MIS 362 Midterm
some of the competitive forces are
1. Suppliers 2. Other competitors 3. Customers
________ of an organization's profits can be attributed to the alignment of the business with IT.
About 50 percent
A _______ is a senior managers who oversees
CIO S
Every business can be seen as a collection of ________.
Business processes
All of the following are technology trends that raise ethical issues EXCEPT:
Disruptive technologies
What is a disruptive technology?
Disruptive technologies can be substitute products that perform as well as or better than anything currently produced. In other cases, disruptive technologies simply extend the market, usually with less functionality and much less cost, than existing products.
Which type of systems would you use to determine what trend in your suppliers industry will affect your firm the most in five years?
ESS
What are legacy systems?
Generally older transaction processing systems created for mainframe computers
________ is a lightweight operating system for cloud computing.
Google Chrome OS
At some hospitals, a growing number of surgeons are using ________ to stream their operations online, float medical images in their field of view, and hold video consultations with colleagues as they operate.
Google Glass
The issue of how information systems should be used within an organization is part of ________.
IT governance
Networking and telecommunications technologies, along with computer hardware, software, data management technology and the people required to run them, constitutes an organization's
IT infrastructure
________ systems are older transaction processing systems, usually created for mainframes.
Legacy
All of the following are interrelated changes in the technology area that impact businesses EXCEPT ________.
Quantum computing
All of the following are advantages of new market entrants EXCEPT:
They have less capital than an established company
A set of principles governing the collection and use of information about users is called ________.
fair information practices
Information technology today can change the ________, making it possible for people to share information.
flow of information
The more successfully a firm can align information technology with its business goals, the ________.
more profitable it will be
the introduction of new information technology has
ripple effect raising new ethical, social, political issues
An example of raw data from a national chain of automobile stores would be
1 Toyota RAV4 sold march 3, 2008 in Louisville, Kentucky
True statements about technology's impact on business firms
1. It helps firms lower the cost of market participation 2. It helps reduce internal management costs 3. It helps reduce transaction costs
Place the following eras of it infrastructure evolution in order, from earlies to most recent: 1. Cloud computing era; 2. Client/ server; 3. Enterprise era; 4. Personal computer; and 5. Mainframe and minicomputers
4,5,2,3,1
One study found that 10 to 25 percent of customer and prospect records contain critical data errors. Correcting these errors at their source and following best practices for promoting data quality increased the productivity of the sales process and generated a(n) _______ increase in revenue.
66 percent
________ means that mechanisms are in place to determine who in an organization took responsible action.
Accountability
All of the following are steps which should be taken when confronted with a new ethical situation EXCEPT:
Analyze the organizational structure
An approach to the study of information systems that focuses on changes in attitude, management, and organization policy is called the ________.
Behavioral approach
How do enterprise social networking tools create business value?
By connecting the members of an organization through profiles, updates, and notifications, similar to Facebook features, but tailored to internal corporate uses
You are planning the launch of your new company, an application service provider that provides an online timesheet and project tacking applications. To best communicate with and manage your relationship with you users, you would want to implement a
CMS Customer management system
Who is responsible for educating and training users and information systems specialists about security, keeping management aware of security threats and breakdowns, and maintaining the tools and policies chosen to implement security?
Chief security officer (CSO)
Which one of the following is NOT one of the major business functions or specialized tasks performed by business organizations and supported by information systems?
Collective bargaining
The study of information systems is a multidisciplinary field. Which of the following lists accurately includes all of the disciplines?
Computer Science, Operations Research, Sociology, Management Science, Economics, Psychology
An information system can be defined technically as a set of interrelated components that ________ to support decision making and control in an organization. Which statement below does NOT correctly complete the above statement?
Creates data
Microsoft SQL server is a
DBMS for mid-range computers
Which type of system would you use to forecast the return on investment if you used new supplier with better delivery tracking
DSS Decision support system
Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system
DSS decision support systems
A powerful, current example of a rapidly expanding ecosystem is the mobile Internet platform. In this ecosystem there are four industries; select the answer that identifies them.
Device makers, wireless telecommunication firms, independent software applications providers, and Internet service providers
The use of digital technology and the internet to execute the major business processes in the enterprise is called:
E-business
Transaction processing systems keep track of what sort of items in an organization?
Elementary activities and transactions of an organization, such as sales, receipts, cash deposits, payroll, credit decisions, and the flow of materials in a factory
A ______ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other partnering business
Enterprise *Enterprise systems, also known as enterprise resource systems (ERP), integrate business processes in manufacturing and production, finance and accounting, sales and marketing, and human resource into a single software system
The network standard for connecting desktop computers into a local area network that enabled the widespread adoption of client/ server computing and local area networks and further stimulated the adoption of personal computers is
Ethernet
All of the following are organizational factors to consider when building a new system EXCEPT:
Executive compensation
What type of system is used by senior management to help make decisions such as nonroutine decisions requiring judgment, evaluation, and insight?
Executive support system (ESS)
Which of the following types of systems helps coordinate the flow of information between the firm and its suppliers and customers?
Extranet
Maintaining the organization's financial records is a central purpose of which main business function?
Finance and accounting
Which of the following statements is NOT accurate regarding how information systems are transforming business?
Forty-six percent of the entire population now use PC computers, sales are soaring.
An example of a highly structured decisions is:
Granting credit to a customer
which of the following US laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPPA
An open source framework for parallel processing across inexpensive computers is called ________.
Hadoop
For handling unstructured and semi-structured data in vast quantities, as well as structured data, organizations are using _____________.
Hadoop
What does HTML stand for?
Hypertext Markup Language
When confronted with a situation that seems to present ethical issues, which steps should you walk through to analyze it?
Identify and describe the facts clearly, define the conflict or dilemma and identify the higher-order values involved, identify the stakeholders, identify the options that you can reasonably take, identify the potential consequences of your options.
________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.
In-memory computing
Which answer contains the correct list of moral dimensions of the Information Age?
Information rights and obligations, property rights and obligations, accountability and control, system quality, quality of life
How are information systems related to business processes?
Information systems make it possible for firms to manage all their information, make better decisions, and improve the execution of their business processes.
________ is an object-oriented programming language that is processor and operating system independent.
Java
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. You rational expresses which historic ethical principle
Kant's categorical imperative
Select an open source operating system from the list below.
Linux
The leading operating system on servers, mainframe computers, and supercomputers is ________.
Linux
Amazon's use of internet as a platform to sell books more efficiently that traditional bookstores illustrates a use of information services for
Low-cost leadership
Which type of systems would you use to determine the five suppliers with the worst record in delivering goods on time?
MIS management information systems
All of the following are major business functions performed by an organization EXCEPT ________.
Maintenance
Producing bills of materials is a business processes with the ______ function
Manufacturing and production
Which list below contains all the factors you can use to answer the question: How much should our firm spend on IT infrastructure?
Market demand for your firm's services, your firm's business strategy, your firm's IT strategy, infrastructure and cost, information technology assessment, competitor firm services, and competitor firm IT infrastructure investments
According the ________ definition of organizations, an organization is seen as a means by which primary factors are tracked by the environment
Microeconomics
A firm can exercise greater control over its suppliers by having
More suppliers
the tools that enables users to view the same data in different ways using multiple dimensions is
OLAP
A(n) _______ model of informed consent permits the collection of personal information unit the consumer specifically requests that the date not be collected
Opt-out
________ encompasses a set of assumptions about what an organization should produce, how it is produced, and for whom.
Organizational culture
All of the following disciplines contribute to the contemporary approaches to information systems EXCEPT ________.
Philosophy
Converting raw data into a more meaningful for is called
Processing
Businesses are using information technology to ________. Which statement below does NOT correctly complete the above statement?
Reduce their dependence on just-in-time inventory
The strength of cloud computing and the growth of mobile digital platforms allow organizations to ________.
Rely more on remote work and teamwork
Enabling management to make better decision regarding organizing and scheduling sourcing, production, and distribution is a central feature of
SCM supply chain management systems
The U.S. department of commerce developed a ________ framework in order to enable U.S. to legally use personal data from EU countries
Safe-Harbor
A browser-based collaboration and document sharing platform which is combined with a powerful search features and is installed on corporate servers is called ________.
Sharepoint
All of the following are examples of functional business processes EXCEPT:
Shipping a product
What is a Web beacon?
Small software programs that keep a record of users' online clickstream
________ connect many storage devices on a separate high-speed network.
Storage area networks
What is technostress?
Stress induced by computer and cell phone use
You have been hired by a worldwide non- profit agency to implement a system to handle their donations. The system must be able to handle SMS, ad internet donations, provide up-to-the-minute reports and create highly customizable mailing lists. In addition, event fundraisers access a donor's information and history which of the following systems will best meet these needs
TPS with MIS capabilities
________ provide data, voice, and video connectivity to customers.
Telecommunication services
which type of infrastructure services provide voice and video connectivity to employees, customers, and suppliers
Telecommunications
Privacy protection for medical records is covered under ________.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
What does scalability refer to?
The ability of a computer, product, or system to expand to serve a large number of users without breaking down
Which statement contains business processes associated with the correct functional area?
The business processes of paying creditors, creating financial statements, and managing cash accounts are in the functional area of finance and accounting.
Which answer best describes what the information systems department is responsible for maintaining?
The information systems department is responsible for maintaining the hardware, software, data storage, and networks that comprise the firm's IT infrastructure.
Thomas Friedman's declaration that the world was now 'flat' meant that
The internet had reduced the economic advantages of developed countries
Select the item below that is NOT one of the ways in which computer science contributes to the understanding of information systems.
Theory of business process development
Which systems are typically a major source of data for other systems?
Transaction processing systems
in a relational database, a record is referred to in technical terms as a
Turple
All of the following are essential characteristics of the cloud EXCEPT ________.
Web beacons
All of the following are types of information obtained from data mining EXCEPT ________.
Web beacons
Tiny software programs that keep track of where a user visited on the Internet and report this back to a server are called ________.
Web beacons
To identify the types of systems that provide a strategic advantage to their firms, select the list that contains all the questions managers should ask.
What is the structure of the industry in which the firm is located? What are the business, firm, and industry value chains for this particular firm? Have we aligned IT with our business strategy and goals?
Ninety percent of all PC's at the client level use which OS?
Windows
All of the following indicate that a business has gained competitive advantage EXCEPT ________.
a balanced budget
An information system can be defined as ________.
a set of interrelated components
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate the situation, you might argue that stealing the food is
acceptable because the higher value is the survival of the family
the feature of social institutions that means mechanisms are in place to determine responsibility for an action in called
accountability
The introduction of new information technology has a ripple effect which raises many issues. These issues have the following moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and ________.
accountability and control
You work for a highly successful advertiser that is just about to expand nationally, of utmost importance with finding a way to store and disseminate their clients' continually update branding guides, which include multiple imaging files and text documents, to all the firm's branches what system will best serve these needs?
and extranet with KMS (knowledge management systems) capabilities *KMS- enables organizations to better manage processes for capturing and applying knowledge and expertise
an industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called
automatic computing
The field of management information systems (MIS) deals with ________ issues as well as technical issues related to the development and use of information systems in an organization.
behavioral
To describe datasets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze, the term __________ is used.
big data
A computer consisting of a circuit board with processers and memory cards stored in racks is called a(n) ________.
blade server
From the point of view of economics, IT changes ________.
both the relative costs of capital and the costs of information
The widespread use of personal devices in the workplace and school is often referred to as ________.
bring your own device (BYOD)
Adopting strategic systems generally requires changes in ________ as well as business processes.
business goals
A collection of routines and behaviors make up a(n) ________.
business process
When a strategic system is adopted, managers will need to devise new ________ for coordinating their firm's activities with customers, suppliers, and other organizations.
business processes
The interaction between information systems and organizations is influenced by
by many factors, including structure, politics, culture, and environment
flash cookie are different from ordinary cookies in that they
cannot be easily detected or deleted
The most common type of repetitive stress injury is ________.
carpal tunnel syndrome
The person responsible for a firm's knowledge management program is called the ________.
chief knowledge officer
The person responsible for information security in most organizations is the ________.
chief security officer
Which of the following industries has not been disrupted by the internet?
clothing
A model of computing that provides a shared pool of computing resources for an organization to use over the Internet is called ________.
cloud computing
The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called
cloud computing
Promises by professions to regulate themselves in the general interest of society are called ________.
codes of conduct
Firms that do better than others are said to have a(n) ________.
competitive advantage
The most widely used model for understanding competitive advantage is Michael Porter's ________.
competitive forces model
The commission of illegal acts against a computer or through the use of a computer is called ________.
computer crime
interpretation of Moore's Law Asserts that
computing power doubles every 18 months
BYOD is one aspect of the consumerization of IT, in which new information technology first emerges in the ________ and spreads into ________.
consumer market; business organizations
what legal mechanism protects the owners of intellectual property from having their work copied by others
copyright law
the select operations
creates a subset of all records in the file and that meets stated criteria
the project operation
creates subset consisting of columns in a table
The fundamental set of assumptions, values, and ways of doing thing that has been accepted by most of a company's members is called it
culture
Which of the following objectives best describes the business strategy behind the technology implemented in Disney's operation command center as discussed in the chapter case?
customer service
NORA is
data analysis technology that finds hidden connections between data in disparate sources
The process of detecting and correcting errors in a database is called ________.
data cleansing
which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to slight different variation of his or her full name
data inconsistency
the specialized language programmers use to add and change data in the database is called
data manipulation language
Although software bugs and facility catastrophes are likely to be widely reported in the press, by far the most common source of business system failure is ________.
data quality
The most common source of business system failure is (are) ________.
data quality
the most common source of business systems failure is
data quality
A(n) ________ is a structured survey of the accuracy and level of completeness of data in an information system.
data quality audit
The confusion created by _______ makes it difficult for companies to create customer relationships management, supply that integrates data from different sources
data redundancy
Data cleansing, also known as _________, consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant.
data scrubbing
A(n) ________ is a database that stores historic and current data for the use of decision makers in the organization.
data warehouse
The corporate function that is responsible for defining and organizing the content of the database as well as database maintenance is ________.
database administration
A(n) ________ enables an organization to centrally manage and organize data.
database management system
When technology must be changed and designed to fit the needs of the organization and individuals, it may need to be ________ in order to adjust the fit between the organizational needs and the technology.
de-optimized
U.S. schools are experiencing a(n) ________, which means that students in poorer schools have less access to technology.
digital divide
Substitute products that perform as well as or better than anything currently produced are called ________.
disruptive technologies
Data redundancy is the presence of ________ in multiple files.
duplicate data
A person, place, or thing which is stored in a database is called a(n) ________.
entity
a schematic of the entire database that describes the relationships in a database is called a
entity-relationship diagram
A record describes a(n) ________ which is a person, place, thing, or event on which we store and maintain information. Each characteristic or quality describing a particular ________ is called a(n) ________.
entity; entity; attribute
The principles of right and wrong that guide an individual are called ________.
ethics
The ethical "no free lunch" rule state that
everything is owned by someone else, and that the creator wants compensation for this work
Systems that are used by senior management to make decisions are called ________.
executive support systems
which of the following is not one of the competitive forces
external environment
A grouping of characters into a word or group of words is called a(n) ________.
field
An example of a divisionalized bureaucracy is a
fortune 500 firms
The IT infrastructure in organizations today is an outgrowth of more than 50 years of evolution in computing platforms. There have been five stages in this evolution, each representing a different configuration of computing power and infrastructure elements. Select the list below with the correct five eras.
general-purpose mainframe and minicomputer computing, personal computers, client/server networks, enterprise computing, and cloud and mobile computing
The value chain model
helps firms identify points at which information technology can most effectively change its competitive position
how would you determine the market demand for your firm's IT Services?
hold focus groups to assess your service
SaaS refers to
hosting and managing access to software application delivered over the internet to clients on a subscription basis
A business model describes ________.
how a company produces, delivers, and sells a product or service to create wealth
All of the following are important questions about IT governance EXCEPT ________.
how data should be stored in a database
Psychologist study information systems with an eye to understanding
how human decision makers perceive and use formal information
You work for a retail clothing chain whose primary outlets are in shopping malls, and you are conducting an analysis of your customers and their preference. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use data mining software that is capable of
identifying sequences
Immanuel Kant's Categorical Imperative states ________.
if an action is not right for everyone to take, it is not right for anyone
All of the following are direct business benefits of the collaboration except for
improved compliance with government regulations Things that directly benefit for collaborations are: Improved quality, improved financial performance, and improved customer service
The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence and
improving decision making
The primary activities of a firm include
inbound logistics, outbound logistics, sales and marketing, and service
Data is considered to be ________ when the same attribute has different values.
inconsistent
FIP is a set of principles governing the collection and use of ________.
information about individuals
A(n) ________ specifies the rules of an organization for sharing and disseminating information.
information policy
The organization's rules for sharing, disseminating, acquiring, standardizing classifying and inventory information is called a
information policy
The formal organizational unit responsible for information technology services is the ________.
information systems department
The three activities in an information system that produce the information organization use to control operations are
input, processing, and outputs
Which of the following would not be considered a disruptive technology
instant messaging
Which of the following are key corporate assets
intellectual property, core competencies, and financial and human assets
All of the following statements regarding Lotus Notes are true except which one?
it began as an e-mail and messaging client Thing regarding Lotus Notes: It is a widely used collaboration tool at larger firms, it provides capabilities for wikis and microblogging, and it provided tools for full version control of all company documents
which of the following statements about Linux is not true
it has garnered 80 percent of the server operating system market
which of the following statements is not true about technology's impact on business firms
it helps firms expand in size
Organizational culture is best described by which of the following statements?
it is a set of assumptions and values accepted by most members
Engineers, scientists, or architects, who design new products or services for a firm, belongs to which level of business hierarchy?
knowledge workers
The four major type of competitive strategy are
low- cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy
One of the reasons that information technology flattens an organization is ________.
managers receive much more timely and accurate information, thus requiring less managers
The functional area which includes the business process to check quality is called ________.
manufacturing and production
When a firm provides a specialized product of service for a narrow target market better than competition, they are using a _______ strategy
market niche
Information technology, especially the use of networks, can help firms lower the cost of ________, making it worthwhile for firms to contract with external suppliers instead of using internal sources.
market participation (transaction costs)
_________ is the ability to offer and individually tailored products of services using the same production resources as bulk production
mass customization
A DBMS reduces data redundancy and inconsistency by ________.
minimizing isolated files with repeated data
the DBMS reduces data redundancy and inconsistency by
minimizing isolated files with repeated data
which of the following does grid computing utilize to create enormous supercomputer power?
networked computers with idle resources
Information technology comprises computer hardware, computer software, data management technology, and ________.
networking and telecommunications technology
the process for streamlining data in minimize redundancy and awkward many-to-many relationships is called
normalization
which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power use only
on-demand
which type of software is created and updated by worldwide community of programmers and available for free?
open source
Free software produced by a team of hundreds of thousands of programmers around the world is called ________.
open source software
software that manages the resources of the computer is called
operating system software
In business hierarchy, the level that is responsible for monitoring the daily activities of the business is
operation management
The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is
operations research
Disciplines that contribute to the technological approach to information systems are
operations research, management science, and computer science
A stable, formal social structure that takes resources from the environment and processes them to produce output is called a(n) ________.
organization
The most common reason for failure of large projects to succeed is ________.
organizational resistance to change
DBMS makes
physical database available for different logical views
the logical view
presents data as they would perceive by end user
The unique identifier for all data in a table is called the ________.
primary key
a field identified in a table as holding the unique identifier of the table's records is called the
primary key
which U.S. act restricts the information the federal government can collect and regulates what they can do with the information
privacy act of 1974
Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems?
production workers
the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
profiling
Coupling of files used to store information and the application program is called ________.
program-data dependence
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
property rights and obligations
A type of computer which could be in many states at once is called a ________.
quantum computer
________ are not held liable for the messages they transmit
regulated common carriers
the type of logical database model that treats data as if they were stored in two dimensional tables is the
relational DBMS
The Do-Not-Track act of 2011
requires firms to notify customers that they are being tracked
which of the following industries has a low barrier entry
restaurant
Business process are collections of
routines
a substitute products of most concern for a cable TV distributor is
satellite TV
The ability of a computer, product, or system to expand to serve more users without breaking down is called ________.
scalability
In relational databases, the ________ operation creates a subset of records in the file that meet stated criteria.
select
A browser-based collaboration and document sharing platform which is combined with powerful search features and is installed on corporate servers is called ________.
sharepoint
Firms that engage their employees, customers, and suppliers with social networking platforms embrace ________.
social business
The ________ view jointly optimizes the social and technical systems used in production.
sociotechnical
All of the following are total cost of ownership infrastructure components EXCEPT ________.
staff salaries
Routines for producing goods and services are sometimes called ________.
standard operating procedures
In order to align IT with business as well as use information systems correctly managers need to perform a ________.
strategic systems analysis
Systems that are used by firms to manage relationships with suppliers are called ________.
supply chain management systems
The principal liaison between the information systems groups and the rest of the organization is a
systems analyst
All of the following are wearable computing devices EXCEPT ________.
tablet computers
According to the Leavitt's model of organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are
tasks, technology, people, and structure
Which of the following is one of the support activities in a firm's value chain?
technology
specification that established the capability of products and the ability to communicate in a network are called
technology standards
In the United States, the claim to privacy is protected primarily by ________.
the First Amendment
The accessibility, storage, and distribution of information and knowledge is increased dramatically by ________.
the Internet
Ethical issues in information systems have become more of an urgent topic because of the rise of ________.
the Internet and e-commerce
All of the following are eras in IT infrastructure evolution except ________.
the disruptive technology era
which of the following best illustrates the relationship between entities and attributes
the entity customer with the attribute purchase
Executive support system are information systems that support the...
the long range planning activities of senior management
The most popular type of database today for PCs as well as for larger computers and mainframes is ___________ database.
the relational
Ethical issues in information systems have been given new urgency by ________.
the rise of the Internet and electronic commerce
Which of the following best describes the primary reason for implementing a new information system, from a business perspective?
the system will create new value for the firm, beyond its cost
one of the difficulties of patent protection is
the years waiting to receive it
Functional systems that operate independently are becoming a thing of the past because ________.
they cannot easily share information
which model can be used to analyze the direct and indirect cost to help firms determine the actual cost of specific technology implementations?
total cost of ownership
As described in the chapter case, the competitive force of ________ resulted in Starbuck's downturn in 2008, and it employed information systems in a strategy of _________ to combat this force.
traditional competitors: product differentiation
as referred to in the text, legacy systems are
traditional mainframe-based information systems
Systems that keep track of elementary activities of an organization and are often used by operational managers are called ________.
transaction processing systems
a one-to-one relationship between two entities is symbolized in a diagram by a line that ends with
two short marks
a client computer networked to a server computer with processing split between the two types of machines, is called a
two tiered client/server architecture
all of the following are current platforms trends except
unix
A tool used for online meetings, interviews, guest speakers, events, and employee training is a(n) ________.
virtual world
Which of the following types of collaboration tools allows you to communicate with avatars using text messaging?
virtual worlds
A set of loosely coupled software components that exchange information with one another using universal standards and languages are called ________.
web services
set of loosely coupled software components that exchange information with each other using standard web communications standards and language are referred to as
web services
tiny software object embedded in a webpage and used by tracking programs to monitor online users behavior is called
web-beacon
the federal trade commission FIP Principle of Notice/Awareness state that
websites must disclose their information practices before collecting data
A useful tool for storing and sharing corporate knowledge is a(n) ________.
wiki
what is the foundation technology for web services?
xml
What are the four generic strategies used in conjunction with information systems?
Low-cost leadership, product differentiation, focus on market niche, and strengthening customer and supplier intimacy
________ states that the number of components that a computer chip can hold doubles every two years.
Moore's Law
________ use a more flexible data model and are designed for big data.
Non-relational database management systems
Select the answer that lists the business benefits of collaboration and social business.
Productivity, quality, innovation, customer service, and financial performance
What are the basic concepts that form the underpinning of an ethical analysis of information systems and those who manage them?
Responsibility, accountability, liability, and due process
The decision to purchase or rent IT assets is called the ________
rent-versus-buy decision