Management Information Systems 11-12
What is an information system?
System that collects, processes, stores, analyzes, and disseminates information for a specific purpose
a wireless access point
When you are looking for a 'hotspot', you are searching for _____.
What are the most commonly occurring types of employee fraud? (2)
1. Fraudulent use of purchasing or procurement cards (P-cards). 2. Fraudulent claims for travel and entertainment expenses (T&E).
What are portals?
A web-based, personalized gateway to information and knowledge that provides relevant information from different IT systems and the Internet using advanced search and indexing techniques
What kind of access does a cable modem give?
Access over your cable TV coaxial cable; can have degraded performance if many of your neighbors are accessing the Internet at once
SWAPI: JSON Schema
All resources support JSON Schema
Which systems are typically used to fulfill and support customer orders?
Back office systems
If your company sold widgets to the automobile industry and these sales were conducted through the Internet, what type of e-commerce model would you be using?
B2B
Similar to what you find in a car, a business _____ provides rapid access to information, in an easy-to-interpret and concise manner, which helps organizations run more effectively and efficiently.
DASHBOARD
all of these answers
Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______.
What is technological innovation and obsolescence?
Few and improved technologies rapidly create or support substitutes for products, alternative service options, and superb quality. As a result today's state-of-the-art products may be obsolete tomorrow (rapid development of both New and Substitute Products and Services)
all of these answers
Flexibility is a major component of ergonomic design, mainly because: _______.
_____ issues deal with what is generally considered right or wrong.
MORAL
What is customer focus?
Organizational attempts to provide superb customer service can make the difference between attracting and retaining customers versus losing them to competitors. Numerous IT tools and business processes have been designed to keep customers happy
What is the function of executive dashboard?
Present structured, summarized information about aspects of business important to executives
Which of the following focuses on the development, use, and reuse of small self-contained blocks of code to meet all the application software needs of an organization?
Service-oriented architecture
Power Pivot and Power Query are components of Microsoft's Power BI tool .-
T
What is business continuity?
The chain of events linking planning to protection and to recovery
What is a business Environment?
The combination of social, legal, economic, physical, and political factors in which businesses conduct their operations; significant changes in any of these factors are likely to create Business pressure
What is Rivalry Among Existing Firms?
The threat from rivalry is high when there is intense competition among many firms in an industry; the threat is low when the competition is among fewer firms and is not as intense
What is the Threat of Entry of New Competitors?
The threat that new competitors will enter your market is high when entry is easy and low when there are significant barriers to entry
What is the objective of business intelligence (BI)?
To provide timely and quality information to decision makers
What is a workgroup?
Two or more individuals who act together to perform some task
What is wireless service?
Very convenient, and WiMAX will not increase the use of broadband wireless
What data manipulation tool allows you to see the contents of a database file?
View
data as a service
With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.
Which of the following is NOT an organizational complement?
familiar processes
The syllabus is a ______________________________.
living document and subject to change
Where does satellite service provide access?
Anywhere that cable and DSL are not available
What are some deliberate threats to information systems?
Espionage or Trespass Information Extortion Sabotage or Vandalism Theft of Equipment or Information Identity Theft Compromises to Intellectual Property Software Attacks Alien Software Supervisory Control and Data Acquisition Attacks (SCADA) Cyberterrorism and Cyberwarfare
Data cubes can be created on an ad hoc basis. There is no need to create them ahead of time. -
FALSE
At lower organizational levels, information exhibits _____ granularity.
Fine
What is effectiveness?
Focuses on doing things that matter; that is, creating outputs of value to the process customer-- for example, high-quality products
Why is managing information resources a difficult, complex task?
It adds strategic value; thus making it relied on too much It is expensive to acquire, operate, and maintain The evolution of MIS
With _____, a software engineer drags and drops graphical objects such as buttons and menus onto an application form.
visual programming
A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.
SERVER
If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.
TRUE
When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack.
TRUE
Dashboards: Many use software like ___________.
Tableau
Which of the following statements is true of network-management software?
With network-management software, a manager on a networked personal computer can scan for viruses.
How to create an API: step 3 Categorize resources according to....?
whether clients can just receive a representation of the resource (using an HTTP GET), or whether clients can modify (add to) the resource using HTTP POST.
Description of Personnel Controls: these can involve the use of....?
user authentication controls and passwords that allow only certain people access to certain information and particular data.
virtualization software
Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.
RESTful API: "clients" are ....?
Whatever interfaces use access to data. Ex: -web application -mobile app -doorbell -smartwatch, etc.
When does espionage or trespassing occur?
When an unauthorized individual attempts to gain illegal access to organizational information
The area covered by one or more interconnected wireless access points is commonly called a(n) _____.
hot spot
Daily scrum meetings help avoid....?
other unnecessary meetings
Often, unstructured data is ultimately related back to....?
the company's structured data records.
Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.
FALSE
RAM stands for random access memory; a form of memory that holds its contents even if the current is turned off or disrupted
FALSE
Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted.
FALSE
_______ removes the need for organizations to manage the underlying infrastructure (usually hardware and operating systems) and allow you to focus on the deployment and management of your applications.
IaaS
The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession. -
FALSE
Which of the following terms represent an organized and structured collection of information?
Database
Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.
virtualization software
User documentation is defined as:
written descriptions developed for people who use a program; in easy-to-understand language, it shows how the program can and should be used to meet the needs of its various users.
_____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads.
z/OS
data-flow line
In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.
mission and vision
What topics are considered so important that they are placed on top of the strategic planning pyramid?
potential entrants
Which of the five forces in Michael Porter's model refers to entry barriers and the relative threat of new competitors?
red hat
Which of the following is NOT a popular vendor of firewall software?
According to the diffusion innovation theory, _____ are the risk takers, always the first to try new products and ideas.
innovators
What term is used to describe the distribution of information regardless of title or department?
Information sharing
________________________________ allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365), Salesforce.com, ERP.
Software as a Service
What is spyware?
Software that collects personal information about users without their consent
perceptive
Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system.
_____ are the most powerful computers with the fastest processing speed and highest performance.
Supercomputers
The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.
TRUE
What is system testing?
Testing the complete, integrated system to validate that the information system meets all specified requirements.
PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online.
True
Responsive design helps to avoid an inconsistent experience for users on different devices. (T/F)?
True
The Cloud: Quickly scale up and down with demand, and pay only for what you use. (T/F)?
True
Economic feasibility
determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive
Elaborate on "Design User Interface"
how the user experiences the information system determines whether the system will be accepted and used.
tacit
_____ knowledge is hard to measure and document and typically is not objective or formalized.
A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities.
thin client
Whenever there is a computer security incident, it is not recommended that the organization reveal all they know in public forums.
TRUE
An organization uses buy-side e-commerce to purchase goods and services from its suppliers.
True
Having access to credible information is an example of the _____ quality attribute of information.
Validity
Which of the following is an electronic marketplace that connects buyers and sellers in a given industry?
Vertical e-marketplace
_______ tools can present data in an easy-to-understand fashion via formatted data, graphs, and charts.
- reporting & query
If consumer data is stolen from a business's computers, ________.
- the customers can file a class-action law suit agains the business
RESTful API: on one side is _______________. On the other side is _______________. In the middle sits the _________________.
1. the clients 2. the data store 3. RESTful API
What are the 3 questions everyone answers in daily scrum meetings?
1. what did you do yesterday? 2. what will you do today? 3. is anything in your way?
There are _____ major exams in this course.
3
Which of the following is an example that would need to use an ETL process: f. Moving data from the old system into a newly developed and deployed system a. Entering a Sale Order in the transaction processing system b. Entering a Car Rental in an ERP system c. Merging sales data with advertising data and deploying the merged data into a business intelligence tool d. 2 of the above are correct
D
What is a corporate backbone network?
High-speed central networks to which smaller networks (such as LANs and smaller WANs) connect
some time later than
In batch processing systems, data processing is done _______ data capture.
What are two categories of Organization Activities in the Value chain?
Primary activities Support Activities
Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted.
False
extensible markup language (xml)
_____ is a markup language designed to transport and store data on the Web.
The Internet of Things connects wireless identifiable objects ________.
all of these
The number of mobile Websites worldwide is expected to grow rapidly because of ______________.
the development of new and useful applications
Dashboards.....
5 points..... Book: Chapter 9 (395-397)
What is a firewall?
A system that prevent s a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network
Prepare Draft of Investigation Report
A systems investigation report that summarizes the results of the systems investigation and recommends a course of action
C2C marketplaces that are supported by advertising are said to be _____.
Ad-supported
What is an example of (API): You want your Super Bowl coverage to include a live stream of every Instagram photo taken near the stadium.
Automating a news app that needs live data from other sources.
An RPO is: a. The same for all systems at a business as all data is backed-up b. Different depending on each system at a business c. Equal to the RTO for a business d. Always less than the RTO for a business e. None of the above are correct
B
What is DSL?
Broadband access via telephone companies
How is data analysis effective in identifying employee fraud?
By analyzing millions of transactions and looking for a variety of indicators of fraud, data analysis can make up for control weaknesses and rapidly identify where fraud has occurred.
API: How can clients modify (add to) the resource?
By using HTTP POST.
Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites?
Consumer-to-consumer (C2C) e-commerce
What is information?
Data that has a particular meaning within a specific context
What is information?
Data that has been organized so it has meaning and value to the recipient
Which application is considered the "heart and soul" of any organization?
Databases
What is insourcing?
Delegating operations or jobs within a business to another company that specializes in those operations; for example, Dell hires FedEx to "take over" Dell's logistics process
Which of the following is an artificial intelligence system that applies reasoning capabilities to reach a conclusion?
Expert system
What 3 things form the IT Infrastructure?
IT Components IT Personnel IT Services
What is external information?
Information about the environment
an embedded system
New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____.
Which of the following is a vendor of popular anti-virus software?
SYMANTEC
What are packets?
Small, fixed bundles of data
What is informing?
The ability to search for information, best illustrated by search engines
projecting
The action of including only some columns for output while retrieving data is known as ____.
What is e-government?
Use of digital technology to transform government operations
Which of the following results from a well-designed supply chain management system?
Well-designed SCM systems can enhance any of these stated activities
What is asynchronous collaboration?
When team members cannot meet at the same time
supercomputers
_____ are the most powerful computers with the fastest processing speed and highest performance.
System construction converts the system design into....?
an operational system.
System investigation is....?
the initial phase in the development of a new or modified business information system whose purpose is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address.
Description of database controls: These controls include the use of...?
user authentication controls and passwords -without which a user is denied access to certain data and information.
When compared to traditional commerce ________.
e-commerce transactions can save money
rule
A _____ is a conditional statement that links conditions to actions or outcomes.
Chip-and-PIN cards employ a computer chip that communicates with a card reader using infrared frequencies so that the cards do not need to be swiped at a terminal.
FALSE
What is procurement?
Includes all of the tasks involved in acquiring needed materials externally from a vendor
There are methods to designing and developing business applications. Which of the following is not one of these methods?
Networking
What is the most popular model for creating databases?
Relational database
What is a worm?
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program)
What are the four authentication mechanisms?
Something the user is Something the user has Something the user does Something the user knows
During drill-down, you go from high-level summary data to detailed levels of data.
TRUE
The "www.nytimes.com" in "http://www.nytimes.com/pages/cartoons" is what?
The Domain name also known as the home page
the arpanet
The ancestor of the Internet was _____.
What is risk?
The probability that a threat will impact an information resource
What is encryption?
The process of converting and original message into a form that cannot be read by anyone except the intended receiver
Legal feasibility
The process of determining whether laws or regulations may prevent or limit a system development project.
How does packet switching work?
-Each packet contains information to help it reach its destination (such as sender's IP address, receiver's IP address, number of packets in message and the number of the particular packet within the message) -Each packet travels independently thru different paths in network -Once packets reach their destination, they reassemble into the original message
How is IT used in Healthcare today?
-Make better/faster diagnoses -Monitor critically ill patients more accurately -Streamline the process of researching & developing new drugs -To enhance the work or radiologists -Allow surgeons to use virtual reality to plan complex surgeries &use robots to remotely perform surgery
What type of services might you go to?
-SLQ queries for your structured data. -Maybe using APIs to automate data retrieval from other sources like social media -Tableau can connect to your TPS database and get real-time data, and it can blend data from sources such as Excel, Google Analytics and APIs.
What is a "sticky" Web site?
A Web site that attracts consumers and encourages them to return
What type of analytics mines audio, video, or graphical content to identify underlying meaning?
Content
Maintenance, repair, and operations (MRO) materials refer to which type of material?
Indirect materials
What is Carelessness with Laptops entail?
Losing or misplacing laptops, leaving them in taxis, and so on
Which of the following is not a key resource of MIS?
Methods
What is spamware?
Pestware that uses your computer as a launch pad for spammers
What is fulfillment?
Process concerned with processing customer orders
Which type of database is used when you want to create ties in the information that show how the files relate to each other?
Relational
___________ is a solid KPI for every business.
Revenue
Which of these organizations offers guidelines on developing security policies?
SANS
black hat hacker
Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
How does IT provide opportunities for people with disabilities?
Speech-recognition for employees unable to type due to physical impairment; Audible screen tips for employees who are visually impaired
What are some examples of something the user does?
Voice and Signature Recognition
visual programming
With _____, a software engineer drags and drops graphical objects such as buttons and menus onto an application form.
batch processing systems
With _____, business transactions are accumulated over a period of time for processing in a single unit.
Description of database controls: These deal with ensuring....?
an efficient and effective database system.
Privacy refers to....?
an individuals right to control both access to and use of his or her information.
Mission-critical processes play a critical role in...?
an organizations continued operations and goal attainment
A database is a collection of integrated and related _____.
files
Description of Input Controls: They maintain...?
input integrity and security
Backlog grooming: Product Owner gets an idea by...?
working with customers and adds one item into Product Backlog
Which type of e-commerce occurs when a business sells products or services to customers who are primarily other businesses?
B2B
the web
_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.
knowledge users
_____ do not need any previous training in computers or expert systems.
According to the diffusion innovation theory, _____ are the risk takers, always the first to try new products and ideas.
innovators
Which of the following is NOT an example of a common use of a point-of-sale (POS) device?
A teller in a bank uses a POS to withdraw money for a customer.
adjourning
A useful model to describe how teams develop is the forming-storming-norming-performing-___________ model.
formation of blood clots
A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.
it employs a database of key operational and planning data that can be shared by all
A key feature of an enterprise system is that _________.
What does cyberterrorism and cyberwarfare refer to?
Malicious acts in which attackers use a target's computer system, particularly via the Internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda
What is the set of marketing tools that your organization will use to pursue its marketing objectives of reaching and attracting customers?
Marketing mix
What is a corporate portal?
A portal that offers a personalized, single point access through a Web browser to critical business information located inside and outside an organizations; also known as enterprise portals, information portals, and enterprise information portals
What is a copyright?
A statutory grant that provides the creators or owners of intellectual property with ownership of the property, also for a designated period
JSON is a (mostly) language-independent way of specifying objects as name-value pairs. A "value" can be:
A string, a number, true, false, null, an object, or an array.
What is the World Wide Web?
A system of universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture
What is a computer network?
A system that connects computers and other devices via communications media so that data and information can be transmitted among them
Callie entering a customer's order into a restaurant's ordering system
All of the following are examples of someone using personal productivity software EXCEPT _________.
What is information security?
All of the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction
What is a Computer-Based Information Systems (CBIS)?
An information system that uses computer technology to perform some or all of its intended tasks
What is an enterprise resource planning (ERP) system?
An integrated software system for every functional area within an organization
What is a trade secret?
An intellectual work, such as a business plan, that is a company secret and is not based on public information
What is a patent?
An official document that grants the holder exclusive rights on an invention or a process for a specified period of time
When you purchase your books for this course from an online source such as Amazon.com, you are conducting which type of e-commerce?
B2C
Which type of e-commerce occurs when a business sells products and services to customers who are primarily individuals?
B2C
Who must formally approve of any changes?
Both the project sponsor and the steering team.
What is a popular methodology for Business Process Improvement?
Six Sigma
Which term describes the banding together of businesses to purchase materials and services with the goal of lowering purchase prices through discounts?
Demand aggregation
What are some examples of software attacks that are remote attacks needing no user action?
Denial of Service Attack Distributed Denial of Service Attack
A podcast is a video broadcast over the Internet.
FALSE
Bartering is a technique used by advertisers to recapture shoppers who abandoned a Website without making a purchase.
False
What is Fiber-to-the-Home (FTTH)?
Expensive and usually placed only in new housing developments
A(n) _____ system, also known as a knowledge-based system, is an excellent tool for diagnosing problems and providing answers to these problems.
Expert
Every primary key can also be a(n) _____ key.
Foreign
What are some examples of something the user has?
ID cards, smart ID cards, and tokens
sharing and selling
In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT ________.
What is scrum?
Scrum is a framework for developing and sustaining complex products
What is a virus?
Segment of a computer code that performs malicious actions by attaching to another computer program
version
A new _____ is a major program change, typically encompassing many new features.
Sprints: constant duration leads to...?
better rhythm.
Describe Sprint Retrospective
1. Periodically take a look at what is and is not working 2. Typically 15-30 minutes 3. Done after every sprint 4. Whole team participates -ScrumMaster -Product owner -Team -Possibly customers and others
Designing the site with a mobile-first approach requires:
1. Prioritizing what content goes on the site. 2. Taking your existing website, using software; converting it to a mobile site while keeping the existing content. 3. A stripped down site with little functionality provided. 4. A careful analysis of the functionality needed by users.
Organizations can use several different approaches when developing their software. Name 2 of them.
1. The waterfall 2. Agile software development
How to web scrape
1. You could go website to website and copy and paste data into Excel or Word; clean it; then use it. 2. You could automate the extraction with software; clean it; then use it.
What are 4 accidental man-made disasters that can disrupt business operations?
1. auto accident knocks down power lines to a data center 2. backhoe digs up a telecommunications line 3. operator error 4. fire
What are advantages of the waterfall system?
1. formal review at the end of each phase allows maximum management control. 2. This approach requires creation of considerable system documentation so that system requirements can be traced back to stated business needs. 3. Approach produces many intermediate products that can be reviewed to measure progress toward developing the system.
server
A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.
community of practice (COP)
A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.
flat file
A _____ is a simple database program whose records have no relationship to one another.
What is communication?
A major category of network applications related to communication technologies delivered online (e.g. including email, call centers, chat rooms, and voice)
What is Business Process Management (BPM)?
A management system used to support continuous BPI initiatives for core business processes over time
What is crowdsourcing?
A process in which an organization outsources a task to an unidentified, generally larger group of people in the form of an open call
What are support activities?
Activities contribute to the firm's competitive advantage by supporting the primary activities, but do not add value directly to the firm's products or services
What are Communication controls?
Also called network controls; controls that secure the movement of data across networks and consist of firewalls, anti-malware systems, whitelisting and blacklisting, encryption, virtual private networks (VPNs), secure socket layer (SSL), and employee monitoring systems
multitasking
An operating system with _____ capabilities allows a user to run more than one program concurrently.
What does "click-and-mortar" refer to?
An organization that has a presence in the physical world and the virtual world
Which of the following does not is NOT an application software?
Android
What is the Cloud?
Cloud computing is the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the internet with pay-as-you-go pricing.
Which of the following is not a major tool for self-sourcing?
Collaboration software
What are the four types of portals?
Commercial Affinity Corporate Industrywide
How do you apply the "strive for consistency" principle?
Consistent sequences should be required in similar situation; identical terminology should be used in prompts, menus, and help screens; and consistent commands should be employed throughout.
What are the 5 types of strategies for competitive advantage?
Cost Leadership Differentiation Innovation Operational Effectiveness Customer-Orientation
Paid Search
Cost-per-click or CPC can be seen in the Acquisition reports and typically refers to people clicking through to your website from paid ads. This includes traffic from linked Google AdWords accounts and campaign tagged URLs where the medium has been defined as 'cpc' or 'paid'.
What is the name of the non-paid, non-employee business model of collaboration used by Goldcorp a Toronto-based gold mining company in Canada?
Crowdsourcing
Which of the following systems uses information about customers to gain insights into their needs, wants, and behaviors in order to serve them better?
Customer relationship management (CRM)
In contemporary business, success depends on minimizing the _____ in an attempt to reduce the costs of producing and selling products or services.
Distribution chain
_____ involves reducing the number of employees to cut costs.
Downsizing
_____ is a markup language designed to transport and store data on the Web.
Extensible Markup Language (XML)
tacit
Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.
Downloading games from unknown websites can be risky. The software may be a Trojan horse.
TRUE
personal cell phone use and internet surfing
In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?
What are two common types of spyware?
Keystroke loggers Screen Scrapers
English
Mastery over which subject is NOT required for being a data scientist?
Which type of marketing is used to discover small pockets of people within a larger group?
Micro targeting
What is Green IT composed of?
Organizational efforts to "go green" in three areas: -Facilities design and management -Carbon management and Energy management -International and US state environmental laws
__________ as a Service (PaaS) includes IaaS (the infrastructure)
Platform
What are the three risk mitigation strategies?
Risk Acceptance Risk Limitation Risk Transference
What are the three processes of risk management?
Risk analysis Risk mitigation Controls evaluation
A traditional view of information systems holds that organizations use them to control and monitor processes and ensure effectiveness and efficiency.
TRUE
accredited domain name registrars
The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.
The "/pages/cartoons" in "http://www.nytimes.com/pages/cartoons" is what?
The Path/ File/ Subdirectory of information after the forward flash
explanation facility
The _____ allows an expert system user to understand how the system arrived at its results.
usa patriot act of 2001
The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.
cutover
The process of switching from an old information system to a replacement system is called _____.
The "http://" of "http://www.nytimes.com/pages/cartoons" is what?
The protocol to interconnect files on the Internet
What are three examples of things that can be used to compromise intellectual property?
Trade Secret Patent Copyright
_______________ ________ ________ does not necessarily prove that fraud has occurred, but it can be a very effective way of highlighting a situation that just does not seem to make sense and warrants further investigation.
Transactional data analysis
Suppose a small manufacturing business wishes to have a system to manage all its vital business operations, they should go for a(n) _______.
enterprise resource planning (ERP) system
A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective.
enterprise resource planning system
Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____.
Web browsers
web browsers
Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____.
z/OS
_____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads.
When is dial-up used?
When broadband is not available
agile
Your new software project manager is OK with requirements that are not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _______ approach to software development.
When analyzing transactions for indicators of fraud, you should identify...?
expenses relating to airfares and hotels in non-standard locations. (ex. Exotic resorts)
For the ____ operation, it is required that the the two tables have a common attribute.
join
80-20 rule
The Pareto principle is also known as the _____.
In most large organizations, the IS department is divided into the following functions __________.
operations, development, and support
Description of Output controls: These ensure that...?
output is handled correctly.
Description of processing controls: Deal with all aspects of....?
processing and storage
Security consists of the ________________________________ to secure protected information. It requires that administrative, technical, and physical safeguards are developed and used.
protections or safeguards put in place
The API's job is to....?
receive requests, process data, and send responses.
Confidentiality relates to the _____________________________________ of their information during storage, transfer, and use, in order to prevent unauthorized disclosure of that information to third parties.
right of an individual to the protection
When coding software components, what is required?
technical and user documentation
Providing value to a _____ is the primary goal of any organization.
stakeholder
The ___________ cannot be used as a reference for discussion forum assignments.
textbook for this course
You manage ____________________________________, and the cloud service provider typically manages everything else.
the applications and services you develop
Schedule feasibility
the process of determining whether a project can be completed within a desired time frame
The system analysis report is presented to.....?
the project steering team with a recommendation to stop, revise, or go forward with the systems development project.
Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees
TRUE
Data ______ tools can take raw data and immediately provide a rich visual image.
VISUALIZATION
When you are looking for a 'hotspot', you are searching for _____.
a wireless access point
Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________.
can use a hosting service to set up the site
Which of the following is NOT a task typically associated with the systems analyst role?
collaborating with others to build a software product from scratch
Scrum Framework: Artifacts
-product backlog -sprint backlog -burndown charts
Scrum Framework - Roles
-product owner -ScrumMaster -team
Businesses rely on enterprise systems to perform daily activities in areas such as:
-product supply and distribution -sales and marketing -human resources -manufacturing -accounting and taxes
Description of processing controls: What are examples of processing and storage controls?
-the use of passwords and user authentication controls. -backup copies of data -storage rooms that have tight security systems
In most cases, people referring to Software as a Service are referring to _______-_______ applications.
end-user
You might be an information systems worker if you _________.
enjoy learning new techniques and enjoy working with people
While performing the feasibility analysis, you should reassess.....?
the technical, economic, legal, operational, and schedule feasibility based on the results of system design findings.
One method an IS professional might use to find a new job would be ____________.
all of these
The members of an organization who are most likely to contribute to organizational learning are _________.
all of these
All of the following are examples of activities performed by an operating system EXCEPT ________.
allowing a user to do word processing
Over the next few years, it is expected that many organizations will focus on projects that _________.
all of these answers
When an organization wants to develop a new information system to meet its needs, it can _________.
all of these answers
Description of Personnel Controls: These ensure that....?
authorized personnel have access to certain systems to help prevent computer-related mistakes and crime.
data definition language
A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
Authentication
Application or developer keys to be able to talk with APIs.
Cybercriminals are hackers who try to steal business information or government data related to a nation's infrastructure, all for personal gain.
FALSE
In linear regression, you are to find a line that best fits the data. Sometimes the line may be curved.
FALSE
It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.
FALSE
Systems development projects should always be outsourced in order to allow an organization to focus on what it does best.
FALSE
Those convicted of cyberterrorism are subject to a prison term of 6 months to 1 year.
FALSE
What are some examples of New (Consultant) Functions of the MIS Department?
Initiating and designing specific strategic information systems Decide what strategic systems you need, and provide input into developing these systems
What are procedures?
Instructions for combining the four components to process information and generate the desired output
What is the function of a supply chain management system?
Manage flow of products, services, and information among organizations
_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards.
Near field communication (NFC)
What type of system is often referred to as a predictive system because it sees patterns in vast amounts of information?
Neural network
f you were using your PDA and it was analyzing and reacting to a word you wrote on the pad, what type of system would you be using?
Neural network
What does opening questionable e-mails entail?
Opening e-mails from someone unknown, or clicking links embedded in e-mails
Mobile commerce (m-commerce) is the use of mobile, wireless devices to place orders and conduct business.
TRUE
Why are E-business and E-commerce important?
Conducting business electronically that is an essential strategy for companies that are competing in today's business environment
What is authentication?
Confirms the identity of the person requiring access
What is the Extranet?
Connects parts of the intranets of different organizations
What must you have before you can effectively use a DSS?
Considerable knowledge or expertise
Which of the following systems can be used to gain insights into the needs, wants, and behaviors of customers?
Customer relationship management systems (CRM)
What was significant of uploading?
Empowered all Internet users to create content and put it on the Web Led the transition from a passive approach to content to an active, participatory, collaborative approach
In the world of e-commerce, your business should be able to distinguish between which of the following?
End consumers and other businesses
What are the two Information Systems support an entire organization?
Enterprise Resource Planning Transaction Processing Systems
What are the cons of buying software?
Unmodified, the software may not be a good match to an organizations needs. Maintenance and support costs can become excessive.
What is an example of a supply chain management system?
Walmart Retail Link system connecting suppliers to Walmart
What is an example of a transaction processing system?
Walmart checkout point-of-sale business events
What is risk mitigation?
Where the organization takes concrete actions against risks which has two functions: -implementing controls to prevent identified threats from occurring -developing a means of recovery if the threat becomes a utility
Which Internet business has "Do the right thing; don't be evil." as one of its values?
schema
Which of the following is NOT one of the parameters that define a project?
A single computer with a single user is typical of a mainframe computer.
Which of the following statements is NOT true about a mainframe computer?
system review
_____ is the process of analyzing systems to make sure they are operating as intended.
big data
_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.
grid computing
_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.
computer-aided design
_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
self-service analytics
_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.
direct conversation
__________ is a high-risk cutover strategy because of the potential for errors and problems when the old system is turned off and the new system is turned on at the same time.
One method an IS professional might use to find a new job would be ____________.
all of these
The members of an organization who are most likely to contribute to organizational learning are _________.
all of these
Suppose you are good in math and statistics. Adding programming to your skill-set will be necessary if you want to be a data scientist
TRUE
To ensure that the newly developed information systems functions properly, what should you create that lists the expected steps that the system should perform and expected results from these steps?
Test conditions
The SDLC contains seven phases. Which phase verifies that the system works and meets all the business requirements developed in an earlier phase?
Testing
IaaS helps you avoid the expense and complexity of...?
buying and managing your own physical servers and other datacenter infrastructure.
PaaS also includes....?
development tools, business intelligence (BI) services, database management systems, and more.
A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is ___________.
flexible
The value of information is directly linked to how it helps decision makers achieve their organization's _____.
goals
All of the following are potential drawbacks to outsourcing EXCEPT:
greater focus on core business
During unit testing, each program is also tested with abnormal input to determine....?
how it will handle erroneous input.
Entity-relationship diagrams show...
logical relationships among data entities
Dashboards: Measures are ________ that track progress in executing chosen strategies to attain organizational objectives and goals.
metrics
You would use Query by Example, if _____.
you wish to use a visual approach to query building
3D printing is ________.
used to make solid products
all of the above
A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?
allowing a user to do word processing
All of the following are examples of activities performed by an operating system EXCEPT ________.
summarized
Data within the data cube has been ______ by specific dimensional values.
SAP
From which vendor is the BI product Business Objects available?
reduce IS costs
If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to _______.
instructs the zombie computers to send simple access requests to target computers
In a denial-of-service (DDoS) attack, the perpetrator ____.
In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________.
all of these
Harrison works at a nationally known grocery store chain. He is analyzing sales data from the past five years to determine which low-selling products should be discontinued. Harrison is most likely a(n) ________.
data scientist
Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______.
data steward
All of the following are potential drawbacks to outsourcing EXCEPT:
greater focus on core business
Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an online e-commerce site, Tom's has been able to enjoy the advantage of ______.
increasing accuracy
VUI: Gain an understanding
-Get one and play around with it. -Gain an understanding of the new ecosystems, "we need to at least have a working knowledge and consider how this might impact our business." -Keep an eye on the younger generations, for whom talking to an AI-powered smart device will become commonplace.
What are the characteristics of Business Process Improvement in comparison to Business Process Reingineering?
-Low risk/ low cost -Incremental change -Bottom-up approach -Takes less time -Quantifiable results -All employees trained in BPI
What three functions does Transmission Control Protocol perform?
-Manages the movement of data packets between computers by establishing a connection between the computers -It sequences the transfer of packets -It acknowledges the packets that have been transmitted
VUI: Strategy
-Many companies are developing apps and "skills" to keep up with the new technology. -Most are doing so without a clear strategy.
Describe sprint planning:
-Team selects items from the product backlog they can commit to completing -Sprint backlog is created --Tasks are identified and each is estimated (1-16 hours) --Collaboratively, not done alone by the ScrumMaster -High-level design is considered -Establish the first "seed" architecture Version 1.0 as SAD (Software Architecture Document). -Think of these models not as a specification, but as common ground to create understanding.
Explain what happens when Reviewing Results of System Design with Steering Team
-The systems design report is presented to the project steering team with a recommendation to stop, revise, or go forward with the systems development project -At the end of the design phase, organizations employing the waterfall system development process freeze the scope and the user and business requirements --Any potential changes must go through a formal scope change process
What are 5 factors contributing to vulnerability?
-Today's interconnected, interdependent, wirelessly networked business environment -Smaller, faster, cheaper computers and storage devices -Decreasing skills necessary to be a computer hacker -International organized crime taking over cybercrime -Lack of management support
VUI: Your company need to understand its consumers
-What do they want to do on the VUI? -Set a kitchen timer? -Check the weather forecast? -Add an item to their grocery list? -Skip a song on Spotify
What are the benefits of being an informed user?
-You benefit more when you understand what is "behind" IT applications -You can provide valuable input -You can recommend and help select IT Applications -You will be aware of new technology -You understand how IT improves performance -Also very beneficial to entrepreneurs
What are the daily scrum meeting parameters?
-daily -15-minutes -stand-up
Data modeling defines...
-databases the system will draw from -new databases the system will create
The goals of volume testing are to:
-determine the work load at which systems performance begins to degrade. -eliminate issues that prevent the system from reaching its required performance.
The overall emphasis on system analysis is on:
-gathering data on the existing system -determining requirements for the new system -considering alternatives within identified constraints -investigating the feasibility of alternative solutions.
Specific security and controls include:
-hardware -software -database systems -telecommunications -internet operations
The Agile Manifesto
-individuals and interactions over process and tools -working software over comprehensive documentation -customer collaboration over contract negotiation -responding to change over following a plan
Things to consider: Objectivity
-is the information covered fact, opinion, or propaganda? -is the authors view objective or impartial? -is the language free or emotion-rousing words or bias? -is the author affiliated with the organization? -does the authors affiliation with an institution or organization appear to bias the information? -does the content of the page have the official approval of the institution, organization, or company?
Scrum is:
-lightweight -simple to understand -difficult to master
During system analysis, develop a prioritized set of requirements. Such as:
-priority categories -processes must be further defined and individuals/organizations responsible for process steps identified. -Diagrams provide a model of a proposed new system -Data modeling -Entity relationship diagrams
It may be necessary to write a program that can....?
-read the old data files from several sources -reformat the data to be compatible with the new system -merge data sources together
Scrum Framework: Ceremonies
-sprint planning -sprint review -sprint retrospective -daily scrum meeting
Start / Stop / Continue: Whole team gathers and discusses what they'd like to:
-start doing -stop doing -continue doing
Describe the Sprint Review.
-team presents what it accomplished during the sprint -typically takes the form of a demo of new features or underlying architecture -informal --2 hour prep time --no slides -whole team participates -invite the world
What is the product backlog?
-the requirements -a list of all desired work on the project -ideally expressed such that each item has value to that users or customers product -prioritized by the product owner -reprioritized at the start of each sprint
E-Business and Privacy
......
What are 6 system controls used to enhance security?
1. input controls 2. processing controls 3. output controls 4. database controls 5. telecommunication controls 6. Personnel controls
RESTful API: When the client submits a request, in this case to get a resource, the RESTful API....?
1. receives that request 2. identifies the requested resource 3. figures out what data needs to be gathered & in what format 4. creates a representation of the data matching the requested format 5. Lastly, sends it all back to the client.
What are the 7 steps of the investigation phase?
1. review systems investigation request 2. identify and recruit team leader and team members 3. develop budget and schedule for investigation 4. perform investigation 5. perform preliminary feasibility analysis 6. prepare draft of investigation report 7. review results of investigation with steering team.
When you use a web API, you supply a URL (possibly with some extra parameters), and you most likely get back a response. The response can be one of two things:
1. some data (which is what you want) 2. An explanation of why your request failed - this might tell you that you failed to supply a required parameter, you're over your rate limit, you need to supply authentication to make that particular request, or there was some other problem with the request.
What are the 6 principles of good user interface design?
1. strive for consistency 2. offer informative feedback 3. offer simple error handling 4. one primary action per screen 5. provide progressive disclosure 6. strive for aesthetic integrity
APIs (Automated Program Interface) APIs: REST and JSON
13 points -3 points on REST and JSON Watch Learning REST APIs with Morten Rand-Hendriksen
Scalability: Typical individual team is _________ people.
7 ± 2 -scalability comes from teams of teams.
data center
A _____ is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services.
thin client
A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities.
network of computers that send out access requests to servers repeatedly
A botnet is a ____.
Bounce
A bounce is reported when a user's session only contains a single page view. The idea is that someone comes to your website and they 'bounce' away and leave after only viewing a single page.
Direct conversion is...
A cutover strategy that involves stopping the old system and starting the new system on a given date; also called plunge or direct cutover. -a high risk approach.
files
A database is a collection of integrated and related _____.
Which of the following is considered a technical architecture for the proposed system?
A description of the needed hardware, software, and telecommunications equipment
_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).
A register
What is a Transaction Processing System?
A system that supports the "real time" monitoring, collection, storage, and processing of data from the organization's basic business transactions (day-to-day operations), each of which generates data
The more ______ resources available, the cooler the apps we build.
API
_______ enable websites, web and mobile applications to build applications, using resources that were completely out of reach in even the recent past.
API's
Consuming APIs aren't just for developers, and about building applications. What else are they used for today?
APIs are fueling many new trends that allow even non-developers to consume APIs and put them to use in documents and other common tools like Excel.
Parker has an Android smartphone. Which type of processor is used in his mobile device?
ARM
_______________ and __________ of information does NOT equal quality.
Accessibility and volume
What does careless internet surfing entail?
Accessing questionable Web sites; can result in malware and/or alien software being introduced into the organization's network
What are primary activities?
Activities that relate to the production and distribution of the firms' products and services; these activities create value for which customers are willing to pay
What is social engineering?
An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
What are anti-malware systems?
Antivirus software; software packages that attempt to identify and eliminate viruses and worms, and other malicious software
What is distance learning?
Any learning situation which teachers and students do not meet face-to-face
Which of the following applies to a company that is OK with losing 12 hours worth of newly entered data: a. RTO = 12 b. RTO = .5 c. RPO = 12 d. Data backup is done on a tape (a storage medium) at your place of business each evening e. None of the above are correct
C
Someone who attempts to destroy the infrastructure components of governments is known as a ______________ .
CYBERTERRORIST
_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.
Cloud computing
What makes up "the Steroids"?
Computing Instant Messaging and File Sharing Wireless Technologies Voice over Internet Protocol Videoconferencing Computer Graphics
What is theft of equipment or information?
Computing devices and storage devices are becoming smaller yet more powerful with vastly increased storage as a result these devices are becoming easier to steal and easier for attackers to use to steal information
A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
DATA DICTIONARY
A database management system contains five important software components. Which of the following components accepts and processes requests from the other four database components?
DBMS engine
Which database management subsystem is responsible for backup and recovery, security management, query optimization, concurrency control, and change management?
Data administration
Which group of employees most often uses data administration subsystems?
Data administrators or database administrators
What is knowledge?
Data and/or information that has been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem
If you needed to store facts about information that you were collecting, you would store these facts in the _____.
Data dictionary
Which DSS component stores and maintains the information you want your DSS to use?
Data management
Which type of environment allows you to go beyond operational database systems to support business intelligence?
Data warehouses
Which organizational function is responsible for developing security procedures for an organization?
Database administration
What type of information system is built to support decisions based on problems that are not structured?
Decision support systems
What is identity theft?
Deliberate assumption of another person's identity usually to gain access to his or her financial information or to frame her for a crime
The SDLC contains seven phases. Which phase builds a technical blueprint of how the proposed system will work?
Design
_____ is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.
Explicit personalization technique
Which of the following methodologies breaks a project into tiny phases; programmers must develop the code for each phase before they can continue to the next phase?
Extreme programming
A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building.
FALSE
A strong security program begins by assessing the backgrounds of the employees in the organization.
FALSE
A wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits.
FALSE
As the complexity of a network increases, the possibility of security breaches decreases.
FALSE
Children and young adults under 18 can easily become the victims of crimes due to their use of social media, but adults are entirely safe in using social media.
FALSE
Organizations cannot have many value chains.
FALSE
Primary memory, which holds program instructions and data, is not associated with the central processing unit (CPU).
FALSE
Which of the following occurs when developers and end users add extra features that were not part of the initial requirements?
Feature creep
Which of the following is an optimizing system; one that continues to process your information until it discovers the best solution for your problem?
Genetic algorithm
weighing options
Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?
_____ is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.
Green computing
_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.
Grid computing
_____ is a visa program that allows skilled employees from foreign lands into the United States.
H-1B
What are the four components that interact to form a Computer-Based Information System?
Hardware Software Databases Network
all of these answers
Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms?
carpal tunnel syndrome (cts)
Heavy computer users who experience red, dry, itchy eyes should _____.
What is risk management?
Identifies, controls, and minimizes the impact of threats; seeks to reduce risk to acceptable levels
internet of things
If your home air conditioner has an IP address, it is part of the ____.
Who is the most famous person for using social engineering ?
Kevin Mitnick
What term is used to describe the small advertisements that appear on other Web sites?
Online or banner ads
Which system allows your organization to gather, process, and update transactional information?
Online transaction processing (OLTP)
What are virtual universities?
Online universities in which students take classes via the Internet at home or an off-site location
_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.
Optical mark recognition (OMR) systems
What is an example of enterprise resource planning?
Oracle; SAP system
What is an enterprise network?
Organizational interconnected networks consisting of multiple LANs and may also include multiple WANs
What are some examples of something s user knows?
Passwords or Passphrases
What is spear phishing?
Phishing attacks that target large groups of people; attack perpetrators to find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information
What are the different types of information security controls?
Physical Controls Access Controls Communication Controls Business Continuity Planning Information Systems Auditing
What is the type of field, or group of fields, that can uniquely identify each record in a database?
Primary key
What are the components of BPM?
Process modeling Web-enabled technologies Business Activity Monitoring (BAM)
What is the function of transaction processing system?
Process transaction data from terminal
What is E-commerce?
Processes of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet
What are two examples of cross-functional processes?
Procurement and Fullfilment
What is the function of a managing information system?
Produce reports summarized from transaction data, usually in one functional area
What are some of the career opportunities IT offers in modern business?
Programmers, Business Analysts, System Analysts, and Designers Chief Information Officer
Which person leads the SDLC?
Project manager
Which type of database model organizes and accesses information according to its logical structure rather than its physical structure?
Relational
What is offshoring?
Relocating an entire operation, or certain tasks, to another country; for example, moving an entire manufacturing operation to China
A common example of a _________ application is web-based email where you can send and receive email without having to manage feature additions to the email product or maintaining the servers and operating systems that the email program is running on.
SaaS
What is adware?
Software that causes pop-up advertisements to appear on your screen
_____ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations.
Spreadsheet
Tier III vendors such as Abas or Bluebee software.
Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution. Which ERP vendor will have the most appropriate solution for them?
What is an example of a functional area IS?
System for processing payroll
A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.
TRUE
A zombie computer would send requests to access to the target site again and again.
TRUE
An embedded system is a computer system that is implanted in and dedicated to the control of another device.
TRUE
Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall.
TRUE
In OLAP data cubes, you would likely find numeric measures categorized by time and geography.
TRUE
relevant
The use of so-called SMART goals has long been advocated by management consultants. What does the R in SMART stand for?
PaaS: Analytics or Business Intelligence
Tools provided as a service with PaaS allow organizations to analyze and mine their data, finding insights and patterns and predicting outcomes to improve forecasting, product design decisions, investment returns, and other business decisions.
The ".com" in "http://www.nytimes.com/pages/cartoons" is what?
Top-Level domain
A(n) _____ IT structure develops from a centralized IT department; one that serves the whole organization and not just a piece of it.
Top-down silo
The structure of IT develops from the culture within that organization and can develop into what type of approach?
Top-down silo, matrix, or fully-integrated
A mobile advertiser can find how many people clicked on his ad and how many people bought his product or service.
True
An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.
True
What is spam?
Unsolicited e-mail, usually advertising for products and services
What is risk transference?
Using other means to compensate for the loss, such as buying insurance
Optical mark recognition (OMR) systems
_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.
The fiber-optic cables that span the globe over land and under sea make up the Internet _____.
backbone
The smallest piece of data used by a computer is a(n) _____.
bit
How to create an API: step 1 Identify all the... ?
conceptual entities that we want to expose as services. Ex. resources such as: parts list, detailed part data, purchase order)
The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.
data administrator
Description of telecommunications controls: These controls provide accurate and reliable __________ and ___________ transfer among systems.
data and information
Description of Input Controls: Input controls range from using standardized input forms to eliminating.....?
data-entry errors and using tight password and identification controls.
Stateless
each request from client to server must contain all the information necessary to understand the request, and can NEVER rely on information from prior requests
Like IaaS, PaaS includes...?
infrastructure ---- servers, storage, and networking.
The information necessary for personalizing web pages for individual customers _________.
is primarily gathered by analyzing users' past transactions on the website
One of the disadvantages of proprietary software is that ______________.
it can take a long time and significant resources to develop the required software features
These metrics are also called ___________________________ and consist of a direction, measure, target, and time frame
key performance indicators (KPIs)
Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) __________.
knowledge management system
Integration testing involves...
linking all of the individual components together and testing them as a group to uncover any defects between individual components.
The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.
main memory
_____ is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices.
mobile crowd sensing (mcs)
POST is generally used when you need to...?
modify data in a database.
An operating system with _____ capabilities allows a user to run more than one program concurrently.
multitasking
Buying ____________________ software is less risky and leads to quicker deployment.
off-the-shelf
A(n) _____ is a field or set of fields in a record that uniquely identifies the record.
primary key
Daily scrum meetings are not for..?
problem solving. -whole world invited -Only team members, ScrumMaster, product owner, can talk
The action of including only some columns for output while retrieving data is known as ____.
projecting
Which of the following is NOT a potential drawback to downsizing?
reduced payroll costs
Effective controls in both areas usually depend upon....?
regular approvals by appropriately authorized individuals.
By using the Cloud, you don't need to worry about...?
resource procurement, capacity planning, OS software maintenance and patching, or any of the other undifferentiated heavy lifting involved in running your application.
What is pilot start-up?
running a complete new system for only one group of users.
Sequential vs. overlapping development: rather than doing one thing at a time....
scrum teams do a little bit of everything at the same time.
A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.
server
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.
service-oriented architecture
The ancestor of the Internet was _____.
the ARPANET
Operational feasibility
the process of determining how a system will be accepted by people and how well it will meet various system performance expectations
Description of Output controls: In many cases, output generated from the computer system is recorded in a file that indicates....?
the reports and documents that were generated, the time they were generated and their final destinations.
For other sites, a good mobile experience means....?
trimming down on content and features.
RESTful API: the "data store" is...?
typically a database, or database server, or some other type of server.
An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.
workgroup
What is an example of an electronic commerce system?
www.dell.com
whether only a limited number of people have access to critical data or not
Which of the following shortcoming may be revealed during an IT security audit?
magnetic stripe
Which of the following types of credit cards is currently diminishing in popularity and being replaced by the other three types?
SANs
Which of these organizations offers guidelines on developing security policies?
only those projects that are tied to specific organizational goals
You have observed that it is possible that some of your organization's projects may end up having little or no value after they are completed. You are tasked with selecting potential future projects. Which type of projects would you recommend the organization consider?
before starting any new project, try to build on expertise and knowledge of others in the organization
You joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means _______.
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?
currency
The world-wide-web uses _____ protocol for transmitting content.
hyper-text transfer
Social journalism or citizen journalism ________.
may not be as reliable as mainstream media sources
What is a digital dashboard?
A computer screen that provides tailored, current snapshots of information and trends
Dr. Fulk's office phone number is __________.
(254) 968-1977
What is a Wide Area Network (WAN)?
A network that covers a large geographical area; typically connect multiple LANs; generally provided by common carriers such as telephone companies and the international networks of global communications services providers; have a large capacity and typically combine multiple channels (e.g. fiber-optic cables, microwave, and satellite)
What is an application?
A program designed to support a specific task or business process
What is a virtual team?
A virtual group that conducts virtual meetings
input/output
A(n) _____ device provides data and instructions to the computer and receives results from it.
primary key
A(n) _____ is a field or set of fields in a record that uniquely identifies the record.
Information has many attributes that help define its quality. Which of the following is not one of these attributes?
Abundance
Which of the following is the science of making machines imitate human thinking and behavior?
Artificial intelligence
accounts payable
As an organization's purchasing systems generate purchase orders and the items ordered are received, information is sent to the _____ system to manage the amounts owed by the organization.
How do you apply the "simple error handling" principle?
As much as possible, design the system so the user cannot make serious error. If an error is made, the system should be able to detect the error and offer simple, comprehensible instructions for handling the error.
A(n) _____ can replace many applications with one unified set of programs, this system can then be used to manage all its vital business operations. a. materials resource planning system b. management information system c. enterprise resource planning system d. decision support system e. None of them
C; ERP system
Which type of system improves the performance of teams by supporting the sharing and flow of information?
Collaborative
What is business intelligence?
Collective information about a business' customers, competitors, partners, environment, and operations
What are physical controls?
Controls that prevent unauthorized individuals from gaining access to a company's facilities; common physical controls include doors, gates, locks, badges, guards, and alarm systems
Transaction processing system output might be used for: f. Developing a predictive model for future student enrollment a. Reporting for evaluating revenue in an e-commerce sales system b. Input into a separate system c. 2 of the above are correct d. All of the above are correct.
D
What is the function of an electronic commerce system?
Enable transactions among organizations and between organizations and customers
schedule feasibility
Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.
What formal business plan maps out your customer base and your strategy for reaching them?
Path-to-profitability (P2P)
batch processing
Payroll transactions and billing are typically done via _____.
What was significant Netscape going public on August 9, 1995?
Popularized the Internet and the World Wide Web
________ fraud total losses can represent a significant sum for a company.
T&E
What data should be compared when analyzing for fraud?
T&E payment data compared to HR records. This will show if there are instances in which an employee has been using a P-card or claiming expenses while on vacation.
A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market.
TRUE
A client is any computer on a network that sends messages requesting services from the servers on the network.
TRUE
What forms the IT Platform?
The IT Components
What makes customers powerful?
The increasing consumer sophistication and expectations Consumers are becoming more knowledgeable about: -Products and Services -Price Comparisons -Electronic Auctions Customer Relationship Management
What is workflow?
The movement of information as it progresses through the sequence of steps that make up an organization's work procedures; makes it possible to pass documents, information, and tasks from one participant to another in a way that is governed by the organization's rules or procedures
If you wanted to ensure that your business maintains a competitive edge, what should be one of your main concerns when purchasing technology?
The new technology enables you to be innovative and move into new markets
data administrator
The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.
bit
The smallest piece of data used by a computer is a(n) _____.
What type of analytics is used to detect the value of e-mail advertising to customers or potential customers?
Web
neural networks
_____ can process many pieces of data at the same time and learn to recognize patterns.
The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.
accredited domain name registrars
Design of System Security and Controls: Specific system security and controls must be developed for.....?
all aspects of the information system.
In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________.
all of these
The Internet of Things connects wireless identifiable objects ________
all of these
System _____________ creates a complete set of technical specifications that can be used to construct the information system.
design
Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
natural user interface
Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying?
nettops
What is a cost leadership strategy?
Produce products and/or services at the lowest cost in the industry (e.g. Walmart's automatic inventory replenishment system)
In the past, market segmentation has been easy for B2B marketers because firmographic data was easy to obtain
FALSE
A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.
star
Define policy statement.
statement that describes what the organization's practices are.
Blend this data with _______________________________ so that employees have more complete information at their fingertips.
systems of record transactional data
What is unit testing?
testing that ideally forces an individual program to execute all of its various functions and user features
All of the following are examples of ethical issues related to data and information systems EXCEPT _________.
the cost of system development
All of the following are examples of ethical issues related to data and information systems EXCEPT__________.
the cost of system development
What is cutover?
the process of switching from an old information system to a replacement system.
The network router sends traffic to the firewall as well as to the IDS
Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?
historical data is examined for patterns that are then used to make predictions
Which of these analysis methods describes neural computing?
faster system start-up
Which of these is an advantage of the hosted software model?
stakeholder analysis matrix
Which tool is useful in identifying the interests and information needs of the stakeholders?
Description of telecommunications controls: Network controls include....?
firewalls and encryption to ensure correct communication while eliminating the potential for fraud and crime.
A _____ is a simple database program whose records have no relationship to one another.
flat file
Google Analytics: Key terms?
-Conversion -Conversion Rate -Bounce -Bounce Rate -Landing Page -SEO -Organic/Natural search results -Paid search results
What are 3 intentional man-made disasters that can disrupt business operations?
1. sabotage 2. terrorism 3. civil unrest
There are two graded ______ in this course.
ELAs
cognos
Which of the following is IBM's BI product?
What is parallel start-up?
running both the old & new systems and comparing outputs.
What is an example of a decision support system?
"What-if" analysis of changes in budget
What is software?
A program or collection of programs that enable the hardware to process data
Which of the following statements is NOT true about a mainframe computer?
A single computer with a single user is typical of a mainframe computer.
Should you create a dedicated mobile site or use a responsive site? What is the right answer?
(For many sites) Content and feature parity. -accommodate both
Why is prototyping a valuable tool?
Because it allows users to evaluate and enhance requirements
What's a dashboard? *think of ClubReady system when @ Club Pilates.
*think of ClubReady system when @ Club Pilates.
The ______ is the agency tasked with the goal of providing for a safer, more secure America, making it resilient against terrorism and other potential threats.
- Department of Homeland Security
What kind of tests are run on an information system?
1. unit 2. integration 3. system 4. volume 5. user acceptance
Responsive design helps to furnish:
- a full experience at the mobile level. - a full experience at the desktop level. - a full experience at the mobile level only. - site design changes as the display used by the user increases in screen size.
Explain how Alexa works
-Alexa is the intelligent voice assistant for Amazon. -Beyond its voice interaction abilities programmed by Amazon, third party organizations may also introduce a specialized set of questions and responses (known as a "Skill"). -The system that allows these skills to function begins with the question, or invocation, asked by the user. -These invocations correspond to intents which are part of the skill.
What does the product owner do?
-Define the features of the product -Decide on release date and content -Be responsible for the profitability of the product (ROI) -Prioritize features according to market value -Adjust features and priority every iteration, as needed -Accept or reject work results
What three areas does IS have a vital role in business processes?
-Executing the process -Capturing and storing process data -Monitoring process performance
Describe the FIPP
-FIPP are guidelines that represent widely accepted concepts concerning fair information practice in an electronic marketplace. -Provide guidance for how to deal specifically with personal information.
Examples of well-defined KPIs:
-For a university. Increase (direction) the five-year graduation rate for incoming freshman (measure) to at least 80 percent (target) starting with the graduating class of 2022 (time frame) -For a customer service department. Increase (direction) the number of customer phone calls answered within the first four rings (measure) to at least 90 percent (target) within the next three months (time frame) -For an HR organization. Reduce (direction) the number of voluntary resignations and terminations for performance (measure) to 6 percent or less (target) for the 2018 fiscal year and subsequent years (time frame)
What are the characteristics of Business Process Reingineering in comparison to Business Process Improvement?
-High risk/ high cost -Radical redesign -Top-down approach -Time consuming -Impacts can be overwhelming -High failure rate
Backlog Grooming: groomed through several rounds, consider:
-consider priority -acceptance criteria may be drafted
The 3 priority categories are?
-critical -medium priority -low priority
What are 6 factors to consider when evaluating information quality.
1. Author 2. Purpose 3. Objectivity 4. Accuracy 5. Reliability and Credibility 6. Currency
Web Scraping process
1. Go to desired web page 2. Press F12 or right-click & select inspect. 3. In the developer tools, you will find a new tab named 'Web Scraper' as shown in the screenshot below. Click on that tab. 4. Click on "create new sitemap" and then select "create sitemap" 5. Give sitemap a name, (icddstores) and copy/paste the URL of the site in the start URL field. 6. Click on "create sitemap" 7. Click on the Sitemap (icddstores ddl) and select Selectors. 8. Click on blue Add new selector button link to take you to this screen. *check slides for more.
What are the 8 steps in the system analysis phase?
1. Identify and recruit team leader and team members 2. Develop budget and schedule for systems analysis activities 3. Study existing system 4. Develop prioritized set of requirements 5. Identify and evaluate alternative solutions 6. Perform feasibility analysis 7. Prepare draft of systems analysis report 8. Review results of systems analysis with steering team
What are the 9 steps in the system design phase? (very similar to system analysis)
1. Identify and recruit team leader and team members 2. Develop schedule and budget for systems design activities 3. Design user interface 4. Design system security and controls 5. Design disaster recovery plan 6. Design database 7. Perform feasibility analysis 8. Prepare draft of systems design report 9. Review results of systems design with steering team
Name 4 advantages of ERP
1. Improved access to quality data for operational decision making 2. Elimination of costly, inflexible legacy systems. 3. Improvement of work processes. 4. Opportunity to upgrade and standardize technology infrastructure. --Why build and re-invent the wheel, when you can buy it?
What are 5 natural disasters that can disrupt business operations?
1. flood 2. tsunami 3. hurricane/cyclone 4. earthquake 5. volcanic erruption
What are the components of the feasibility analysis?
1. technical feasibility 2. economic feasibility 3. legal feasibility 4. operational feasibility 5. schedule feasibility
What are the 6 phases of the Waterfall system development process?
1. investigation 2. analysis 3. design 4. construction 5. integration 6. testing and implementation
Scrum Framework (3)
1. roles 2. ceremonies 3. artifacts
Exam 1 Review Questions
10 points
Enterprise Systems & the Cloud
10 points Ch. 8 (356-367) Ch. 6 (279-284)
Employee Fraud & Data Analysis...
10 points...
A company buys and receives products from suppliers that they will sell on their e-commerce site. Once they receive the products from the suppliers and record it in their Purchasing System; they create a spreadsheet of products and quantities received; and then manually update the quantity available for sale in their ecommerce system. Real-time system integration might enable them to: a. Sell more products by having more accurate and real-time data b. Avoid using a database and instead, rely on integration software for better control c. Avoid using a spreadsheet and instead, rely on an Access database for data entry and control d. Avoid using a spreadsheet and instead, rely on ETL for weekly data transfers e. 2 of the above are correct
A
What is a Functional Area Information System?
A collection of application programs in a single department or functional area
record
A collection of fields all related to a single object, activity, or individual is a(n) _____.
What is a database?
A collection of related files or tables containing data
What is a mashup?
A combination of information and applications originating from different sources being displayed on one computer screen
What is ethernet?
A common LAN protocol (ex many organizations use 100 gigabit ethernet, where network provides data transmission speeds of 100 gigabits (100 billion bits) per second)
What is a network?
A connecting system (wireline or wireless) that permits different computers to share resources
Conversion
A conversion is reported whenever a user completes a goal or makes a purchase during a session. Each goal will report a maximum of one conversion per session, while every transaction is reported.
value
A core _____ is the widely accepted principle that guides how employees behave and make decisions in the organization.
distribution and accounting
A customer relationship management (CRM) system helps a company in managing ______.
What is a disaster recovery plan?
A documented process to recover an organization's business information system assets including hardware, software, data, networks, and facilities in the event of a disaster
2012
A friend's computer came with Windows 8 operating system. Which of the following years was the computer most likely bought in?
What are hot sites?
A fully configured computer facility with all of the company's services, communications links, and physical plant operations; duplicates computing resources, peripherals, telephone systems, applications, and workstations; reduce risk to the greatest extent but are the most expensive
theory of evolution
A genetic algorithm is an approach to solving problems based on the _____.
What is the DHS's US-VISIT program?
A network of biometric-screening systems
What is a project scope document?
A one-paragraph statement about the scope of the proposed project
What is a communications channel?
A pathway or medium communicating data from location to another
What is an informed user?
A person knowledgeable about information systems and information technology
What is an affinity portal?
A portal that offers a single point of entry to an entire community of affiliated interests, such as hobby group or political party
What is an industrywide portal?
A portal that serves an entire industry (e.g. TruckNet)
What is a Virtual Private Network (VPN)?
A private network that uses a public network (usually the internet) to connect to users; essentially integrate the global connectivity of the internet with the security of a private network and thereby extend the reach of either organization's networks; called "virtual" because they have no separate physical existence
What is whitelisting?
A process in which a company identifies the software that it will allow to run on its computers and permits acceptable software to run and it either prevents any other software from running or lets new software run only in a quarantined environment until the company can verify its validity
What is telecommuting?
A process in which knowledge workers are being called the distributed workforce, or "digital nomads." Able to work anywhere and anytime
Client-Server
A pull-based interaction style (client requests data from servers as when needed).
What is Business Process Reingineering (BPR)?
A radical redesign of an organization's business processes to increase productivity and profitability; examines business processes with a "clean slate" approach
What is a value chain?
A sequence of activities through which the organization's inputs are transformed into valuable outputs, whatever they are
What is the waterfall methodology?
A sequential, activity based SDLC
Describe the waterfall system development process.
A sequential, multistage system development process. -Work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified if necessary.
What is the sprint goal?
A short statement of what the work will be focused on during the sprint
What are coaxial cables?
A single strand of insulated copper wire; much less susceptible to electrical interference and it can carry much more data than twisted-pair; commonly used to carry high-speed data traffic as well as television signals
What is a warm site?
A site that provides many of the same services and options as the hot sites, but typically does not include the actual applications the company needs; includes computing equipment such as servers, but it often does not include user workstations
What is a cold site?
A site that provides only rudimentary services and facilities such as a building or a room with heating, a/c, and humidity control; provides no computer hardware or user workstations; reduce risk the least but are least expensive
up to 500
A small and medium-sized enterprise (SME) is a legally independent enterprise with _____ employees.
What is SQL?
A standardized fourth generation language found in most DBMSs
What is the systems development life cycle (SDLC)?
A structured approach for developing information systems
What is a phishing attack?
A use of deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages
enterprise system
A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business.
Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system? a. All of them b. 1 and 3 only c. 1 only d. None of them
A; All
An ______ is very much the same thing as a UI (user interface), except that it is geared for consumption by software instead of humans.
API
What are 4 different types of alien software?
Adware Spyware Spamware Cookies
If you created links on your personal Web site that connected your visitors to businesses with the goal that you would earn a fee for purchases made by your visitors, what type e-commerce model are you creating?
Affiliate programs
release
After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.
Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system?
All of them
What is synchronous collaboration?
All team members meet at the same time
What is a commercial portal?
Also called a public portal; the mos popular type of portal on the Internet and is intended for broad and diverse audiences (e.g. stock ticker)
Which of the following contains a subset of a data warehouse in which only a focused portion of the data is kept?
Data mart
filtering software
Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.
What is data?
An elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning
What is a Software-Defined Network (SDN)?
An emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks; manages decisions controlling how network traffic flows across network devices are managed centrally by software; dynamically adjusts data flows to meet business and application needs
What is Business Process Improvement (BPI)?
An incremental approach to move an organization toward business process centered operations; focuses on reducing variation in process outputs by identifying the underlying cause of the variation
For a moment, imagine yourself visiting your local florist to order flowers for a party you were preparing for. The florist, however, did not have the type of flower arrangement you hoped for but the florist was able to immediately find, order and deliver this arrangement directly to your home from their supplier. What kind of relationship does this represent?
An information partnership
What is a strategic information system (SIS)?
An information system that helps an organization achieve and maintain a competitive advantage
workgroup
An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.
What is competitive advantage?
Any assets that provide an organization with an edge against its competitors in some measure such as cost, quality, or speed; also helps an organization to control a market and to accrue larger-than-average profits (a statement identifying a business's approach to compete, its goals, and the plans and policies required to attain those goals)
What is information technology?
Any computer-based tool that people use to work with information and to support the information and information-processing needs of an organization
What is a threat (to an information resource)?
Any danger to which a system may be exposed
Which of the following DBMS components allows you to quickly develop computer routines or tasks that will process your business transactions?
Application generation subsystem
APIs today
Applications are depending on entire stack of APIs, employing 10s or 100s of API resources to deliver applications across multiple web and mobile channels.
data lifecycle management
At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________.
a business rule
Best Value Hardware Stores, a national chain, has established strict policies about the conditions under which a customer can return merchandise. These policies are an example of: __________.
Your student ID is an example of a(n) _____.
Attribute
What are some examples of something the user is?
Biometrics, fingerprint scans, palm scans, retina scans, iris recognition, and facial recognition
What is E-business?
Broader concept than EC that includes servicing customers, collaborating with business partners, and performing electronic transactions within an organization
To succeed in business and to enable your organization to extract meaningful information from its information repositories, you need which type of application?
Business intelligence
What are technology pressures?
Business pressures caused by technological innovation and information overload
What are market pressures?
Business pressures generated by the global economy, intense competition, the changing nature of the workforce, and powerful customers
What are Societal/ Political/ Legal pressures?
Business pressures related to social responsibility, governmental regulation/ deregulation, spending for social programs, spending to protect against terrorism, and ethics
Which question does not support a business' efforts to support and maintain a competitive edge?
Can this technology make the company look better?
The ______ is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards.
Card Verification Number
What are common human errors?
Carelessness with Laptops Carelessness with Computing Devices Opening Questionable E-mail Careless Internet Surfacing Poor Password Selection and Use
What does poor password selection and use entail?
Choosing and suing weak passwords
What is alien software?
Clandestine software that is installed on your computer through duplicitous methods
_____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process.
Consumer-to-consumer (C2C) e-commerce
What are other areas of threats under human errors?
Contract Labor, Consultants, Janitors, and Guards
What are access controls?
Controls that restrict unauthorized individuals from using information resources and involve two major functions: authentication and authorization
What is an example of an expert system?
Credit card approval analysis
Which of the following is a characteristic of a proposed system that is essential to the success of your organization?
Critical success factor
On which group of people does business intelligence collect knowledge?
Customers and business partners, Competition and competitive environment, Internal Operations
What are the pros of building software?
Customized software is more likely to be a good match to an organization's needs. A custom application provides the potential to achieve competitive advantage.
Transaction processing systems that support a large enterprise typically store data in a: a. NoSQL database b. Excel sheet c. Access database d. Relational database e. None of the above
D
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
DATAMART
What is authorization?
Determines which actions, rights, or privileges the person has, based on his or her verified identity
If you were the marketing director and involved in the design and development of a new marketing application, which phase would your responsibilities begin to lessen with this new project?
Development
What is Internet 2 do?
Develops and Deploys advanced network applications such as remote medical diagnosis, digital libraries, distance education, online simulation, and virtual laboratories; designed to be fast, always on, everywhere, natural, intelligent, easy, and trusted
What is the Internet Protocol responsible for?
Disassembling, delivering, and reassembling the data during transmission
Before importing data into Access from another source; like Excel; the data should be cleaned. Converting multi valued columns in Excel into multiple columns in Excel prior to moving to Access: a. Is not necessary as Access uses multi-valued fields b. Is not necessary as Access converts multi-valued Excel columns into multiple columns when you run a Make Table query c. Is not necessary as Access converts multi-valued Excel columns into multiple columns when you run an Append Table query d. Is necessary only if you have more than 1 table in Access e. None of the above are correct.
E
Data used in business intelligence (BI) analysis could come from which of the following sources: a. An OLTP internal system b. Unstructured data from sources outside the company c. Unstructured data from sources inside the company d. 2 of the above are correct e. All of the above are correct
E
What are some examples of protection against terrorist attacks?
Employees in military reserve called to active duty Information Technology used to identify and protect against terrorists and cyber attacks Department of Homeland Security's (DHS) US-VISIT progam
_____ are people who work directly with information systems to get results.
End users
What is risk analyses?
Ensures IS security programs are cost effective; asses the value of each asset being protected; estimate the probability it might be compromised; and compare the probable costs of it being compromised with the costs of protecting it
What does an Enterprise Resource Planning System do?
Ensures the information can be shared across all business functions and all level of management to support the running and managing of business.
What is a Chief Information Officer (CIO)?
Executive who is in charge of the IS function
What are some examples communicating controls?
Firewalls Anti-malware Systems Whitelisting and Blacklisting Encryption Virtual Private Networking Secure Socket Layer Employee Monitoring Systems
What is efficiency?
Focuses on doings things well in the process; for example progressing from one process activity to another without delay or without wasting money or resources
How do you apply the "offer informative feedback" principle?
For every user action, there should be some system feedback. For frequent and minor actions, the response can be modest, while for infrequent and major actions, the response should be more substantial.
Having access to information in a usable form is an example of the _____ quality attribute of information.
Form
Having an audio file that describes current environmental factors that you can listen to while walking to a meeting is an example of the _____ quality attribute.
Form
In a downward information flow, how is data passed?
From management to operations
Which systems are typically used to support customers or sales?
Front office systems
What are a set of steps that relate variables representing inexact information or personal perceptions?
Fuzzy logic algorithms
Which type of e-commerce refers to the electronic commerce activities performed within a nation's government or between governments?
G2G
Data _____ is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted.
GOVERNANCE
If you needed to analyze the bear population in Maine and their interactions with humans located in towns and cities, what type of computer application should you use?
Geographic information system
Which type of DSS allows you to analyze spatial information?
Geographic information system
What are some examples of social responsibility?
Green IT Digital Divide
nettop
Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________.
___________ level employees+ _____________ access privileges= __________ threat
Higher; Greater; Greater
What are some example of how IT changes the way managers make decisions?
IT provides near-real-time information Managers have less time to make decisions It provides tools for analysis to assist in decision making
In addition to the intellectual assets that are needed to succeed in today's competitive environment, what do contemporary organizations need?
IT systems capable of capturing, organizing, and disseminating these assets
What two areas pose significant threats under human errors?
Human Resources Information Systems
What is the biggest unintentional threats to information systems?
Human errors
You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is ______.
INCREASE VULNERABILITY
What are IT Services?
IT Personnel use IT Components to develop IS's; oversee security and risk; also manage data
How does IT impact organizations?
IT can impact entire industries IT reduces the number of middle managers IT changes the manager's job
How does IT change the manager's job?
IT change the way managers make decisions (and decision making is the most important managerial task)
Which of the following statements successfully differentiates the term MIS from IT?
IT is a component of MIS
What is the Threat of Substitute Products or Services?
If there are many alternatives to an organization's products or services, then the threat of substitutes is high; if there are few alternatives then the threat is low
In which SDLC phase should you create user documentation?
Implementation
What are Organizations Responses?
Implementations of information technology such as strategic systems, customer focus, make-to-order and mass customization, and e-business
What is risk limitation?
Implementing controls that minimize the impact of the threat
What is the Operational Effectiveness Strategy?
Improve the manner in which a firm executes its internal business processes so that is performs these activities more effectively than its rivals. Such improvements increase quality, productivity, and employee and customer satisfaction while decreasing time to market
about half
In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails?
What is a blacklist?
Includes certain types of software that are not allowed to run in the company environment
What is a value system?
Includes the suppliers that provide the inputs necessary to the firm along with their value chains. After the firm creates products, these products pass through the value chains of distributors (which also have their own value chains), all the way to the customers. All parts of these chains are included in the value system
What is an advantage of being an early adopter of technology?
Increasing the competitive advantage of the organization
Compared to the agricultural age where the work force focused on the production of food, we now work in the _____ where the focus has shifted to the production of knowledge.
Information age
____________ as a Service (SaaS) provides you with a completed product that is run and managed by the service provider.
Software
What are the three elements of a business process?
Inputs, Resources, and Outputs
Which of the following systems development techniques requires IT specialists that are in-house to develop business applications?
Insourcing
Which type of online environment supports virtual teams and the online activities they complete?
Integrated collaboration environments (ICEs)
What is the function of enterprise resource planning?
Integrates all functional areas of the organization
Which type of constraint ensures the quality of information in a relational database?
Integrity constraint
To be successful in today's competitive environment, what must a company have?
Intellectual assets
The complexity of SCM is supported by technology. Which intricate SCM activity needs strong monitoring by SCM systems?
Inter-modal transportation
What is information overload?
Internet and other telecommunications networks are bringing a flood of information to managers. To make decisions effectively and efficiently, managers must be able to access, navigate, and utilize these vast stores of data, information and knowledge (difficult in managing data for decision making)
What are ethical issues?
Issues involving general standards of right and wrong
applets
Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document.
What is JSON?
JavaScript Object Notation; a minimal, readable format for structuring data. It is used primarily to transmit data between a server and web application, as an alternative to XML.
How does IT impact employees' health and safety?
Job stress Long-term use of the keyboard and mouse can lead to health problems
When IT specialists and end users meet in one location to define and review the business requests for a proposed system, the meetings is called a _____?
Joint application development session
What does Supervisory Control and Data Acquisition Attacks (SCADA) refer to?
Large-scale, distributed measurement and control system; used to monitor or control chemical, physical, and transport processes such as those used in oil refineries, water and sewage treatment plants, electrical generators and nuclear power plants
A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.
MAN
What coordinates and uses three organizational resources; information, people, and IT?
MIS
_____ is a storage technology that is primarily used only for backups.
Magnetic tape
The SDLC contains seven phases. Which phase monitors and supports the new system to ensure it continues to meet your business goals?
Maintenance
What are some examples of traditional functions of the MIS Department?
Manage systems development and systems project management Manage computer operations, including the computer center Staffing, training, and developing IS skills Providing technical services Infrastructure planning, development, and control
Which of the following deals with the planning for, development, management, and use of information technology?
Management information systems
What is an example of an office automation system?
Microsoft Office
_____ is an example of a popular general purpose software suite for personal computer users.
Microsoft Office
What is the function of an expert system?
Mimic human expert in a particular area and makes decisions
a repetitive strain injury
Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______.
Which term describes a business' approach to offering multiple ways in which customers can interact with it?
Multi-channel service delivery
Which data warehouse tools are slice-and-dice techniques that allow you to view multidimensional information from different perspectives?
Multidimensional analysis
What is a Local Area Network (LAN)?
Network that connects two or more devices in a limited geographical region, usually within the same building, so that every device on the network can communicate with every other device
Should a business' decisions about its technology drive its business strategy?
No, business strategy should drive decisions about its technology
Will IT eliminate jobs?
Not necessarily; even though the competitive advantages of replacing people with IT and machines is increasing rapidly, IT in business is also creating new job categories and requires more employees with IT knowledge and skills
When does information extortion?
Occurs when an attacker either threatens to steal, or actually steals, information from a company; the perpetrator demands payment for not stealing information or for agreeing not to disclose the information stolen
What is the Differentiation strategy?
Offering different products, services, or product features than your competitors (e.g. Southwest Airlines has differentiated itself as a low-cost, short-haul, express airline)
consulting with stakeholders to establish future needs
Once new software has been selected, implementation will include all of these tasks EXCEPT _________.
the software provides a company a competitive advantage by solving problems in a unique manner
One advantage of proprietary software versus off-the-shelf software is that _____.
The Lusha Contacts API uses a...
RESTful architecture.
Which of the following systems development techniques delegate development tasks to a third party for a specified cost, period of time, and level of service?
Outsourcing
If a business sends information to its partners, suppliers, or distributors, what type of information flow is this considered?
Outward/inward
API: _______ is a way to send hidden data as part of a request, data that doesn't get listed as part of the URL.
POST
PaaS: Development Framework
PaaS provides a framework that developers can build upon to develop cloud-based applications.
What are the different types of computer networks?
Personal Area Networks (PAN) Local Area Networks (LAN) Metro Area Network (MAN) Wide Area Network (WAN) Enterprise Networks
The SDLC contains seven phases. Which phase is devoted to creating a solid plan for developing your information system?
Planning
What term is used to describe a small Web page containing an advertisement that appears on your screen, outside the current Web site loaded into your browser?
Pop-up ads
If your phone number was used in a clothing store to uniquely identify you as a customer, the phone number would be considered a(n) _____.
Primary key
What is Web Scrapping?
Process of extracting data from websites.
To use SaaS, simply.....?
Rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser.
What data manipulation tool allows you to create intermediate subtotals and grand totals?
Report Generator
What is an example of a managing information system?
Report on total sales for each customer
What is the process in which a buyer posts its interest in buying a certain quantity of items with specified purchasing requirements and suppliers then compete for this business?
Reverse auction
What is dumpster diving?
Rummaging through commercial or residential trash to find discarded information
Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are constantly changing. As a result, Pinterest has turned to Amazon for _______. as
STORAGE AS A BUSINESS
_______ provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider.
SaaS
_________ allows your organization to get quickly up and running with an app at minimal upfront cost.
SaaS
Customer relationship management (CRM) systems include which of the following functions?
Sales force automation, Customer service and support, and Marketing campaign management and analysis.
What are examples of compliance with government regulations
Sarbanes-Oxley Act USA PATRIOT Act Gramm-Leach-Biley Act Health Insurance Portability and Accountability Act (HIPAA)
What was significant about the Fall of the Berlin Wall on November 9, 1989?
Shifted the world toward free-market economies and away from centrally planned economies Led to the emergence of the European Union and early thinking about the world as a single, global unit
How to apply the "provide progressive disclosure" principle?
Show only what is necessary on each screen. If the user is making a choice, show enough information to allow the user to choose and then display details on a subsequent screen.
What do unified communications do?
Simplify and integrate all forms of communications (voice, voice mail, fax, chat, e-mail, instant messaging, short message service, presence (location) services, and videoconferencing) on a common hardware and software platform
What are cookies?
Small amounts of information that Web-sites store on your computer, temporarily or more or less permanently
What are some ways that IT has changed the way we work?
Smartphones provide constant access to text, email, and voice communication The lines between time at work and leisure time at home have become blurred Surveys indicate employees take laptops and smartphones on vacation
may not be as reliable as mainstream media sources
Social journalism or citizen journalism ________.
may not be as reliable as mainstream media sources
Social journalism or citizen journalism ________.
What is the difference between multidimensional analysis and statistical analysis?
Statistical analysis is a mathematical approach to understanding information; multidimensional analysis is a way of viewing information from different perspectives
What is an example of an executive dashboard?
Status of sales by product
What are the four major organizational responses?
Strategic Systems Customer Focus Make-to-Order and Mass Customization (Bodymetrics) E-business and E-commerce
What is Make-to-Order?
Strategy of producing customized (made to individual specifications) products and services
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
Structured Query Language (SQL)
What is structured data?
Structured information is information easily displayed in tilted columns and rows which can easily be ordered and processed. TPS --> Relational Database
you wish to use a visual approach to query building
You would use Query by Example, if _____.
Which of the following activities tracks inventory and information among business processes and across companies?
Supply chain management (SCM)
What is the function of an office automation system?
Support daily work activities of individuals and groups
What is the function of functional area IS?
Support the activities within specific functional area
If you were developing a new information system using selfsourcing, what should be a key consideration of yours?
Supporting the changing requirements and needs of others who uses the new information system
create the entity-relationship model
Suppose a new tech startup wants to define the data model. They would then ____.
A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.
TRUE
A field is typically a name, number, or combination of characters that describes an aspect of a business object.
TRUE
What is the major difference between B2B and B2C e-commerce?
The B2B marketplace does not involve consumers, just business partners; the B2C marketplace involves consumers
SWAPI: Base API URL
The Base URL is the root URL for all of the API methods
128-bit
The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.
gramm-leach-bliley act of 1999
The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.
knowledge base
The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.
Average visit duration
The average length of time a visitor stays on your website. This number isn't entirely accurate for a few reasons, but can be useful as a way of comparing page performance relative to other pages.
main memory
The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.
IT supports CRM with front and back office systems. Which statement describes a front office system?
The computer interfaces that collect customers' information and sends it to the main information system
What are the cons of building software?
The cost to build a system can be quite costly compared to the cost of purchasing off-the-shelf software. Custom software can take months or even years to deploy.
What are Switching costs?
The costs in money and time, imposed by a decision to buy elsewhere (e.g. contracts with smartphone providers)
What is security?
The degree of protection against criminal activity, danger, damage, and/ or loss
support and improve decision making
The goal of business intelligence is to _____.
volume testing
The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.
How to apply "strive for aesthetic integrity" principle?
The graphic design elements used in an interface should be simple and clean, pleasant to look at and easy to understand.
What is exposure?
The harm, loss, or damage that can result if a threat comprises an information resources
transaction processing system
The information about invoices to customers is tracked by ____ system.
What is globalization?
The integration and interdependence of economic, social, cultural, and ecological facets of life, made possible by rapid advances in IT
Bounce Rate
The percentage of users that arrive on your landing page and leave your website without viewing any additional pages. A lower bounce rate is generally the goal.
% new visits
The percentage of visitors that have not previously visited your website.
What is communications media?
The physical media used to send data (e.g. twisted-pair wire, coaxial cable, fiber optic cable, satellite, etc)
What is intellectual property?
The property created by individuals or corporations that is protected under trade secret, patent, and copyright laws
What are the characteristics of connected computers in a computer network?
They work together Are interdependent Exchange data with each other
What are Porter's 5 Competitive Forces?
Threat of Entry of New Competitors Bargaining Power of Suppliers Bargaining Power of Buyers/ Customers Threat of Substitute Products or Services Rivalry Among Existing Firms within the Industry
Having access to information that spans a period of time is an example of the _____ quality attribute of information.
Timeliness
all of these answers
To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________.
What is the purpose of a business continuity plan?
To provide guidance to people who keep the business operating after a disaster occurs
What is the function of a strategic system?
To provide organizations with advantages that enable them to increase their market share and/or profits, to better negotiate with supplies, and to prevent competitors from entering their markets
One function in CRM is the sales force automation (SFA) system. What is its purpose?
To track all the steps in the sales process
natural user interface
Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
Which of the following is an example of commodity like merchandise?
Toothpaste
____ is the first phase of the cross-industry process for data mining (CRIPS-DM).
UNDERSTANDING
Within an organization information will flow in four basic directions. Which of the following describes the movement of data from operations to management?
Upward
What are some examples of software attacks that are remote attacks requiring user action?
Virus Worm Phishing Attacks Spear Phishing Attacks
When does shoulder surfing occur?
When the attacker watches another person's computer screen over that person's shoulder; dangerous in public areas such as airports, commuter trains, and on airplanes
streaming video
When video files are played while being downloaded from the Internet, it is called _____.
You use POST all the time when you use the web. For example,....
When you fill out a form to buy something online, it submits your payment information using POST, because it would be bad if you loaded a URL that put that information out in the open
What is Mass Communication?
Where a company produces a large quantity of items, but it customizes them to match the needs and preferences of individual customers; essentially an attempt to perform make-to-order on a large scale (example: Bodymetrics)
process for gathering BI requirements
Which of the following is NOT a core process associated with data management?
online transaction processing
Which of the following is NOT considered a BI and analytics tool?
mishandling computer outputs
Which of the following is a computer-related mistake?
Users should implement proper procedures to ensure correct input data.
Which of the following is a useful policy to minimize waste and mistakes?
UAT must be completed successfully before newly developed software can be rolled out to the market.
Which of the following statements is true of user acceptance testing (UAT)?
stock investments
Which of the following transactions definitely require online transaction processing and cannot work on batch processing approach?
online transaction processing
Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms?
Provide an example of transactional data analysis that would warrant further investigation.
Why would one employee with the same job responsibilities as a hundred others claim 50% more travel expenses?
What is the digital divide?
Wide gap between those individuals who have access to information and communications technology and those who do not
What are the types of collaboration?
Work group Workflow Virtual Team Virtual Collaboration Crowdsourcing Electronic Teleconferencing and Video Conferencing
Which type of system facilitates the automation and management of business processes?
Workflow
PaaS: Additional service components can be incorporated into your application. Such as:
Workflow, directory, security, and scheduling.
_____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor.
Workstations
Technical documentation is defined as:
Written details used by computer operators to execute the program and by analysts and programmers to solve problems or modify the program
Do businesses use social networking systems?
Yes, to connect to influential people from outside your immediate environment or organization
What does Homo Conexus mean in terms of an informed user?
You (the informed user) practice continuous computing and are surrounded by a personal, movable information network
volume testing
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.
parallel start up
You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?
Evaluating Information quality
You can find information related to companies, products, people, governments, research, etc. that is readily available through the Internet For example: You can find many sites that rank high schools. -What data do they use? -Where is the data from? -Does the information truly represent the overall population? -Is there a potential bias?
API is often explained as...?
a technology that allows applications (software programs) to talk with one another. -the terms "software", "applications", "machines", and "computers" are virtually interchangeable.
You cannot boot a computer from ____________.
a wireless network
During modeling of the CRISP-DM method, we would ______.
apply selected modeling techniques
A deep _________ ____________ doesn't translate well on mobile; it often forces the user to take too many steps to reach the content.
information architecture -which is often supported by cascading menus on the desktop.
With cloud computing, you don't need to ......?
make large upfront investments in hardware and spend a lot of time on managing that hardware.
The "create and load data" step involves....?
making sure that all files and databases are populated and ready to be used with the new information system.
Some businesses outsource their security management to MSSPs. MSSP stands for ________.
managed security service provider
A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) __________.
management information system (MIS)
A Cloud services platform such as Amazon Web Services owns and maintains the ___________________________________ required for these application services, while you provision and use what you need via a web application.
network-connected hardware
Instead, you can..... _____________________________________________ .......to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.
provision exactly the right type and size of computing resources you need
The concept of _______, in connection with IS security, recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
reasonable assurance
The RESTful API is doing what?
receiving, processing, and handling requests and responses.
A collection of fields all related to a single object, activity, or individual is a(n) _____.
record
Description of Input Controls: Their purpose is to...?
reduce errors while protecting the computer system against improper and fraudulent input.
The phase-in approach involves...
slowly phasing the new systems components as the old systems components are phased out.
VUI uses ___________________ technology to enable users to interact with technology using just their voices.
speech recognition Ex: Siri, Alexa
Scrum projects make progress in a series of ________.
sprints
_____ is a good site to develop your professional network.
Several types of testing must be conducted before a new or modified information system is ready to be put into production. These tests include:
-integration testing -system testing -volume testing -user acceptance testing
check slide 19
..
What are the disadvantages of the waterfall system?
1. users get a system that meets the needs as understood by the developers; however, this might not be what the users really need. 2. Often, user needs go unstated or are miscommunicated or misunderstood. 3. Users cant easily review intermediate products and evaluate whether a particular product (ex. a data flow diagram) will lead to a system that meets their business requirements.
Quality Info and Web Scraping Scraping Web Data with Chrome Web Scraper Extension Cleaning the Data
10 points...
What percentage of today's Fortune 500 companies are technology companies?
10%
The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.
128-bit
T&E frauds alone account for about ___% of all frauds uncovered.
16%
According to Lewin and Schein's 3-stage model of organizational change, which of the following tasks would be found in the 'unfreezing' stage?
Assign leaders and implementation team
What is the difference between information and business intelligence (BI)?
Information is about a specific situation; business intelligence is about internal and external conditions and how they will affect strategy
What is the innovation strategy?
Introducing new products and services, add new features to existing products and services, or develop new ways to produce them (Ex. the first introduction of automated teller machines (ATMs) by Citibank)
Which of the following statements is true of a database?
It helps companies analyze information to open new market opportunities.
What is data?
Raw facts that describe some phenomenon
hot spot
The area covered by one or more interconnected wireless access points is commonly called a(n) _____.
What is telepresence?
The latest form of videoconferencing which enables participants to seamlessly share data, voice, pictures, graphics, and animation by electronic means
What is the difference between the implementation phase and the maintenance phase?
The maintenance phase monitors and adjusts new and existing systems; the implementation phase places new systems into operation
What is a twisted-pair wire?
The most prevalent form of communications wiring used for almost all business telephone wiring and consists of strands of copper wire twisted in pairs; relatively inexpensive, widely available, and easy to work with
What is bandwidth?
The transmission capacity of a network (stated in bits per second)
What is packet switching?
The transmission technology that breaks up blocks of data into packets
What is electronic teleconferencing?
The use of electronic communication technology that enables two or more people at different locations to hold a conference
hyper-text transfer
The world-wide-web uses _____ protocol for transmitting content.
The three basic components of a successful e-commerce model include content, commerce, and community.
True
How to create an API: step 2 Create a ______ to each resource.
URL
The Internet is an example of a _________
WAN
economic fluctuations
Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs?
java
You wish to learn a programming language that can be used on any computer. What language would it be?
If you wanted to ensure that your business maintains a desirable return on your investment with technology, what should be one of your main concerns?
Your technology helps streamline costs without sacrificing quality
Authoritarian regimes sometimes limit citizens' access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of ___________.
censorship
VUI: No clear strategy in VUI can also be said about....?
chatbots, VR, and social media. -Many chatbots were created and then abandoned because they on a checkbox list of customer experience "must-haves" rather than part of a strategy.
REST isn't a specific technology, but rather a _____________________________________ that produces predictable and consistent outputs and behaviors by receiving a set of standard methods and returning standardized structured data, typically JSON or XML, called the resource.
data architecture and design methodology
A _____ is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services.
data center
A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
data definition language
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
data mart
Description of database controls: Many of these controls are provided by....?
database management systems.
-URLs should be....?
descriptive and have structure. (Ex: http://www.ex.com/software/releases/latest.tar.gz)
Product is ______, ________, and ________ during the sprint.
designed, coded, and tested
Suppose you work at a business unit that has group of people who would rather wait to try a new technique. They listen to and follow the opinion leaders. They would be classified as the _________.
early majority
Amy is doing some online research for a term paper. She'd like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used.
false
Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.
false
An in-depth ______________ __________ is done for each of the candidate solutions the team wants to consider.
feasibility analysis
In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:
finance and accounting
In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is__________.
the information systems security analyst
An employee may be authorized to use a P-card to purchase specific business items. If the analysis of P-card data shows that a purchase was made from a consumer products store, then....?
this could be an indication of an actual fraud.
Which of the following is NOT one of the key website performance measures commonly used by online retailers?
total sales
Scrum has been used on multiple 500+ person projects. (T/F)?
true
incursion
The second phase of an Advanced Persistent Threat attack is _____.
A ___________ should be informative and geared towards monitoring and tracking KPIs.
dashboard
Most companies will not succeeded without having a balanced portfolio of acquisition channels. Show a good balance (%).
40% Search 20% Direct 30% Referring Sites 10 % Ad/Email Campaigns Strengths and Weaknesses?
Definition of Scrum.
: A framework within which people can address complex adaptive problems, while productively and creatively delivering products of the highest possible value.
Is Internet 2 a separate physical network from the Internet?
No
Is the World Wide Web the same thing as the Internet
No
What need/problem do API consumers need to solve?
-they want to provide a feature in their website, or mobile application. -often times people just want two systems to talk to each other. -or be able to analyze and visualize information in a particular way, to accomplish a business objective.
"Big Picture" models to keep and maintain:
-"Architecture" of the system for the team to get a rough idea of the whole system structure. -"Domain Model" to help the team to understand the concepts used in the problem domain. -"Key Use Cases " to understand the typical users of the system, and how they benefit from the system.
Things to consider: Currency
-If timeliness of the information is important, is it kept up-to-date? -Is there an indication of when the site was last updated?
Things to consider: Author
-Is the name of the author/creator on the page? -Are his/her credentials listed (occupation, years of experience, position or education)? -Is the author qualified to write on the given topic? Why? -Is there contact information, such as an email address, somewhere on the page? -Is there a link to a homepage? -If there is a link to a homepage, is it for an individual or for an organization? -If the author is with an organization, does it appear to support or sponsor the page? -What does the domain name/URL reveal about the source of the information, if anything? -If the owner is not identified, what can you tell about the origin of the site from the address?
VUI: Limitations
-Will your customers actually use it? -Users have to follow a script -Natural Language Processing
What other needs do API consumers have?
-to get information that would be time-consuming to get there otherwise. -to get information that you can't get otherwise. -To automate a news app that needs live data from other sources. -To use it as a more direct interface for reading and writing data to a service.
Scalability: factors in scaling
-type of application -team size -team dispersion -project duration
Describe the Team
-typically 5-9 people -cross-functional (programmers, testers, user experience designers, etc.) -members should be full-time --may be exceptions (ex. database admin) -teams are self-organized (ideally no titles, but rarely possible) -membership should only change between sprints
Voice User Interface... 5points
...
Intro to SCRUM.. 10 points
....
check slide 109 & 110
....
Structured & Unstructured Data........
.......
E-Business; Mobile Design; and Privacy
.........
SDLC: Waterfall 5 points Cross reference notes to book Chapter 12 504 - 512; 514 - 519; 521 - 534; 542 - 546 Economic Feasibility Analysis 3 points Spreadsheet
..........
What are the ten "flatteners"?
1. 11/9/189: Berlin Wall Falls 2. 8/9/1995: Netscape Goes Public 3. Development of Workflow Software 4. Uploading 5. Outsourcing 6. Offshoring 7. Supply Chaining 8. Insourcing 9. Informing 10. The Steroids
While using data analysis to identify employee fraud, you should...?
1. Analyze entire populations of transnational data. -Look for various forms of anomalies. 2. Analyze transactions for indicators of known fraud risks. 3. Compare data across different databases and systems
If you need to measure and predict customer behavior and attitudes you would most likely use this type of decision support.
Analytics
What is the term used when businesses employ GIS software to generate maps showing information of interest to them?
Business geography
What is the Bargaining Power of Customers (Buyers)?
Buyer power is high when buyers have many choices from whom to buy and low when buyers have few choices
Big and unstructured data is often stored in a NoSQL database for which of these reasons: a. It needs a tabular row and column structure b. It needs a relationship structure with key fields and foreign keys c. Data is spread over multiple servers leading to better response times for queries d. Data is concentrated in one server leading to a better reporting response time e. 2 of the above are correct
C
When assessing security threats and procedures for endpoints; which of the following is True: a. All endpoints have the same risk level b. All endpoints implement the same standard security procedures c. All endpoints should have an up-to-date Operating System installed d. All endpoints should have data encrypted e. 2 of the above are True
C
When assessing security threats and procedures for servers; which of the following is True: a. All servers have the same risk level if they are networked b. All servers implement the same standard security procedures c. All servers should have an up-to-date Operating System installed d. All servers should have data encrypted e. 2 of the above are True
C
nettops
Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying?
What is a Customer Orientation Strategy?
Concentrate on making customers happy. Web-based systems are particularly effective in this area because they can create a personalized, one-to-one relationship with each other
What is outsourcing?
Contracting with an outside company to perform a specific function that your company was doing itself and then integrating their work back into your operation; for example, moving customer call centers to India
After assessing security threats and procedures for IT Systems: a. Applications and endpoints will always share the same risk level b. Applications and servers will always share the same risk level c. Servers and endpoints will always share the same risk level d. Servers and endpoints might have different security risk levels e. All parts of an IT system share the same risk level if they are networked
D
Multi-valued fields in relational databases are: a. Allowed in line item tables b. Allowed because they make update queries faster c. Allowed because they make the retrieving of data in a query faster d. Not allowed e. 2 of the above are correct
D
Which of the following is NOT considered a business intelligence (BI) practice or tool? a. Data extraction b. Visualization c. Predictive Modeling d. Transaction processing controls e. All of the above are BI related
D
NoSQL databases require a company to: a. Model a business process prior to building the database and then not allow changes to the database b. Specifically define the data type for each attribute in the NoSQL table c. Store data in rows and columns d. All of the above are correct e. None of the above are correct
E
Types of data that can be moved from the source to Access include: a. Transaction data b. Unstructured data like web ad data c. Data stored in a different relational database d. Sentiment Analysis customer scores stored in your ERP system e. All of the above
E
Which of the following is an example of unstructured data: a. University of Iowa course registrations b. Social media posts c. University of Iowa payment amounts received for tuition d. Clickstream data e. 2 of the above are examples
E
What is the market space called that allows for interactive e-commerce between multiple buyers and sellers?
E-marketplace
What was significant of development of workflow software?
Enabled computer applications to work with one another without human intervention Enabled faster, closer collaboration and coordination among employees, regardless of their location
Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.
FALSE
Educational institutions' Websites are the most commonly targeted sites by phishers
FALSE
If an activity is defined as legal then it is ethical.
FALSE
A computer-based information system (CBIS) is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, and process data into information, but the CBIS does not include software.
FALSE
A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization
FALSE
A marketing manager who does not have deep knowledge of information systems or data science, willNOT be able to use BI tools
FALSE
A procurement card is an attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or a Web site.
False
The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce.
False
What are the IT components?
Hardware, Software, Databases, and Networks
consider the use of artificial tears
Heavy computer users who experience red, dry, itchy eyes should _____.
PaaS: High-performance computing
High performance computing (HPC) on supercomputers, computer grids, or computer clusters helps solve complex problems involving millions of variables or calculations. Examples include: earthquake and protein folding simulations, climate and weather predictions, financial modeling, and evaluating product designs.
What term refers to the electronic integration of government agencies across specific levels of government?
Horizontal government integration
invoice
In the context of purchasing systems involved in the traditional transaction processing systems, when a(n) _____ arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent.
What is an Interorganizational Information system (IOSs)?
Information systems that connect two or more organizations
What are some examples of Ethical Issues?
Information-processing activities Monitoring employee email Monitoring employee Internet activity at work Privacy of customer data
What is Infrastructure as a Service (IaaS)?
Infrastructure as a Service (IaaS) is an instant computing infrastructure, provisioned and managed over the internet. Such as: Computers (virtual or on dedicated hardware), networking, and data storage space hardware.
In what decision making phase do you recognize a problem, need, or opportunity?
Intelligence
Which of the following activities is not part of component-based development?
Learning and using new technologies to enhance existing information systems
What is e-learning?
Learning supported by the Web
What is Lusha?
Lusha is a platform which locates business and individual profile information, such as emails and phone numbers, and it is used for recruitment, marketing, and sales purposes.
What are the three types of business pressures?
Market pressures Technology pressures Societal/Political/ Legal pressures
_____ is a hard disk drive storage device that is set up with its own network address and provides file-based storage services to other devices on the network.
Network-attached storage (NAS)
What type of system is known for finding and differentiating patterns?
Neural networks
What is an example of a Digital Divide?
One Laptop per Child (OLCP)
present the results in an easy to understand manner
One of the goals of business intelligence is to _________.
Organic/natural search results
Organic refers to people clicking on a free link from a search results page. For example, people clicking through to your website from a free result on a Google search results page.
_____ is/are considered to be the most important element in computer-based information systems.
People
What is the function of a decision support system?
Provide access to data and analysis tols
An expert system is capable of all but which of the following?
Providing conclusive answers
materials requirement plan
Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers.
If you were able to quickly pull information from student records with course records to build students' schedules, you would be using a _____ tool.
Query-by-example
REST and API are acronyms for.....?
REST = Representational State Transfer API = Application programming interface
APIs that use the REST architecture pattern are said to be ____________.
RESTful
If you were to create, read, or respond to a blog on Facebook, you would be working with which of the following applications?
Social networking site
Creating an API: What are resources?
Something that can be stored on a computer and represented as a stream of bits. Ex: -A document (e.g. Purchase Order) -Row in DB (e.g. 'User Profile') -Output of executing an algorithm --like a mortgage payment calculation.
What are some examples of Interorganizational Information Systems?
Supple Chain Management (SCM) Electronic commerce (e-commerce) systems
What is the Bargaining Power of Suppliers?
Supplier power is high when buyers have few choices from whom to buy and low when buyers have many choices
_____ encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery.
Supply chain management
employing full-time IT professionals to manage its resources
Suppose a small business is using the hosted model for its enterprise software. Which of the following will not be an issue they will he worried about?
SWAPI Authentication
Swapi is a completely open API. No authentication is required to query and get data. This also means that we've limited what you can do to just GET-ing the data.
_____ are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output.
System operators
A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more.
TRUE
What is supply chaining?
Technological revolution led to the creation of networks composed of companies, their suppliers, and their customers, all of which could collaborate and share information for increased efficiency
How does technology affect ethics?
Technology increases the complexity of ethical dilemmas faced by our society
Why do we consider technology invasive?
Technology is an integral part of our personal, as well as our professional lives
What is User Acceptance Testing?
UAT is testing performed by trained systems users to verify that the system can complete required tasks in a real-world operating environment and perform according to the system design specifications
gathering information
While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?
Workstations
_____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor.
augmented reality
_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.
artificial intelligence systems
_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.
data correction
_____ involves reentering data that was not typed or scanned correctly.
pilot start-up
_____ involves running a complete new system for one group of users rather than all users.
Things to consider: Accuracy
-Are the sources for factual information clearly listed so that information can be verified? -Is it clear who has the ultimate responsibility for the accuracy of the content of the material? -Can you verify any of the information in independent sources or from your own knowledge? -Has the information been reviewed or refereed? -Is the information free of grammatical, spelling, or typographical errors?
Things to consider: Purpose
1. Knowing the motive behind the page's creation can help you judge its content. 2. Who is the intended audience? -scholarly audience or experts? -general public or novices? 3. If not stated, what do you think is the purpose of the site? Is the purpose to: -inform or teach? -explain or enlighten? -persuade? -sell a product?
Sprints: typical duration is.....?
2-4 weeks or a calendar month at most.
How long did it take for iPod to penetrate a market audience of 50 million people?
3 years
Which of the following is true about structured data from an Online Transaction Processing System? a. Each transaction is processed at the time of entry b. Is based upon Business Intelligence analysis c. Data is always captured with a paper document d. Involves unstructured data about 80% of the time e. 2 of the above are correct
A
data mart
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
star
A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.
What is the Intranet?
A network that uses Internet protocols so that users can take advantage of familiar applications and work habits; supports discovery (easy and inexpensive browsing and search), communication, and collaboration inside an organization
What is a Barrier to Entry?
A product or service feature that customers have learned to expect from organizations in a certain industry; a competing organization must offer this feature in order to survive in the marketplace (e.g. legal requirements such as admission to the bar to practice law)
In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.
BUS NETWORK
A company buys and receives products from suppliers that they will sell on their e-commerce site. Once they receive the products from the suppliers and record it in their Purchasing System; they create a spreadsheet of products and quantities received; and then manually update the quantity available for sale in their ecommerce system. Options for real-time system integration software are: a. Design and build integration software that automates ETL for weekly data transfers b. Avoid using a database and instead, rely on integration software for better control c. Buy real-time system integration software from a software provider and implement it d. Design and build a new Purchasing System that uses larger relational database software e. 2 of the above are correct
C
In what type of e-commerce do the consumer drive supply and the business drive demand?
C2B
Which of the following e-commerce business models is considered very small?
C2G
What is the title for the person responsible for overseeing every aspect of an organization's information resource?
CIO (chief information officer)
Information systems applications help sales and marketing professionals with all of the following EXCEPT __________.
COMPUTER MANUFACTURING
What is the title of the person responsible for ensuring that information is used in an ethical way and that only the right people have access to certain types of information?
CPO (chief privacy officer)
Your ex-colleague was apprehended based on the "Fraud and Related Activity in Connection with Access Devices Statute" Act. He was caught using unauthorized or stolen _________.
CREDIT CARDS
What is the title of the person responsible for overseeing both the underlying IT infrastructure within an organization and the user-facing technologies?
CTO (chief technology officer
Which of the following is a potential disadvantage with self-service BI?
Can lead to over spending on unapproved data sources and business analytics tools.
A business intelligence (BI) predictive model that predicts whether a student accepted to the Tippie COB will actually enroll in the Tippie COB; might use: a. Structured Data only b. Unstructured Data only c. Internal Unstructured Data only d. Structured and Unstructured Data e. None of the above are used in a BI model
D
Which of the following is true about structured data from an Online Transaction Processing System? a. Data is batched, and transactions are created once a day b. Transactions are typically stored in a NoSQL database c. Involves unstructured data about 80% of the time d. Point of Sale system that reads a UPC code is an example e. 2 of the above are correct
D
With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.
Database as a Service
What is sabotage or vandalism?
Deliberate acts that involve defacing an organization's Web site, potentially damaging the organization's image and causing its customers to lose faith
What is virtual collaboration?
E-collaboration; the use of digital technologies that enable organizations or individuals who are geographically dispersed to collaboratively plan, design, develop, manage, and research products, services, and innovative applications
Companies usually follow the ____________________________ set forth by the Federal Trade Commission (FTC)
Fair Information Practices Principles (FIPP)
What term is used when referring to an informed user, such as yourself?
Homo Conexus
If the marketing department were to pass information to the finance department, what type of information flow is this considered?
Horizontal
Customer Relationship Management
In Book....
Which of the following is an IT system that supports the capturing, organization, and dissemination of knowledge?
Knowledge management system
data steward
Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______.
it can take a long time and significant resources to develop the required software features
One of the disadvantages of proprietary software is that ______________.
Which application supports the manipulation of information to support decision making?
Online analytical processing (OLAP)
What are business requirements?
The detailed set of requests that the proposed information system must meet to be successful
backbone
The fiber-optic cables that span the globe over land and under sea make up the Internet _____.
What does it mean for a data warehouse to be multidimensional?
The files stored in a warehouse contain multiple layers of columns and rows
Landing Page
The landing page is the first page viewed during a session, or in other words, the entrance page. It can be useful to review your landing pages to understand the most popular pages people view as they navigate to your website. This can be used to identify potential opportunities to cross-promote or feature other content from your website.
Pages/Visit
The number of pages that a user visits after landing on the initial page. The higher the number, the more engagement your landing page is promoting.
What is vulnerability (of an information resource)?
The possibility that the system will be harmed by a threat
What is the Internet Backbone?
The primary network connections and telecommunications lines that link the nodes made up of a fiber-optic network that is operated primarily by large telecommunications companies
SaaS: _______________________ manages the hardware and software, and with the appropriate service agreement, will ensure the availability and the security of the app and your data as well.
The service provider
performance and power consumption
The toughest challenge in designing a processor for a smartphone or tablet is balancing _____________.
What is broadband?
The transmission capacity of a communications medium (approximately 1 million bits per second)
What is teleconferencing?
The use of electronic communication technology that enables two or more people at different locations to hold a conference
service-oriented architecture
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.
measurable
The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for?
Linux
_____ is an open-source operating system whose source code is freely available to everyone.
a wireless network
You cannot boot a computer from ____________.
systems operation
_____ involves using a new or modified system under all kinds of operating conditions.
Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) __________.
knowledge management system
Which of the following types of credit cards is currently diminishing in popularity and being replaced by the other three types?
magnetic stripe
In most large organizations, the IS department is divided into the following functions __________.
operations, development, and support
The toughest challenge in designing a processor for a smartphone or tablet is balancing _____________.
performance and power consumption
A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product.
personalized
Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?
presentation graphics
Which of the following is NOT a potential drawback to downsizing?
reduced payroll costs
In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is__________.
the information systems security analyst
Describe a modeling workshop
-Communicates the core ideas and the structure of the system. -Don't try to make the SAD complete. -"Use workshops as a way to establish a common understanding without handovers while having a rich conversation." -"Print and Draw" modeling workshops are facilitated with big paper posters on the wall (or on the table) and by doing the conversation with them. -Draw notes and comments directly on the printed poster.
What are possible actions resulting from the draft of investigation report?
-Continue on into systems analysis -Modify the project in some manner and perhaps repeat the systems investigation -Drop the project altogether
Examples of Lusha Uses:
-Get complete profile information on individuals for marketing purposes. -Given full name and email, the Lusha API completes the picture with phone numbers and location details. -Get rich information on company profiles for sales or marketing. You can get company logos, descriptions, location, and more -Integrate Lusha with marketing tools and sales tools.
What does the ScrumMaster do?
-Represents management to the project -Responsible for enacting -Scrum values and practices -Removes impediments -Ensure that the team is fully functional and productive -Enable close cooperation across all roles and functions -Shield the team from external interferences
Describe Burndown chart
-Visualize the correlation between the amount of work remaining and the progress in reducing the work -- x: date -- Y: hours of work remaining -Update according the sprint backlog
Scraping with the Google Chrome Extension:
-Web Scraper is an extension for the Chrome browser made exclusively for web data scraping. -You can setup a plan (sitemap) on how to navigate a website and specify the data to be extracted. -The scraper will traverse the website according to the setup and extract the relevant data. -It lets you export the extracted data to CSV.
Things to consider: Reliability and Credibility
-Why should anyone believe information from this site? -Does the information appear to be valid and well-researched, or is it unsupported by evidence? -Are quotes and other strong assertions backed by sources that you could check through other means? -What institution (company, government, university, etc.) supports this information? -If it is an institution, have you heard of it before? Can you find more information about it? -Is there a non-web equivalent of this material that would provide a way of verifying its legitimacy.
The review system investigation request typically includes what information?
-a preliminary statement of the problem or opportunity to be addressed. -a brief discussion of how this effort aligns with previously defined company and organization objectives, goals and strategies. -Identification of the general areas of the business and business processes to be included in the scope of study.
Responsive Design: Describe Card & Card-like Layouts design pattern
-cards are a way of organizing different topics -card layouts respond well to responsive designs. -smaller screens have helped the web to become more responsive. -pages can be broken up into constituent parts, and reordered on the fly, depending on browser and screen sizes. -cards work for displaying information in bite-sized chunks. -cards often include information such as title, a username, a picture, and various icons, a brief amount of text (like a product description).
Mobile E-Commerce: Cyber Monday
-cyber Monday 2017, Mobile saw its first $2 Billion. -claiming just under 1/3 of the money spent online. -Smartphones accounted for 37.6% of retail visits and 21% of the revenue on Cyber Monday. -Smartphone conversion rates were up by roughly 10%
What are the 3 steps of the system construction phase?
1. code software components 2. create and load data 3. perform unit testing
What kind of information might you Scrape?
1. product prices from your competitors. 2. a listing of real estate agents with phone number and email for marketing your Home Selling Software Product. 3. A list of all retail stores in a city for a location analysis project; where might I open my new business? 4. A list of last months restaurant inspections for a research project. 5. A list of all apartment buildings in a city. 6. A list of all products that large e-commerce sites sell that are Made-In-USA; where might I sell my Made-In-USA product? Does it fit within their product lines? Is my pricing reasonable?
A friend's computer came with Windows 8 operating system. Which of the following years was the computer most likely bought in?
2012
used to make solid products
3D printing is ___________.
What is a Wiki?
A Web site that allows you to create, change, or eliminate content
What's the Internet?
A global WAN that connects approx. 1 million computer in all continents; features around 3 billion people daily
embedded system
A global positioning system (GPS) device uses a(n) _____ to help people find their way around town or more remote areas.
What is a data warehouse?
A logical collection of information gathered from many different operational databases to create business intelligence
What is Enterprise Resource Planning (ERP)?
A set of integrated programs that manage a company's vital business operations for an entire organization. -leading provider is: SAP and Oracle
What is the difference between a social networking site and a social networking system?
A social networking site is a virtual place to socialize; a social networking system is the tools that link you to people
What are the pros of buying software?
A software solution can be acquired and deployed relatively quickly. An organization can "test drive" software before acquiring it.
enterprise search
An international package shipping company like FedEx needs to be able to track the location of every package at every stage in the process, from pick-up to delivery. Which specific type of software would be useful in this situation?
What is a business process?
An ongoing collection of related activities that create a product or service of value to the organization, its business partners, and/or its customers
In business and in life, where do most decisions fit into?
Between structured and unstructured
_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.
Big data
PaaS: Big Data Analysis
Big data is a popular term for massive data sets thsat contain potentially valuable patterns, trends, and associations. Mining data sets to locate or tease out these hidden patterns requires a huge amount of processing power, which IaaS economically provides.
What are fiber optic cables?
Consists of thousands of very thin filaments of glass fibers that transmit information via light pulses generated by lasers; surrounded by cladding, a coating that prevents the light from leaking out of the fiber
What is your personal information network created by?
Constant cooperation between -the digital devices you carry -the wired and wireless networks that you access as you move about -web-based tools for finding information and communicating and collaborating with other people
What is risk acceptance?
Continuing to operate without controls, and absorb any damages that occur
It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.
FALSE
What is hardware?
Devices such as the processor, monitor, keyboard, and printer (physical items)
What group of people knows little about IT but a lot about domain knowledge?
End users
_____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.
Enterprise data modeling
Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.
FALSE
Network management software is a system software that controls the computer systems and devices on a network and allows them to communicate with each other.
FALSE
How do you apply the "one primary action per screen" principle?
Every screen should support a single action of the real value to the user.
Dashboards: You can build an effective KPI dashboard in ________.
Excel -how do you update the data on the dashboard?
leveraging the expertise of people across the organization
Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system?
"Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems.
FALSE
A collection of data fields that are all related to one object, activity, or individual is called a file.
FALSE
Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors.
FALSE
Spam emails do not add to costs because nobody reads them anyways.
FALSE
Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requiremenT
FALSE
Suppose your university administrators wish to summarize student GPA on Major, Gender, High School, Home City and ZIP Code dimensions. This cannot be done with one data cube.
FALSE
In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:
FINANCE AND ACCOUNTING
join
For the ____ operation, it is required that the the two tables have a common attribute.
Description of Personnel Controls: ____________ and other security devices (such as smart cards) can prevent unauthorized people from entering strategic areas in the information systems facility.
ID badges
If you were to purchase a car before it was manufactured and the assembly of that car was dictated by your requirements, you would be utilizing which type of manufacturing process?
Just-in-time manufacturing
________ have specific targets that directly impact business outcomes.
KPI's
Dashboards: Create a spreadsheet and map out the data behind your most important _____.
KPIs -each KPI you track will have at least one data point originating from one system or another.
This harmful malware is triggered by a specific event, such as Friday the 13th.
LOGIC BOMB
_____ is an open-source operating system whose source code is freely available to everyone.
Linux
What does carelessness with computing devices entail?
Losing or misplacing these devices, or using them carelessly so that malware is introduced into an organization's network
sales forecasting
Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _______ to develop an estimate of future customer demand.
What is cross-functional processes?
No single functional area is responsible for their execution; steps are executed in a coordinated, collaborative way
If you were a programmer and needed to view information as it was stored by the database, what type of database view would you see?
Physical view
When you make a choice that may not necessarily be the best choice but it meets your needs, you're making a(n) _____ choice.
Satisficing
Data mining is used to explore large amounts of data, looking for hidden patterns that can be used to predict future trends and behaviors.
TRUE
Data represents real-world things including raw facts such as image and audio data.
TRUE
Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time.
TRUE
If you wish to have a visual depiction of relative frequencies of words in a document, a word cloud would be an appropriate option .
TRUE
JavaScript can be used to validate data entry in a Web form.
TRUE
Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online.
TRUE
One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit.
TRUE
PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online
TRUE
There are bots that can sign up for thousands of email accounts.
TRUE
Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.
TRUE
Management information systems (MIS) focuses on which of the following?
Tasks related to information processing and management
What is the definition of the Steroids?
Technologies that amplify the other flatteners Enable all forms of computing and collaboration to be digital, mobile, and personal
_____________________ dictate how developers can use APIs, and the end-users can take advantage of services on the platform.
Terms of Service (TOS)
What type of analytics detects patterns in grammar, syntax, and structure?
Text
_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.
The Internet Protocol (IP)
_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.
The Web
What is Transmission Control Protocol/ Internet Protocol?
The protocol of the internet
What is this an example of? you use MailChimp to manage all of your mailing lists. You want to be able to automatically add and remove people from lists when certain things happen instead of someone having to manually manage those lists.
Using APIs as a more direct interface for reading and writing data to a service.
Wikipedia.org is a contemporary Web site providing definitions and descriptions of many concepts. Wikipedia is not peer-reviewed (a group of peers or experts do not verify the quality of information). Because of this, Wikipedia may not demonstrate which of the following quality attributes?
Validity
What is a distributed denial of service attack?
Where an attacker first takes over many computers, typically by using malicious software; these computers are called zombies or bots; attacker uses these bots- which form a botnet- to deliver a coordinated stream or information requests to a target computer, causing it to crash
What is a denial of service attack?
Where an attacker sends so many information requests to target computer system that the target cannot handle them successfully and typically crashes (ceases to function)
What is videoconferencing?
Where participants in one location can view participants, documents, and presentations at other locations
What is Enterprise Resource Planning?
Where systems are designed to correct a lack of communication among the functional area IS; provide communication among functional area ISs
It helps companies analyze information to open new market opportunities.
Which of the following statements is true of a database?
With network-management software, a manager on a networked personal computer can scan for viruses.
Which of the following statements is true of network-management software?
It provides documents required for FDA and environmental compliance.
Which of the following statements is true of product lifecycle management (PLM) software?
It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.
Which of the following statements is true of the E-Government Act of 2002?
Describe web query in Excel.
You can use Excel to import data appearing on a web page. 1. Use "Data" ribbon in Excel and then choose "From Web" Option. 2. Next, you provide a URL in a dialog box that looks like a web browser. 3. A box with an arrow appears next to html tables on the page. 4. You can select a table on the page by clicking on the arrow next to it. 5. You can now import data from the selected table into Excel by clicking on the "import" button. 6. Next, provide where toy would like your imported data to appear. *you can click Properties to modify Refresh frequency.
system testing
_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.
the internet protocol (ip)
_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.
_____ is a good site to develop your professional network.
Network-attached storage (NAS)
_____ is a hard disk drive storage device that is set up with its own network address and provides file-based storage services to other devices on the network.
game theory
_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.
spreadsheet
_____ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations.
Green computing
_____ is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.
structured query language (sql)
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
Magnetic tape
_____ is a storage technology that is primarily used only for backups.
near field communication (nfc)
_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards.
Enterprise data modeling
_____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.
Microsoft Office
_____ is an example of a popular general purpose software suite for personal computer users.
agile development
_____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months.
A register
_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).
cloud computing
_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.
code of ethics
_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.
XP; extreme programming
______ stands for __________ and is a form of agile software development.
API's came into existence to satisfy...?
a demand for access to valuable content, data and resources.
System analysis concludes with...?
a formal analysis report summarizing the findings of this phase of the project (Prepare draft of system analysis report)
New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____.
an embedded system
Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document.
applets
Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of _________.
business analytics
User interface design integrates concepts and methods from ________________, _________________, and __________________ to build interfaces that are accessible, easy to use, and efficient.
computer science, graphic design, and psychology
Information systems applications help sales and marketing professionals with all of the following EXCEPT __________.
computer-assisted manufacturing
The idea of _____ is a form of innovation that constantly seeks ways to improve business processes and add value to products and services.
continuous improvement
Suppose a new tech startup wants to define the data model. They would then ____.
create the entity-relationship model
Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.
cybercriminals
Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization?
diffusion of innovation theory
A global positioning system (GPS) device uses a(n) _____ to help people find their way around town or more remote areas.
embedded system
Volume testing involves....?
evaluating the performance of the information system under varying yet realistic work volume and operating conditions.
Technical feasibility
examines whether a project is feasible within the current limits of available technology
Dashboards: Gathering your data to feed your dashboard likely requires...
going to multiple services.
With a SaaS offering you do not have to think about how the service is maintained or how the underlying infrastructure is managed; you only need to think about.......?
how you will use that particular application software.
A(n) _____ device provides data and instructions to the computer and receives results from it.
input/output
Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________.
nettop
Web scraping
the process of using computer software to extract large amounts of data from websites
SaaS: All of the underlying infrastructure, middleware, app software, and app data are located in..... ?
the service provider's data center (IaaS and PaaS).
One advantage of proprietary software versus off-the-shelf software is that _____.
the software provides a company a competitive advantage by solving problems in a unique manner
systems design
_____ creates a complete set of technical specifications that can be used to construct an information system.
procurement management
Activities related to the acquisition of goods and/or services for a project from sources outside the organization make up _______.
All of the following are examples of someone using personal productivity software EXCEPT _________.
Callie entering a customer's order into a restaurant's ordering system
apply selected modeling techniques
During modeling of the CRISP-DM method, we would ______.
preparing alternative courses of action
Experienced project managers would manage risk by ______.
If your home air conditioner has an IP address, it is part of the ____.
Internet of Things
You wish to learn a programming language that can be used on any computer. What language would it be?
Java
communication managment
_________ involves the generation, collection, dissemination, and storage of project information in a timely and effective manner.
presentation graphics
Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?
verify the card is legitimate and not a stolen card number
On the back of a credit card the three-digit number above the signature panel is used to _____.
ARM
Parker has an Android smartphone. Which type of processor is used in his mobile device?
may 13th
Suppose Task C has Task A and Task B as its predecessor tasks. Task A ends on May 10th and Task B ends on May 12th. When can Task C begin?
the agreement is to reimburse the costs plus a fixed amount as fee
Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.
alert the Department of Homeland Security about information security incidents
The US-CERT incident reporting system is used to ____.
conversion funnel
The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.
IS organization
The members of the _______ review and consider the corporate objectives, goals, and strategies, and they can generate many ideas for IS projects that support corporate objectives and goals.
mission statement
The organization's _____ is stated in a challenging manner to inspire employees, customers, and shareholders.
steal data
The purpose of Advanced Persistent Threat (APT) usually is to ____.
activate the forensics analysis team and prepare documentation
There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
issues-based strategic planning
This type of strategic planning defines the organization's vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values.
the spreadsheets "what-if" capability
To analzye various alternative scenarios, a manager would use _______.
currency
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?
100,000 to 200,000
What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report?
business leadership skills
Which of the following is NOT a characteristic of a data scientist?
automated customer service
Which of the following is NOT a commonly used BI tool?
format
Which of the following is NOT a component of a KPI (key performance indicator)?
A teller in a bank uses a POS to withdraw money for a customer.
Which of the following is NOT an example of a common use of a point-of-sale (POS) device?
transaction processing
Which of the following is NOT considered business intelligence practice?
the technique implies causality between the independent and the dependent variables
Which of the following is NOT true about linear regression?
Can lead to over spending on unapproved data sources and business analytics tools.
Which of the following is a potential disadvantage with self-service BI?
It is a software and hardware combination that limits the incoming and outgoing Internet traffic.
Which of the following is the correct description of a firewall?
Fraud and Related Activity in Connection with Access Devices Statute
Which of the following laws covers false claims regarding unauthorized use of credit cards?
cyberterrorism
Which of the following subject areas does the USA Patriot Act cover?
IS manager
You are part of an Information Systems project team. Your job is to ensure that the technology and vendor suggested for use in the project are consistent with the IS strategy. Your role in the project steering team is _____.
identity theft
You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.
Leaving laptop computers unattended in public spaces
You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?
your non-work related use of the laptop could increase vulnerability
You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is ______.
Assign roles and privileges to users so that only job-relevant data is accessible to the user.
You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?
Install a Business Rules management system and interface it to the Supply chain management system.
You work for a manufacturing business. Your employer uses a model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation?
At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________.
data lifecycle management