hot
In the ________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution.
improve
The ________ manages IS services such as help desks, hot lines, training, and consulting.
information center manager
Axon uses ________ to analyze its video footage in order to encourage law enforcement to use video recordings for more investigative analysis.
machine learning systems
A ________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
patent
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ________.
phishing attack
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) ________ control.
physical
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is ________ and is ________.
piracy; illegal
In public-key encryption, the ________ key is used for locking and the ________ key is used for unlocking.
public; private
The video states that cyberattacks will _______________ in the near future.
quadruple
License plate reader companies maintain that only two groups can use their software to find the owner of a car: law enforcement agencies and ________ companies.
repossession
Dave and Darla are worried about their home's security as there have been a lot of robberies in the neighborhood lately. To ease their concern, they purchase insurance for their home and possessions. This is an example of ________. Correct!
risk transference
________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
social engineering
Keystroke loggers and screen scrapers are examples of ________.
spyware
The BYOD phenomenon is a ________ pressure.
technology
A ________ is an intellectual work that is not based on public information.
trade secret
Data aggregators can collect public and non-public information to create digital dossiers.
true
Due to its digital transformation, the New York Times had to reduce employee headcount.
true
Effectiveness focuses on doing the things that matter.
true
Google can analyze offline purchase activity even when consumers deactivate location tracking on their smartphones.
true
It costs less to operating an internet application today than it did 15 years ago.
true
One thing that the popularity of open source and online studying resources has uncovered is that what learning looks like in many areas of study has drastically changed.
true
Passwords are a huge information security problem for all organizations.
true
Privacy advocates are not questioning whether Axon's software will transform the legal and lethal limits of policing but how it will change policing and who will profit the most from these changes.
true
Privacy rights apply to individuals, groups, and institutions.
true
The basic fiber infrastructure without service is called dark fiber.
true
The internet makes customers more powerful.
true
The origination of Aadhaar was from a benevolent place: identifying impoverished Indians so that they could be documented and therefore receive government benefits.
true
The right to privacy is recognized today in all the U.S. states and by the federal government, either by statute or in common law.
true
If humans are careless with laptops, this is an ________ error which could cause theft of equipment or information (an ________ error).
unintentional; intentional
A ________ attack is a targeted attempt to steal sensitive information from a company, such as financial data or personal details about employees.
whaling
Auditing ________ the computer means using a combination of client data, auditor software, and client and auditor hardware.
with