MGMT 341 Final
Which of the following is the most complete desciption of computer crime? -processing private information from an official computer system. -using a computer to commit an illegal act -unauthorized use of a computer device -stealing computer devices
using a computer to commit an illegal act
Match each part of the URL www.winthrop.edu to the correct term for it. -www -winthrop -edu
-www - host -winthrop - domain -edu - top level domain
Which of the following technologies opens new avenues for copyright violations? -3D printing -IIoT -Big Data -home automation
3D printing
Data mining is most closely associated with ______ CRM. -Analytical -Operational -Collaborative
Analytical
Which is the correct list of the three general ways Informations Systems provide value? -Organizational Learning - Supporting Strategy - Analyzing Competitive Forces -Automating - Organizational Learning - Supporting Strategy -Increasing innovation - Automating - Supporting strategy
Automating - Organizational Learning - Supporting Strategy
A systematic approach by all of an organization to examine, rethink and redesign processes in order to improve performance is called _________________.
Business process management
Systems for providing effective communication (with the customer) from the entire organization are -Analytical CRM -Operational CRM -Collaborative CRM
Collaborative CRM
federal law prohibiting stealing data about national defense, banking data or threatening a US President or other federal administrative members
Computer Fraud and Abuse Act
Which of the following are items of concern in managing an I.S. infrastructure? -Data Center (or data warehouse) -Networking -Employee skill -Software -Hardware
Data Center (or data warehouse); Networking; Employee skill; Software; Hardware
Old system is discontinued and new system is in use immediately. A. Parallel B. Direct C. Phased D. Pilot
Direct
federal law makes it a crime to intercept/record communications services without the knowledge and permission of those being recorded.
Electronic Communications Privacy Act
Which of the following statements is the best example of organizational learning? -Employees of an organization visiting a local high school's career day. -Employees of an organization carefully analyzing inventory reports from the past quarter in preparation of ordering for the upcoming quarter. -A mandatory training session for employees to learn to use a new software application. -A company sponsored seminar for employees to learn about retirement planning.
Employees of an organization carefully analyzing inventory reports from the past quarter in preparation of ordering for the upcoming quarter.
Which of the following are considered the primary threats to IS Security? Select all that apply -Viruses -Employees -Accidents/Natural Disasters -Outside Intruders -Links to Outside Associates -Hackers -Email attachments
Employees; Accidents/Natural Disasters; Links to Outside Associates; Email attachments
focuses on long-term strategic questions, often making decisions that are unstructured
Executive Level
Which of the following terms refers to a private part of the Internet used by an organization to allow access only to those it chooses to grant access to, such as customers, suppliers, etc. ? -Intranet -Extranet -PBX -Internet
Extranet
Choosing and implementing an emerging information system or technology is sufficient to gain and sustain competitive advantage. -True -False
False
Cybersquatting is considered unethical but is not illegal -True -False
False
Operational, managerial, and executive decision making levels are all supported by a single type of information system. -True -False
False
The Systems Development Life Cycle is a series of four phases that must be completed in order, with no back-tracking or iteration of phases. -True -False
False
The World Wide Web is the term used to mean the network of the Internet overall, including the computers, the transmission media and all of the digital information stored or displayed -True -False
False
The term "computer security" refers only to the activities related to protecting computers against criminal activity. -True -False
False
The terms "database" and "database management system" are synonomous. -True -False
False
Transmission of data, voice and video over the same network.
IP Convergence
Select all statements below that are true of IP addresses. -An IP address is made up of letters that spell the name of the company. -IP addresses are made up of numbers. -The domain name translates to an IP address.
IP addresses are made up of numbers.; The domain name translates to an IP address.
a system that uses sensors that emulate or enhance human capabilities
Intelligent system
Which of the following terms refers to a broad range of physical objects connected to the internet that can share data over the internet? -The Web -Global information systems -Information systems -Internet of Things
Internet of Things
Which of the following terms refers to a private network which uses web technology for transmission and is used only by authorized users within an organization, such as employees? -Intranet -Internet -PBX -Extranet
Intranet
Which of the following statements is true about an IP address? -It is written as a number with a period at the end. -None of the available statements is true. -Each number separated by periods can have any number between 0 and 999. -It can be used to navigate to particular Web addresses.
It can be used to navigate to particular Web addresses.
collection of tools to enable generation, storage and management of tacit and explicit assets
Knowledge management system
focuses on monitoring and controlling operations and providing information to higher level personnel
Managerial Level
____________ law stated that computing power (transistors on a chip) would double about every 2 years
Moore's
According to ______, the number of transistors that could be squeezed onto a silicon chip would double about every 18 months to 2 years -laws of physics -Moore's law -cloud computing standards -Megan's law
Moore's law
SFA (sales force automation) is most closely associated with ______ CRM. -Operational -Analytical -Collaborative
Operational
focuses on day-to-day operations, usually making routine, structured decisions
Operational Level
Both old and new system used for some time to verify the new system performs as expected. A. Parallel B. Direct C. Phased D. Pilot
Parallel
allows investigators to intercept communication under certain circumstances
Patriot Act
Analyst gathers information and builds a business case for a new/improved system A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation
Phase 1, Systems Planning/Selection
Collect requirements, model data (determine data that is needed) A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation
Phase 2, Systems Analysis
Processing is designed and the logic is determined. Pseudocode is often used. A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation
Phase 3 Systems Design
Install the system. Testing. Training. A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation
Phase 4 Systems Implementation
Software programming/writing code A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation
Phase 4 Systems Implementation
Parts , or modules, of a new system are implemented one at a time over time. A. Parallel B. Direct C. Phased D. Pilot
Phased
new system is implemented in one location or department before implementation in all other areas A. Parallel B. Direct C. Phased D. Pilot
Pilot
Which of the following is the best description of a knowledge worker? -Computer programmers. -Professionals who create, modify, and/or synthesize knowledge as a fundamental part of their job. -Professionals who use knowledge in their work every day.
Professionals who create, modify, and/or synthesize knowledge as a fundamental part of their job
Which of the following terms is an approach to systems development that is best used when the endpoint isn't known and involves trial and error until an acceptable solution is found? -AGILE -Prototype -Rapid Application Development (RAD) -SDLC
Prototype
A user of proprietary software has rights to ___ the software. -run -modify -copy -redistribute
Run
the protocol that allows different networks to communicate over the internet
TCP/IP
Core competencies necessary for a career in information systems include which of the following? -Technical competency -Financial accounting competency -Systems competency -Business competency
Technical competency; Systems competency; Business competency
A RFP is often a required step in acquiring a new I.S. through external acquisition A. True B. False
True
As data storage becomes less expensive, the need for storage increases. -True -False
True
CRM is a corporate level strategy to create and maintain lasting relationships with customers.
True
Computer viruses are created intentionally by a hacker and are not caused by incompatibility or conflicts between computer hardware or software. -True -False
True
Enterprise systems that have been customized require thorough testing and possibly further customization with every new version of the system
True
Managerial-level decision making is referred to as semistructured decision making. -True -False
True
RFID is rapidly replacing the use of standard bar codes on most products -True -False
True
Some computer viruses are harmless pranks -True -False
True
To make VMI possible, the manufacturer (or retailer) often allows the supplier to monitor stock levels and ongoing sales data.
True
Which of the following are prohibited by the Computer Ethics Institute's guidelines for responsible computer use? Select all that apply. -Using a computer to harm others -Copying or using software without paying for it -Snooping in other people's files -Using computer resources without authorization
Using a computer to harm others; Copying or using software without paying for it; Snooping in other people's files; Using computer resources without authorization
The _____ version of software includes only the features and modules that a packaged software comes with out of the box.
Vanilla Version
Which of the following statements is from the Target article regarding what they did after consumers became "freaked out" by how much information Target knew about them? -We stopped using the analysis of their purchases to make predictions about their personal life. -We started mixing in all these ads for things we knew pregnant women would never buy, so the baby ads looked random.
We started mixing in all these ads for things we knew pregnant women would never buy, so the baby ads looked random.
A standard developed by the World Wide Web Consortium and used by web designers/programmers to enable the transmission and validation of data between web pages and databases is -HTML -SQL -XML -Java
XML
Which statement(s) below describe a legacy system? Select all that apply. -useful in utilizing and integrating data from many departments and processes. -easy to integrate with other systems. -a stand-alone system that was not designed to support multiple departments. -is fast approaching the end of its useful life span
a stand-alone system that was not designed to support multiple departments; is fast approaching the end of its useful life span
12. The phenomenon of cutting out the middleman in transactions is referred to as a. disintermediation b. e-tailing c. group buying d. showrooming e. net neutrality
a. disintermediation
6. Intranets are most often used by ___________ of an organization a. employees b. customers c. upper level management
a. employees
1. Select the true statement below. a. A file with the extension .csv can be read only by spreadsheets, mathmatical and statistical analysis software applications. b. The file extension .csv stands for Common Standard Values c. In using a .csv file in Excel, saving it as a .csv file again converts all formulas and functions to the displayed values in the saved file
a. A file with the extension .csv can be read only by spreadsheets, mathmatical and statistical analysis software applications.
5. Match a. Crowd sourcing b. collective intelligence c. metadata - the use of the contributions of others as free labor to complete a task. Example: Wikipedia - data about data, which may describe a digital file in terms of when it was created and by whom, etc. - A concept which uses people with a divergent range of skills and expertise to outperform that capabilities of an individual expert. Example might be an online journal about brain surgery.
a. Crowd sourcing - the use of the contributions of others as free labor to complete a task. Example: Wikipedia b. collective intelligence - A concept which uses people with a divergent range of skills and expertise to outperform that capabilities of an individual expert. Example might be an online journal about brain surgery. c. metadata - data about data, which may describe a digital file in terms of when it was created and by whom, etc.
2. Match each of the following terms with the best example. a. Descriptive analytics . b. Predictive Analytics c. Prescriptive analytics - Estimating the expected sales of the coming week based upon last week's sales. - Reviewing reports of restaurant sales from each of night of the prior week - Scheduling the correct number of employees for the coming week based upon last weeks sales reports.
a. Descriptive analytics - Reviewing reports of restaurant sales from each of night of the prior week. b. Predictive Analytics - Estimating the expected sales of the coming week based upon last week's sales. c. Prescriptive analytics - Scheduling the correct number of employees for the coming week based upon last weeks sales reports.
10. A web site that is maintained by the city of Charlotte and allows residents to view the property tax rates is an example of: a. G2C b. C2C c. G2G d. C2B
a. G2C
12. Which of the following are tips for businesses to be prepared in case of a crisis with social media? Select all that apply. a. Identify a crisis team. b. Monitor your social media environment. c. Act fast. d. Before reacting, monitor the situation for a while to see if the problem resolves itself. e. Identify your social media nightmare
a. Identify a crisis team. b. Monitor your social media environment. c. Act fast. e. Identify your social media nightmare
Which of the following statements is true about hard data? a. It includes facts and numbers. b. It involves the use of text mining technologies. c. It includes textual news stories. d. It includes nonanalytical information.
a. It includes facts and numbers.
The most common language used to work with databases and perform queries is called: a. SQL b. XML c. HTML d. TCP/IP
a. SQL
7. Match the following TYPES of reports that are commonly produced from a DBMS with the best description. a. Scheduled b. key-indicator c. drill-down d. ad hoc - give greater detail to help analyze information on a prior report - highlights situations that are out of normal range - produced at predefined intervals or days/times - provide of summary of critical information - unplanned; created to support non-routine decisions
a. Scheduled - produced at predefined intervals or days/times b. key-indicator - provide of summary of critical information c. drill-down - give greater detail to help analyze information on a prior report d. ad hoc - unplanned; created to support non-routine decisions
Which of the following statements concerning the management of master data are true? Select all that apply. a. The information presented by master data is typically shared among units in an organization as "one version of the truth." b. Access to modify or edit master data is to normally allowed to all employees. c. The format and rules of use of master data must be agreed upon by all units in the organization who collect, store or use the data.
a. The information presented by master data is typically shared among units in an organization as "one version of the truth." c. The format and rules of use of master data must be agreed upon by all units in the organization who collect, store or use the data.
. Finding the right technology to manage knowledge assets is often easier than determining what knowledge needs to be captured and who has this knowledge a. True b. False
a. True
3. Data integrity can be protected by human means and by use of technological means a. True b. False
a. True
4. To truncate data means to remove characters from the end of a data element, often to save space. For example, to truncate the word "computer" at 4 characters produces "comp". a. True b. False
a. True
A database is simply a collection of related data organized in a way that makes searches possible. Therefore, a small database could even be stored as an Excel spreadsheet. a. True b. False
a. True
10. Which statements below are benefits of using a CMS? Select all that apply. a. allows collaboration by many users on files. b. allows different users to have differing levels of access. c. Is used only for working with web sites/pages. d. allows users to publish or edit files.
a. allows collaboration by many users on files. b. allows different users to have differing levels of access. d. allows users to publish or edit files.
Methods used to discover previously unknown, or hidden, predictive relationships in data is _____ a. data mining b. clustering c. classification d. data modeling
a. data mining
6. Select the common errors that compromise data integrity. Select all that apply. a. files overwritten b. viruses c. sorting incorrectly d. failure to backup files e. errors in formulas f. truncated data g. power failures
a. files overwritten c. sorting incorrectly e. errors in formulas f. truncated data
5. Technological methods used to protect data integrity and enforce business rules are called: a. integrity contraints b. integrity assurance c. validation d. error messages
a. integrity contraints
7. ______________ is the principle that all traffic on the internet should be treated equally with no interference from the internet service provider or any other 3rd party. a. net neutrality b. m-commerce c. disintermediation d. Internet Tax Freedom Act
a. net neutrality
paying a business to refer customers to another business
affiliate marketing
Securely limiting access to electronic information should include the use of -something you know -something you have -something you are -all other possible answers listed
all other possible answers listed
Which of the following benefits are available with the use of most CRM systems? Select all that apply -allows individualized customer service -enables operation 24 hours a day and 7 days a week -speeds processes -allows timely exchange of data to facilitate improved and timely product development -enables customers to shop online
allows individualized customer service; enables operation 24 hours a day and 7 days a week; speeds processes; allows timely exchange of data to facilitate improved and timely product development
Testing by a software tester that uses sample data and may be done a testing environment is which of the following types? -developmental -alpha -beta
alpha
11. Adding information about the location a file was created is called ________. An example would be adding the longitude and latitude to a photograph. a. tagging b. geotagging c. posting d. labeling
b. geotagging
Which of the following is an example of a utility program? -operating system -a spreadsheet application -a word processor -antivirus program
antivirus program
Which of the following storage methods is used for storing long-term copies of organizational data that typically need to remain unchanged? -operational -archival -translational -backup
archival
2. Which type of e-commerce generates the greatest number of transactions? a. B2B b. B2C c. C2C d. G2C
b. B2C
1. Success using applications in the consumer environment usually indicates the application will be successful in the corporate environment. a. true b. False
b. False
11. SEO is managed well by using appropriate and relevant keywords on your web site. Other concerns such as backlinks are not relevant. a. True b. False
b. False
6. The term "structural firmness" refers to whether a web site is easy to use with menus that are well-designed. a. True b. False
b. False
As explained in the text, in database design redundant data should be avoided for which of the following reasons? Select all that apply. a. redundant data makes it difficult to print the data b. Redundant data wastes file storage space. c. redundant data is not well organized (a change to a phone number could make it necessary to change many instances of that phone number.)
b. Redundant data wastes file storage space. c. redundant data is not well organized (a change to a phone number could make it necessary to change many instances of that phone number.)
13. Which of the following are visual indicators that a web site is being accessed over a secure connection. Select all that apply. a. The web site text states that it is secure. b. The URL begins with "https". c. The web site asks for personal information. d. An image of a locked or green padlock is displayed in the address bar
b. The URL begins with "https". d. An image of a locked or green padlock is displayed in the address bar
In a relational database design, each column is a(n) ______________ a. record b. attribute c. query d. entity
b. attribute
14. The definition of E-Commerce includes internet transactions only. a. true b. false
b. false
2. Changes in technology that enabled dynamic web applications, allowing people to collaborate and share content online is referred to as Web 1.0. a. true b. false
b. false
4. In designing web sites to meet consumers' needs, successful companies will address which of the following sets of characteristics? Select all that apply. a. search engine optimization b. functional convenience c. Structural firmness d. representational delight
b. functional convenience c. Structural firmness d. representational delight
The term which refers to perform a search or retrieval of information from a database is ____________________ a. ad hoc b. query c. normalization d. Lookup
b. query
9. A set of standards for sharing updated web content, such as news, across sites is _____________________ . Access to these updates often requires a user to sign-up or subscribe a. mashup b. real simple syndication c. microblogging d. wikis
b. real simple syndication
3. In order to minimize fraud, EC businesses look for anomolies in which of the following? Select all that apply. a. click fraud b. shipping and billing addresses c. transaction patterns d. e-mail addresses provided
b. shipping and billing addresses c. transaction patterns d. e-mail addresses provided
1. Knowledge management systems often store _______ knowledge assets that reflect processes or procedures that are known, yet difficult to explain to others. a. common b. tacit c. detailed d. explicit
b. tacit
11. Which of the following characteristics are associated with Big Data? Select all that apply. a. verifiability b. volume c. variety d. velocity
b. volume c. variety d. velocity
The transmission capacity of a computer or telecommunications device is -speed -bandwidth -TCP/IP
bandwidth
the transmission capacity of a device or communications channel
bandwidth
Organizations are increasing trying to use ________ , or analyze structured and unstructured data from social media, customer support calls, transactions and other sources. -deep web data -big data -raw data
big data
a commission is paid to the business for aiding in a transaction
brokerage
Large fluctuations in supplies caused by several small fluctuations and the need to create stock "buffers" is the __________________. -supply chain planning -vertical market -product flow -bullwhip effect
bullwhip effect
. In a database storing data about customers, which of the following would be the best choice to be used as a primary key? a. Last name b. Full name c. Customer ID number
c. Customer ID number
4. A ________ is a special purpose information system designed to support organizational decision making. a. Intelligent system b. Transaction processing system c. Decision support system
c. Decision support system
8. A(n) _________________ emulates human capabilities such as reasoning or sensing. a. Decision support system b. database system c. Intelligent agent system d. Transaction processing system.
c. Intelligent agent system
5. Methods for improving a web site's rank in search engine results is a. SEO - search entity operations b. SEO - simple engine optimization c. SEO - search engine optimization d. SEO - search engine operations
c. SEO - search engine optimization
8. The phrase "amateurization of journalism" is often used in reference to which of the following Web 2.0 applications? a. podcasts b. wikis c. blogs d. webcasting
c. blogs
9. Companies following a ________ business strategy choose to operate solely in the traditional physical markets a. brick and click b. click only c. brick and mortar d. none of the above
c. brick and mortar
_______ refers to tools and techniques for analyzing past data a. advanced analytics b. business analytics c. business intelligence
c. business intelligence
2. In data analysis, _____________ is used when records ( or data) are segmented based on grouping known beforehand. a. clustering b. mining c. classification d. drilling down
c. classification
. In a database storing records about employees and the department to which they are assigned, which type of association would be most appropriate? a. many-to-many b. one-to-one c. one-to-many
c. one-to-many
1. According to the laws passed in accordance with the Internet Tax Freedom Act, companies are required to collect sales tax on internet sales a. if they have sales over $100,000 per year. b. if the company was created after 2004. c. only from customers who reside in a state in which the company has a presence. d. according to the laws of the state in which the customer lives
c. only from customers who reside in a state in which the company has a presence.
3. People meeting at the same time, whether in person or virtually is _________ communication. a. asynchronous b. collaborative c. synchronous d. virtual teams
c. synchronous
users pay a fee for using software
licensing
A ______ on a network typically makes requests and receives applications and files from other computers on the network. -client -extranet -peer -intranet -server
client
A short description of _______________ is "network access to a shared pool of computing resources." -cloud computing -IP convergence -utility computing -software as a service
cloud computing
The various services offered online that allow users to access software and store data, such as Google Docs, are good examples of _________. -systems integration -cloud computing -data mining -internetworking
cloud computing
The ability to learn new technologies and assess their impact on one's work and life is _____ -intellectual property -technological inertia -computer fluency -BYOD
computer fluency
Knowing how to use a computer to gather, store or organize information is known as ____________ . -information technology -the digital divide -technology literacy -computer literacy
computer literacy
The type of maintenance of Information Systems that is usually considered the highest priority is -corrective -adaptive -preventive -perfective
corrective
Most computer crimes/abuses are committed by __________, as reported by most organizations. -spyware -current or former employees -hackers -white hats
current or former employees
support interaction between a firm and its customers
customer relationship management system (or CRM)
15. The term _____ refers to technologies in innovative ways to support the financial sector a. E-finance b. electronic bill pay c. online brokerage d. Fintech
d. Fintech
7. Which of the following statements is true about tagging? a. It is the process of categorizing digital photos. b. It is the process of distributing digital media for playback. c. it is the process of creating avatars and syndication feeds. d. It is the process of adding metadata to digital information such as files or photos
d. It is the process of adding metadata to digital information such as files or photos
10. A primary key is a. used as a secondary method of identifying an attribute b. a combination of two or more attributes c. can be duplicated within the entity d. a unique identifier for a record
d. a unique identifier for a record
4. A wiki a. allows users to add content. b. allows users to revert edits c. allows anyone to read content. d. allows all of the above.
d. allows all of the above.
8. A business model based on the __________________ caters to niche markets a. group buying b. social commerce c. paid inclusion d. long tail
d. long tail
raw symbols such as letters or numbers that have no meaning until formatted or processes
data
A firewall is part of a computer system designed to ________. (Select all that apply.) -detect instrusions -prevent unauthorized access -filter traffic -correct network errors
detect instrusions; prevent unauthorized access; filter traffic
A company whose focus is on maximizing customer service - even if it increases transportation costs, production costs is focused on _____________.
effectiveness
The extend to which goals are accomplished well.
effectiveness
A company whose focus is on minimizing production costs ( even if it sacrifices customer service) is focused on_____________.
efficiency
The extent to which goals are completed faster, at a lower cost and with little time or effort.
efficiency
The exchange of data using telecommunications networks is referred to as: -internet transmission -electronic data interchange or EDI -extended markup language -portals
electronic data interchange or EDI
____ is the process of encoding messages before the enter a network, then decoding them at the receiving end so the recipients can read (or hear) them. -encryption -authentication -doxing -tunneling
encryption
_____ is the process of encoding messages before they are transmitted through a network, then decoding them upon arrival at the destination. -encryption -authentication -biometrics -password protection
encryption
Which type of software licensing is commonly a negotiated agreement which results in a license allowing a specific number of users or installations? -enterprise license -click wrap license -shrink wrap license -business license
enterprise license
Types of business arguments discussed in the text include which of following? -faith based -fear based -financial based -fact based
faith based; fear based; fact based
Which of the following are primary components of an ERP? Select all that apply. -financial management -human resource management -value chain management -operations management
financial management; human resource management; operations management
The term given to a company that is first to enter a market thus creating a competitive advantage is ________. -competitive mover -strategic mover -first-mover -adaptor
first-mover
Giving away limited versions of a product in order to build a large customer base is called a -affiliate product -innovation -sharing economy -freemium
freemium
Information systems use information technology to collect, create, and distribute useful data. Information technology consists of -big data -hardware -software -people -telecommunications
hardware; software; telecommunications
Which of the following backup strategies includes a fully equipped location with hardware, software, and current data? -cold backup site -hot backup site -disaster recovery plan -RAID
hot backup site
___________ safeguards help protect information systems with laws, effective management and ethics. -educational -human -technological
human
formatted or organized in a manner that can be recongnized by a user or computer
information
An information system that supports functional areas, business processes and decision making within the organization is which of the following: -externally focused system -legacy system -internally focused system
internally focused system
A network of physical objects that can automatically share data over the internet is a/the __________. -smart home technologies -network effect -internet of things
internet of things
Computer maker, Dell, realized there are problems with keeping large inventories because of the fast rate of obsolescence of electronics components. Dell now keeps only minimal inventory in its factories. The company is most likely using a ________. -Scan based trading system -customer_managed inventory system -just-in-time inventory management system -vendor-managed inventory system
just-in-time inventory management system
A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________. -critical factor -performance metric -key performance indicator -critical performance indicator
key performance indicator
the ability to use or understand something to make informed decisions
knowledge
Which of the following are considered intangible ? Select all that apply -total cost of ownership -loss of customers -sales gains -increased customer satisfaction
loss of customers; increased customer satisfaction
A manufacturer receives a cash deposit with an order for a custom designed work desk. It will take about 7 weeks to produce the desk. Upon completion, the desk will be sent to the buyer and the balance will be paid in full. This process is known as ________. -make-to-order -order-to-cash -procure-to-pay -make-to-stock
make-to-order
In the ________ process, goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from inventory. -make-to-order -make-to-stock -procure-to-pay -order-to-cash
make-to-stock
Which of the following tasks are managed by the operating system? -calculations of Excel formulas -file compressions using a Zip application -formatting the text in Microsoft Word -managing input and output devices
managing input and output devices
Which of the following is a core business activity? -payroll record keeping -common administrative tasks -human resource actvities -operations and manufacturing
operations and manufacturing
We often use information systems for learning and improving. The ability of an organization to use past behavior and information to improve its business processes is ______________. -organizational learning -supporting strategy -automating
organizational learning
Least ______ and least privileges mean that users should only be given access to the systems, data, or resources that are needed to perform their duties, and access to other resources should be restricted. -authorization -identification -passwords -permissions
permissions
The RAID method is commonly used in -processes to backup data -creating new, outsourced, information systems -processing data -naming files
processes to backup data
An alternative measure of outcome used when it is difficult to measure direct effects is a -intangible variable -proxy variable -indeterminate variable -decision variable
proxy variable
A product that uses markedly new or different technology to provide significantly greater customer benefits and eventually replaces existing products is a -radical innovation -breakthrough -open innovation -startup
radical innovation
A ___ is a document that an organization uses to tell vendors the requirements of a needed project and invite them to submit a proposal identifying how they would meet the requirements. -job announcement -vendor request -requirements specification -request for proposal
request for proposal
Organizations deploying innovative information systems must have the human capital and financial capital necessary to deploy the new systems. These requirements can be categorized as ________ requirements. -risk tolerance -process -quality -resource
resource
An organization hires an outside company to manage routine backups of the corporate data and to perform regular updates to its software. This is an example of -risk reduction -risk transference -risk rescheduling -risk acceptance
risk transference
software that gathers private information from a computer
spyware
With respect to decision making in organizations, ________ decisions are those in which the procedures to follow for a given situation can be specified in advance. -comparative -asymmetrical -structured -unstructured
structured
users pay a recurring fee, often monthly, for the use of a product or software.
subscription
Which of the following careers typically observes and/or studies the current processes/tasks that may be incorporated into a future (new) I.S. ? -systems analyst -systems developer -computer programmer
systems analyst
Which of the following careers would usually create most of the diagrams, flowcharts, entity relationship models, etc. for a new I.S. ? -systems analyst -systems developer -computer programmer
systems developer
What is meant by BYOD? -the increased focus of hardware companies on the mass market -the phenomenon that devices are becoming increasingly useful -the use of personal devices and applications for work related purposes
the use of personal devices and applications for work related purposes.
Which of the following are common reasons documentation must be kept during all phases of the SDLC? Select all that apply. -to detail installation procedures and troubleshooting suggestions -to provide an attractive, printed book about the system -to aid in the creation of training materials -as reference for users or developers
to detail installation procedures and troubleshooting suggestions; to aid in the creation of training materials; as reference for users or developers
a customer buying a product from a web site
traditional sales
Which of the following are keys to successful implementation of an Enterprise System. Select all that apply. -train users -upgrade the enterprise system regularly -evolve the implementation -Secure executive sponsorship -Get help from outside experts -secure buy-in from staff that will use the system -use a multidisciplinary approach
train users; evolve the implementation; Secure executive sponsorship; Get help from outside experts; use a multidisciplinary approach
process day-to-day, operational data
transaction processing system
a computer program that appears to be a legitimate program but carries with it a destructive computer virus
trojan horse
Which of the following terms are often used to describe Big Data? Select all that apply. -variety -virtual -volatile -volume -velocity
variety; volume; velocity
A market comprised of firms within a specific industry sector is a _____________. (An example may be an automobile manufacturer and and tire manufacturers.) -vertical market -horizontal market -supply network -vendor managed inventory
vertical market
An automobile manufacturer buying a company which produces tires is an example of expanding into the -vertical market -horizontal market -competing industry -supply chain management
vertical market
Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home. -near-me area -wired -virtual private -bluetooth
virtual private
software written specifically to disrupt the normal functioning of a computer or network
virus
a computer virus that is designed to copy itself and send itself through networked computers
worm