MIS 3 - Spring
data warehouse
A repository of historical data that are organized by subject to support decision makers in the organization.
The secondary key is a field that identifies a record with complete uniqueness.
Answer: False
Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.
Answer: True
The best way to capture the data in an organized format is to use a database.
Answer: True
You would be an instance of your university's STUDENT class.
Answer: True
Expert systems do what?
Apply reasoning, knowledge, and expertise within a specific domain.
Because AI mimics human intelligence, it has the capability to be creative. True False
False
Computers typically work in isolation in modern organizations due to information security concerns. True False
False
Customers that are using software-as-a-service are not using cloud computing. True False
False
Cybersquatting refers to the tampering of existing Web sites and selling unrelated products.
False
Decision-support systems support only lower- and middle-level managers. True False
False
Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity. True False
False
Electronic commerce makes national and international markets less accessible. True False
False
Employees who telecommute have generally found that the experience enhances their careers. True False
False
In batch processing, the data are collected from transactions as they occur and placed in groups or batches that are processed as they occur.
False
In order to be considered as an e-commerce Web site, the site must sell some tangible good. True False
False
In the fulfillment process, instance-level information indicates the status of a particular vendor purchase order. True False
False
In the implementation phase of the decision-making process, managers set criteria for the evaluation of alternative potential solutions. True False
False
Independent data stores or data silos are an efficient way to store proprietary data because they deny access to unauthorized parties.
False
Independent data stores or data silos are an efficient way to store proprietary data because they deny access to unauthorized parties. True False
False
Information technology and information systems are the same thing.
False
Internet marketing typically is one-way and impersonal.
False
Mainframe computers are no longer being used. True False
False
T/F A browser is used to prevent web surfing.
False
T/F Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.
False
T/F Digital signals have two parameters, amplitude and frequency.
False
T/F Microwave transmissions are broadcast, where as satellite transmissions are point-to-point.
False
T/F Social commerce involves paying for services such as online dating.
False
T/F The 20-80 rule refers to the fact that 20% of the feedback on social media is typically negative.
False
T/F The IT department is solely responsible for the quality of the data in the data warehouse.
False
T/F Voice and data communication networks are becoming more expensive.
False
Which of the following statements is false?
Business activity monitoring is a type of scheduled reporting.
T/F eBay uses a reverse auction.
False
Two strategies that a company can use to gain a competitive advantage are?
Customer-Orientation and Operational Effective Strategy.
Concentrate on making customers happy:
Customer-orientation Strategy
It is very difficult to manage data for which of the following reasons?
Data are scattered throughout organizations.
clickstream data
Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a Web site.
Data subject to constraints is an example of:
Data integrity
________ occurs when the same data are stored in many places.
Data redundancy
Which of the following represents the core drives of the information age?
Data, Information, Business Intelligence, Knowledge
A(n) _____________ is a computer program designed to support a specific task or business process.
Database
The Internet is managed by a central agency which bears all the cost and responsibility. True False
False
The right of privacy is absolute. True False
False
The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores.
False
The stock market is the only area of business that has experienced fraud on the Internet. True False
False
Trademark owners in the US are not allowed to sue for damages in cases of cybersquatting. True False
False
Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities.
False
Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities. True False
False
Entering data and programs from user departments to the mainframe was called remote data entry. T or F?
False!
Information systems for accounting and finance incorporate the following functions: (check all that apply)
Financial planning and forecasting Budgeting Auditing
The area of the earth reached by a satellite's transmission is referred to as its _____.
Footprint
HR information systems, POM information systems, CRM information systems, and marketing information systems are usually classified as:
Functional Area Information Systems
HR information systems, POM information systems, CRM information systems, and marketing information systems are usually classified as:
Functional area information systems
How does IT affect society?
Employees have greater flexibility in terms of work hours and locations.
Enterprise resource management is an enterprise wide effort intended primarily to acquire and retain customers.
FALSE
Functional information systems support the entire enterprise or major portions of it.
FALSE
Generating revenue from social networking sites is easy to do.
FALSE
Geo-tagging refers to tagging information on tour sites.
FALSE
In order to be considered as an e-commerce Web site, the site must sell some tangible good.
FALSE
Internet marketing typically is one-way and impersonal.
FALSE
One can trust the content of blogs.
FALSE
People making online posts know that they are providing market research data.
FALSE
Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.
FALSE
Refer to IT's About Business 3.3 - Your Privacy on Facebook: Which of the following is false about Facebook's privacy polices?
Facebook uses an Opt-in Model
A browser is used to prevent web surfing. True False
False
Which of the following statements concerning tagging is false? a)Tags fall into categories. b)Users can pick their own tags. c)Tags can be given to any piece of information or file. d)Tags can be used to retrieve Web content. e)Each user designs a personal set of tagging rules.
Tags fall into categories.
primary key
The identifier field or attribute that uniquely identities a record.
Which of the following are key data in a packing list?
Order and ship quantity Date the order was shipped Unit weight
The cloud service in which customers rent servers and operating systems over the Internet is called:
Platform as a service
structured query language (SQL)
Popular relational database language that enables users to perform complicated searches with relatively simple instructions.
_____ typically are used for unplanned B2B purchases, and the amount per purchase generally is limited ($1,000 to $2,000)
Purchasing Cards
Downloading a book on an Amazon Kindle is an example of:
Pure E-commerce
Downloading a book on an Amazon Kindle is an example of:
Pure e-commerce
When you buy a book from Amazon for your Kindle, you are conducting:
Pure-play EC
____ is a communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet.
Router
Sales and marketing professionals use IT for which functions?
Site Analysis and Promotion Anaylsis
Twisted Wire Pair
Slowest, most used, inexpensive, easy to work with
An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:
Social Engineering
Rank-and-file employees tend to make more _________ decisions. a)Structured b)Unstructured c)Undocumented d)Semistructured e)Procedural
Structured
A standard language used to manipulate data in a database is ___.
Structured Query Language
Broadband refers to a network with a high transmission capacity.
TRUE
Collaborative consumption allows strangers to make connections through peer-to-peer sharing.
TRUE
Companies monitor blogs for mention of their products.
TRUE
Companies use CRM systems to recreate the intimate personal relationship that once existed between them and their customers.
TRUE
Knowledge management systems (KMS) are used by organizations to capture, store, and disseminate knowledge within the organization.
TRUE
Many employees have organized work groups usually social networking sites because their companies don't offer similar tools.
TRUE
More and more organizations are using social media for training sessions.
TRUE
Online analytical processing involves the analysis of accumulated data by end users.
TRUE
distribution portals
corporate portals that automate the business processes involved in selling or distributing products from a single supplier to multiple buyers
Ergonomics with affect employees by
eliminating some of the physical stresses experienced on the job.
The primary goal of extranets is to do which of the following?
foster collaboration between and among business partners
With which type of satellite is there a propagation delay?
geostationary
With _____, every call opens up a dedicated circuit for the duration of the call.
plain old telephone service
A(n) _____ is automatically launched by some trigger and appears in front of the active window.
pop-up ad
pop-under ad
pop-up ad you do not see until you close your current browser window
Which of the following is an example of explicit knowledge?
procedural guides
An organization's IT components include all of the following except:
procedures
Which of the following are typical business processes?
procurement
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.
protocols
The technology that uses radio waves to identify individual items is:
radio-frequency identification
Blogs and wikis fundamentally differ in terms of
Their ability of users to post content
Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
Trojan Horse
A benefit of the summary reports that an enterprise system offers is the ability to drill-down into more specific details for a given report. True False
True
Business process management includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
True
Companies monitor blogs for mention of their products. True False
True
Despite the success of E-Mealz, Jane Delaney did not originally plan to create a large enterprise.
True
Distributed computing refers to the distribution of computing tasks among one or more computers.
True
Messages transmitted across the Internet are first divided into packets. True False
True
Sales force automation is a customer-facing application.
True
Server farms are designed to provide redundancy and fault tolerance. True False
True
Servers are typically more powerful than client machines. True False
True
Social media Web sites can use feeds to help market their products and services. True False
True
T/F Networks enable organizations to meet rapidly changing business conditions.
True
T/F NoSQL databases can process both structured and unstructured data.
True
T/F One of the attributes in a record must be a primary key.
True
T/F Organizational databases access one record at a time, where data warehouses access groups of related records.
True
T/F Rogue access points can be set up by employees.
True
T/F Servers are typically more powerful than client machines.
True
T/F The OnStar system from General Motors is an example of telemetry.
True
T/F The key mechanisms in the sell-side marketplace are customized electronic catalogs and forward auctions.
True
T/F Wireless computing can increase speed and improve customer service.
True
The Internet can both reduce and increase the bargaining power of suppliers, depending on the specific circumstances
True
The Internet can both reduce and increase the bargaining power of suppliers, depending on the specific circumstances.
True
The Internet reduces the barriers of entry for new competitors in an established industry.
True
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. True False
True
The data processed by transaction processing systems provide the inputs for other organizational information systems.
True
_____ refers to online word-of-mouth marketing. a)Permission marketing b)One-to-one marketing c) Personalized marketing d)Viral marketing e)Direct mail
Viral marketing
Which of the following is not a basic function of transmission control protocol?
analyzing the packets for size
functional area information systems
a cross organizational level information system designed to support a specific functional area
customer touch point
any interaction between a customer and an organization
A(n) _____________ is a computer program designed to support a specific task or business process.
application
Facebook is a _________.
social networking site
Facebook is a _________. blog wiki social networking site mash up
social networking site
Precisely targeted attacks, usually in the form of personal messages from a known social contact, are referred to as:
spear phishing. (spam, malware, social engineering)
The set of computer programs used to manage hardware resources is called:
systems software
The amount and type of memory that a computer possesses affects all the following except:
the speed of data entry
Wireless
telecommunications in which electromagnetic waves carry the signal between communicating devices. **makes use of time previously wasted and increases work flexibility**
Managing information systems in a modern organization is challenging because:
the systems are very expensive to acquire, operate, and maintain; and the systems are critical to the organization's operations.
electronic storefront
the web site of a single company, with its own internet address, at which orders can be placed
Companies use blogs for the following purposes: a)Marketing and social commerce b)Connecting with their customers/clients c)Influencing customers and market forces d) All of these
All of these
open-source CRM systems
CRM software whose source code is available to developers and users
Analytical CRM systems
CRM system that analyzes customer behavior and perceptions in order to provide actionable business intelligence
Exception reports show a greater level of detail than is included in routine reports.
False
T/F A free software package is called a browser.
False
T/F A group of related fields is generally called a data file.
False
T/F A relational database typically consists of one large two-dimensional table.
False
T/F A virtual group is one that works in the same room, but uses digital technologies to accomplish its goals.
False
T/F All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews.
False
T/F In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores.
False
T/F In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores.
False
T/F Internet marketing typically is one-way and impersonal.
False
T/F Managing data is difficult because data is stored in one place in an organization, its database.
False
T/F Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.
False
T/F One of the advantages of e-learning is that it is easy to assess students' work.
False
T/F Process and procedures are important but not critical to the effective use of computer based information systems.
False
T/F Social computing forces companies to deal with customers reactively as opposed to proactively.
False
T/F Social data is not a form of big data.
False
T/F Stored-value money cards contain chips with personal data.
False
T/F TCP/IP is a common LAN protocol.
False
T/F The Internet is managed by a central agency which bears all the cost and responsibility.
False
T/F The MIS department is solely responsible for the organization's ER diagrams.
False
T/F The terms, wireless and mobile, mean the same thing.
False
T/F The use of electronic commerce requires companies to hire additional employees.
False
T/F When two companies fight over a domain name the company that has been in business the longest is automatically considered the owner of the domain.
False
T/F Wireless broadband (WiMAX) is most useful for bringing Internet access to individuals in large cities.
False
T/F Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.
False
The "safe harbor" framework details how the European Union exports data about U.S. citizens.
False
The configure-to-order strategy is commonly used by high-volume, low-cost operations, such as grocery stores, office supply stores, or fashion retailers. True False
False
The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores. True False
False
The sell-from-stock strategy is commonly used by low-volume, high-cost industries that require specialized products. True False
False
The use of electronic commerce requires companies to hire additional employees. True False
False
The user interface is the most sophisticated on enterprise operating systems and the least sophisticated on desktop operating systems. True False
False
Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions.
False
Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions. True False
False
Voice and data communication networks are becoming more expensive. True False
False
When requesting production in a highly automated enterprise system, an employee would need to manually create a planned order when inventory levels drop below a predetermined level. (T/F)
False
When two companies fight over a domain name the company that has been in business the longest is automatically considered the owner of the domain. True False
False
Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations. True False
False
[Chapter 12] In the choice phase of the decision-making process, managers construct a model that simplifies the problem. True False
False
[Chapter 5] It is important for applications and data to be dependent on each other. True False
False
Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):
Fiber optic cables offer higher security
Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct): • Fiber optic cables have very high bandwidth. • Fiber optic cables are less difficult to tap. • Fiber optic cables offer higher security. • Fiber optic cables are susceptible to interference.
Fiber optic cables offer higher security
Fiber-optic cables are preferred over co-axial and twisted pair cables because
Fiber optic cables offer higher security. And Fiber optic cables have very high bandwidth.
Which wireline communication has the highest security?
Fiber-optic Cable
Which wireline communication has the highest security?
Fiber-optic cable
Which of the following are typical functional areas in a business?
Finance and Accounting
An "evil twin" is associated with which type of threat to wireless networks? a)Rogue access points b)War driving c)Eavesdropping d)RF jamming
Rogue access points
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.
True
A company stores their products in a warehouse until customers place an order. Once an order has been placed, the company sends their shipments. This company is using a make-to-stock strategy. (T/F)
True
A digital signal consists of a stream of digital bits. True False
True
IT is enabling more and more people to communicate, collaborate, and compete, thereby leveling the digital playing field.
True
In an automated system you would be able to check the status of an order and any other related data by searching for the order number in the system. True False
True
In general, informed users tend to get more value from whatever technologies they use.
True
In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. True False
True
In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.
True
In the production process, instance-level information is concerned with a single planned order and its progress through the production process. (T/F)
True
In the production process, process-level information is concerned with the production process as a whole, across multiple instances and over time. (T/F)
True
T/F An electronic marketplace is a central, virtual market space on the Web where many buyers and many sellers conduct e-commerce and e-business activities.
True
T/F Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
True
T/F Workflow is the movement of information as it progresses through a sequence of steps that make up an organizations' work procedures.
True
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
True
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. True False
True
The sell-from-stock strategy is commonly used by high-volume, low-cost operations, such as grocery stores, office supply stores, or fashion retailers. True False
True
Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. True False
True
Web 2.0 sites tend to be more interactive and collaborative than Web 1.0 sites. True False
True
When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.
True
When you interview for a job at a company, it is likely that the company will Google your name and search social networking sites for information on you. True False
True
Wireless computing can increase speed and improve customer service.
True
You do not have to work in the IT department to benefit from learning about IT.
True
[Tech Guide 4] An expert system has a knowledge base and an inference engine. True False
True
Extranets offer limited accessibility to the intranets of participating companies.
True!
Functional area information systems summarize data and prepare reports, and provide the major support for middle-level managers. T or F?
True!
If your computer loses its power supply, you will lose the contents of your random access memory, because it is volatile. T or F?
True!
In a service-oriented architecture (SOA) is web services can be reused across an organization in other applications. T or F?
True!
In addition to traditional IT jobs such as programmers and designers, many new jobs are available in areas such as e-commerce and network security. T or F?
True!
There are six (6) characteristics of effective Business-IT Alignment. T or F?
True!
Utility computing is also called on-demand computing. T or F?
True!
Web services description language (WSDL) is used to create XML documents.
True!
XML is a more powerful language than HTML.
True!
Which of the following statements concerning blogging is false? a) Anyone can blog. b) A reader can believe all of the details in a blog. c) A company can maintain an internal blog site. d) Blogging can be used in marketing. e) Tweets are replacing blogging.
Tweets are replacing blogging.
Businesses and organizations set up Web sites to:
all - Sell goods and services. - Induce people to visit a physical location. - Reduce operational and transaction costs. Enhance their reputation.
Payment terms are declared by the seller at what step?
quotation
Here is an alternative format: Whereas phishing attacks are ____ , denial of service attacks are ____.
remote attacks requiring user action, remote attacks requiring no user action (remote attacks requiring no user action, attacks by a programmer developing a system ; remote attacks requiring no user action, remote attacks requiring user action ; Distributed remote attacks requiring user action, attacks by a programmer developing a system )
The key mechanisms in the ____ marketplace are customized electronic catalogs and forward auctions.
sell-side
electronic retailing
selling goods and services to ultimate customers over the internet
A company's annual employee evaluation best fits which type of decision? a)unstructured b)structured c)semistructured d)confrontational e)wisdom
semistructured
Blogs and wikis fundamentally differ in terms of
their ability of users to post content
Manufacturers or retailers sell directly to customers in which of the following business models?
online direct marketing
Low Earth Orbit (LEO)
--Satellites move rapidly relative to point on earth. --Large number needed for global coverage. --Requires only low-power transmitters. --Negligible transmission delay. --LEAST expensive to build and launch. --Shortest orbital life (as low as 5 years).
Identify six major categories of network applications:
1-Discovery 2-Communications 3-Collaboration 4-E-learning 5-Virtual Universities 6-Telecommunicating
Variable-length records contain: A. both a variable number of fields and variable field lengths. B. both a variable number of fields and fixed field lengths. C. both a fixed number of fields and variable field lengths. D. both a fixed number of fields and fixed field lengths.
A
Wireless local area network (WLAN)
A computer network in a limited geographical area that uses wireless transmission for communication.
Personal area network
A computer network used for communication among computer devices close to one person.
_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.
A computer-based information system
Data Warehouse
A data warehouse is a repository of historical data that are organized by subject to help support an organizations decision making. They are also relatively expensive so they are used more so by larger corporations. They use online data processing where business transactions are processed online as soon as they occur. Collects data from multiple systems and integrates it together. They also store data for a long time, years even.
Although the incident in the case resulted from a quality assurance error, the attack most closely resembled
A denial of service attack (A worm attack. A virus attack. A spam attack. )
bundling
A form of versioning: offering several products as a package at a single price.
file
A grouping of logically related records.
It is very difficult to manage data for which of the following reasons? A. Data are scattered throughout organizations. B. Data security is easy to maintain. C. Data are stored in the same format throughout organizations. D. The amount of data stays about the same over time. E. The decreasing amount of external data needs to be considered.
A. Data are scattered throughout organizations.
Organizations are using social computing in which of the following functions?
All of these
Increasing amounts of external data need to be considered in making organizational decisions.
Answer: True
Online analytical processing (OLAP) involves the analysis of accumulated data by end users.
Answer: True
Database management packages based on the _______________ model can link data elements from various tables to provide information to users. A. object-oriented B. relational C. network D. hierarchical
B
A(n) _____ is a logical grouping of related fields. A. database B. record C. byte D. field E. file
B. record
With _____, phone calls are treated as just another kind of data. A. chat rooms B. voice over IP C. plain old telephone service D. internet relay chat E. teleconference
B. voice over IP
Differentiate between the terms business process reengineering and business process management.
BPR is a radical redesign of an organizations business processes that is intended to improve the efficiency and effectiveness of these processes. The key to BPR is for enterprises to examine their business processes from a "clean sheet" perspective and then determine for they could best reconstruct those processes to improve their business functions. B/c BPR proved difficult to implement, organizations have turned to BPM. BPM is a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
A high-speed network that connects a firm's LANs and WANS is:
Backbone network
A(n) _______________ is an integrated collection of logically related data elements. A. master file B. program base C. database D. integrated file
C
Which database structure works effectively with complex data types, such as video clips, audio segments, and other subsets of Web pages, and is considered one of the key technologies of Web-based applications? A. Hierarchical B. Network C. Object-oriented D. Relational
C
Cybercriminals can obtain the information they need in order to assume another person's identity by: A. Infiltrating an organization that stores large amounts of personal information. B. Phishing. C. Hacking into a corporate database. D. Stealing mail. E. All of the above are strategies to obtain information to assume another person's identity.
C.Hacking into corporate database
What is _____ is not necessarily _____. A. Illegal, unethical B. Ethical, illegal C. Unethical, illegal D. Unethical, legal E. Ethical, legal
C.Unethical, legal
___ is a type of EC where sellers and buyers are individuals.
C2C
The executive in charge of the IS field is the:
CIO
Which of the following statements concerning CRM is not true?
CRM is designed for companies to interact with their customers as a group.
____ and ____ are the two major challenges for the sellers in e-commerce. a)Order fulfillment, large orders b)Channel conflict, advertising c)Advertising, large orders d)Channel conflict, order fulfillment
Channel conflict, order fulfillment
____ and ____ are the two major challenges for the sellers in e-commerce.
Channel conflict; Order fullfillment
__________ are high speed central networks to which multiple smaller networks connect
Corporate backbone networks
Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?
Cost Leadership
Boolean logic deals with three logical operators: A. AND, OR, and BUT B. AND, NOT, and BUT C. OR, BUT, and NOT D. AND, OR, and NOT
D
In all information systems, data resources must be organized and structured in some logical manner, so that they can be: A. Easily accessed B. Processed efficiently C. Retrieved quickly D. All of the choices are correct.
D
In the relational database model, all data elements within the database are viewed as being stored in the form of simple two-dimensional tables, sometimes referred to as _______________. A. records B. rows C. columns D. relations
D
Object technology allows designers to do all of the following except: A. Develop product designs B. Replicate product designs and then modify them to create new product designs C. Save designs as objects in an object-oriented database D. Substantially reduce the file size of designs
D
_______________ are used to model the relationships among the many entities involved in business processes. A. Entity-relationship diagrams B. Data-flow diagrams C. Schema diagrams D. Subschema diagrams
D
_______________ databases have become the most popular structure for analytical databases that support online analytical process (OLAP) applications, in which fast answers to complex queries are expected. A. Relational B. Object-oriented C. Inter-relational D. Multidimensional
D
Operational data that are constantly updated are stored in:
Databases
The process of profiling
Decreases individual privacy
____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.
Digital Wallets
_____ appears in 3 major forms: stored-value money cards, smart cards, and person to person payments.
E-Cash
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability
E.Liability
Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?
EIS, DSS, TPS
attribute
Each characteristic or quality describing a particular entity.
Which of the following statements is false?
Each functional area within an organization has only one application.
_____ refers to efforts by unauthorized users to access data traveling over wireless networks.
Eavesdropping
_____ refers to efforts by unauthorized users to access data traveling over wireless networks. a)RF jamming b)War driving c)Eavesdropping d)Telemetry e)Installing rogue access devices
Eavesdropping
What could a manager use to measure the success of an MIS project?
Effectiveness MIS metrics, efficiency MIS metrics
Which type of electronic payment is typically favored in B2B?
Electronic Checks
____, which is a broader concept than ___, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization.
Electronic business, Electronic Commerce
Which type of electronic payment is typically favored in B2B
Electronic checks
Discuss at least one main advantage of relational databases.
Enable people to compare information quickly by row or column. Users can retrieve items by finding the point of intersection of a particular row and column.
Human Resources departments only use social computing for external tasks.
FALSE
In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores.
FALSE
In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores.
FALSE
In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores. True False
False
Internet marketing typically is one-way and impersonal. True False
False
Knowledge is data that have been organized to convey accumulated learning.
False
Mainframe computers are no longer being used. True False
False
Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading. True False
False
Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading. True False
False
Niche applications are broad in their scope and run independently of a company's ES. True False
False
T/F A database must be associated with only one computer program or information system.
False
T/F An Intranet is a scaled-up version of the Internet that uses similar technologies.
False
Smart phones
In addition to being small enough to easy carry or wear, have sufficient computing power to perform productive tasks, and can communicate wirelessly with the Internet, they often have: --cellular telephony --bluetooth --wi-fi --digital camera --gps --an organizer/scheduler/address book/calculator --access to e-mail and sms messaging --mp3 music player --video player DOWNSIDE: people can use them to copy and pass confidential information.
Information Systems for production and operations management (POM) incorporate the following functions: (check all that apply)
Inventory and quality management
Collecting sales tax is an example of a(n):
Marketing Business Process
Producing identical items in large quantities is called:
Mass Production
Wi-Fi networks are typically classified as _______ wireless networks.
Medium-Range
A(n) _____ is a logical grouping of related fields.
Record
Each ___ in a relational database is a record.
Row
DNS are a convenient alternative to the difficult-to-remember IP naming system for computers.
TRUE
Data updates in a data warehouse are performed by the MIS department, not the users.
TRUE
Distributed computing refers to the distribution of computing tasks among one or more computers.
TRUE
Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.
TRUE
Financial management, operations management, and human resource management are core ERP modules.
TRUE
Governance of a data warehouse must be a collaboration between business users and IT personnel.
TRUE
In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.
TRUE
Information is the major component of the e-commerce offerings of service industries.
TRUE
Explain how the web has an impact on the bargaining power of customers (buyers):
The web provides customers with incredible amounts of choices for products, as well as information about those choices. As a result, the Web increases buyer power. However, companies can implement loyalty programs in which they use the web to monitor the activities of millions of customers. Such programs reduce buyer power.
Refer to IT's About Business 4.3 - The Stuxnet Worm: Which of the following statements is true?
The worm specifically targeted nuclear facilities
Which of the following statements about companies that provide proactive protection of your information assets is not correct?
These companies operate independently of the three major credit reporting agencies. ( These companies allow their customers to lock their credit files. These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files. When customers sign up with these companies, merchants and banks must obtain their verbal or written permission before opening new lines of credit in their names. These companies will proactively monitor their clients' credit files at the three credit reporting agencies. )
Which of the following is not a limitation of barcodes?
They identify the manufacturer, product, and item
Broadband refers to a network with a high transmission capacity.
True
Tacit knowledge has which of the following characteristics?
Unstructured because it isn't recorded and is through experience
What types of business decisions would an EIS use AI for?
Unstructured decisions
Grid computing utilizes _____ to form a virtual supercomputer. a)Unused processing b)Unused computers c)Geographically dispersed servers d) None of these
Unused processing
Various organizations that promote fair and responsible use of information systems often develop ____.
a code of ethics
WIRELESS FIDELITY
a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
SATELLITE RADIO
a form of digital radio that receives broadcast signals via communications satellite
order fulfillment process
a highly integrated process, often requiring persons from multiple companies and multiple functions to come together and coordinate to create customer satisfaction at a given place and time
WEB 2.0
a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet
A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database
a) Byte
Ratings, reviews, and recommendations
b) Are an aspect of social shopping.
In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File.
b) Bit.
The comments of consumers in the blogosphere concerning a company's products are called ____________________.
b) Consumer-generated media.
24) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports
b) Corporate databases
Organizations are turning to data governance for which of the following reasons? a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization's databases. e) Data across their organizations are generally consistent.
b) They are responding to federal regulations
The most important benefit of knowledge management systems is: a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient.
b) They make best practices available to employees.
Buying a Vehicle Takes Work: Cars.com integrates different types of data from different sources and presents it to customers. Which of the following is false about its Web 2.0 efforts?
b) Users need to join Cars.com in order to obtain pricing quotes from dealerships.
The process of moving data from various sources into the data warehouse is called: a) uploading. b) extracting, transforming, and loading. c) online transaction processing. d) master data management. e) online analytical processing.
b) extracting, transforming, and loading.
In a relational database, every row represents a(n) _____. a) file b) record c) attribute d) primary key e) secondary key
b) record
The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________.
b) social intelligence
Network protocols describe a)The number of nodes in the network. b)The rules for communication within the network. c)The connections between the nodes in the network. d)The number of nodes in the network and the connections between them.
b)The rules for communication within the network.
Data Hierarchy
bit, byte, field, record, file, database
A(n) _____ is a collection of related activities that produce a product or a service of value to an organization.
business process
In the _____ marketplace model, the reverse auction is typically used.
buy-side
The data in a data warehouse: a) are updated constantly in real time. b) are updated in batch mode, approximately once per day. c) are not updated. d) are purged constantly as new data enter. e) are available for MIS analysts, but not users
c) are not updated.
A database management system is primarily a(n) _____. a) file-handling program b) data-modeling program c) interface between applications and a database d) interface between data and a database e) interface between queries and a database
c) interface between applications and a database
When data are normalized, attributes in the table depend only on the _____. a) secondary key b) common attribute c) primary key d) common row e) common record
c) primary key
With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.
convenience instant connectivity
strategies for competitive advantage
cost leadership differentiation innovation operational effectiveness customer-orientation
Compared to data warehouses, data marts have which one of the following characteristics?
cost less
Rank the following in terms of dollar value of the crime, from highest to lowest.
cybercrime - white collar crime - robbery
_____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart
d) Data governance
In a database, the primary key field is used to _____. a) specify an entity b) create linked lists c) identify duplicated data d) uniquely identify a record e) uniquely identify an attribute
d) uniquely identify a record
All of the following are used to provide online market research except
d)Emails
Which type of remote software attack does not require user action? virus worm phishing attack denial-of service attack
denial of service attack
HR departments use social computing applications to assist them in which of the following activities:
e) All of the above a) Recruiting b) Training c) Regrouping teams d) Managing downsizing
Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Both "They enable faster program development." and "They make it easier to modify data and information." e) All of these
e) All of these
Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time.
e) All of these are reasons why managing data is difficult over time.
on-demand CRM systems
hosted by an external vendor in the vendor's data center; lower costs and a need for employees to know only how to access and utilize the software
The threats to information security are _____, and the greatest threat is _____. • increasing, technological • decreasing, technological • staying about the same, software • decreasing, human • increasing, human
increasing, technological ??
An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.
information technology infrastructure
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?
innovation
Which type of satellite has the shortest orbital life?
low earth orbit
Which type of satellite requires the highest number of satellites to cover the earth?
low earth orbit
Secondary Storage
nonvolatile more cost effective than primary storage slower than primary storage
A _____ is automatically launched by some trigger and appears behind the active window. a)keyword banner b) random banner c) pop-up ad d)pop-under ad e)text box
pop-under ad
The _____ is known as make-to-stock.
push model
Which of the following are key data in a purchase order when the order is first created?
quantity of material ordered purchase order number price of the material ordered requested delivery date
Which of the following are variations of the basic fulfillment process
quote to cash inquiry to cash
Knowledge management systems (KMSs)
refer to the use of information technologies to systematize, enhance, and expedite intrafirm and interfirm knowledge management.
Whereas phishing attacks are ____ , denial of service attacks are ____.
remote attacks requiring user action, remote attacks requiring no user action
Brick and Mortar
retailers who sell goods within an actual store
A _____ sends messages through several connected LANs or to a wide-area network.
router
Geostationary Earth Orbit (GEO)
satellites orbit 22,300 miles directly above the equator. These satellites maintain a fixed position above the earth's surface because of their altitude, their orbital period matches the 24-hour period of the earth. For this reason, receivers on the earth do not have to track GEO satellites. GEO satellites are excellent for sending television programs to cable operators and broadcasting directly to homes. --Satellites remain stationary relative to point on earth --Few satellites needed for global coverage. --Transmission delay (approx .25 sec.) --Most expensive to build and launch --Longest orbital life (many years)
Porter's Five Forces
threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry
Mainframe
type of server
The development of mobile commerce is driven by the following factors:
-Bandwidth Improvement -widespread availability of mobile devices
The use of databases enables organizations to (choose all that apply):
-Minimize data inconsistency -Minimize data security risks -Minimize data isolation NOT -Eliminate data redundancy -Eliminate data integrity
The development of mobile commerce is driven by the following factors (choose all that apply)
-widespread availability of mobile devices -bandwidth improvement
Negative societal effects of the increased use of information technology:
1-Can cause health problems for individuals 2-Place employees on constant call 3-Potentially misinform patients about their health problems
IPv6 will allow for ___ unique IP addresses.
2128
Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.
802.11g
A _______________ is an overall logical view of the relationships among the data elements in a database. A. schema B. subschema C. logical data model D. conceptual design
A
bit
A binary digit; that is, a 0 or a 1.
Pervasive Computing (ubiquitous computing)
A computer environment in which virtually every object has processing power with wireless or wired connections to a global network.
A quotation in the fulfillment process is a response to: A sales order A customer invoice A customer inquiry A vendor invoice
A customer inquiry
byte
A group of eight bits that represents a single character.
data mart
A low-cost, scaled-down version of a data warehouse designed for the end-user needs in a small organization, or in a strategic business unit (SBU) or department in a large organization.
normalization
A method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance.
The same data are stored in many places.
Data Redundancy
In the fulfillment process, instance-level information indicates the status of which of the following? A particular customer order A particular quotation A particular goods receipt A particular purchase order
A particular customer order
instance
A particular entity within an entity class.
entity
A person, place, thing, or event about which information is maintained in a record.
Mobile Computing
A real-time wireless connection between a mobile device and other computing environments, such as the Internet or an intranet.
viral marketing
A strategy to get consumers to share a marketer's message, often through e-mail or online video, in a way that spreads dramatically and quickly
EC
A system formed by the interaction of a community of organisms with their physical environment
omputer integrated manufacturing
A system of manufacturing that uses computers to integrate the process of production, business, and manufacturing in order to create more efficient product lines
Really simple syndication is:
A system that allows you to receive information from sites you identify without having to go to the individual Web sites.
Define the term computer network:
A system that connects computers via communications media so that data and information can be transmitted among them.
Satellite radio (Digital radio)
A wireless system that offers uninterrupted, near CD-quality music that is beamed to your radio from satellites.
Microwave transmission
A wireless system that uses microwaves for high-volume, long-distance, point-to-point communication. **Negative: interference**
Global Positioning System (GPS)
A wireless system that uses satellites to enable users to determine their position anywhere on earth.
Satellite Transmission
A wireless transmission system that uses sttelites for broadcast communications.
When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.
A. Buy-side marketplace.
Organizations typically face issues related to e-tailing including A. Companies face issues in both of these areas B. Channel conflict C. Order fulfillment D. Companies do not face issues in either of these areas
A. Companies face issues in both of these areas
A data model is the diagrammatic representation of a database that clearly defines a database's ___ , ____ and ____. A. Entities, attributes, relationships. B. Entity classes, hierarchy, files. C. Data hierarchy, data attributes, data files. D. Entity classes, entity attributes, entity files.
A. Entities, attributes, relationships.
Which of the following is not a reason why software currently comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s? A. Hardware costs have increased. B. Hardware performance has increased C. Software has become increasingly complex. D. Building software applications remains slow, complex, and error-prone. E. None of these
A. Hardware costs have increased
____ is the cumulative store of subjective or experiential learning. A. Tacit knowledge B. Explicit knowledge C. Intellectual capital D. None of these
A. Tacit Knowledge
For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply): A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. C. The ability to eliminate advertising. D. The ability to offer lower prices to customers.
A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. D. The ability to offer lower prices to customers.
A tenet of ethics that refers to determining who is responsible for actions that were taken:
Accountability
Which of the following is not an ethical issue related to IT?
Accountability
______________ determines who is responsible for the actions taken.
Accountability
Radio
Advantages: a.) High bandwidth b.) Signals pass through walls c.) Inexpensive and easy to install Disadvantages: a.) Creates electrical interference problems b.) Susceptible to snooping unless encrypted.
Infrared
Advantages: a.) Low to medium bandwidth b.) Used only for short distances Disadvantages: a.) Must have unobstructed line of sight
Microwave
Advantages: a.) High bandwidth b.) Relatively inexpensive Disadvantages: a.) Must have unobstructed line of sight b.) Susceptible to environmental interference
_____ portals support communities such as hobby groups or a political party.
Affinity
Activities such as an availability check on inventory can be automated in an enterprise system because of which of the following?
An ES integrates functional areas and stores data in a common database.
Wireless Access Point
An antenna connecting a mobile device to a wired local area network.
data governance
An approach to managing information across an entire organization.
identifier
An attribute that identifies an entity instance.
secondary key
An identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy.
_____ systems analyze customer data for designing and executing targeted marketing campaigns.
Analytical CRM
An organization's data warehouse generally maintains its operational data.
Answer: False
Data rot refers to the quality of the data itself.
Answer: False
In a data warehouse, existing data are constantly purged as new data come in.
Answer: False
Which of the following statements is not correct?
As with normal first-class mail, employers cannot read employee e-mail.
AJAX
Asynchronous Javascript and XML
In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n):
Attribute
What is the viewing of the physical world with computer-generated layers of information added to it?
Augmented Reality
Access controls involve _____ before _____.
Authentication; Authorization
A DBMS query language is designed to: A. Support information systems professionals in the development of complex application software B. Support end users who wish to obtain ad hoc reports C. Provide efficient batch mode processing of the database D. Specify the content, relationships, and structure of a database
B
With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices.
B and C
____ accounts for the majority of e-commerce transactions. A. B2C B. B2B C. C2C D. B2E E. G2C
B. B2B
Workflow, groupware, and telepresence systems are examples of which network application? A. Web services B. Collaboration C. Communications D. None of these E. Discovery
B. Collaboration
Which transmission technology utilizes existing telephone lines? A. T-carrier systems B. DSL C. ATM D. SONET
B. DSL
The following can be considered as broadband technologies (choose all that are correct): A. Dial-up B. DSL C. Cable D. All of these
B. DSL C. Cable
Which type of electronic payment is typically favored in B2B A. Electronic credit cards B. Electronic checks C. Smart cards D. Electronic cash
B. Electronic checks
An Intranet that allows limited access to its partners, suppliers, and customers is called a(n): A. Secure Intranet B. Extranet C. Corporate Web site D. Portal
B. Extranet
Which of the following is a flow of the supply chain? A. Virtual flows B. Information flows C. Report flows D. Human resources flows
B. Information Flows
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that is part of the organization's memory and typically resides inside the organization in an unstructured manner. A. Discovery B. Knowledge management C. Decision support D. Data mining
B. Knowledge Management
A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users. A. Supercomputer B. Mainframe C. Midrange computer D. Microcomputer E. Laptop computer
B. Mainframe
_____________is(are) the part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. A. Read-only memory B. Random access memory C. Cache memory D. Registers E. Flash memory
B. Random Access Memory
If broadband is not available in your area, which of the following Internet connection methods would allow you to connect to the Internet? A. You would able to connect using any of these methods B. Satellite C. Cable Modem D. DSL
B. Satellite
The term "data rot" refers to A. Data that no longer serve a purpose. B. The deterioration of the medium on which the data are stored. C. Data that are irrelevant or contain errors. D. All of these.
B. The deterioration of the medium on which the data are stored.
The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by: A. Neither party; PayPal is a free service. B. The payer. C. The payee. D. Both the payee and the payer.
B. The payer.
Network protocols describe A. The number of nodes in the network. B. The rules for communication within the network. C. The connections between the nodes in the network. D. The number of nodes in the network and the connections between them.
B. The rules for communication within the network.
The least expensive cable medium is: A. Fiber-optic cable B. Twisted-pair wire C. Coaxial cable
B. Twisted-pair wire
In an e-credit card transaction, the clearinghouse plays the following role: A. Initiates the transfer of money B. Validates and verifies the seller's payment information C. Transfers funds between the seller's bank and the buyer's bank D. All of these
B. Validates and verifies the seller's payment information
Where in a domain name do you find the top-level domain (TLD)? A. all the way to the left B. all the way to the right C. a TLD is not found within the domain name
B. all the way to the right
Which of the following is not a basic function of transmission control protocol? A. sequencing the transfer of packets B. analyzing the packets for size C. acknowledging that packets have been transferred D. managing the movements of packets between computers
B. analyzing the packets for size
Compared to data warehouses, data marts have which one of the following characteristics? A. contain more information B. cost less C. are harder to navigate D. have longer lead time for implementation E. have central rather than local control
B. cost less
____ accounts for the majority of e-commerce transactions.
B2B
You are given the following list of components: Touchscreen Panel (1), Flash Storage chip (1), Microprocessor (1), Aluminum Case (1). Which of the following documents would contain this information? -Production order -Planned order -Bill of materials -Purchase order
Bill of materials
A ___ is a personal Web site, open to the public, in which the creator expresses his or her opinions chronologically.
Blog
Which of the following are examples of instance-level information in the production process? -Stock requirement list from a particular planned order -Production date of a specific production order -Neither of these are examples of instance-level information. -Both A and B
Both A and B
A modem can perform which of the following operations?
Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only
Which of the following is not a component of a local area network?
Bridge
While information systems, such as transaction processing systems, generate more information for managers to process, other information systems, such as ___, help them analyze this information to make better-informed decisions.
Business intelligence applications
Business-IT alignment refers to the synchronization of a company's IT operations with its:
Business objectives
B2B
Business to Business
B2C
Business to Consumer
According to the textbook case, the innovation of the open-source product Hadoop is _______________. A. that it has not been sued by Google B. that it actually works C. that it has no proprietary predecessor D. its algorithms run contrary to contemporary mathematics
C
All of the following contribute to problems when using a file management approach except: A. Data redundancy B. Lack of integration of data C. Data independence D. Lack of data integrity
C
Early mainframe DBMS packages used the _______________ structure, in which all records are dependent and arranged in multilevel structures, consisting of one root record and any number of subordinate levels. A. network B. relational C. hierarchical D. object-oriented
C
Many end users have trouble correctly phrasing database language search queries, so most end-user DBMS packages now offer _______________ methods. A. speech recognition B. command line C. GUI D. All of the choices are correct.
C
The _______________ database structure is considered one of the key technologies of a new generation of Web-based applications. A. hierarchical B. relational C. object-oriented D. multidimensional
C
IPv6 will allow for ___ unique IP addresses. A. 128 B. 32 C. 2128 D. 232
C. 2128
Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using: A. The users of the search engine. B. Dedicated employees. C. Automated webcrawlers. D. A combination of all of these.
C. Automated webcrawlers
A modem can perform which of the following operations? A. Convert analog signals to digital signals only B. Convert digital signals to analog signals only C. Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only D. Modems do not convert signals
C. Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only
Workflow, groupware, and telepresence systems are examples of which network application? A. Discovery B. Communications C. Collaboration D. None of these
C. Collaboration
Which of the following is not a benefit of employing server virtualization? A. Cost savings in space B. Cost savings in energy C. Cost savings in customer service D. Cost savings in maintenance E. Cost savings in personnel
C. Cost savings in customer service
Arrange the hierarchy of terms to describe memory capacity in the correct sequence, from smallest to largest: A. Megabyte - kilobyte - gigabyte - terabyte - exabyte - petabyte B. Exabyte - petabyte - terabyte - gigabyte - megabyte - kilobyte C. Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte D. Petabyte - exabyte - kilobyte - gigabyte - kilobyte - terabyte E. Kilobyte - gigabyte - megabyte - exabyte - petabyte - terabyte
C. Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte
Place the different types of computer networks in size order, ranging from smallest to largest. A. LAN-PAN-MAN-WAN B. PAN-MAN-WAN-LAN C. PAN-LAN-MAN-WAN D. PAN-MAN-LAN-WAN
C. PAN-LAN-MAN-WAN
A standardized language used to manipulate data is _____. A. MS-Access B. Oracle C. Query-by-example language D. None of these
C. Query-by-example language
Which of the following factors does not affect decisions about hardware? A. Power B. Appropriateness for the task C. Size D. Cost E. Speed
C. Size
Which of the following items is an IT component of information systems? A. Procedures B. End users C. Software D. Management
C. Software
Which of the following is not a reason why managing information systems is a complex task? A. Information systems have strategic value to the organizations. B. Information systems are very expensive to acquire, operate, and maintain. C. The IS department "owns" the computing resources in a company. D. End users share the responsibility for the information systems with the IS department.
C. The IS department "owns" the computing resources in a company.
A(n) _____ is automatically launched by some trigger and appears in front of the active window. A. keyword banner B. random banner C. pop-up ad D. pop-under ad E. text box
C. pop-up ad
A standardized language used to manipulate data is _____. A. Oracle B. query-by-example language C. structured query language D. data manipulation language E. MS-Access
C. structured query language
A _____ is intellectual work that is known only to a company and is not based on public information. A. copyright B. patent C. trade secret D. knowledge base E. private property
C.Trade secret
_____ is a system that connects computers and other devices via communications media so that data and information can be transmitted among them.
Computer Network
Tranion Processing System (TPS)
Continuous 'real-time' data collection Efficiently handle high volumes of data and large variations isactn those volumes Avoid errors and downtime
electronic CRM
Customer relationship management conducted electronically.
Which of the following are examples of master data? Vendors, customers, dates, and quantities Dates, vendors, and locations Dates, quantities, times, and locations Customers, vendors, products, and employees
Customers, vendors, products, and employees
____ involves conducting various banking activities from home, at a place of business, or on the road instead of at a physical bank location.
Cyberbanking
A record represents a collection of _______________ that describe an entity. A. characters B. fields C. files D. attributes
D
Networks enable which of the following application A. Discovery B. Communications C. Collaboration D. All of these
D. All of these
Which of the following is not a benefit of grid computing? A. It enables efficient use of computing resources. B. It enables applications to run faster. C. There is no single point of failure. D. It reduces the number of applications that are installed on computers E. It makes it easier to scale up or down.
D. It reduces the number of applications that are installed on computers
Which of the following is the correct hierarchy from the lowest level to the highest level?
Data / Information / Knowledge
Various versions of the data do not agree.
Data Inconsistency
In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n): A. entity B. object C. relation D. attribute E. primary key
D. attribute
In the _____ marketplace model, the reverse auction is typically used. A. desktop purchasing B. group purchasing C. electronic exchange D. buy-side E. sell-side
D. buy-side
Human Resource Planning and Management
Developing a comprehensive strategy for meeting future human resource needs.
Describe the most common methods for accessing the Internet:
Dial-up DSL Cable Modem Satellite Wireless Fiber to the home
Efforts by unauthorized users to access data traveling over a wireless network is called:
Eavesdropping
The principles of right and wrong that individuals use to make choices to guide their behaviors:
Ethics
_____ reports summarize the performance of critical activities.
Exception
Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby's tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering?
Feedback
Global outsourcing helps an organization to:
Find the best person for the job. Find more economical resources. Implement spatial and temporal flexibility. All of these.*
Microwave transmission systems are used for _____ volume, _____ distance, _____ communications.
High, long, line-of-sight
eBay employs the ___ auction mechanism.
Forward
eBay employs the ___ auction mechanism. a)Forward b) Reverse c) Dutch d)Proprietary eBay
Forward
eBay uses a ___ auction.
Forward
Porter's competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____.
General Strategies, Activities
What activity is performed when a shipment arrives from a vendor?
Goods receipt
Direct payment of Social Security benefits is an example of _____ e-commerce.
Government-to-citizen
Computer programs like CAPTCHA are used to counter
Hackers using key loggers
Data redundancy refers to:
Having copies of the same data in multiple locations.
Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.
High, repetitive, difficult
_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.
IT Components
IT personnel use _____ to produce _____.
IT components, IT services
Explain how the web has an impact on the rivalry among existing firms in the industry:
In the past, proprietary information systems provided strategic advantage for firms in highly competitive industries. The visibility of Internet applications on the Web makes strategic advantage more short lived.
_____ is (are) data that have been organized to have meaning and value to a recipient.
Information
How does the text recommend that a company operate if it wants to be successful in the information age?
Interdependently between departments
What does a systems analyst do?
Interfaces between end users and programmers
The benefits of open-source CRM include all of the following except:
It has more functionality than in-house CRM systems.
The workforce in developed countries is exhibiting all of the following trends except:
It includes fewer persons with disabilities
The major types of wireless media are:
Microwave, satellite, radio, and infrared.
The most overlooked people in information security are:
Janitors and Guards
Compare and contrast blogs and wikis.
Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0
Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________.
Location based advertising
List a business pressure and describe an IT response to it;
Market Pressures: An example of a market pressure is powerful customers. Customer relationship management is an effective IT response that helps companies achieve customer intimacy.
The blogosphere is defined as:
Millions of blogs on the Web.
Which of the following is not a type of Big Data?
None of the above; all are types of Big Data
A method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance.
Normalization
Explicit knowledge has which of the following characteristics?
Objective
The sales, marketing, and service functions are part of:
Operational CRM
_____ systems support the front-office business processes, which directly interact with customers.
Operational CRM
Once production has been authorized with an enterprise system, what would be needed to obtain the raw materials from the warehouse to begin production? -Planned order -Invoice -Order number -Material withdrawal slip
Order number
What is a characteristic of effective business - IT alignment?
Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams
When data are normalized, attributes in the table depend only on the _____.
Primary Key
___ is the right to be left alone and to be free of unreasonable personal intrusions.
Privacy
Which of the following are examples of intra-company processes? -Procurement, fulfillment, and production -Procurement, fulfillment, and CRM -Fulfillment, CRM, and SCM -None of the above are examples of intra-company processes.
Procurement, fulfillment, and production
Social networking Web sites:
Provide an easy, interactive tool for communicating and collaborating with other people on the Web.
Data dictionaries perform all of the following functions except:
Providing information on each record
All of the following statements regarding QR codes are true except:
QR codes can only store information that is comprised of numbers or text.
What is the key piece of data needed to begin the pick and pack step of the fulfillment process?
Sales order number
____ are other fields that have some identifying information but typically do not identify the file with complete accuracy.
Secondary Keys
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
Spamware
The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by:
The Payer
Which of the following is not an example of business - IT alignment?
The company views IT as a way to support the business but not as a way to create new revenue streams.
operational CRM systems
The component of CRM that supports the front-office business processes that directly interact with customers
Medium-range wireless networks
The familiar wireless local area networks (WLANs). The most common type is Wireless Fidelity or Wi-Fi.
multidimensional structure
The manner in which data are structured in a data warehouse so that they can be analyzed by different views or perspectives, which are called dimensions.
explicit knowledge
The more objective, rational, and technical types of knowledge.
best practices
The most effective and eff cient ways to do things.
Which of the following is not a reason that managers need IT support?
The number of alternatives is decreasing.
The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by:
The payer.
Identify 3 places that store personal data and the threat of privacy to these.
The privacy threat in Internet bulletin boards, newsgroups, and social networking sites is that you might post too much personal information that many unknown people can see.
Auction
The public sale of something to the highest bidder
etwork protocols describe • The number of nodes in the network. • The rules for communication within the network. • The connections between the nodes in the network. • The number of nodes in the network and the connections between them.
The rules for communication within the network.
database management system (DBMS)
The software program (or group of programs) that provides access to a database.
What is the biggest concern with collaborative consumption?
Trust
Blogs and wikis fundamentally differ in terms of • their size • their potential to be shared with the public • their ability of users to post content • their use of AJAX
Their ability of users to post content
Which of the following are true regarding fixed order quantities? -They maximize costs and reduce inventories -They minimize costs and reduce inventories -They minimize costs but lead to accumulation of inventories -They maximize costs but lead to accumulation of inventories
They minimize costs but lead to accumulation of inventories
Which of the following is not a characteristic of DSS?
They support all phases of the decision-making process.
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?
This software reduces your vulnerability to distributed denial-of-service attacks.
Many organizations have implemented corporate portals to...
To cut costs To free up time for busy managers To improve profitability To offer customers self-service opportunities
A supply chain management system would need to connect to a supplier relationship management system in order to do which of the following?
To transfer raw materials requirements to be matched against current supplier information
The rightmost segment of a domain name is:
Top-level domain
The difference between a customer purchase order (in fulfillment) and a purchase order (in procurement) is that the customer purchase order data reflects the customer's perspective rather than the company's perspective. True False
True
Wireless Mesh Networks
Use multiple Wi-Fi access points to create a wide area network that can be quite large. Ex: spending $ for more wireless access points in streetlights and and power poles in Augusta, Georgia.
Web 2.0 sites include:
User participation. Collaboration. Social interaction. All of these.*
Third Generation (3G)
Uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128 Kbps when moving in a car, and 2 Mbps when the device is in a fixed locations. Supports video, Web browsing, and instant messaging.
What are the minimum pieces of information required to create a purchase requisition?
Vendor
Which of the following are examples of process-level information relevant to procurement process?
What is the average time between sending a purchase order and receiving the shipment? Which materials are purchased most frequently? Which suppliers are prompt and which suppliers are habitually late in delivering the materials ordered?
The main problem with radio transmission is which of the following?
When you travel too far from the source, the signal fades.
Which of the following are examples of process-level information relevant to the fulfillment process?
Which customers are prompt and which ones are habitually late in sending the payment? What is the average time between creating a sales order and sending the shipment? Which materials are sold most frequently?
Wireless Fidelity
Wi-Fi A set of standards for wireless local area networks based on IEEE 802.11 standard.
Which of the following is not a benefit of being an informed user of IT?
Working in the IT side of the organization
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program)
Worm
If you are an employee of a large organization and your Facebook account is hacked, the attackers can obtain access to:
Your personal information and photographs on Facebook. Your personal financial information. Information of all your Facebook friends. Your company's data and resources. All of these.
The complete data set on a customer is called:
a 360-degree view
customer interaction center (CIC)
a CRM operation where organizational representatives use multiple communication channels to interact with customers in functions such as inbound teleservice and outbound telesales
Ergonomics
a science that deals with designing and arranging things so that people can use them easily and safely
electronic marketplace
a virtual market space on the web where many buyers and many sellers conduct electronic business activities
Business intelligence applications include:
a) Microsoft Excel spreadsheets b) Data warehouses c) Special purpose analytic packages
Knowledge workers
advise middle managers
Knowledge workers:
advise middle managers
Query by Example (QBE)
allows users to fill out a grid or template to construct a sample or description of the data he or she wants
Structured Query Language (SQL)
allows users to perform complicated searches by using relatively simple statements or keywords.
Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence
b) Data integrity.
The part of a network that handles the major traffic is the ________.
backbone
A company does not have sufficient inventory of materials ordered by a customer. So, it ships what it has now and will ship the remaining at a later date when more materials are available. Which of the following best describes the above scenario?
backorder
virtual banks
banking institutions dedicated solely to internet transactions.
Cyber Banking
banking through online services; allow people to check balances, pay bills, etc. online
what are the types of data needed to create an invoice?
billing date billing document type outbound delivery number
LinkedIn is a _______________________ social networking site that makes money from advertising and services.
c) Business-oriented
Refer to Closing Case - Can Anyone Succeed with Local, Online Advertising?
c) Competition from Google and Facebook
_____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
c) Data consistency
A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________.
c) Enterprise Social Networks
When customers access a Web site and make purchases, they generate _____.
clickstream data
Tacit knowledge
cumulative store of subjective or experiential learning. Examples: experiences, insights, expertise, know-how, trade secrets, understanding, skill sets, and learning
What information is needed to convert a quotation to a sales order?
customer purchase order date customer purchase order number quotation number
Searching for valuable business information in a database, data warehouse, or data mart refers to _____.
data mining
A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____.
data, information
A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________.
data, information
Which of the following is the correct hierarchy from the lowest level to the highest level?
data, information, knowledge
Gordon Moore (with Moore's Law) predicted that microprocessor complexity would do which of the following?
double every two years
A Web site that combines content from other Web sites to form new content is called a(n) ______.
e) Mashup
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a)tacit b)explicit c)managerial d)geographical e)cultural
explicit
Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.
high, repetitive, Easy
The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________.
information
Primary key
is a field that uniquely identifies a record
Database
is a group of logically related files
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. a) keyloggers, screen scrapers b) screen scrapers, uninstallers c) keyloggers, spam d) screen scrapers, keyloggers e) spam, keyloggers
keyloggers, screen scrapers
Using your cell phone to purchase a Coke from a vending machine is an example of:
micropayment
When e-commerce is done in a wireless environment, this is called:
mobile commerce
Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics?
mobility, broad reach
The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________.
mobility, broad reach
Explicit knowledge has which of the following characteristics?
objective
The _____ is known as make-to-order.
pull model
The advantages of RFID tags to Staples include all of the following except:
reduced transaction costs at checkout
routine reports
reports produced at scheduled intervals
comparative reports
reports that compare performances of different business units or time periods
drill-down reports
reports that show a greater level of detail than is included in routine reports
cross selling
selling additional products or services to a customer
mobile commerce
the ability to purchase goods and services through a wireless Internet-enabled device
In a database, the primary key field is used to _____. a)specify an entity b)create linked lists c)identify duplicated data d) uniquely identify a record e)uniquely identify an attribute
uniquely identify a record
The ___________ is comprised of a company's suppliers, suppliers' suppliers, and the processes for managing them.
upstream segment of the supply chain
The development of mobile commerce is driven by the following factors (choose all that apply)
widespread availability of mobile devices bandwidth improvement
The development of mobile commerce is driven by the following factors (choose all that apply)
widespread availability of mobile devices -bandwidth improvement
An organization's e-mail policy has the least impact on which of the following software attacks?
zero-day
A company receives an order for multiple items, however, only some of the items can be shipped and the remainder will be shipped later. This is an example of a stock out. True False
False
A company that utilizes software-as-a-service (SaaS) must physically install the ES at their facility. True False
False
A free software package is called a browser.
False
A free software package is called a browser. True False
False
A relational database typically consists of one large two-dimensional table. True False
False
All business processes must be owned by one and only one functional area in any organization.
False
All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews. True/False
False
An ERP system is an inter-organizational information system.
False
An Intranet is a scaled-up version of the Internet that uses similar technologies. True False
False
An individual or organization faced with an ethical decision is basically considering whether to break the law
False
BI refers to only those technologies that obtain data from warehouses. True False
False
Backup and recovery procedures are recommended only to safeguard against hardware/software failures. F
False
Bluetooth devices can be used to establish NFC for mobile commerce.
False
Both transactional data and master data are connected to a specific process or process step within an organization. True False
False
Computer code is generally efficient, well designed, and contains very few errors. True False
False
Computer hardware and software are designed to be general purpose True False
False
Cybersquatting refers to the tampering of existing Web sites and selling unrelated products. True False
False
Cybersquatting refers to the tampering of existing Web sites and selling unrelated products. True False
False
Digital signals have two parameters, amplitude and frequency. True False
False
Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity.
False
Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity. True False
False
Dumpster diving is always illegal because it involves trespassing on private property. True False
False
Electronic data interchange does not help much in reducing paper.
False
End-user computer refers to a group of end users working together to manage their interactions with a computer.
False
Enterprise resource planning systems do not support intercompany processes. True False
False
Grid computing supports all applications that run on traditional servers. True False
False
Human Resource departments only use social computing applications for recruiting purposes. True/False
False
IT personnel use the IT infrastructure to develop information systems.
False
In a client-server environment, each component layer runs on a single computer. True False
False
In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores. True False
False
In general, employees have high legal protection against surveillance by employers.
False
In general, employees have high legal protection against surveillance by employers. True False
False
In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores. True False
False
In order to be considered as an e-commerce Web site, the site must sell some tangible good.
False
In order to be considered as an e-commerce Web site, the site must sell some tangible good. True False
False
Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.
False
Once a shipment has been sent, the customer purchase order must be updated. True False
False
Organizational servers typically function at 80-90 percent of their actually capacity, which provides a high level of efficiency. True False
False
Over the years, improved security software has made it progressively more difficult for hackers to get access to potential victim's computers F
False
Packaged applications are designed specifically for one firm. True False
False
Packing is the process of retrieving the needed material from the warehouse and requires a packing list to be completed. True False
False
RSS allows content publishers to get their content across to a large group of interested as well as uninterested consumers on a regular basis. True False
False
Server farms store vast amounts of data at a very low cost. True False
False
Stored-value money cards contain chips with personal data. True False
False
Supply chain visibility is the time between the receipt of incoming goods and the dispatch of finished, outbound products.
False
T/F A data warehouse is a low-cost, scaled-down version of a data mart designed for the end-user needs in a department in a large organization.
False
T/F B2B EC is more complex than B2C EC.
False
T/F Big Data is the same thing as huge amounts of structured data in organizational databases.
False
T/F Bluetooth devices can be used to establish NFC for mobile commerce.
False
T/F Computers typically work in isolation in modern organizations due to information security concerns.
False
T/F Electronic commerce makes national and international markets less accessible.
False
T/F Enterprise social networks and social networks are the same thing.
False
T/F Human Resource Departments use social computing applications only in the area of training.
False
T/F Human Resource departments only use social computing applications for recruiting purposes.
False
T/F In order to be considered as an e-commerce Web site, the site must sell some tangible good.
False
T/F The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.
False
T/F The only risk companies face when using social commerce is that customers may post negative feedback.
False
T/F The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores.
False
T/F The stock market is the only area of business that has experienced fraud on the Internet.
False
T/F Trademark owners in the US are not allowed to sue for damages in cases of cybersquatting.
False
T/F Transferring data from the organization's operational databases into its data warehouse is called data reconciliation.
False
T/F Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities.
False
T/F Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions.
False
T/F Voice-over-IP transmits voice over the Internet in the form of analog waves.
False
T/F When various copies of the data agree, this is an example of data integrity.
False
T/F Wi-Fi is a wireless standard that enables temporary, short-range connections between mobile devices.
False
The individual's right of privacy supersedes the public's right to know.
False
The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.
False
The main purpose of location-based applications is to broadcast your current location coordinates to local businesses. True False
False
The only target for cyber criminals are organizations with valuable information such as customer credit card information. F
False
The relational database model is based on the concept of three-dimensional tables. True False
False
The right of privacy is absolute.
False
The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores. True False
False
Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities. True False
False
When you start a job, you are given an employee handbook which contains the company's tacit knowledge. True False
False
Wikipedia can always be considered a reliable and undisputable source of information. True False
False
[Chapter 7] eBay is a good example of business-to-consumer electronic commerce. True False
False
[Chapter 8] Pervasive computing and virtual reality are just different names for the same thing. True False
False
[Chapter 9] RSS stands for Real Simple Subscription. True False
False
[Tech Guide 3] MIS departments embraced the arrival of personal computers in the work place. True False
False
Supplier relationship management focuses only upon a company and a single supplier. (T/F)
False - SRM focuses on the entire relationship between a company and its suppliers.
A source-to-settle process occurs between a company and its customers. (T/F)
False - occurs between a company and it's suppliers.
ERP and TPS systems have separate systems for each department. T or F?
False!
Functional area information systems are those that integrate all areas of the company. T or F?
False!
Master data are generated and captured by operational systems.
False!
Server farms can be located just about anywhere. T or F?
False!
The pricing model for infrastructure-as-a-service model offered by cloud computing providers is usually a per user fee. T or F?
False!
Information technology collects, processes, stores, analyzes, and disseminates information for a specific purpose. T or F?
False. That is Information Systems.
In batch processing, the data are collected from transactions as they occur and placed in groups or batches that are processed as they occur.
Fasle
Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.
Fasle
Tacit knowledge is the more objective, rational, and technical types of knowledge. True False
Fasle
Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):
Fiber optic cables have very high bandwidth.-Fiber optic cables offer higher security.
Data dictionaries perform all of the following functions except: A. Providing information on each record B. Defining the format necessary to enter data into the database C. Providing information on why attributes are needed in the database D. Providing information on how often attributes should be updated E. Providing information on name of attributes
A. Providing information on each record.
Which of the following are advantages of computer networks? A. They enable organizations to be more flexible. B. They enable companies to share hardware, computer applications, and data. C. They enable geographically dispersed employees to work together. D. They provide a critical link between businesses and their customers. E. All of the above
All of the above
Enterprise systems allow for which of the following?
All of the above - The division of business processes traditionally performed inside a company to outside partners -Providing collaboration among networks of partner companies -Providing cost savings by capitalizing on individual company strengths in a group partnership
Organizations are using social computing in which of the following functions? •Marketing. •Cust. Relationship Manag •Human Resource Management •All of these
All of these
The popularity of online classes and online universities can be attributed to which of the following network applications?
All of these
The popularity of online classes and online universities can be attributed to which of the following network applications? Discovery Communications Collaboration All of these
All of these
Which of the following statements concerning social media Web sites like Twitter and Facebook are true? a)They collect vast amounts of data about and from their users. b)Data collected from users can be used without their explicit consent. c)They connect individuals with similar interests. d)They are useful in recording the lives of famous people and ordinary people. e)All of these
All of these
Methods you should use to protect your portable devices and information include all of the following except: a) Using two-factor authentication. b) Making certain not to leave your portable devices in plain view in a car. c) Keeping your portable devices in an inconspicuous container. d) Encrypting the hard drive of your laptop. e) All of these are legitimate protection methods.
All of these are legitimate protection methods.
Where in a domain name do you find the top-level domain (TLD)?
All the way to the right
Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.
Answer: False
Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.
Answer: False
The database maintenance process is accomplished via: A. Hierarchical database systems that provide flexibility and network databases B. Transaction processing systems and other end user applications, with the support of the DBMS C. Graphical query languages correctly phrasing SQL D. File processing systems with the support of 4GLs
B
The tables in a relational database are flat files which have rows and columns. Each row represents a _______________ in the file. A. field B. record C. file D. relation
B
When independent of any other files related to it, a single table is referred to as a(n): A. Independent file B. Flat file C. Hierarchical file D. Non-variable file
B
Which database model allows many-to-many relationships among records so that a data element can be accessed by following one of several paths? A. Hierarchical B. Network C. Object-oriented D. Relational
B
Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.
Back Door Also called a Trap Door
An information system that uses computer technology to perform some or all of its intended tasks:
Computer based information system (CBIS)
eBay is an example of which type of e-commerce?
C2C
Which of the following are examples of inter-company processes? -Procurement, fulfillment, and production -Procurement, fulfillment, and CRM -CRM and SCM -None of the above are examples of inter-company processes.
CRM and SCM
When customers access a Web site and make purchases, they generate _____.
Clickstream data
Porter's _____ help(s) companies identify general strategies, whereas his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact.
Competitive force model; Value chain model
An application that is isolated to one process or part of a process and has evolved from a departmental application is a: Niche application Best-of-breed application Mashup Composite Application
Composite Application
The computing skills necessary to be a hacker are decreasing for which of the following reasons?
Computer attack programs, called scripts, are available for download from the Internet.
____ accounts for the majority of e-commerce transactions. a)B2C b)B2B c)C2C d)B2E e)G2C
B2B
n mainframe and server computer systems, the database management system controls the _______________ of the databases of computer-using organizations. A. maintenance B. development C. use D. All of the choices are correct.
D
_____ are similar to regular paper checks. They are used mostly in B2B.
E-Checks
Cards allow customers to charge online payments to their credit card account. These are used primarily in B2C and in shopping by small to medium enterprises.
E-Credit
_____ portals support communities such as hobby groups or a political party. A. Corporate B. Commercial C. Industrywide D. Personal E. Affinity
E. Affinity
Businesses and organizations set up Web sites to: A. Sell goods and services. B. Induce people to visit a physical location. C. Reduce operational and transaction costs. D. Enhance their reputation. E. All of the above.
E. All of the above
Many organizations have implemented corporate portals for which of the following reasons? A. to cut costs B. to free up time for busy managers C. to improve profitability D. to offer customers self-service opportunities E. all of the above
E. All of the above
Which of the following are advantages of computer networks? A. They enable organizations to be more flexible. B. They enable companies to share hardware, computer applications, and data. C. They enable geographically dispersed employees to work together. D. They provide a critical link between businesses and their customers. E. All of the above.
E. All of the above
The concept of _____ refers to competing computing products working together. A. Open-source software B. Software-as-a-Service C. Object-oriented software D. Application software packages E. Open systems
E. Open systems
The data in a data warehouse have which of the following characteristics? A. They are organized in a hierarchical structure. B. They are updated in real time. C. They are typically retained for a defined, but limited, period of time. D. They are coded in different formats. E. They are organized by subject.
E. They are organized by subject.
Electronic business includes which of the following? A. buying and selling B. servicing customers C. collaborating with business partners D. conducting electronic transactions within an organization E. all of the above
E. all of the above
In a database, the primary key field is used to _____. A. identify duplicated data B. uniquely identify an attribute C. specify an entity D. create linked lists E. uniquely identify a record
E. uniquely identify a record
Which of the following is not a consequence of poor information security practices? A. Stolen information B. Stolen identities C. Financial loss D. Loss of service E. All of the above are consequences of poor information security practices.
E.All of the above are consequences of poor information security practices.
A(n) ___ can consist of one or more ____ . a)LAN, WANs b)WAN, enterprise networks c)LAN, enterprise networks d)Enterprise network, LANs
Enterprise network, LANs
Two information systems that support the entire organization are:
Enterprise resource planning systems; Transaction processing systems
Social commerce involves paying for services such as online dating.
FALSE
Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a)Low, long, broadcast b)Low, short, line-of-sight c)High, long, broadcast d)High, short, broadcast e)High, long, line-of-sight
High, long, line-of-sight
A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.
Hotspot
A major category of unintentional threats is:
Human Error
______________ provides cloud services based on security requirements.
Hybrid Cloud Computing
The IT infrastructure is comprised of _______ and ________.
IT Components and IT Services
With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.
Localization of products and services
Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________.
Location-based advertising
New technologies can produce new products very _____, which _____ the threat from substitute products.
Quickly; Increases
In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
RF jamming
Organizational Responses to business pressures
Mass Customization, Strategic sytems
_____ provide(s) companies with a single version of the truth for their data.
Master Data Management
Wi-Fi networks are typically classified as _______ wireless networks
Medium Range
Wi-Fi networks are typically classified as _______ wireless networks
Medium-range
Wi-Fi networks are typically classified as _______ wireless networks a)Short-range b)Medium-range c)Wide-range d)None of these
Medium-range
If broadband is not available in your area, which fo the following Internet connection methods would allow you to connect to the Internet?
Satellite
If broadband is not available in your area, which for the following Internet connection methods would allow you to connect to the Internet?
Satellite
Which of the following is not a characteristic of twisted-pair wire? A. Inexpensive B. Easy to work with C. Subject to interference from other electrical sources D. Secure transmissions pg 180 E. None of the above
Secure transmissions
Businesses and organizations set up Web sites to:
Sell goods and services. Induce people to visit a physical location. Reduce operational and transaction costs. Enhance their reputation.
In the ____ marketplace model, organizations attempt to sell their products or services to other organizations electronically.
Sell-side
____ host sales for their members that last just a few days and often feature luxury brands.
Shopping clubs
PERSONAL AREA NETWORK
Short range network between a computer and a mobile phone or similar portable device.
When shoppers visit a brick-and-mortar store, examine a product in person, and use digital technology to buy from an online rival, often at a lower price, this is called:
Showrooming
Short-Range wireless networks
Simplify the task of connecting one device to another, eliminating wires and enabling users to move around while they use the device. Typically connects with range of 100 feet or less.
Which of the following is a useful, cost-effective, hands-on, and safe teaching tool in the medical field?
Simulation environments
____ contain a chip that can store information and can be used for several purposes.
Smart Cards
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time.
Swarming
____ is an interface standard designed to carry large volumes of traffic over relatively long distances using fiber optic lines.
Synchronous Optical Network (SONET)
A call center is a type of customer interaction center.
TRUE
File sharing is a type of peer-to-peer processing.
TRUE
Social computing empowers customers to act.
TRUE
The OnStar system from General Motors is an example of telemetry.
TRUE
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
TRUE
The major objective of ERP Systems is to integrate an organization's various functional areas to facilitate the seamless flow of information.
TRUE
War driving is the act of locating wireless networks while driving around a certain area.
TRUE
Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
TRUE
____ is the cumulative store of subjective or experiential learning.
Tacit knowledge
Which of the following statements about neural networks is incorrect? a)Neural networks are adept at recognizing subtle, hidden, and newly emerging patterns within complex data. b)Neural networks are able to interpret incomplete inputs. c)Neural networks can assist users in solving a wide range of problems. d)Neural networks attempt to mimic human experts by applying expertise in a specific domain.
Neural networks attempt to mimic human experts by applying expertise in a specific domain.
Explain how the web has an impact on the threat of substitute products or services:
New technologies create substitute products very rapidly, and the web makes information about these products available almost instantly. As a result, industries (particularly information based industries) are in great danger from substitutes (music, books, newspapers, magazines, software) However, the web can also enable a company to build in switching costs, so that it will cost customers time and or money to switch from your company to a competitor.
T/F Information is the major component of the e-commerce offerings of service industries.
True
T/F Social computing fosters close customer relationships
True
T/F The primary key is a field that uniquely and completely identifies a record.
True
T/F The relationship between Student and Parking Permit is mandatory 1:1 because each student may have only one parking permit.
True
The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors.
True
The computing skills necessary to be a hacker are decreasing. True False
True
The configure-to-order strategy is commonly used by low-volume, high-cost industries that require specialized products. True False
True
The description of the layout of a factory as well as the location of the factory are examples of organizational data. True False
True
The flow of information among countries is called intraborder data flows.
True
The goal of SCM systems is to reduce friction along the supply chain.
True
The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet. True False
True
The key mechanisms in the sell-side marketplace are customized electronic catalogs and forward auctions. True False
True
The operating system supervises the overall operation of the computer. True False
True
The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.
True
The primary characteristic of auctions is that prices are determined dynamically by competitive bidding.
True
The primary characteristic of auctions is that prices are determined dynamically by competitive bidding. True False
True
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.
Utilitarian
What is the purpose of entering the pick quantity for each material on the order?
Verification that the quantity of materials in the shipment match the quantity on the order
_____ is the standard that enables wireless devices to access Web-based information and services.
Wireless Application Protocol
_____ is the standard that enables wireless devices to access Web-based information and services.
Wireless Application protocol.
_____ collect data from many points over an extended space.
Wireless Sensor Networks
Parking meters that you can pay via your mobile telephone are an example of _________.
Wireless electronic payment
If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________.
Wireless electronic payment system
_____ networks collect data from many points over an extended space.
Wireless sensor
_____ collect data from many points over an extended space.
Wireless sensor networks
Demonstrate how to interpret relationships depicted in an entity-relationship diagram.
YES
Demonstrate the use of a multidimensional model to store and analyze data.
YES
pull model
a business model in which the production process begins with a customer order and companies make only what customers want, a process closely aligned with mass customization
According to the closing case, the consequences of customizing an ERP system to accurately reflect a company's business process can include:
a) Increased maintenance expenses b) The inability to incorporate the latest technological developments c) The failure to sustain a competitive advantage
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge
a) Knowledge, information
_____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields
a) Primary keys
The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time. d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure.
a) They are organized by subject.
Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate
a) They cost less
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): a) attribute. b) entity. c) primary key. d) object. e) file.
a) attribute.
Electronic business includes which of the following?
all of the above* -buying and selling-servicing customers-collaborating with business partners-conducting electronic transactions within an organization
Many organizations have implemented corporate portals for which of the following reasons?
all of the above* to cut costs-to free up time for busy managers -to offer customers self-service opportunities
An organization's information technology architecture:
all of these
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining
b) Knowledge management
_____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis
b) Normalization
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys
b) Secondary keys
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit b) explicit c) managerial d) geographical e) cultural
b) explicit
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners.
extranet
Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.
f -- Are an aspect of social shopping.
Enabling groups to work together in ways that were not available previously is called
facilitating collaboration
Customers using social commerce benefit from _____________.
faster responses from vendors
Customers using social commerce benefit from _____________. • greater privacy • faster responses from vendors • unbiased opinions on products • none of the choices is correct
faster responses from vendors
Office automation systems
include report generators
Office automation systems
include report generators.
customer-facing CRM
includes those areas where customers directly interact with the company.
According to Michael Porter, the Web ______ competition, which generally _________ a firm's profitability.
increases; decreases
IT affects middle managers by:
increasing their productivity
The threats to information security are _____, and the greatest threat is _____.
increasing, technological
Bit
is a binary digit, or a "0" or a "1".
Byte
is eight bits and represents a single character (e.g., a letter, number or symbol).
The main system control program is the _____.
operating system
clicks and mortar organization
organizations that do business in both the physical and digital dimensions
Which of the following are documents associated with the fulfillment process?
packing list picking list customer invoice
Which of the following is not a function of functional area information systems?
providing data from business events to the corporate database
What are the minimum pieces of information required to create a quotation?
quantity material valid to date sold to party
A(n) _____ allows unauthorized entry into a wireless network.
rogue access point
What information is required to record a goods receipt?
store location quantity
Which of the following are key skills necessary for a knowledge worker?
strategic thinking
The type of decision that can be made by following a definite procedure is called a(n) ______ decision.
structured
The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a)structured b)unstructured c)undocumented d)semistructured e)procedural
structured
A standardized language used to manipulate data is _____.
structured query language
For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are a)memory size. b)disk size. c)student's dorm room. d)type (laptop or desktop). e)manufacturer.
student's dorm room.
production process
the activities, equipment, and resources needed to manufacture a product
The most important benefit of knowledge management systems is:
they make best practices available to employees.
Information-based industries are most susceptible to which one of Porter's five forces?
threat of substitute products
Which of the following is not a goal of supply chain management?
to increase cycle time
online transaction processing
transaction processing mode in which transactions entered online are immediately processed by the computer.
Which of the following is not a mobile application in financial services?
transaction processing systems
Buying health insurance is an example of risk ____, whereas going without is an example of risk _____.
transference, acceptance
Buying health insurance is an example of risk ____, whereas going without is an example of risk _____.
transference, acceptance ( transference, limitation limitation, acceptance limitation, transference )
Wireless transmission media (broadcast media)
transmits signals without wires over the air or in space. Ex: microwave, satellite, radio, and infrared.
When using an ES, much of the data needed to create a customer invoice is automatically obtained from data previously stored in the system.
true
Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. b) Decisions about software. c) Decisions about data. d) Both "decisions about hardware" and "decisions about software." e) All of these have an equal impact.
c) Decisions about data.
Groupon is an example of ________________
c) Group shopping
Pinterest: Pinterest is:
c) a shareable online bulletin board.
One of the problems that HR departments have with using social computing to recruit is
c) they receive many more applications than they can process.
Tacit knowledge has which of the following characteristics? a) codified b) objective c) unstructured d) rational e) technical
c) unstructured
The short-range wireless network best suited for touchless credit card transactions is:
Near-field communications
Which of the following statements about IT's role in society is false?
Robots can handle unfamiliar situations.
A(n) _____ allows unauthorized entry into a wireless network.
Rogue Access Point
An "evil twin" is associated with which type of threat to wireless networks?
Rogue Access Points
In an integrated process, production begins after which of the following processes takes place?
A check of inventory reveals that there are no finished products in stock
A(n) _____ allows unauthorized entry into a wireless network.
Rogue access point
In an integrated process, production begins after which of the following processes takes place? -A customer submits a purchase order -A check of inventory reveals that there are no finished products in stock -A vendor invoice is sent -A check of inventory reveals that there are no raw materials in stock
A check of inventory reveals that there are no finished products in stock
An "evil twin" is associated with which type of threat to wireless networks?
Rogue access points
A single point of entry to an entire community of common interests is:
Affinity portal
The IT infrastructure is comprised of _______ and ________.
) IT components, IT services
Advantages of Data Warehouses
- Organized by dimension or subject: Data are organized by subject. This arrangement is different from transactional systems where data are organized by business process, such as order entry, inventory control or accounts receivable. This is beneficial because it allows it to remain organized and easily accessible to businesses and allows them to make informed decisions. - Using online analytical processing: Business transactions are processed online as soon as they happen. This allows for speed and efficiency which is critical to internet-based business operations. - Integrated: Data collected from multiple sources are organized by subject to remain easily accessible and easy to understand and interpret. This allows businesses to turn them into strategies easier. - Nonvolatile: No one can change or update the data. This allows for unbiasedness in the data and a sure-fire way to make sure that no one is tampering with the data so it is all true.
What is the hierarchy of small to large for bytes, bits, records, fields?
-Bit -Byte -Field -Record -File -Database
Describe Buy-side for B2B EC:
-A model in which organizations attempt to buy needed products or services from other organizations electronically.
Networks enable what applications?
-Discovery -Communications -Collaboration -Web Services
The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.
Alien Software
Threats to privacy include:
-Advances in Information Technologies -Electronic Surveillance -Personal information in databases -Internet Bulletin boards -Newsgroups -Social Networking sites
Describe Microwave transmission systems and one advantage and disadvantage:
-Are used for high-volume, long-distance, line-of-sight communication. -Advantage: The high volume. -Disadvantage: Susceptible to environmental interference during severe weather such as heavy rain or snowstorms.
What would be the best use of RFID in a business?
Supply chain management
Customer relationship management systems include which of the following?
Create demand for products through marketing and transform demand into sales opportunities
The following can be considered as broadband technologies (choose all that are correct):
-DSL -Cable
What are the 4 types of electronic payments?
-E-Checks -E-Credit -Purchasing Cards -E-Cash
Describe Public Exchanges:
-E-marketplaces in which there are many sellers and many buyers, or just exchanges. -Public Exchanges are open to all business organizations. -They are frequently owned and operated by a 3rd party. -Their are 3 basic types of public exchanges: Vertical, Horizontal, and Functional
The goals of business process reengineering are to:
-Increase productivity. -Optimize operations. -Increase customer satisfaction. -Reduce waste.
What are the advantages of computer networks?
-Enable organizations to be more flexible -Enable companies to share hardware, computer applications, and data. -Enable geographically dispersed employees to work together. -Provide a critical link between businesses and their customers.
Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):
-Fiber optic cables have very high bandwidth. -Fiber optic cables offer higher security.
Global outsourcing helps an organization to:
-Find the best person for the job. -Find more economical resources. -Implement spatial and temporal flexibility
In recent years, companies such as Walmart and Amazon.com have offered streaming videos for rent on their Web sites. This is another example of how new technology has:
-Increased the threat of new entrants. -Increased the threat of substitute products
By upgrading their IT systems and investing in mobile computing devices for its employees, Home Depot is able to:
-Improve customer service. -Give employees immediate access to up-to-date inventory information. -Improve the efficiency of the stocking process.
Provide an example of Discovery, and explain how that network application supports business functions.
-Involves browsing and information retrieval, and provides users the ability to view information in databases, download it, and/or process it. Tools include search engines, directories, and portals. -Discovery tools enable business users to efficiently find needed information.
Describe Infrared light and one advantage and disadvantage:
-Is red light that usually is not visible to human eyes. Common applications are in remote control units for televisions, VCRs, DVDs, and CD players. -Advantage: Does not penetrate walls and so does not interfere with other devices in adjoining rooms. -Disadvantage: Signals can be easily blocked by furniture.
Coaxial Cable consists of copper wire. Discuss the main advantages and disadvantages.
-It is much less susceptible to electrical interference than is twisted-pair wire, and it can carry much more data. -Is more expensive and more difficult to work with than twisted-pair wire. Also somewhat inflexible.
A supply chain management system can do which of the following? -Use demand forecasts to create a demand plan over a given period of time -Match demand with future production capacity -Create a material plan to match the expected amount of finished goods to be produced -All of the above
All of the above
An enterprise resources planning system could interconnect which of the following? SCM, PLM, CRM SRM, procurement, production planning Sales order management, Operations, human recourses All of the above
All of the above
Grid computing combines processing resources to form a virtual supercomputer. True False
True
For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply):
-The ability to offer lower prices to customers. -The ability to reach a wider customer base. -The ability to offer a larger selection of products.
Human errors are a major cause of the security-related problems in many organizations. True False
True
Provide examples of Business Processes in the functional area of an organization:
-Managing accounts payable -Managing accounts recieveable -managing post sale customer follow up -managing bills of materials -Managing manufacturing change orders -Applying disabilities policies -Hiring employees -Training staff and computer users -Applying internet use policy
Compare and contrast the 2 major types of networks:
-LANs encompass a limited geographic area and usually are composed of one communications medium. -WANs encompass a broad geographical area and usually are composed of multiple communications media.
Provide an example of Communications, and explain how that network application supports business functions.
-Networks provide fast, inexpensive communications via e-mail, call centers, chat rooms, voice communications, and blogs. -Communication tools provide business users with a seamless interface among team members, colleagues, business partners, and customers.
Why is marketing so valuable on social media?
-Marketers can assess markets in real time. -We often buy products that friends recommend. -We provide information voluntarily and for free. -All of the choices are correct.*
Organizations are using social computing in which of the following functions?
-Marketing. -Customer Relationship Management. -Human Resource Management. -All of these.*
Describe one way organizations can address the challenges with managing data using data governance.
-Master data management provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the companies core master data. Master data management consistently manages data gathered from across an organization, data from multiple sources, and data across business processes in an organization.
The 4 main types of wireless transmission media:
-Microwave -Satellite -Radio -Infrared
The use of databases enables organizations to:
-Minimize data inconsistency -Minimize data security risks -Minimize data isolation
Provide an example of Virtual Universities, and explain how that network application supports business functions.
-Online universities in which students take classes from home or at an off-site location, via the Internet. -Make it possible for students to obtain degrees while working full time, thus increasing their value to their firms.
Describe Sell-side and provide a specific example in terms of B2B EC.
-Organizations attempt to sell their products or services to other organizations electronically from their own private e-marketplace web site and/or from a third-party web site. -Sellers such as Dell computer use sell-side auctions extensively. In addition to auctions from their own Web sites, organizations can use third-party auction sites, such as eBay, to liquidate items.
Provide an example of Collaboration, and explain how that network application supports business functions.
-Refers to mutual efforts by 2 or more entities (individuals, groups, or companies) who work together to accomplish tasks. Collaboration is enabled by workflow systems. -Collaboration tools enable business users to collaborate with colleagues, business partners, and customers.
Which of the following is true of data in a data warehouse? A. Data in operational databases is ever changing; data in data warehouses is static B. Data in operational databases is static; data in data warehouses is ever changing C. Data in operational databases can be cataloged; data in data warehouses cannot D. None of the choices are correct.
A
Provide an example of Telecommunicating, and explain how that network application supports business functions.
-Process where knowledge workers are able to work anywhere and anytime. -Provides flexibility for employees, with many benefits and some drawbacks.
The core capabilities of computer-based information systems include (check all that apply):
-Quick access to information -High-speed calculations -Staging and processing of large amounts of data
The core capabilities of computer-based information systems include:
-Quick access to information. -Staging and processing of large amounts of data. -High-speed calculations.
The goals of business process reengineering are to (check all that apply):
-Reduce waste. -Increase customer satisfaction. -Increase productivity. -Optimize operations.
Which of the following are ways for companies to leverage big data to gain value? (check all that apply)
-Segmenting a population to customize actions -Providing automated algorithms to support decision making -Creating transparencies
What are the 3 business models for business-to-business electronic commerce?
-Sell-side -Buy-side -Public Exchanges
Fiber-optic cables consist of thousands of very thin filaments of glass fibers that transmit information via light pulses generated by lasers. Discuss the main advantages and disadvantages.
-Significantly smaller and lighter than traditional cable media. Can transmit far more data, and they provide greater security from interference and tapping. -Fiber-optic cable often is used as the backbone for a network, whereas twisted-pair wire and coaxial cable connect the backbone to individual devices on the network.
QR codes can:
-Store more information than bar codes. -Are more resistant to damage than bar codes. -Can be read from any direction or angle.
Differentiate between the Internet and the World Wide Web:
-The internet is a global network of computer networks, using a common communications protocol, TCP/IP. -The World Wide Web is a system that stores, retrieves, formats, and displays information accessible through a browser. *The Internet functions as a transport mechanism, whereas the World Wide Web is an application that uses those transport functions.
Describe Satellite transmission systems and one advantage and disadvantage:
-Sytems make use of communication satellites, and they receive and transmit data via line-of-sight. -Advantage: Their enormous footprint- the area of the earth's surface reached by a satellite's transmission- overcomes the limitations of microwave data relay stations. -Disadvantage: susceptible to environmental interference during severe weather.
The opening case illustrates how e-commerce has increased (choose all that apply):
-The volume of business transactions. -The speed at which we do business.
Which of the following are advantages of computer networks?
-They enable organizations to be more flexible. -They enable companies to share hardware, computer applications, and data. -They enable geographically dispersed employees to work together. -They provide a critical link between businesses and their customers. -All of the above.*
Describe Radio Transmission and one advantage and disadvantage:
-Uses radio-wave frequencies to send data directly between transmitters and receivers. -Advantage: Radio waves travel easily through normal office walls. -Disadvantage: Radio transmissions are susceptible to snooping by anyone who has similar equipment that operates on the same frequency.
A relational database typically consists of one large two-dimensional table.
FALSE
Define Risk Acceptance and provide an example in the context of owning a home.
-Where the organization accepts the potential risk, continues operating with no controls, and absorbs any damages that occur. -If you own a home you may decide not to insure it. Thus, you are practicing risk acceptance, clearly this is a bad idea.
Define Risk Limitation and provide an example in the context of owning a home.
-Where the organization limits the risk by implementing controls that minimize the impact of threats. -As a homeowner, you practice risk limitation by putting in an alarm system or cutting down weak trees near your house.
Define Risk Transference and provide an example in the context of owning a home.
-Where the organization transfers the risk by using other means to compensate for the loss, such as by purchasing insurance. -The vast majority of homeowners practice risk transference by purchasing insurance on their houses and other possessions.
Enterprise systems allow for which of the following? -The division of business processes traditionally performed inside a company to outside partners -Providing collaboration among networks of partner companies -Providing cost savings by capitalizing on individual company strengths in a group partnership -All of the above
All of the above
Electronic business includes which of the following?
-buying and selling -servicing customers -collaborating with business partners -conducting electronic transactions within an organization -all of the above*
Mobile applications in financial services include which of the following?
-mobile banking -wireless electronic payment systems -micropayments -brokerage services -all of the these*
The advantages of RFID tags to Staples include:
-movement history of each item through the store to moment of sale -labor savings -accurate inventory -precise location of each item in stores
An organization's information technology architecture:
-provides a guide for current operations. -provides a blueprint for future directions. - integrates the information requirements of the organization and all users. - is analogous to the architecture of a house.
For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include:
-reach a wider customer base. -offer lower prices to customers. -offer a larger selection of products
Many organizations have implemented corporate portals for which of the following reasons?
-to cut costs -to free up time for busy managers -to improve profitability -to offer customers self-service opportunities
Many organizations have implemented corporate portals for which of the following reasons?
-to cut costs -to free up time for busy managers -to improve profitability -to offer customers self-service opportunities -all of the above*
. All of the following are used to provide online market research except a)Reviews b)Recommendations c)Voting d)Emails e)Blogs
...
a)Reviews
...
Describe the 6 common types of electronic commerce.
1-(B2C) : The sellers are organizations, and the buyers are individuals. 2-(B2B) : The sellers and the buyers are business. 3-(C2C) : An individual sells products or services to other individuals. 4-(B2E) : An organizations uses EC internally to provide information and services to its employees. 5-(E-government) : is the use of Internet technology in general and e-commerce in particular to deliver information and public services to citizens (G2C EC), and business partners and suppliers (G2B EC). 6-(Mobile Commerce) : Refers to e-commerce that is conducted entirely in a wireless environment.
What are the 5 strategies that organizations typically adopt to counter the 5 competitive forces and achieve competitive advantage?
1-Cost Leadership 2-Differentiation 3-Innovation 4-Operational Effectiveness 5-Customer-orientation
Name 6 problems that can be minimized by using the database approach.
1-Data Redundancy 2-Data Isolation 3-Data Inconsistency 4-Data Security 5-Data Integrity 6-Data Independence
All of Friedman's flattners
1. Fall of Berlin Wall 2. Netscape switched from PC-based to Internet-based 3. Work-flow software 4. Uploading 5. Outsourcing 6. Offshoring 7. Supply-Chaining 8. Insourcing 9. In-forming 10. The steroids - virtual, digital, personal, mobile.
Types of Orbits
1. Propagation delay 2. Geostationary earth orbit (GEO) 3. Medium earth orbit (MEO) 4. Low earth orbit (LEO)
Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?
All of the above
IPv6 will allow for ___ unique IP addresses.
2^128
IPv6 will allow for ___ unique IP addresses. 128 32 2^128 232
2^128
A data warehouse contains data that have been processed in all the following ways except: A. Separated B. Cleaned C. Transformed D. Cataloged
A
According to the textbook case, on cars: A. Cars are a goldmine of consumer information B. Gathering consumer information from cars is not technologically feasible C. Gathering consumer information from cars is not legal by federal right-to-privacy standards D. Gathering consumer information from cars is not feasible from a financial perspective
A
Database development involves defining and organizing the _______________ of the data needed to build a database. A. structure B. content C. relationships D. All of the choices are correct.
A
Databases contain data elements that describe both entities and the _______________ among entities. A. relationships B. disparities C. subsets D. applications
A
collaborative CRM system
A CRM system where communications between the organization and its customers are integrated across all aspects of marketing, sales, and customer support processes
Three-tier architecture systems provide which of the following? Greater mobility for the user Greater scalability Cost savings All of the above
All of the above
A wiki is:
A Web site on which anyone can post material and make changes to already posted material.
What are some limitations of mainframe systems? Poor scalability High cost The need for a custom design All of the above
All of the above
A tag is the way a developer describes a piece of information.
FALSE
BLOG
A Web log, or blog, is an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on news and popular culture.
A wiki is a collection of blogs.
FALSE
transaction
A business activity that changes assets, liabilities, or owner's equity
In an integrated process, procurement begins after which of the following processes takes place?
A check of inventory reveals that an insufficient number of raw materials are available
In an integrated process, procurement begins after which of the following processes takes place? -A planned order is created -A customer purchase order is received -A customer inquiry is received -A check of inventory reveals that an insufficient number of raw materials are available
A check of inventory reveals that an insufficient number of raw materials are available
database
A group of logically related files that stores data and the associations among them.
entity classes
A grouping of entities of a given type.
field
A grouping of logically related characters into a word, a small group of words, or a complete number.
record
A grouping of logically related fields.
The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as:
AJAX
The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as: AJAX RSS Tagging Web 2.0
AJAX
___ Restrict unauthorized individuals from using information resources. These controls involve 2 major functions: Authentication and Authorization.
Access Controls
_____ issues involve who may obtain information and how much they should pay for this information.
Accessibility
batch processing
Accumulating source documents for a period of time and then processing them all at once such as once a day, week, or month.
What is the relationship between advances in information technology and the practice of profiling?
Advances in IT make it easier to profile individuals.
Satellite
Advantages: High bandwidth, large coverage area Disadvantages: a.) Expensive b.) Must have unobstructed line of sight c.) Signals experience propagation delay d.) Must use encryption for security.
Activities such as an availability check on inventory can be automated in an enterprise system because of which of the following? -An ES integrates functional areas and stores data in a common database. -An ES integrates functional areas and eliminates the need for paper documents. -An ES eliminates the need for paper documents and stores data in a common database. -None of the above are reasons an ES can automate activities.
An ES integrates functional areas and stores data in a common database.
Ads cannot appear as YouTube videos.
FALSE
Which of the following is not a component of a local area network? A. File server B. Client computers C. Bridge D. Network interface cards E. All of the above
Bridge
A company's production process consists of taking a frame, wheels, a chain, and other such pieces and combining them to produce a bicycle. This process most accurately describes which of the following? -Manufacturing -Assembling -Procurement -Fulfillment
Assembling
Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? A. Digital subscriber line B. Asynchronous transfer mode pg ??? C. Synchronous optical network D. T-carrier system E. ISDN
Asynchronous transfer mode
_____ can transmit up to 2.5 gigabits (billions of bits) per second. However it requires fiber-optic cable and is 21% more expensive than DSL.
Asynchronous transfer mode (ATM)
Bluetooth devices can be used to establish NFC for mobile commerce.
FALSE
The _______________ stage of database development translates the conceptual models into the data model of a DBMS. A. data planning B. requirements specification C. conceptual design D. logical design
D
A modem can perform which of the following operations? • Convert analog signals to digital signals only • Convert digital signals to analog signals only • Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only • Modems do not convert signals
Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only
Which wireline communication has the highest security? A. Coaxial cable B. Fiber-optic cable C. All of the wireline communications channels listed have good security and are difficult to tap. D. Twisted-pair wire
B. Fiber-optic cable
_____ is a method for analyzing and reducing a relational database to its most streamlined form. A. Structured query B. Normalization C. Query-by-example D. Relational analysis
B. Normalization
Which of the following is not a component of hardware? A. primary and secondary storage B. the operating system C. input and output technologies D. central processing unit E. communication technologies
B. Operating System
When organizations come to a company's Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.
B. Sell-side marketplace.
Which of the following electronic payments is ideal for micropayments? A. Purchasing cards B. Smart cards C. Electronic checks D. None of the methods listed is suited to micropayments
B. Smart cards
Why has LinkedIn become so important to recruiters?
Because LinkedIn enables recruiters to precisely target their searches
Which of the following is the most appropriate wireless networking standard for creating personal area networks?
Bluetooth
___ is an ongoing collection of related activities that create a product or a service of value to the organization, its business partners, and/or its customers.
Business Process
B2E
Business to Employee
The tight integration of the IT function with the strategy, mission, and goals of the organization:
Business-information technology alignment
In this type of e-commerce, the sellers and buyers are organizations.
Business-to-Business
Which type of electronic commerce is the largest by volume?
Business-to-Business
Difficulties in order fulfillment are most closely associated with which of the following?
Business-to-Consumer EC
____ e-commerce is also known as e-tailing.
Business-to-consumer
In this type of e-commerce, buyers and sellers are individuals. A. business-to-consumer B. business-to-business C. consumer-to-consumer D. government-to-citizen E. consumer-to-business
C. consumer-to-consumer
In _____, needed services such as temporary help or extra space are traded on an as-needed basis. A. buy-side marketplaces B. horizontal exchanges C. functional exchanges D. sell-side marketplaces E. vertical exchanges
C. functional exchanges
Businesses do not use social commerce for new products.
FALSE
Buying a book online at Amazon is an example of social commerce.
FALSE
Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct): A. Fiber optic cables are less difficult to tap. B. Fiber optic cables are susceptible to interference. C. Fiber optic cables have very high bandwidth. D. Fiber optic cables offer higher security.
C. Fiber optic cables have very high bandwidth. D. Fiber optic cables offer higher security.
The _____ allows users to exert direct control of icons on the computer screen. A. Systems software B. Application software C. Graphical user interface D. Plug-and-play E. Operating system
C. Graphical user interface
Data redundancy refers to: A. Storing data in a single central location. B. Sharing data with others. C. Having copies of the same data in multiple locations. D. All of these.
C. Having copies of the same data in multiple locations.
Which of the following is not considered a major capability of information systems? A. They provide fast, accurate communication and collaborations within and among organizations. B. They interpret vast amounts of data quickly and efficiently. C. They automate manual tasks but not semiautomatic business processes. D. They perform high-speed, high-volume, numerical computations.
C. They automate manual tasks but not semiautomatic business processes.
All of the following are cloud computing security issues except A. sensitive data access B. malicious insiders C. users technical ability D. privacy
C. Users Technical Ability
Which type of electronic exchange connect buyers with sellers within a specific industry? A. Functional exchanges B. Public exchanges C. Vertical exchanges D. Horizontal exchanges
C. Vertical exchanges
The management of data across the entire organization is most accurately defined as: A. Data integration. B. Data control. C. Data governance. D. Data administration
C. Data Governance
Operational data that are constantly updated are stored in: A. Data warehouses. B. Data marts. C. Databases. D. All of these.
C. Databases
Over the past 20 years, hardware costs have _____, while software costs have _____. A. Increased, increased B. Decreased, decreased C. Decreased, increased D. Increased, decreased E. Increased, remained level
C. Decreased, increased
Which of the following factors is preventing mobile wallets from being widely adopted in the United States? a)Lack of consumer interest b)Conflicts among the credit card companies, mobile carriers, and technology companies c)The poor quality of the existing technology d)All of these
Conflicts among the credit card companies, mobile carriers, and technology companies
Horizontal Exchanges:
Connect buyers and sellers across many industries.
Vertical Public Exchanges:
Connect buyers and sellers in a given industry.
enterprise application integration system (EAI)
Connects the plans, methods, and tools aimed at integrating separate enterprise systems
Customer relationship management systems include which of the following? -Convert sales quotations into sales orders and manage the procurement of raw materials -Create demand for products through marketing and transform demand into sales opportunities -Document the historical background of a product and transform demand into sales opportunities -Convert sales opportunities into sales quotations and manage all product purchases
Create demand for products through marketing and transform demand into sales opportunities
Knowledge Management System Cycle
Create, Capture, Refine, Store, Manage, Disseminate
Communication marketing is using social media sites to get feedback.
FALSE
The set of computer programs used to manage hardware resources is called: A. Microsoft Office Suite. B. Application software. C. General software. D. Systems software. E. Personal application software.
D. Systems software
Craigslist is an example of a shopping community.
FALSE
Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes or ceases to function.
Denial of Service Attack
A data warehouse is a low-cost, scaled-down version of a data mart designed for the end-user needs in a department in a large organization.
FALSE
data model
Definition of the way that data in a DBMS are conceptually structured.
Analytic CRM systems can be used for the following purposes except:
Delivering future product information to customers
A database must be associated with only one computer program or information system.
FALSE
Primary storage stores which of the following for very brief periods of time? A. Data to be processed by the CPU B. Instructions for the CPU as to how to process the data C. Operating system programs that manage various aspects of the computer's operations D. All of these
D. All of these
The popularity of online classes and online universities can be attributed to which of the following network applications? A. Discovery B. Communications C. Collaboration D. All of these
D. All of these
____ and ____ are the two major challenges for the sellers in e-commerce. A. Order fulfillment, large orders B. Channel conflict, advertising C. Advertising, large orders D. Channel conflict, order fulfillment
D. Channel conflict, order fulfillment
When customers access a Web site and make purchases, they generate _____. A. Web data B. information C. hyperlink data D. clickstream data E. tracking cookies
D. Clickstream data
__________ are high speed central networks to which multiple smaller networks connect A. Network servers B. Local area networks C. Routers D. Corporate backbone networks
D. Corporate backbone networks
All of the following are strategies for competitive advantage except: A. Differentiation. B. Innovation. C. Operational effectiveness. D. Customer leadership.
D. Customer leadership
A(n) ___ can consist of one or more ____ . A. LAN, WANs B. WAN, enterprise networks C. LAN, enterprise networks D. Enterprise network, LANs
D. Enterprise network, LANs
______________ determines who is responsible for the actions taken. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability
D.Accountability
What is the relationship between advances in information technology and the practice of profiling? A. Advances in IT make it more difficult to profile individuals. B. Advances in IT have no impact on profiling. C. Advances in IT make it more expensive to profile individuals. D. Advances in IT make it easier to profile individuals.
D.Advances in IT make it easier to profile individuals
Which transmission technology utilizes existing telephone lines?
DSL
The following can be considered as broadband technologies (choose all that are correct):
DSL -Cable
The following can be considered as broadband technologies
DSL and Cable
The management of data across the entire organization is most accurately defined as:
Data Governance
No alphabetic characters in a Social Security Number field is an example of _____:
Data Integrity
An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots- which form a bonnet- to deliver a coordinated stream of information requests to a target computer, causing it to crash.
Distributed Denial of Service Attack
_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers.
Distribution
Product life cycle management systems incorporate which of the following so that everyone in the process has access to the historical background of a product?
Document and knowledge management capabilities
entity-relationship (ER) diagram
Document that shows data entities and attributes and relationships among them.
The major problem with RFID has been _______.
Expense
The major problem with RFID has been:
Expense
Explicit knowledge vs Tactical knowledge
Explicit knowledge deals with more technical, objective and rational knowledge. a few examples are procedural guidelines, policies, reports, guidelines and the IT infrastructure. It is knowledge that can be documented in a form that can be distributed to others or turned into a strategy. Tactic knowledge is a cumulative store of subjective or experiential learning. It is never usually recorded and it is super personal to the salesperson or employee. Examples include an organization's insights, experiences, expertise and trade secrets. It also includes organizational culture. It is generally imprecise and costly to transfer.
The process of moving data from various sources into the data warehouse is called:
Extracting, transforming, and loading
An Intranet that allows limited access to its partners, suppliers, and customers is called a(n):
Extranet
An Intranet that allows limited access to its partners, suppliers, and customers is called a(n): a)Secure Intranet b)Extranet c) Corporate Web site d)Portal
Extranet
One field that uniquely identifies an entity or a record is:
File
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.
First-party
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.
First-party ( Tracking Monitoring Second-party Third-party)
Information technology deals with the planning, development, management, and use of management information tools to help people perform all the tasks related to information processing and management.
Flase
Managing the IS function within an organization is the exclusive responsibility of the IS department
Flase
_____ is(are) a branch of mathematics that deals with uncertainties by simulating the process of human reasoning. a)Fuzzy logic b)Boolean logic c)Neural networks d)Genetic algorithms
Fuzzy logic
Explain how the web has an impact on the threat of entry of new competitors:
For most firms, the web increases the threat that new competitors will enter the market by reducing traditional barriers to entry. Frequently, competitors need only to set up a Web site to enter a market. The web can also increase barriers to entry, as when customers come to expect a nontrivial capability from their suppliers.
______ are auctions that sellers use as a channel to many potential buyers. Usually, sellers place items at sites for auction, and buyers bid continuously for them.
Forward Auction
Two major conflicting issues related to privacy are ___ and ___.
Freedom of Speech; National Security
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.
Freedom of Speech; Privacy
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.
Freedom of speech, privacy
___________ include B2B and B2C.
Functional area information systems
This type of satellite has the largest footprint:
GEO
The most important reason that social computing is so valuable is:
Information is not anonymous
knowledge management systems (KMSs)
Information technologies used to systematize, enhance, and expedite intra- and inter- firm knowledge management.
The most common wireless technology for TV and DVD remote control devices is _______.
Infrared
The most common wireless technology for TV and DVD remote control devices is _______. a)Bluetooth b)Ultra-wideband c)Near-field communications d)WiMAX e)Infrared
Infrared
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?
Innovation
Which strategy for competitive advantage involves introducing new products and putting new features in existing products
Innovation
Introduce new products and services, put new features in existing products and services, or develop new ways to produce them:
Innovation Strategy
Which of the following is not a communications channel? a)Fiber-optic cable b)Satellite transmission c)Twisted-pair wire d) Integrated circuits e)Cellular radio
Integrated circuits
Packaging, assembly, or manufacturing take place in the __________ segment of the supply chain.
Internal
Micro-browsers
Internet browsers with a small fire size that can work within the low-memory constraints of wireless devices and the low bandwidths of wireless networks.
Folksonomies are:
Keywords that describe a piece of information.
Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning and expertise as they apply to a current problem or activity:
Knowledge
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____.
Knowledge
_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem
Knowledge
A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n):
LAN
A network that connects computing devices within the same building is:
LAN
Which type of satellite requires the highest number of satellites to cover the earth?
Low earth orbit
GPS are supported by ___ satellites
MEO
GPS are supported by ___ satellites a)LEO b)MEO c)GEO
MEO
GPS are supported by ___ satellites.
MEO
This type of satellite is used for the global positioning system:
MEO
The most important benefit of knowledge management systems is:
Make best practices available to employees.
Which of the following statements concerning the management of information resources is not true?
Managing mainframes has become more difficult
A company's production process consists of taking sand and refining it into silicon to be used in microchip production. This process most accurately describes which of the following? -Manufacturing -Assembling -Procurement -Fulfillment
Manufacturing
Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes?
Operational Effectiveness
Improve the manner in which internal business processes are executed so that the firm performs similar activities better than its rivals:
Operational Effectiveness Strategy
Privacy advocates prefer which model of informed consent
Opt-in
Privacy advocates prefer which model of informed consent?
Opt-in
In the fulfillment process, instance-level information would include: Order date, FOB, order number Average date from order to shipping Average date from order to shipping and order number Order date and products sold to customer over the past year
Order date, FOB, order number
Data in an ES is classified into what three types? Information, knowledge, and transactional Organizational, master, and knowledge Organizational, master, and transactional Enterprise, master, and transactional
Organizational, master, and transactional
Our most expensive, yet underutilized asset is:
Our cars
Place the different types of computer networks in size order, ranging from smallest to largest.
PAN-LAN-MAN-WAN
Which of the below represents procurement as part of the support value activities in a value chain analysis?
Purchases inputs such as raw materials, resources, equipment and supplies.
The B2B equivalent of electronic credit cards is ______. Unlike credit cards, where credit is provided for 30 to 60 days (for free) before payment is made to the merchant, payments made with these are settled within a week.
Purchasing Cards
Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT
Privacy
Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli's client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved?
Privacy
What are the 4 categories of ethical issues related to IT?
Privacy, Accuracy, Property, Accessibility
Content-filtering software performs all of the following functions except:
Proactively monitoring computers to protect against malware attacks.
Which of the following is an example of explicit knowledge?
Procedural guides
An organization's IT components include all of the following except:
Procedures
Cooking a patty and putting the ingredients together are included in which category of making a hamburger?
Process
cross departmental process
Processes that cross the boundaries of departments.
Which of the following problems do organizations face when managing data?
Processing and analyzing the data that are being stored Collecting the vast amounts of data that are being generated Storing the data that are being collected
The greatest problem with GEO satellites is which of the following?
Propagation delay
A group of logically related fields is a(n):
Record
You decide to start a landscaping business called Trim Grass. You created a Web site , but it doesn't seem to be attracting any clients. So, you decide to explore advertising on the . Which of the following advertising methods probably would not be beneficial?
Spamming
Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book? spamware cookies adware spyware
Spamware
Target large groups of people. In these attacks perpetrators find out as much information as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information.
Spear Phishing Attack
Fourth Generation (4G)
Still under development and does not fall under one defined technology or standard. "A network that operates on Internet technology, combines this technology with other applications and technologies such as Wi-Fi and WiMax, and operates at speeds ranging from 100 Mbps in cell-phone networks to 1 Gbps in local Wi-Fi networks.
____ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary.
Stored-value money cards
List a business pressure and describe an IT response to it;
Technology Pressures: An example of a technology pressure is information overload. Search engines and business intelligence applications enable managers to access, navigate, and utilize vast amounts of information.
What pressure do businesses face today?
Technology pressures such as information overload.
_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
Telematics
The wireless transmission and receipt of data gathered from remote sensors.
Telemetry
_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.
Telemetry
Business intelligence applications are used for gathering, storing, accessing, and analyzing data to help business users make better decisions. True False
True
The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by:
The Seller
For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply):
The ability to offer a larger selection of products. The ability to offer lower prices to customers. The ability to reach a wider customer base.
For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply):
The ability to offer lower prices to customers. -The ability to reach a wider customer base.-The ability to offer a larger selection of products.
tacit knowledge
The cumulative store of subjective or experiential learning; it is highly personal and hard to formalize.
Explain how the web has an impact on the bargaining power of suppliers:
The web enables buyers to find alternative suppliers and to compare prices more easily, thereby reducing suppliers' bargaining power. From a different perspective, as companies use the web to integrate their supply chains, participating suppliers can lock in customers, thereby increasing suppliers' bargaining power.
The term "data rot" refers to
The deterioration of the medium on which the data are stored.
Which development led to the dramatic growth of the use of enterprise systems? The development of client-server architecture The development of service oriented architecture The development of mainframe systems The development of databases
The development of databases
Friedman's Flattner's include
The development of work-flow software
Netcasting is:
The distribution of audio files and video files.
Which of the following is not a characteristic of a structured decision? a)It is routine. b) It is repetitive. c)Human intuition is not involved. d)The first three phases of the decision-making process need not occur in any particular sequence. e)Standard solutions exist.
The first three phases of the decision-making process need not occur in any particular sequence.
Computer technologies become obsolete faster than other technologies in the organization. True False
True
Which of the following is not inhibiting faster Wi-Fi expansion?
The growth of WiMAX
Which of the following is not inhibiting faster Wi-Fi expansion?
The growth of WiMax
DNS are a convenient alternative to the difficult-to-remember IP naming system for computers. True False
True
Why would a company find it advantageous to have access to reports based off of process-level information in the fulfillment process? To identify the FOB of a particular order The amount of supplies purchased from a vendor in a given month The number of shipments that were on-time versus delayed All of the above are advantageous for a company in the fulfillment process
The number of shipments that were on-time versus delayed
Propagation Delay
The one-quarter second transmission delay in communication to and from GEO satellites.
Which of the following statements is false? a) Social networks can be used to achieve strategic objectives. b)The only downside of social networks is the required bandwidth. c)Social networks can be implemented on a secure platform. d)Social networks take the place of traditional employee directories. e)Social networks can offer personal pages as well as business pages.
The only downside of social networks is the required bandwidth.
customer relationship management
The overall process of building and maintaining profitable customer relationships by delivering superior customer value and satisfaction
DNS are a convenient alternative to the difficult-to-remember IP naming system for computers. True False
True
entity-relationship (ER) modeling
The process of designing a database by organizing data entities to be used and identifying the relationships among them.
Supplier relationship management systems include which of the following?
The purchasing process, analyzing potential and existing suppliers, procuring nonproduction materials
Supplier relationship management systems include which of the following? -Determining the most viable end products for development, the purchasing process, procuring nonproduction materials -Create demand for products, requesting quotations for complex products, procuring nonproduction materials -The purchasing process, analyzing potential and existing suppliers, procuring nonproduction materials -Match demand to future production capacity, requesting quotations for complex products, the purchasing process
The purchasing process, analyzing potential and existing suppliers, procuring nonproduction materials
Network protocols describe
The rules for communication within the network.
Network protocols describe:
The rules for communication within the network.
Which of the following statements about your future role as a manager is false?
The size of my team will likely be smaller than teams of today.
A stock out occurs when: A company has excess inventory of a product Information is incorrectly copied to the packing list A delivery is made to the incorrect location There are insufficient products in inventory to meet demand
There are insufficient products in inventory to meet demand
Which of the following statements about companies that provide proactive protection of your information assets is not correct?
These companies operate independently of the three major credit reporting agencies.
The data in a data warehouse have which of the following characteristics?
They are organized by subject.
All of the following statements concerning wide-area networks are true except:
They are provided by individual companies.
Of the following, which is the major problem with smart phones?
They can be used to compromise security.
When a sales order is created in the fulfillment process, much data from prior steps in the process is copied over. Which of the following is a benefit of this redundancy? It reduces the likelihood of errors in the process. This process can be automated in a manual environment. This redundancy does not waste time and resources. This ensures a clear understanding of the transaction details for both parties.
This ensures a clear understanding of the transaction details for both parties.
Sales orders have two primary purposes. These are: To standardize data across all customer purchase orders and consolidate customer inquiries To standardize data across all customer purchase orders and create an internal record for tracking purposes To identify where items are stored in the warehouse and create an internal record for tracking purposes Agree to purchase the stated material, for the stated price, under the stated terms
To standardize data across all customer purchase orders and create an internal record for tracking purposes
Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols. True False
True
A _____ is any danger to which an information resource may be exposed.
Threat
Business intelligence applications are used for gathering, storing, accessing, and analyzing data to help business users make better decisions.
True
Sense networks track users via all of the following technologies except _______.
Traffic cameras
Which of the following is not a concern or risk of cloud computing?
Training
Which of the following is not a mobile application in financial services?
Transaction Proccessing Systems
In the preceding example, "Robert Jones" is an example of:
Transaction data
Which of the following is not a mobile application in financial services?
Transaction processing systems
Which type of data in ES changes constantly? Transactional data Master data Organizational data Layer data
Transactional data
A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. True False
True
A combination of your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be considered information
True
A university registrar who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores, would be applying her knowledge in your application process.
True
AJAX is a Web development technique that enables portions of Web pages to reload with fresh data instead of requiring the entire Web page to reload. True False
True
According to McKinsey & Co, the root cause of companies' inability to align their IT and their business goals is the lack of knowledge and communication.
True
An attribute is any characteristic or quality that describes a particular entity. True False
True
An auditing manager focuses on the ethical and legal use of information systems.
True
An electronic storefront is a Web site on the Internet that represents a single store. True False
True
A service-oriented architecture is an IT architecture that makes it possible to build business applications using Web services.
True!
An organization's supply chain starts at the supplier and ends at the customer. T or F?
True!
Cost Leadership Strategy is one strategy to gain a competitive advantage. T or F?
True!
Data marts are designed for the end-user needs in a strategic business unit or department.
True!
Which of the following statements about Wi-Fi is not correct? a)Wi-Fi provides simple Internet access. b)Laptop PC scans contain chips that can send and receive Wi-Fi signals. c)Many companies offer free Wi-Fi access in their stores. d)Wi-Fi requires encryption for secure transmissions. e)Wi-Fi is expensive to set up.
Wi-Fi is expensive to set up
Which of the following statements about Wi-Fi is not correct?
Wi-Fi is expensive to set up.
___ enables peer-to-peer wireless communications without the need to go through a central wireless access point.
WiFi Direct
The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.
WiMAX
A Web site on which anyone can post material and make changes to other material is a(n) ______.
Wiki
A ___ is a Web site made up entirely of content posted by users.
Wiki
A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n):
Wireless Access Point
Which of the following statements is not correct? a) You should use credit cards with your picture on them. b) You may use virtual credit cards for additional security. c) You should use debit cards whenever possible for additional security. d) You cannot use virtual credit cards for in-store purchases. e) Signatures on credit cards are often impossible to read.
You should use debit cards whenever possible for additional security.
You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen? a) When you sign up, you will need to download print templates. b) You won't be able to search RSS content. c) You will be able to choose only one topic area. d) You will be notified of updates in the content areas you selected. e) You will get content sent to you via e-mail.
You will be notified of updates in the content areas you selected.
Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.
Zero, the amount in your bank account
Your liability with credit cards is typically _____, where your liability with debit cards is _____.
Zero, the amount in your bank account ( The amount in your bank account, your credit limit Your credit limit, the amount in your bank account The amount in your bank account, zero Your credit limit, zero)
Which of the following attacks is most closely associated with downloading and installing patches immediately?
Zero-day attack
Which of the following can be used for reading utility meters without a person having to get out of a truck?
ZigBee
metadata
Data about data.
An evil twin attack is a type of:
Rogue access point
Master data are generated and captured by operational systems.
Answer: False
Tacit knowledge is the more objective, rational, and technical types of knowledge.
Answer: False
The relational database model is based on the concept of three-dimensional tables.
Answer: False
When data are normalized, attributes in the table depend on the primary key and any secondary keys.
Answer: False
smart cards
Sometimes called "electronic wallets," look like ATM cards; however, they also include a microchip.
______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a)Electronic checks b)Stored-value money cards c)Purchasing cards d)Smart cards e) Person-to-person payments
Stored-value money cards
Systems that help an organization gain a competitive advantage by supporting its strategic goals and/or increasing performance and productivity.
Strategic Information Systems (SISs)
Michael Porter defined the Five Forces Model and the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales?
Suppliers can drive down profits by charging more for supplies
Which of the following is not a limitation of barcodes?
They identify the manufacturer, product, and item.
Distributed computing refers to the distribution of computing tasks among one or more computers. True False
True
E-commerce systems are a type of inter-organizational information systems.
True
Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.
True
Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols. True False
True
File sharing is a type of peer-to-peer processing. True False
True
T/F A/B experiments are so-named because there are only two possible outcomes for each experiment.
True
Medium Earth Orbit (MEO)
--Satellites move relative to point on earth. --Moderate number needed for global coverage. --Requires medium-powered transmitters. --Negligible (very small) transmission delay. --Less expensive to build and launch. --Moderate orbital life (6-12 years).
Benefits of e-commerce:
-Benefits organizations by making national and international markets more accessible and by lowering the costs of processing, distributing and retrieving information. -Customers benefit by being able to access a vast number of products and services, around the clock. -Major benefit to society is the ability to easily and conveniently deliver information services, and products to people in cities, rural areas, and developing countries.
Twisted-pair wire, the most prevalent form of communications wiring, consists of strands of copper wire twisted in pairs. Discuss the main advantages and disadvantages.
-It is relatively inexpensive to purchase, widely available, and easy to work with. -It is relatively slow for transmitting data, it is subject to interference from other electrical sources, and it can easily be tapped by unintended receivers.
Provide an example of E-learning, and explain how that network application supports business functions.
-Refers to learning supported by the Web. Distance learning refers to any learning situation in which teachers and students do not meet face-to-face. -E-learning provides tools for business users to enable their lifelong learning.
Identify three common challenges in managing data:
1-Data are scattered throughout organizations and are collected by many individuals using various methods and devices. These data are frequently stored in numerous servers and locations and in different computing systems, databases, formats, and human and computer languages. 2-Data come from multiple sources. 3-Information systems that support particular business processes impose unique requirements on data, which results in repetition and conflicts across an organization.
What are the Deliberate Threats to Information Systems?
1-Espionage or Trespass 2-Information Extortion 3-Sabotage and Vandalism 4-Theft of equipment and information 5-Identity Theft 6-Protecting intellectual property 7-Software attacks 8-Alien Software 9-Supervisory control and data acquisition (SCADA) 10-Cyberterrorism and Cyber warfare
Give examples that go with the 5 factors that contributed to the increasing vulnerability of information resources.
1-Internet 2-Netbooks, Thumb drives, iPads 3-Information system hacking programs circulating the Internet 4-Organized crime has formed transnational cybercrime cartels. Because it is difficult to know exactly where cyber attacks originate, these cartels are extremely hard to bring to justice. 5-Suppose that your company spent $10 million on information security countermeasures last year and experienced no successful attacks on information resources. Short-sighted management might conclude that the company could spend less during the next year and obtain the same results. Bad Idea.
What are the 6 characteristics of effective alignment for BIT?
1-Organizations view IT as an engine of innovation that continually transforms the business. 2-Organizations view customers and customer service as supremely important. 3-Organizations rotate business and IT professionals across departments and job functions. 4-Organizations provide clear, overarching goals for all employees. 5-Organizations ensure that IT employees understand how the company makes (or loses) money. 6-Organizations create a vibrant and inclusive company culture.
Positive societal effects from the increased use of information technology:
1-Provide opportunities for people with disabilities 2-Provide people with flexibility in their work (anywhere/anytime) 3-Robots will take over mundane chores 4-Enable improvements in health care
Identify the 5 competitive forces described by Porter:
1-Threat of entry of new competitors 2-Bargaining power of Suppliers 3-Bargaining power of customers(buyers) 4-Threat of substitute products or services 5-Rivalry among existing firms in the industry
Identify the 5 factors that contribute to the increasing vulnerability of information resources.
1-Today's interconnected, interdependent, wirelessly networked business environment. 2-Smaller, faster, cheaper computers and storage devices 3-Decreasing skills necessary to be a computer hacker 4-International organized crime taking over cybercrime 5-Lack of management support
What are the 9 types of deliberate attacks?
1-Virus 2-Worm 3-Phishing Attack 4-Spear Phishing attack 5-Denial of service attack 6-Distributed denial of service attack 7-Trojan Horse 8-Back Door 9-Logic Bomb
From a logical point of view, a(n) _______________ is the smallest data element that can be observed and manipulated. A. character B. bit C. attribute D. byte
A
In a(n) _______________ database structure, all of the relationships among records are one-to-many, because each data element is related to only one element above it. A. hierarchical B. relational C. network D. object-oriented
A
Large organizations usually place control of enterprise-wide database development in the hands of _______________. A. Database administrators (DBAs) B. Automated CASE tools C. End users D. All of the choices are correct.
A
The object-oriented database model supports _______________. That is, new objects can be automatically created by replicating some or all of the characteristics of one or more parent objects. A. inheritance B. morphing C. duplication D. cloning
A
The primary challenge of a distributed database is: A. Data accuracy B. Data transmission speed C. Storage costs D. Data security
A
The tables in a relational database are flat files which have rows and columns. Each column represents a _______________ in the file. A. field B. record C. file D. relation
A
Using a relational database, a user can temporarily combine two or more tables so that he/she can see relevant data in a form that looks like it is in one big table. This is the _______________ operation. A. join B. link C. merge D. select
A
The integrated process begins when which of the following occurs:
A customer submits an inquiry
The integrated process begins when which of the following occurs: -A planned order is issued -An invoice is sent to the vendor -A customer sends a purchase order -A customer submits an inquiry
A customer submits an inquiry
Wireless Network Interface card (WNIC)
A device that has a built-in radio an antenna and is essential to enable a computer to have wireless communication capabilities.
table
A grouping of logically related records.
Ultra-Wideband (UWB)
A high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. The high speed makes it good for streaming multimedia for, say, tv or personal computers.
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?
A hot site needs to be located close to the organization's offices.
A company creates a web service that consists of a Google Map that is connected to a list of customer addresses. This would be an example of A mainframe A mashup A Wiki A hardware layer
A mashup
knowledge management (KM)
A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory and that typically reside within the organization in an unstructured manner.
master data management
A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core master data.
Which of the following would be true in a highly automated enterprise system in the production process? -The system could be configured to automatically approve all vendor purchase orders. -A production controller could configure the system to automatically approve planned orders under certain conditions. -The system could be configured to automatically send invoices to customers. -None of these are possible in a highly automated enterprise system.
A production controller could configure the system to automatically approve planned orders under certain conditions.
Short message service (SMS)
A service provided by digital cell phones that can send and receive short text messages (up to 160 characters in length).
master data
A set of core data, such as customer, product, employee, vendor, geographic location, and so on that span the enterprise information systems.
Hotspot
A small geographical perimeter within which a wireless access point provides service to a number of users.
GLOBAL POSITIONING SYSTEM
A system that determines the precise position of something on Earth through a series of satellites, tracking stations, and receivers.
Which of the following problems do organizations face when managing data? A. All of these B. Collecting the vast amounts of data that are being generated C. Processing and analyzing the data that are being stored D. Storing the data that are being collected
A. All of these
Which of the following are ways for companies to leverage big data to gain value? (check all that apply) A. Creating transparencies B. Segmenting a population to customize actions C. Analyzing less data D. Reducing spending on technical initiatives E. Providing automated algorithms to support decision making
A. Creating transparencies B. Segmenting a population to customize actions E. Providing automated algorithms to support decision making
eBay employs the ___ auction mechanism. A. Forward B. Reverse C. Dutch D. Proprietary eBay
A. Forward
The ___ is the transport mechanism, while the ___ is the application that uses the transport mechanism. A. Internet, WWW B. WWW, intranet C. WWW, Internet
A. Internet, WWW
A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n): A. LAN. B. Network server. C. WAN. D. All of these.
A. LAN
The use of databases enables organizations to (choose all that apply): Entry field with correct answer A. Minimize data security risks. B. Minimize data isolation. C. Eliminate data redundancy. D. Eliminate data integrity. E. Minimize data inconsistency.
A. Minimize data security risks B. Minimize data isolation E. Minimize data inconsistency
Downloading a book on an Amazon Kindle is an example of: A. Pure e-commerce. B. Partial e-commerce. C. Both of these are correct. D. Neither of these are correct.
A. Pure e-commerce.
The opening case illustrates how e-commerce has increased (choose all that apply): A. The volume of business transactions. B. The skill with which computers are able to handle unexpected situations. C. The occurrence of human errors. D. The speed at which we do business.
A. The volume of business transactions. D. The speed at which we do business.
With _____, phone calls are treated as just another kind of data. A. Voice over Internet Protocol B. Chat rooms C. Teleconference D. All of these
A. Voice over Internet Protocol
Place the following members of the data hierarchy in the correct order: A. bit - byte - field - record - file - database B. bit - record - field - byte - file - database C. byte - bit - record - field - database D. bit - byte - field - record - database - file E. bit - field - byte - record - file - database
A. bit - byte - field - record - file - database
eBay is an example of which type of e-commerce? A. consumer-to-consumer B. consumer-to-business C. business-to-consumer D. business-to-business E. government-to-citizen
A. consumer-to-consumer
When e-commerce is done in a wireless environment, this is called: A. mobile commerce B. wireless commerce C. pervasive computing D. location commerce E. consumer commerce
A. mobile commerce
Explicit knowledge has which of the following characteristics? A. objective B. slow C. costly to transfer D. personal E. ambiguous
A. objective
Manufacturers or retailers sell directly to customers in which of the following business models? A. online direct marketing B. affiliate marketing C. find-the-best-price D. name-your-own-price E. electronic tendering system
A. online direct marketing
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. A. Access B. Physical C. Data security D. Administrative E. Input
A.Access
Biometrics are an example of: A. something the user is. B. something the user wants. C. something the user has. D. something the user knows. E. something the user does.
A.Something the user is
A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, dsfsf commission to the partner. This scenario illustrates which business model?
Affiliate marketing
Which of the following are examples of process-level information in the production process? -The average time to complete production of a product -The percent of planned orders are currently in the Final Inspection stage -How many orders were delayed in January and why -All of the above
All of the above
Conversational marketing can take place in which of the following forums?
All of the above -- a) Blogs b) Wikis c) Online forums - d) Social networking sites
A supply chain management system can do which of the following?
All of the above -Use demand forecasts to create a demand plan over a given period of time -Match demand with future production capacity -Create a material plan to match the expected amount of finished goods to be produced
Which of the following is not a consequence of poor information security practices?
All of the above are consequences of poor information security practices.
Cybercriminals can obtain the information they need in order to assume another person's identity by:
All of the above are strategies to obtain information to assume another person's identity.
Businesses and organizations set up Web sites to: a)Sell goods and services. b)Induce people to visit a physical location. c)Reduce operational and transaction costs. d)Enhance their reputation. e)All of the above.
All of the above.
Which of the following is not a step in ethical decision making? A. Recognize the ethical issue. B. Get the facts. C. Evaluate alternative actions. D. Make a decision and test it. E. All of these are steps in ethical decision making.
All of these are steps in ethical decision making.
A server is a network device that allows users to share a)Software programs. b)Files. c)Network resources. d)All of these.
All of these.
The "cloud" in cloud computing is comprised of a)Computers and servers. b)Software. c)Network connections. d) All of these.
All of these.
BI refers to only those technologies that obtain data from warehouses.
False
It is easy to manage all the data coming into an organization.
Answer: False
It is important for applications and data to be dependent on each other.
Answer: False
A negative value for a student's grade point average is an example of a data integrity problem.
Answer: True
An attribute is any characteristic or quality that describes a particular entity.
Answer: True
An entity is a person, place, thing, or event about which information is maintained.
Answer: True
Data marts are designed for the end-user needs in a strategic business unit or department.
Answer: True
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
Answer: True
Ratings, reviews, and recommendations a) Are always provided by businesses on their Web site. b) Are posted by experts. c) Are posted without compensation. d) Are an aspect of social shopping. e) Are not beneficial to the business
Are an aspect of social shopping.
Which of the following statements is not correct? A. Employees have limited protection against surveillance by employers. B. The large majority of organizations monitor employee Internet usage. C. The large majority of organizations use URL filtering. D. As with normal first-class mail, employers cannot read employee e-mail. E. Employees should be aware that surveillance is legal.
As with normal first-class mail, employers cannot read employee e-mail.
______ allows users to access almost unlimited bandwidth on demand. Provides support for data, video, and voice transmissions on a single communications line.
Asynchronous transfer mode (ATM)
Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using:
Automated Webcrawlers
Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using:
Automated webcrawlers.
The system which provides overall control and monitoring functions of a specific process or application. Generally consists of a network of computers, controllers, and I/O modules.
Automation Systems
In the fulfillment process, process-level information would include: Order date, FOB, order number Average date from order to shipping Average date from order to shipping and order number Order date and products sold to customer over the past year
Average date from order to shipping
A _______________ is an overall logical view of the relationships needed to support specific end-user application programs that will access the database. A. schema B. subschema C. logical data model D. conceptual design
B
A central source of data that have been cleaned, transformed, and cataloged so that they can be used for business analysis, market research, and decision support is called a _______________. A. data mart B. data warehouse C. transaction processing mart D. data repository
B
A database with a(n) _______________ data structure can easily handle a many-to-many data relationship. A. hierarchical B. network C. relational D. object-oriented
B
According to one database pioneer, the future development of databases and data warehouses will depend on _______________. A. rows B. columns C. transaction D. All of the choices are correct.
B
According to the text, most data warehouses will run _______________ in a column format. A. 20 times faster B. 50 times faster C. 50 times slower D. None of the choices are correct.
B
All of the following are major functions of a database management system except: A. Creating new databases and database applications B. Identifying insufficient data processing or storage needs C. Maintaining the quality of the data in an organization's databases D. Using the databases of an organization to provide the information needed by its end users
B
All the fields used to describe the attributes of an entity are grouped to form a(n) _______________. A. field B. record C. file D. database
B
Which of the following is true of data marts? A. They hold data from many different data warehouses. B. They are a subset of a data warehouse. C. They focus on many generalized aspects of a company. D. None of the choices are correct.
B
_______________ is the most commonly used database application for the PC. A. Oracle 10g B. Microsoft Access C. DB2 D. SQL Server
B
Which of the following is an example of explicit knowledge? A. skill sets B. procedural guides C. experiences D. expertise E. insights
B. procedural guides
_____ refers to the range of frequencies available in any communications channel.
Bandwidth
What are the two types of account data needed to process a payment?
Bank Account Vendor Account
What are the types of data needed to post an incoming payment?
Bank account customer account invoice amount
The short-range wireless network best suited for eliminating the wires connecting keyboard, mouse, monitor, and computer in your office is:
Bluetooth
_____ is a wireless standard that enables temporary, short-range connection between mobile devices.
Bluetooth
_____ is a wireless standard that enables temporary, short-range connection between mobile devices. a)Bluetooth b)Wireless application protocol c)Short message service d)Wi-Fi e)Global positioning system
Bluetooth
With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.
Both of the following are correct: convenience and instant connectivity
Managing information systems in a modern organization is challenging because:
Both of the following are correct: the systems are very expensive to acquire, operate, and maintain; and the systems are critical to the organization's operations.
The term "digital divide" refers to the gap between:
Both of the following: Individuals who have access to information and communication technologies and those who do not; and the IT staff and the other employees who are not IT savvy.
When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n):
Buy-side marketplace
When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n):
Buy-side marketplace.
When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): a)Buy-side marketplace. b)Sell-side marketplace. c)Electronic exchange. d)None of these.
Buy-side marketplace.
A(n) _____ represents a single character, such as a letter, number, or symbol.
Byte
A database with a(n) _______________ data structure can easily handle ad hoc requests for information. A. hierarchical B. network C. relational D. object-oriented
C
A group of related records is a data file, or a _______________. A. field B. record C. table D. database
C
The _______________ model is the most widely used database structure today. A. network B. object-oriented C. relational D. hierarchical
C
The _______________ operation is used to create a subset of the columns contained in the temporary tables created by the select and join operations. A. link B. relate C. project D. merge
C
The basic form of a SQL query is: A. SELECT ¼ AND ¼ OR B. SELECT ¼ WHERE ¼ FROM ¼ C. SELECT ¼ FROM ¼ WHERE ¼ D. AND ¼ OR ¼ NOT ¼
C
The physical design stage of database development: A. Develops a model of business processes B. Translates conceptual models into the data models C. Determines the data storage structures and access methods D. Defines the information needs of end users in a business process
C
What type of databases are employees using when they access online data banks, whether those data banks are free or paid for through subscriptions? A. Common databases B. Distributed databases C. External databases D. Local databases
C
Which of the following statements concerning the replication and duplication process for updating distributed databases is correct? A. The two terms are interchangeable because the processes work the same way B. Duplication is the more complicated process because it has to identify one database as a master and prevent changes being made to any database other than the master C. Replication is the more complicated process because it must find changes in each distributed database and make appropriate changes to make each database identical D. None of the choices are correct.
C
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security
C.Freedom of speech, privacy
The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the
CIO
E-Business
Carrying out the goals of business through utilization of the internet.
_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.
Cell phones
First Generation (1G)
Cellular used analog signals and had low bandwidth (capacity).
Disintermediation
Channel conflict that arises when a channel member bypasses another member and sells or buys products direct
____ and ____ are the two major challenges for the sellers in e-commerce.
Channel conflict, order fulfillment
Bluetooth
Chip technology that enables short-range connection (date and voice) between wireless devices.
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______.
Client/server
Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Which of the following might be a good source of computing for the company? a)Server farm b)Grid computing c)Cloud computing d)Utility computing e)Virtualization
Cloud computing
Making and distributing information goods to which you do not own the ___ is referred to as ____.
Copyright; Piracy
__________ are high speed central networks to which multiple smaller networks connect.
Corporate backbone networks
____ is(are) involved with monitoring and managing an organization's performance according to the organization's key performance indicators.
Corporate performance management
procurement portals
Corporate portals that automate the business processes involved in purchasing or procuring products between a single buyer and multiple suppliers.
The capabilities of smart phones include all of the following except _________.
Corporate transaction processing
Produce products and/or services at the lowest cost in the industry:
Cost Leadership Strategy
Compared to data warehouses, data marts have which one of the following characteristics?
Cost Less
When customers access a Web site and make purchases, they generate ____.
Clickstream data.
Compared to data warehouses, data marts:
Cost less
Various organizations that promote fair and responsible use of information systems often develop a _____.
Code of ethics
Workflow, groupware, and telepresence systems are examples of which network application?
Collaboration
Aggregators are primarily designed to a)Collect information from different information sources. b)Disseminate information to potential consumers. c)Store information for later reference. d)None of these
Collect information from different information sources.
data dictionary
Collection of definitions of data elements, data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use the data elements.
transaction processing systems-
Collects and stores information about transactions; control some aspects of transaction
In the relational database model, related tables can be joined when they contain common _____.
Columns
____ Secure the movement of data across networks. These controls consist of firewalls, anti-malware systems, whitelisting and blacklisting, encryption, virtual private networking, secure socket layer, and vulnerability management systems.
Communications Controls
Organizations typically face issues related to e-tailing including
Companies face issues in both of these areas
An advantage over competitors in some measure such as cost, quality, or speed; leads to control of a market and to larger-than-average profits.
Competitive Advantage
The computing skills necessary to be a hacker are decreasing for which of the following reasons? a) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. b) Computer attack programs, called scripts, are available for download from the Internet. c) International organized crime is training hackers. d) Cybercrime is much more lucrative than regular white-collar crime. e) Almost anyone can buy or access a computer today.
Computer attack programs, called scripts, are available for download from the Internet.
Which of the following would be an example of a SCADA attack? • Email accounts are hacked and kinky messages are sent to all of the user's contacts. • Bank accounts are hacked into after Internet purchases • Social Security numbers are deleted from a company's database. • Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
Wide-Area Wireless Networks
Connects users to the Internet over geographically dispersed territory. Typically operate in a licensed spectrum. They are either "cellular radio" or "broadband."
C2C
Consumer to Consumer
In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as:
Conversational marketing
A modem can perform which of the following operations?
Convert analog signals to digital signals and Convert digital signals to analog signals
A modem can perform which of the following operations?
Convert analog signals to digital signals only; and convert digital signals to analog signals only.
CSF's and KPI's are two core metrics used to evaluate results and measure the progress of a project for a business. Which of the below represents the acronyms for CSF and KPI?
Critical success factors and key performance indicators
When Amazon welcomes you by name back to its website on your second visit this is an example of which strategy for competitive advantage?
Customer Orientation
Information Systems for marketing incorporate the following functions: (check all that apply)
Customer Relationship Management
Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.
Customer intimacy
Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________. A. Customer relationships B. Customer profiling C. Customer intimacy D. Customer knowledge E. Spying
Customer profiling
Information Systems for marketing incorporate the following functions: (check all that apply)
Customer relationship management
According to the textbook case, file processing in Hadoop is not halted by hardware failures because _______________. A. Hadoop is a software product B. Open-source products are not affected by hardware failures C. Hadoop is an Internet product and does not need hardware D. Hadoop keeps three (3) copies of all data
D
Database administrators and database design analysts work with end users and systems analysts to do all of the following except: A. Model business processes and the data they require B. Determine what data definitions should be included in the database C. Determine what structure or relationships should exist among the data elements D. Enter live data into the system until it has proven to be reliable
D
Database management involves the use of database management software to control how databases are _______________. A. created B. interrogated C. maintained D. All of the choices are correct.
D
Fixed-length records contain: A. both a variable number of fields and variable field lengths. B. both a variable number of fields and fixed field lengths. C. both a fixed number of fields and variable field lengths. D. both a fixed number of fields and fixed field lengths.
D
Operational databases store the detailed data needed to support the business processes and operations of a company. They are also called _______________. A. Subject area databases B. Transaction databases C. Production databases D. All of the choices are correct.
D
Which of the following is a legitimate use for data mining? A. Performing "market-basket analysis" to identify new product bundles B. Profiling customers C. Finding the root cause of a quality or manufacturing problem D. All of the choices are correct.
D
_____ occurs when the same data are stored in many places.
Data Redundancy
Which of the following statements regarding informed users of IS and IT is true? A. Informed users almost invariably work for the IT department. B. Being an informed user is less important today than in the past because IT providers offer extensive help and support. C. Most employees who have experience surfing the Web or working with computers qualify as informed users. D. Informed users enhance an organization by providing feedback regarding the applications and technologies used by the organization.
D. Informed users enhance an organization by providing feedback regarding the applications and technologies used by the organization.
_____ is a method for analyzing and reducing a relational database to its most streamlined form. A. Structured query B. Joining C. Relational analysis D. Normalization E. Query by example
D. Normalization
The most important benefit of knowledge management systems is: A. improved morale. B. retention of scarce knowledge if employees retire. C. more efficient product development. D. they make best practices available to employees. E. improved customer service.
D. they make best practices available to employees
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management?
Data Inconsistency
______ Occurs when applications cannot access data associated with other applications.
Data Isolation
The management of data across the entire organization is most accurately defined as:
Data governance
relational database model
Data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.
_____ occurs when the same data are stored in many places. a)Data isolation b)Data integrity c)Data consistency d)Data redundancy c) Application/Data dependence
Data redundancy
query by example (QBE)
Database language that enables the user to fill out a grid (form) to construct a sample or description of the data wanted.
The software program (or group of programs) that provides access to a database.
Database management system
CoStar faced pushback from the real estate community in the Washington area, and eventually in every city in which the company began operations, because commercial real estate brokers did not want the buying or selling process to be transparent. This situation is clearly illustrates how CoStar's database system produced information and business intelligence that changed the real estate market in terms of:
Decreased suppliers bargaining power
Product life cycle management includes which of the following?
Determine the most viable end products to produce and collaborate internally and externally to develop products
Product life cycle management includes which of the following? -Determine the most viable end products to produce and collaborate internally and procure nonproduction materials -Determine the most viable end products to produce and collaborate internally and externally to develop products -Transform demand into sales opportunities and externally to develop products -Enabling the source-to-settle and idea-to-market processes
Determine the most viable end products to produce and collaborate internally and externally to develop products
Which of the following statements is correct?
Determining and enforcing privacy regulations can be difficult.
Offer different products, services, or product features:
Differentiation Strategy
The network application, ___, enables users to access information located in databases all over the world.
Discovery
Networks enable which of the following applications?
Discovery Communications Collaboration
Networks enable which of the following applications?
Discovery Communications Collaboration All of these*
The popularity of online classes and online universities can be attributed to which of the following network applications?
Discovery Communications Collaboration All of these*
six network applications
Discovery - how computers are able to find other computers or devices on the network and if they can see it back. Communications - A set of nodes connected by communication links that allow for the transfer of information between users around the world. E-Learning - Education via the Internet by the use of applications and processes to learn. Virtual University - Provides higher education through online schooling allowing people to take classes from home to obtain a degree. Telecommuting - The Internet allows workers to save their commute and work from home, transmitting files and data from their own personal computers to the company.
Product life cycle management systems incorporate which of the following so that everyone in the process has access to the historical background of a product? -Document and knowledge management capabilities -Document and supply chain management capabilities -Knowledge and customer relationship management capabilities -Supply chain and supplier relationship management capabilities
Document and knowledge management capabilities
An employee is examining that status of all delayed orders via the company's enterprise system. One particular order is noticeably delayed. The employee performs which task in the enterprise system to learn more about this particular order number? -Stock out -Drill down -Backlogging -Product routing
Drill down
The amount and type of memory that a computer possesses affects which of the following? A. The type of program the computer can run B. The speed of the computer C. The cost of the computer D. The cost of processing data E. All of these
E. All of these
In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was:
Employee Negligence
Internet over Satellite (IoS)
Enables users to access the Internet via GEO satellites from a dish mounted on the side of their homes (often in regions of the world where it's the only option for Internet). Downside: GEO satellite transmissions entail a propagation delay, and they can be disrupted by environmental influences such as thunderstorms.
Protocol
Engagement
A(n) ___ can consist of one or more ____ .
Enterprise Network; LANs
Information systems that correct a lack of communication among the functional area IS's by tightly integrating the functional area IS's via a common database:
Enterprise Resource Planning (ERP) Systems
Two information systems that support the entire organization are:
Enterprise Resource Planning system (ERP) and Transaction Processing System (TPS)
The use of network standards to connect different types of computer networks resulted in ____. a)Local area networks b)Enterprise computing c) Cloud computing d)Mobile computing
Enterprise computing
A(n) ___ can consist of one or more ___.
Enterprise network, LANs
A(n) ___ can consist of one or more ____ .
Enterprise network, LANs
____ integrate the planning, management, and use of all of an organization's resources and are designed to tightly integrate the functional areas of the organization.
Enterprise resource planning systems
___ systems are designed to correct a lack of communications among ___.
Enterprise resource planning; Functional area information systems
A data model is the diagrammatic representation of a database that clearly defines a database's ___ , ____ and ____.
Entities, attributes, relationships.
A data model is the diagrammatic representation of a database that clearly defines a database's ___ , ____ and ____. a)Entities, attributes, relationships. b)Entity classes, hierarchy, files. c)Data hierarchy, data attributes, data files. d)Entity classes, entity attributes, entity files.
Entities, attributes, relationships.
Which of the following is not a role that information systems play in businesses processes?
Establish Standards
The most distinguishing characteristic of geographical information systems is:
Every record or digital object has an identified geographical location.
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.
Evil twin
An Intranet that allows limited access to its partners, suppliers, and customers is called a(n):
Extranet - Customer profiling
A browser is used to prevent web surfing.
FALSE
A free software package is called a browser.
FALSE
A group of related fields is generally called a data file.
FALSE
All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews.
FALSE
An Intranet is a scaled-up version of the Internet that uses similar technologies.
FALSE
CRM systems are designed to focus companies' marketing efforts on a large and broad group of people.
FALSE
Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.
FALSE
Digital signals have two parameters, amplitude and frequency.
FALSE
Human Resource Departments use social computing applications only in the area of training.
FALSE
Human Resource departments only use social computing applications for recruiting purposes.
FALSE
Process and procedures are important but not critical to the effective use of computer based information systems.
FALSE
Recruiters only use social computing to find people who are unemployed.
FALSE
Small companies do not have to worry about CRM as it is only essential for large organizations..
FALSE
Social computing increases the need for customer service.
FALSE
Social computing sites are not utilized by passive job seekers.
FALSE
Social data is not a form of big data.
FALSE
The IT department is solely responsible for the quality of the data in the data warehouse.
FALSE
The Internet is managed by a central agency which bears all the cost and responsibility.
FALSE
The basic idea behind CRM is to treat all customers in exactly the same way and give them the same great service.
FALSE
The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.
FALSE
The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores.
FALSE
The three common cross functional business processes supported by an ERP system are procurement, production and reporting.
FALSE
A public cloud is a data center that integrates servers, storage, networks, data, and applications as a set of services that users inside a company share. True False
False
An organization's IT platform consists of the IT components and IT services.
False
How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security
Freedom of speech, privacy
Michaela runs a dog-walking business. She has three employees, and she prides herself in maintaining a high level of customer service. She gets about half of her business from last-minute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information? a)Radio transmission b)Internet over Satellite c)LEO constellation d)GPS e)Microwave
GPS
The ability to precisely specify the geographic location of pictures is referred to as: a)Locating b)Tagging c)Geo-tagging d)None of these
Geo-tagging
Which type of satellite has the largest footprint?
Geostationary
With which type of satellite is there a propagation delay?
Geostationary
) If your identity is stolen, what is the first thing you should do?
Get a lawyer
Which of the following is not a step in ethical decision making?
Get the facts. Evaluate alternative actions. Make a decision and test it.
Telepresence systems can help make ___________ a more popular choice for small and medium enterprises.
Global outsourcing
_____ is a satellite-based tracking system that enables users to determine a person's position.
Global positioning system
At the end of a semester, a student knows that she must score at least an 81 on the final exam to receive an A in the course. She decided that she can make the 81 by studying the material only the night before the exam. She has just performed what kind of analysis?
Goal-seeking
At the end of a semester, a student knows that she must score at least an 81 on the final exam to receive an A in the course. She decided that she can make the 81 by studying the material only the night before the exam. She has just performed what kind of analysis? a)What-if b)Statistical c)Sensitivity d)Goal-seeking e)Simulation
Goal-seeking
Refer to Opening Case- What to Do About WikiLeaks?: Which of the following is false about WikiLeaks?
Governments and companies are using network forensics to identify intruders who break into systems.
____ offers major discounts or special deals during a short time frame.
Group shopping
Compare and contrast human mistakes and social engineering, providing an example for each.
HUMAN MISTAKES are unintentional errors. However, employees can also make unintentional mistakes as a result of actions by an attacker, such as social engineering. SOCIAL ENGINEERING is an attack where the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information. -An example of a human mistake is tailgating. An example of social engineering is when an attacker calls an employee on the phone and impersonates a superior in the company.
Computer programs like CAPTCHA are used to counter • Hackers using key loggers. • Malware. • Hackers using screen scrappers. • Websites leaving cookies on the local machine.
Hackers using key loggers
Computer programs like CAPTCHA are used to counter
Hackers using key loggers. ( Malware. Hackers using screen scrappers. Websites leaving cookies on the local machine )
The components of an Enterprise System include: Data, information, knowledge Hardware, software, a database Hardware, software, information Clients, applications, data management
Hardware, software, a database
A company that has recently experienced tremendous growth and needs to increase their capacity for users on their enterprise systems would benefit from system that: Has low scalability Is a stand-alone mainframe system Has high scalability Is based on a punch card system
Has high scalability
Which of the following statements about the potential impact of IT on non-managerial workers is true?
IT could cause employees to experience a loss of identity.
Which of the following statements is false?
IT decreases the number of promotional opportunities
In recent years, companies such as Walmart and Amazon.com have offered streaming videos for rent on their Web sites. This is another example of how new technology has (check all that apply):
Increased the threat of new entrants. - Increased the threat of substitute products. - Increased the supplier's bargaining power. - Decreased the buyer's bargaining power.
Which of the below offers a disadvantage for working virtually?
Increases in feeling of seclusion
For most companies, the Web ___ the threat that new competitors will enter the market by ___ traditional barriers to entry.
Increases, decreasing
The development of mobile commerce is driven by all of the following factors except:
Increasing prices.
IT changes a middle manager's job in which of the following ways?
Increased number of employees reporting to a single manager and increased productivity
Collects, processes, analyzes, stores, and disseminetes information for a specific purpose:
Information Systems
Relates to any computer based tool that people use to work with information and support the information and information processing needs of an organization:
Information Technology (IT)
The age we live in has infinite quantities of facts that are widely available to anyone who can use a computer. What age is this statement referring to?
Information age
Which of the following statements about blogs is NOT true: a)In the blogosphere, news travels at a much faster pace than in the mainstream media. b)Blogs are changing the way information and news are consumed. c)Information available on blogs consists of personal opinions that don't have an impact on readers. d)Blogs are a vehicle for companies to engage with their customers.
Information available on blogs consists of personal opinions that don't have an impact on readers.
The ___ is the transport mechanism, while the ___ is the application that uses the transport mechanism.
Internet, WWW
just-in-time inventory systems
Inventory system in which companies manufacture or purchase goods just in time for use.
In which of the following documents is the price of the materials relevant?
Invoice Purchase Order
Which of the following are key data in an invoice?
Invoice date FOB Prices of the material ordered
Give three examples of how YouTube is redefining the entertainment business. Comment on the success or limitations of their efforts.
Learning Objective: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business
Benefits of grid computing
It makes it easier to scale up or down. It enables efficient use of computing resources. It enables applications to run faster. There is no single point of failure.
Content-filtering software performs all of the following functions except:
It proactively monitors computers against malware attacks ( It blocks access to undesirable Web sites. It records all Web sites that users have visited. It records both sides of chat conversations. It enables users to selectively filter content. )
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.
Knowledge Management
______ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.
Knowledge Management
Which of the following is not an expert system activity? a)Knowledge acquisition b)Knowledge domain c)Knowledge inferencing d)Knowledge representation e)Knowledge transfer
Knowledge domain
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that is part of the organization's memory and typically resides inside the organization in an unstructured manner.
Knowledge management
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem.
Knowledge; Information
A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n): LAN. Network server. WAN. All of these.
LAN
A collection of the following devices two desktop computers, three laptops, two smart phones and a printer — can be described as a(n):
LAN
A collection of the following devices: two desktop computers, three laptops, two smart phones and a printer, can be described as a(n):
LAN
A collection of the following devices = two desktop computers, three laptops, two smart phones and a printer can be described as a(n):
LAN.
A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n): a) LAN. b)Network server. c)WAN. d)All of these.
LAN.
Which of the following factors that make information resources more vulnerable to attack can be most easily remedied?
Lack of management control ( Interconnected/dependent business environments; Larger and cheaper storage; Organized cyber crime; Decrease skill level of hackers; None - all factors are exogenous )
Discuss at least one main disadvantage of relational databases.
Large-scale relational databases can be composed of many interrelated tables, making the overall design complex with slow search and access times.
Discuss the efforts that Wikipedia takes to improve the reliability of its content. Why do many colleges continue to disallow Wikipedia as a cite for scholarly work?
Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0
Explain how a corporate social networking site would differ (on as many aspects as you can think of) from the personal one that so many of us belongs to.
Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business
Identify and analyze the risks and benefits associated with social networking sites.
Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business
Explain social intelligence and give some examples.
Learning Objective: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business: Marketing
How does social computing improve the customer experience? What benefits do the customers derive from using social computing?
Learning Objective: LO 9.5 Describe how social computing improves customer service Section Reference 1: 9.5 Social Computing in Business: Customer Relationship Management
Social computing is making it easier for recruiters to find good candidates and making it harder. Explain this statement.
Learning Objective: LO 9.6 Discuss different ways in which human resource managers make use of social computing Section Reference 1: 9.6 Social Computing in Business: Human Resource Management
A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations or systems:
Liability
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Liability
With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a) Ubiquity b) Convenience c) Instant connectivity d) Personalization e) Localization of products and services
Localization of products and services
Segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
Logic Bomb
master vs transaction data
Master data includes data that is important to business applications that make up the IS, while transaction data are data that describes events that occur within the business. Master data is not volatile while transaction data is highly volatile. Master data is always involved with transaction data.
Once production has been authorized in a manual environment, which document would be presented to the warehouse in order to obtain the raw materials to begin production? -Vendor invoice -Planned order -Goods receipt document -Material withdrawal slip
Material withdrawal slip
Groupon's social commerce revenue model is based on the following: a)Merchants get free advertising b)Merchants are guaranteed additional business and potential new customers c)Groupon is paid a fixed amount for advertising d)All of these
Merchants are guaranteed additional business and potential new customers
_____ networks use multiple Wi-Fi access points to create a wide area network.
Mesh
_____ use multiple Wi-Fi access points to create a wide area network.
Mesh Networks
_____ use multiple Wi-Fi access points to create a wide area network.
Mesh networks
___ is a portable wireless device that provides users with a WiFi hotspot wherever they go.
MiFi
Using your cell phone to purchase a Coke from a vending machine is an example of:
Micropayment
Smart cards, a form of e-cash, are ideal for ____ which are small payments of a few dollars or less.
Micropayments
Which of the following technologies is wireless but not mobile?
Microwave towers
The major types of wireless media are: a)Satellite, radio, microwave, and television. b)Cellular, television, radio, and microwave. c)Microwave, satellite, radio, and infrared. d)Smart phones, satellite, television, and radio.
Microwave, satellite, radio, and infrared.
The use of databases enables organizations to (choose all that apply):
Minimize data inconsistency -Minimize data security risks -Minimize data isolation NOT -Eliminate data redundancy -Eliminate data integrity
____ is a CRM system that enables organizations to conduct communications related to customer management through portable media.
Mobile CRM
The data processed by transaction processing systems provide the inputs for other organizational information systems.
TRUE
Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics?
Mobility, broad reach
The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.
Mobility, broad reach
The function of _____ is to convert digital signals to analog signals and vice-versa. a)Modems b)Multiplexers c) Front-end processors d) Servers e)Clients
Modems
Fuzzy logic could be used to define which of the following terms: a)Gender b)Moderate income c)Age d)Address e) Income
Moderate income
_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.
Monitoring
Which of the following statements is not true?
Most companies do not find it necessary to closely monitor social media.
MIS is a business function. Which of the following does MIS perform to help aid the company in decision making and problem solving?
Moves information about people. Moves processes across the company to improve systems. Moves information about products
A process in which a company integrates its online and offline channels.
Multichanneling
Consider this domain name, www.business.gsu.edu. The "business" is the ________.
Name of the specific computer
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.
Public; Private
What is not a government regulation that puts pressure on businesses?
National Technology Act
_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.
Near-field communications
Functional Exchanges:
Needed service such as temporary help or extra office space are traded on an "as-needed" basis.
Ethernet, packet switching, HTTP, and TCP/IP are all examples of:
Network Protocols
Internet service providers connect to one another through _____.
Network access points
A _____ allows a device to physically connect to a local area network's communications medium.
Network interface card
Which of the following factors is associated specifically with corporate performance management for online businesses?
Network traffic
_____ is a method for analyzing and reducing a relational database to its most streamlined form.
Normalization
A three-way match involves which of the following documents?
Purchase Order Goods Receipt Document Invoice
bullwhip effect
Occurs when distorted product demand information ripples from one partner to the next throughout the supply chain
e-wallets
Offer a secure, convenient and portable tool for online shopping
_____ is a CRM system that is hosted by an external vendor in the vendor's data center.
On-demand CRM
The most common method for storing data in a data warehouse is:
One central data warehouse
exception reports
Reports that include only information that exceeds certain threshold standards
The transmission technology that breaks up blocks of text into packets.
Packet Switching
Which of the following statements concerning packet switching is not true? A. Packets contain a sequence number. B. Packets are routed through different paths. C. Packets require dedicated circuits. pg 182 D. Packets use TCP/IP to carry their data. E. Packets contain destination addressing.
Packets require dedicated circuits.
With Web 1.0 sites, users ______________, whereas with Web 2.0 sites, users _________________. a) Use HTML, use CCS b) Passively receive information, participate with the site. c) Use wired connections, use wireless connections. d) Have to know the address of the site, can use search engines to find a site e) Did not have to login to find information, have to login in to find information.
Passively receive information, participate with the site.
_____ can be used to create strong passwords that are easy to remember.
Passphrases ( Mnemonics Birthdates Numbers )
peer-to-peer vs client/server
Peer-To-Peer processing has no central server and should be installed in homes and small businesses where people use them regularly. The point of it is to be inexpensive for those who only need it for a small use. Client/server computing can become as large as it needs to be without sacrificing any of its performance and it has a centralized security server that protects it.
Wireless Devices
People like them because they can make productive use of formerly wasted, their work places are become more flexible because they can take them with them, and because wireless technology enables us to allocate our working time around personal and professional obligations.
To effectively manage by exception (i.e., use exception reports), the company must first create:
Performance standards
_____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. a)Viral marketing b)Personalized marketing c)Permission marketing d)Paper catalogs e)Direct mail
Permission marketing
___ can be used for a variety of purposes, such as sending money to students at college, paying for an item purchased at an online auction, or sending a gift to a family member.
Person to Person payments
A(n) ___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.
Personal firewall
____ use deception to acquire sensitive personal information by masquerading as official looking emails or instant messages.
Phishing Attack
Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly.
Phones, digital cameras
___ Prevent unauthorized individuals from gaining access to a companies facilities. Common controls include walls, doors, fencing, gates, locks, badges, guards, and alarm systems. More sophisticated controls include pressure sensors, temperature sensors, and motion detectors.
Physical Controls
Identify the 3 major types of controls that organizations can use to protect their information resources:
Physical, Access, Communications
What is a negative societal effect of IT?
Places employees on constant call
_____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers.
Procurement
According to Porter's Value Chain Model, what are considered support activities?
Product and Technology Development Procurement
Which of the following are examples of extended intercompany processes? -Asset management, supply chain management, supplier relationship management -Human capital management, supply chain management, supplier relationship management -Product life cycle management, supply chain management, supplier relationship management -Product life cycle management, asset management, customer relationship management
Product life cycle management (PLM), supply chain management (SCM), supplier relationship management (SRM), and also customer relationship management (CRM)
Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can't use it. Her decision reflects which ethical issue related to IT?
Property (such as intellectual property)
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.
Protocols
A(n) _____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.
Proxy Server
Which of the following documents are associated with the fulfillment process? Purchase order, picking document, packing list Customer inquiry, quotation, customer invoice Quotation, packing list, vendor invoice Bill of materials, quotation, vendor invoice
Purchase order, picking document, packing list
A standardized language used to manipulate data is _____.
Query-by-example language
The core capabilities of computer-based information systems include (check all that apply):
Quick access to information -High-speed calculations -Staging and processing of large amounts of data
The technology that uses radio waves to identify individual items is:
Radio frequency identification
Which of the following is not an advantage of radio?
Radio waves do not create electrical interference problems.
The technology that uses radio waves to identify individual items is
Radio-Frequency Identification
The generic term for technologies that use radio waves to automatically identify individual items is __________.
Radio-frequency identification
key indicator reports
Reports that provide a summary of critical information on a recurring schedule
Which of the following statements concerning the difficulties in protecting information resources is not correct? a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization.
Rapid technological changes ensure that controls are effective for years.
Which of the following are key data in a goods receipt?
Receipt date Order and Received quantity
Which of the following is the correct order of the Fulfillment Process?
Receive Customer Inquiry, Receive Customer Purchase Order, Create Sales Order, Prepare and Send Shipment, Create and Send Invoice, Receive Payment
Which of the following begins the fulfillment process? Receive customer inquiry Create & send quotation Create requisition Request production
Receive customer inquiry
A(n) _____ is a logical grouping of related fields. a)Byte b)Field c)Record d)File e)Database
Record
In the relational database model, related tables can be joined when they contain common ____.
Records
The goals of the IT overhaul at BP focused primarily on:
Reducing and reorganizing their IT spending.
Mobile Commerce (M-Commerce)
Refers to e-commerce (EC) transactions that are conducted in a wireless environment, especially via the Internet.
adhoc reports
Reports that are used to pull specific information from CHCS
Which of the following are key data in a purchase requisition when the requisition is first created?
Requested delivery date quantity of material requested
When faced with negative feedback, companies should:
Respond constructively and appropriately
A tenet of ethics in which you accept the consequences of your decisions and actions:
Responsibility
What are the three fundamental tenants of ethics?
Responsibility, Accountability, and Liability
Which of the following statements regarding the relationship between electronic commerce and search is not correct?
Retailers will provide fewer product details to avoid information overload for customers.
In ______ auctions, there is one buyer who wants to buy a product. Suppliers submit bids and the lowest bid wins.
Reverse
An auction in which one buyer, usually an organization, seeks to buy a product or service, and suppliers submit bids; the lowest bidder wins.
Reverse Auction
The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.
Rights
What are the 3 risk mitigation strategies?
Risk Acceptance, Risk Limitation, Risk Transference
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of
Risk Mitigation
In ___, the organization purchases insurance as a means to compensate for any loss.
Risk Transference
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of
Risk mitigation
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of Risk mitigation. Risk acknowledgement. Risk acceptance. All of these.
Risk mitigation
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of
Risk mitigation. ( Risk acknowledgement. Risk acceptance. All of these.)
What statement about IT's role in society is false?
Robots can handle unfamiliar situations
Businesses and organizations set up Web sites to:
Sell goods and services. Induce people to visit a physical location. Reduce operational and transaction costs. Enhance their reputation. All of the above.*
When organizations come to a company's Web site for procurement, such business is classified as a(n):
Sell-side Marketplace
When organizations come to a company's Web site for procurement, such business is classified as a(n):
Sell-side marketplace.
When organizations come to a company's Web site for procurement, such business is classified as a(n): a)Buy-side marketplace. b)Sell-side marketplace. c)Electronic exchange. d)None of these.
Sell-side marketplace.
Which of the following steps in the procurement process have a financial impact on the company that is buying the materials
Send payment to vendor Receives shipment from vendor
____________ act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.
Social marketplaces
Cards that contain a chip containing a large amount of information are:
Smart cards
Which of the following electronic payments is ideal for micropayments?
Smart cards
An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as: Trespass. Social engineering. Identity theft. Information extortion.
Social Engineering
_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
Social Engineering
. Which of the following is false about social advertising? a) Social network sites have turned to advertising as a way to make revenue. b) Viral marketing is effective with social networking c) Social advertising removes peer pressure from the buying decision. d) Social advertisements are placed in paid-for media space by companies. e) Social apps support social interactions and are managed by a company to promote its brand.
Social advertisements are placed in paid-for media space by companies.
The number of connections you have within and between social networks is your:
Social capital
When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true?
Social computing generates faster and cheaper results.
When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true? • Social computing generates faster results but is more expensive. • Social computing generates faster and cheaper results. • Social computing takes longer but is less expensive. • Participation by customers is more limited when using social computing.
Social computing generates faster and cheaper results.
In a(n) ___ attack, the perpetrator tricks an employee into divulging confidential information.
Social engineering
In a(n) ___ attack, the perpetrator tricks an employee into divulging confidential information. Password Shoulder surfing Social engineering Tailgating
Social engineering
An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:
Social engineering. ( Trespass. ; Social engineering. ; Identity theft. ; Information extortion.)
The monitoring, collection, and analysis of social generated data and the resultant strategic decisions is called:
Social intelligence
The primary key is a field that uniquely and completely identifies a record.
TRUE
____________ act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services. • Group shopping sites • Shopping Communities • Social marketplaces • Peer-to-peer shopping models
Social marketplaces
In today's business environment, it is rare for a company not to have a significant Web presence. This trend can be attributed primarily to:
Social responsibility. Technological pressures. Government regulations. ---->None of these.
List a business pressure and describe an IT response to it;
Societal/Political/Legal Pressures: An example is social responsibility, such as the state of the physical environment. Green IT is one response that is intended to improve the environment.
What are 2 IT components in CBIS?
Software and Database
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. A. Leeching B. Collaboration C. Packet switching D. Torrents E. Swarming
Swarming
____ defines optical line rates, known as optical carrier (OC) signals. The base rate is 51.84 Mbps (OC-1), and higher rates are direct multiples of the base rate. For example OC-3 runs at 155.52 Mbps, or 3 times the rate of )C-1.
Synchronous Optical Network (SONET)
Radio FREQUENCY IDENTIFICATION TECHNOLOGY
System of tags which contain data that can be read from a distance using radio waves.
What is a way of monitoring the entire system in a company, by viewing the multiple inputs being processed to produce outputs?
Systems thinking
These circuits include: T1: (1.544 Mbps, equivalent to 24 channels) T2: (6.312 Mbps, equivalent to 96 channels) T3: (44.736 Mbps, equivalent to 672 channels) T4: (274.176 Mbps, equivalent to 4,032 channels)
T-Carrier System
____ is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call.
T-Carrier System
TAG
TAG is a DOS-based bulletin board system (BBS) software program, released from 1986 to 2000.
A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.
TRUE
A successfully implemented enterprise system should reduce errors, initiate processes more quickly, and execute processes more quickly. (T/F)
TRUE
Asset management is primarily concerned with machinery and computers in the company. (T/F)
TRUE
Competitive intelligence is legal, where industrial espionage is illegal.
TRUE
In the downstream segment of the supply chain, managers coordinate the receipt of orders from customers, develop a network of warehouses, select carriers to deliver their products to customers, and develop invoicing systems to receive payments from customers.
TRUE
NoSQL databases can process both structured and unstructured data.
TRUE
Normalization is a method for eliminating redundant data elements.
TRUE
One impact of IT will be to decrease the numbers of managers employed in organizations.
TRUE
One of the attributes in a record must be a primary key.
TRUE
One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications.
TRUE
Organizational databases access one record at a time, where data warehouses access groups of related records.
TRUE
Rogue access points can be set up by employees.
TRUE
Social ads are placed in paid-for media space on social networking Web sites.
TRUE
Social apps are online apps that promote social interaction
TRUE
Social computing fosters close customer relationships
TRUE
Social networks are helping marketing professionals understand who their customers are.
TRUE
The amount of data is increasing exponentially over time.
TRUE
The data dictionary defines the format necessary to enter data into a database.
TRUE
The opening case illustrates how e-commerce has increased (choose all that apply):
The volume of business transactions. The speed at which we do business.
The opening case illustrates how e-commerce has increased (choose all that apply):
The volume of business transactions.-The speed at which we do business.
Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. The Web site for the store is www.GalsTunes.net. Which of the following is true? a)Gal must be hosting his Web site on his own desktop computer based on its URL. b)The point-of-sale terminal cannot connect to the Internet. c)Gal must not be selling on his Web site because the top-level domain is "net" and not "com." d)The desktop computer must also be able to connect to the Internet in order for the notebook to access data from it. e) All of these are true.
The point-of-sale terminal cannot connect to the Internet.
Once a shipment has been sent, which document should be updated? The customer purchase order The sales order The quotation The packing list
The sales order
Near-Field Communications (NFC)
The smallest of the short-range wireless networks that is designed to be embedded in mobile devices such as cell phones and credit cards.
Wireless Application Protocol (WAP)
The standard that enables wireless devices with tiny display screens, low-bandwidth connections, and minimal memory to access Web-based information and services.
All of the following statements concerning wide-area networks are true except: A. They are provided by individual companies. B. They have large capacity. C. They cover large geographical areas. D. They combine multiple communications channels. E. The Internet is an example of a wide-area network.
They are provided by individual companies.
What is the benefit for companies that develop packaged applications? Spreading development cost across many customers They can be modified to suit specific needs They are more expensive to purchase None of the above
They can be modified to suit specific needs
Which of the following statements about wireless devices is not true?
They have strong security feature that make them impossible to hack.
Which of the following statements about wireless devices is not true? a)They are small enough to easily carry or wear. b)They have sufficient computing power to perform productive tasks. c)They have strong security feature that make them impossible to hack. d)They can communicate wirelessly with the Internet and other devices.
They have strong security feature that make them impossible to hack.
Fiber-optic cables are preferred over co-axial and twisted pair cables because:
They have very high bandwidth and offer higher security.
Personal firewalls perform all of the following functions except:
They should seek out the origin of malware in an attempt to block it in the future.
Which of the following is not a characteristic of DSS? a)They support only lower and middle-level managers. b)They are easy to use and construct. c)They can be adapted to changing conditions. d)They typically utilize quantitative models. e)They support all phases of the decision-making process.
They support all phases of the decision-making process.
Which of the following is not a characteristic of strong passwords? a) They are difficult to guess. b) They contain special characters. c) They are not a recognizable word. d) They are not a recognizable string of numbers e) They tend to be short so they are easy to remember.
They tend to be short so they are easy to remember.
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.
Third-pary
A supply chain management system would need to connect to a supplier relationship management system in order to do which of the following? -To determine the most viable ideas for end development -To transfer raw materials requirements to be matched against current supplier information -To create demand for products -To create a wide base of interest in a product
To transfer raw materials requirements to be matched against current supplier information
Radio Transmission
Transmission that uses radio-wave frequencies to send data directly between transmitters and receivers. --Travel easily through normal office walls. --Fairly inexpensive and easy to install. --Can transmit data at high speeds
A list of football scores with the names of the teams that played the games would be considered information.
True
A manufacturing facility can produce 200 cellular phones in any given day. This would represent the facilities production capacity. (T/F)
True
A search engine that utilizes other search engines and integrates the results is a metasearch engine. True False
True
A student's decision to drop one course and add another would be considered a transaction to the university's information system but not to its accounting system.
True
A successfully implemented enterprise system should reduce errors, initiate processes more quickly, and execute processes more quickly. (T/F)
True
A supercomputer is the term given to the latest technology. True False
True
A systems analyst focuses on designing specifications for new technology.
True
An information system collects, processes, stores, analyzes, and disseminates information for a specific purpose using a computer
True
An informed user of IT can enhance his or her organization's competitive position.
True
An organization's supply chain starts at the supplier and ends at the customer.
True
Assembling is the process of taking a number of component materials and putting them together to produce the desired finished product. (T/F)
True
Asset management is primarily concerned with machinery and computers in the company. (T/F)
True
At the point when payment is received in the fulfillment process, accounts receivable experiences a decrease and there is an increase in cash. True False
True
Broadband refers to a network with a high transmission capacity. True False
True
Broadband refers to a network with a high transmission capacity. True False
True
Broadband refers to a network with a high transmission capacity:
True
Chapter 6 An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. True or False?
True
Client/server computing relies heavily on network infrastructures such as LANs True False
True
Competitive intelligence is legal, where industrial espionage is illegal. True/False
True
Digital dashboards are special information systems that that support all managers of the organization
True
Distributed computing refers to the distribution of computing tasks among one or more computers. True False
True
Information is data that have been organized to provide value.
True
Information is the major component of the e-commerce offerings of service industries. True False
True
Information is the major component of the e-commerce offerings of service industries. True False
True
Information technology refers to computer-based tools used to support the needs of an organization
True
Neural networks are used to detect fraud in credit card transactions and insurance claims, to fight crime, and to gauge customer satisfaction. True False
True
One impact of IT will be to decrease the numbers of managers employed in organizations.
True
One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications.
True
One of the drawbacks of telecommuting is that telecommuting employees have a lower chance at being promoted than employees who work in the office. True False
True
Online analytical processing (OLAP) involves the analysis of accumulated data by end users. True False
True
Organizations depend on IT to facilitate their transition to the globalization of their operations.
True
Packing is the act of preparing the material for shipment in a suitable container. A packing list is created when the order is packed for shipment. True False
True
Service-oriented architecture allows companies to integrate multiple client-server systems together and make the result accessible via the internet. True False
True
Social computing fosters close customer relationships True/False
True
T/F A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.
True
T/F A digital signal consists of a stream of digital bits.
True
T/F A search engine that utilizes other search engines and integrates the results is a metasearch engine.
True
T/F As we have progressed through the generations of cellular phones, their transmissions have evolved from analog to digital; their transmission speeds (bandwidth) have increased; and they transmit voice and data.
True
T/F Broadband refers to a network with a high transmission capacity.
True
T/F Claiming an Internet domain for five days at no cost and filling that site with ads is called domain tasting.
True
T/F Collaborative consumption allows strangers to make connections through peer-to-peer sharing.
True
T/F Companies often have to clean up the data before it can be imported into the data warehouse.
True
T/F DNS are a convenient alternative to the difficult-to-remember IP naming system for computers.
True
T/F Data updates in a data warehouse are performed by the MIS department, not the users.
True
T/F Distributed computing refers to the distribution of computing tasks among one or more computers.
True
T/F ER diagrams consist of entities, attributes, and relationships.
True
T/F Electronic commerce can be problematic in developing countries due to a lack of bandwidth and expense in accessing the Web.
True
T/F Electronic commerce gives customers access to a wider array of products and services than brick-and-mortar stores.
True
T/F Electronic commerce transactions conducted in a wireless environment, especially via the Internet, is called mobile commerce.
True
T/F Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.
True
T/F File sharing is a type of peer-to-peer processing.
True
T/F Governance of a data warehouse must be a collaboration between business users and IT personnel.
True
T/F In an ER diagram, relationships are expressed as diamonds and entities are expressed as boxes.
True
T/F In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.
True
T/F In the sell-side marketplace, organizations sell their products or services to other organizations electronically from their private e-marketplace and/or from third-party Web site.
True
T/F Invisible "everywhere" computing embedded in objects is called pervasive computing.
True
T/F Knowledge management systems (KMS) are used by organizations to capture, store, and disseminate knowledge within the organization.
True
T/F Many employees have organized work groups usually social networking sites because their companies don't offer similar tools.
True
T/F Messages transmitted across the Internet are first divided into packets.
True
T/F NoSQL databases can manage more different types of data than a traditional relational database.
True
T/F Normalization is a method for eliminating redundant data elements.
True
T/F One impact of IT will be to decrease the numbers of managers employed in organizations.
True
T/F One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications.
True
T/F One of the drawbacks of telecommuting is that telecommuting employees have a lower chance at being promoted than employees who work in the office.
True
T/F Online analytical processing involves the analysis of accumulated data by end users.
True
T/F RFID tags and QR (quick response) codes designed to replace bar codes.
True
T/F Registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else is called cybersquatting.
True
T/F Satellite radio offers uninterrupted, near-CD quality music that is beamed to your radio from satellites.
True
T/F The ETL process is now typically called data integration.
True
T/F The amount of data is increasing exponentially over time.
True
T/F The buy-side marketplace is concerned with procurement.
True
T/F The data dictionary defines the format necessary to enter data into a database.
True
T/F The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
True
T/F The most common source system for a company's data warehouse is its corporate operational databases.
True
T/F The primary characteristic of auctions is that prices are determined dynamically by competitive bidding.
True
T/F The wireless transmission and receipt of data gathered from remote sensors is called telemetry.
True
T/F Thin clients depend on the network to be able to run applications.
True
T/F Unified communications simplifies and integrates all forms of communications on a common hardware and software platform.
True
T/F War driving is the act of locating wireless networks while driving around a certain area.
True
Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of media does he likely use to connect the point-of-sale terminal to the desktop?
Twisted pair-wire
The least expensive cable medium is:
Twisted-pair wire
Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c)URL address d) ISO/OSI identifier e)World Wide Web address
URL address
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments?
Ultra wideband
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments?
Ultra-wideband
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a)Wi-Fi b)Microwave c)Ultra-wideband d)Infrared e)Bluetooth
Ultra-wideband
What is _____ is not necessarily _____.
Unethical; Illegal
Are acts performed without malicious intent that nevertheless represent a serious threat to information security.
Unintentional Threats
In a database, the primary key field is used to ____.
Uniquely identify a record.
Tacit knowledge has which of the following characteristics?
Unstructured
Cellular telephones
Use radio waves to provide two-way communication. ****Communicates with radio antennas (towers) placed with adjacent geographic areas called "cells."***
Which of the following actions should you take to protect your portable devices and information?
Use two-factor authentication. Do not leave your portable devices in plain view in a car. Keep your portable devices in an inconspicuous container. Encrypt the hard drive of your laptop All of these
Second Generation (2G)
Uses digital signals for voice communication; it provides data communication up to 10 Kbps. 2.5G uses digital signals and provides voice and data communication up to 144 Kbps.
The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. A. Common good B. Fairness C. Rights D. Utilitarian E. Well-being
Utilitarian
In ____ a service provider makes resources and infrastructure management available to a customer as needed. a)Server farms b)Utility computing c)Grid computing d)None of these
Utility computing
In an e-credit card transaction, the clearinghouse plays the following role:
Validates and verifies the seller's payment information
In an e-credit card transaction, the clearinghouse plays the following role: a)Initiates the transfer of money b) Validates and verifies the seller's payment information c) Transfers funds between the seller's bank and the buyer's bank d)All of these.
Validates and verifies the seller's payment information
With _____, phone calls are treated as just another kind of data.
Voice over IP
___ exchanges connect buyers and sellers in one industry.
Vertical
Which type of electronic exchange connect buyers with sellers within a specific industry?
Vertical exchanges
Infrared Transmission
Very fast, large bandwidth; most common for tv/dvd remote controls; not visible to human eyes.
____ refers to online word-of-mouth marketing.
Viral Marketing
A _____ offers you the option of shopping online with a disposable credit card number.
Virtual credit card
A _____ offers you the option of shopping online with a disposable credit card number.
Virtual credit card (Credit card Debit card Driver's license Bank card )
Cards that can be used only once, with a different, random card number every time you shop online are:
Virtual credit cards
Segment of computer code that performs malicious actions by attaching to another computer program.
Virus
With _____, phone calls are treated as just another kind of data.
Voice over Internet Protocol
With _____, phone calls are treated as just another kind of data. a)Voice over Internet Protocol b)Chat rooms c)Teleconference d)All of these
Voice over Internet Protocol
With _____, phone calls are treated as just another kind of data.
Voice over internet protocol
An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.
Vulnerability, threat, exposure
An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks. • Vulnerability, threat, exposure • Vulnerability, security, threat • Threat, vulnerability, liability • Threat, vulnerability, exposure
Vulnerability, threat, exposure
An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.
Vulnerability, threat, exposure (Vulnerability, security, threat; Threat, vulnerability, liability; Threat, vulnerability, exposure)
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.
WPA2, WEP
Which of the following demonstrates a company that has implemented a low cost, broad market strategy?
Walmart
The act of locating wireless local area networks while moving around a city is called ____.
War driving
Which of the following are examples of instance level information relevant to the procurement process?
Was the invoice paid? If so when? How long did it take to receive the shipment after creating a purchase order? What was the total of the invoice?
Which of the following are examples of instance-level information relevant to the fulfillment process?
Was the invoice paid? If so, when? How long did it take to send the shipment after creating a sales order? What was the total of the sales order?
_____ are applications, delivered over the Internet, that use shared protocols to interoperate without human intervention.
Web Services
_____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
a) Data isolation
Which of the following technologies is(are) used by analytic CRM systems?
a) Data warehouses and data mining b) Decision support systems c) Transaction processing systems
The popularity of online classes and online universities can be attributed to which of the following network applications?
a) Discovery b) Communications c) Collaboration
Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated.
a) Providing information on each record.
Refer to Opening Case #1 - Facebook Commerce: Which of the following is true about Facebook commerce?
a) Shoppers can make purchases without leaving Facebook.
Refer to Opening Case - Big Data. Which of the following is not a problem created by "Big Data"? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can't handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated.
a) The data is not reliable.
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases
a) Transaction data, master data
Key features of transaction processing systems include:
a) dependability b) reliability c) processing capacity
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. a) instance b) individual c) representative d) entity e) relationship
a) instance
Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services.
a) intermediaries
Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous
a) objective
Networks enable which of the following applications?
all - Discovery - Communications - Collaboration
The popularity of online classes and online universities can be attributed to which of the following network applications?
all - Discovery - Communications - Collaboration
Global outsourcing helps an organization to:
all - Find the best person for the job.- Find more economical resources. - Implement spatial and temporal flexibility.
Refer to IT's About Business 5.3 - Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. b) to provide a complete view of the customer. c) to enhance its marketing campaigns d) to provide business users access to business-wide data. e) to determine where to place its slot machines.
a) to process transactions faster.
Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct): a) Fiber optic cables offer higher security. b) Fiber optic cables are less difficult to tap. c)Fiber optic cables are susceptible to interference. d)Fiber optic cables have very high bandwidth.
a)Fiber optic cables offer higher security. d)Fiber optic cables have very high bandwidth.
Which of the following can be classified as unintentional threats to information systems caused by human errors?
a. Selecting a weak password (b. Revealing your password ; c. Leaking company data to others ; d. Both (a) and (b); e. None of these )
_____ issues involve who may obtain information and how much they should pay for this information.
accessibility
Where in a domain name do you find the top-level domain (TLD)?
all the way to the right
customer touching CRM applications
applications where customers interact directly with these technologies and applications
Master data
are a set of core data that span all of an enterprise's information systems.
The data in a data warehouse:
are not updated.
The data in a data warehouse have which of the following characteristics?
are organized by subject
Secondary keys
are other field that have some identifying information but typically do not identify the file with complete accuracy
Best practices
are the most effective and efficient ways of doing things
A business strategy achieves a specific set of goals which include _________.
attracting new customers, developing new products or services
Access controls consist of ____, which confirms user identity, and ____, which determines user access levels.
authentication, authorization ( access, privileges authorization, privileges passwords, privileges )
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence
b) Data inconsistency
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File e) Database
b) Field
Place the following members of the data hierarchy in the correct order:
bit - byte - field - record - file - database
Lisa Kelling is able to use her business's Facebook page to do the following:
c) Let customers place orders online
A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database
c) Record
The monitoring, collection, and analysis of socially generated data is called
c) Social intelligence
Workflow, groupware, and telepresence systems are examples of which network application? Discovery Communications Collaboration None of these
collaboration
Fiber-Optic Cable
consists of thousands of very thin filaments of glass fibers that transmit information via light pulses generated by lasers. The fiber-optic cable is surrounded by cladding, a coating that prevents the light from leaking out of the fiber. Smaller, lighter, most expensive, fastest, used for the backbone while others are used for individual devices.
In this type of e-commerce, buyers and sellers are individuals.
consumer-to-consumer
eBay is an example of which type of e-commerce?
consumer-to-consumer
With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.
convenience and instant connectivity
Making and distributing information goods to which you do not own the ___ is referred to as ____.
copyright, piracy ( intellectual property, piracy; copyright, appropriation; intellectual property, theft)
Rank the following in terms of dollar value of the crime, from highest to lowest. a) robbery - white collar crime - cybercrime b) white collar crime - extortion - robbery c) cybercrime - white collar crime - robbery d) cybercrime - robbery - white collar crime e) white collar crime - burglary - robbery
cybercrime - white collar crime - robbery
Place the following members of the data hierarchy in their correct order: a) Bit - byte - field - record - database - file b) Bit - field - byte - record - file - database c) Byte - bit - record - field - database d) Bit - byte - field - record - file - database e) Bit - record - field - byte - file -- database
d) Bit - byte - field - record - file - database
_____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
d) Data redundancy
A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File e) Database
d) File
The reliability of the content in Wikipedia, the online encyclopedia, is questionable because
d) It is difficult to test the authenticity of the content due to the fact that anyone can contribute content.
_____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts c) Databases d) Master data management e) Enterprise information management
d) Master data management
A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) query-by-example language d) structured query language e) data-manipulation language
d) structured query language
In the relational database model, related tables can be joined when they contain common _____. a) primary keys b) rows c) records d) columns e) files
d) columns
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one b) one-to-many c) many-to-one d) many-to-many e) some-to-many
d) many-to-many
Data Hierarchy
data, information, knowledge, wisdom
A(n) _____ provides rapid access to timely information and direct access to management reports.
decision support system
Key features of transaction processing systems include:
dependability reliability processing capacity
Refer to Closing Case - CoStar Group. The target audience for CoStar's aggregated commercial real estate data was a) banks. b) building owners. c) real estate agents. d) builders. e) All these
e) All these
Refer to IT's About Business 5.2 - Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. b) data for some cell phones are inaccurate. c) very few Mexicans can afford cell phones. d) All of these e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart's sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week
e) Product, store, and week
Building relationships, anticipating needs, and providing special deals for the community's members is a function of which category of Web 2.0 applications?
e) Social commerce
So You Want to Find a Job: Which of the following is a benefit of searching for a job online?
e) Social networking can help personalize the search.
Many companies are using ________ to capture updated product features and specifications.
e) Wikis
Which of the following is not a disadvantage of telecommuting for employees?
fewer opportunities for housebound people
Which of the following accounts are affected by a shipment of goods to a customer?
finished goods inventory accounts receivable cost of goods sold
In _____, needed services such as temporary help or extra space are traded on an as-needed basis.
functional exchanges
An important trend is the combination of geographical information systems with _____ to form geospatial technologies.
global positioning systems
campaign management system
guides users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis
Coaxial Cable
insulated copper wire, less susceptible to electrical interference, carries more data, used for cable, more expensive, somewhat inflexible.
enterprise resource planning
integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprisewide information on all business operations
mobile CRM systems
interactive systems where communications related to sales, marketing, and customer service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers
A database management system is primarily a(n) _____.
interface between application and a database
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks.
internet
_____ are Internet access points that are located in public places, such as libraries and airports.
internet kiosks
ERP II systems
interorganizational ERP systems that provide Web-enabled links between a company's key business systems (such as inventory and production) and its customers, suppliers, distributors, and others
Which of the manager's roles do modern information systems support?
interpersonal roles, informational roles, and decisional roles
Data model
is a diagram that represents the entities in the database and their relationships
SOCIAL ADVERTISING
is a form of online advertising that uses social media channels to deliver targeted commercial messages to potential customers.
Field
is a group of logically related characters (e.g., a word, small group of words, or identification number).
Record
is a group of logically related fields (e.g., student in a university database).
File (or table)
is a group of logically related records
Normalization
is a method for analyzing and reducing a relational database to its most streamlined form for Minimum redundancy, Maximum data integrity, Best processing performance
Attribute
is a particular characteristic or quality of a particular entity
Entity
is a person, place, thing, or event about which information is maintained. A record generally describes an entity.
Knowledge management (KM)
is a process that helps organizations manipulate important knowledge that is part of the organization's memory, usually in an unstructured format.
Master data management
is a process that spans all of an organization's business processes and applications.
procurement process
is a series of steps that a COMPANY takes to obtain or acquire necessary materials from WAREHOUSE:
Database management system (DBMS)
is a set of programs that provide users with tools to add, delete, access, and analyze data stored in one location.
Data governance
is an approach to managing information across an entire organization.
Relational database model
is based on the concept of two-dimensional tables.Allows or faster searches
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____.
knowledge
You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using _____ to select your class schedule.
knowledge
Which of the following factors is not increasing the threats to information security? a) smaller computing devices b) downstream liability c) the Internet d) limited storage capacity on portable devices e) due diligence
limited storage capacity on portable devices
Explicit knowledge
objective, rational, technical knowledge that has been documented. Examples: policies, procedural guides, reports, products, strategies, goals, core competencies
Business environment pressures can come from
political changes Social factors Economic factors Legal factors
When data are normalized, attributes in the table depend only on the _____. a)secondary key b)common attribute c)primary key d)common row e)common record
primary key
A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service.
smart phone
Facebook is a__________.
social networking site
The digital divide is an example of which type of societal pressure?
social responsibility
In a database, the primary key field is used to _____.
uniquely identify a record
When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a)undocumented b)structured c)unstructured d)semistructured e)documented
unstructured
Enterprise resource planning systems
use a common data base for all functional areas
Enterprise resource planning systems
use a common database for all functional areas.
What is the purpose of entering the amount from the invoice?
verification that the amount invoiced matches the amount ordered and received
The type of cloud used to build cloud infrastructure and applications for different businesses is called a ________ cloud.
vertical
With _____, phone calls are treated as just another kind of data.
voice over IP
Random access memory is _____ and _____.
volatile; temporary
A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n):
wireless access point
An organization's e-mail policy has the least impact on which of the following software attacks? a) virus b) worm c) phishing d) zero-day e) spear phishing
zero-day
Data warehouses and Data Marts
• A data warehouse is a repository of historical data organized by subject to support • Organized by business dimension or subject • Multidimensional • Historical data in data warehouses can be used for identifying trends, forecasting, and making comparisons over time • Use online analytical processing (OLAP) involves the analysis of accumulated data by end users (usually in a data warehouse).
Difficulties in managing data:
• Amount of data increasing exponentially • Data are scattered throughout organizations and collected by many individuals using various methods and devices. • Data come from many sources. • Data security, quality, and integrity are critical.
Database management system (DBMS) minimize the following problems:
• Data redundancy The same data are stored in many places • Data isolation Applications cannot access data associated with other applications. • Data inconsistency Various copies of the data do not agree • Data security: Keeping the organization's data safe from theft, modification, and/or destruction. • Data integrity: Data must meet constraints (e.g., student grade point averages cannot be negative). • Data independence: Applications and data are independent of one another.
entity-relationship (ER) modeling.
• ER diagrams: consists of entities, attributes and relationships. • Entity: classes are groups of entities of a certain type • Instance: of an entity class is the representation of a particular entity • Identifiers: are attributes that are unique to that entity instance
Benefits of Data Warehousing
• End users can access data quickly and easily via Web browsers because they are located in one place. • End users can conduct extensive analysis with data in ways that may not have been possible before. • End users have a consolidated view of organizational data.