MIS ch 13-17

¡Supera tus tareas y exámenes ahora con Quizwiz!

Cloud computing

Replacing computing resources - either an organization's or individual's hardware or software - with services provided over the Internet.

Record

A row in a database table. Records represent a single instance of whatever the table keeps track of (e.g., student, faculty, course title).

Embedded systems

Special-purpose software designed and included inside physical products. They help make devices "smarter" sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems.

Supply chain management (SCM)

Systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption.

Relational Database

The most common standard for expressing databases, whereby tables (files) are related based on common keys.

Black Swans

Unpredicted, but highly impactful events. Scalable computing resources can help a firm deal with spiking impact from black swan events. The phrase entered the managerial lexicon from the 2007 book of the same name by Nassim Taleb.

In database systems, a table is also known as a _____. a) field b) record c) file d) row e) key

file

Hadoop

made up of some half-dozen separate software pieces and requires the integration of these pieces to work.

In database systems, a row is also known as a _____. a) table b) column c) key d) record e) field

record

AI

(Artificial intelligence) Computer software that seeks to reproduce or mimic (perhaps with improvements) human thought, decision-making, or brain functions.

ISP

(Internet Service Provider) An organization or firm that provides access to the Internet.

OLAP

(Online Analytical Processing) A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in the special database called a data cube.

SQL

(Structured Query Language) A language used to create and manipulate databases.

TPS

(Transaction Processing Systems) Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return.

Dashboards

A heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics.

Server Farm

A massive network of computer servers running software to coordinate their collective use. Server farms provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services.

Virtualization

A type of software that allows a single computer (or cluster of connected computers) to function as if it were several different computers, each running its own operating system and software. Virtualization software underpins most cloud computing efforts, and can make computing more efficient, cost-effective, and scalable.

Expert systems

AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.

_______ refers to applications installed on a personal computer, typically to support tasks performed by a single user. a) Database management program b) Desktop software c) Software as a service d) Server program e) Enterprise software

Desktop software

Server

A program that fulfills the requests of a client.

Database

A single table or a collection of related tables.

Enterprise resource planning (ERP)

A software package that integrates the many functions (accounting, finance, inventory management, Human Resources, etc.) of a business.

Client

A software program that makes requests of a server program.

Applications

Includes desktop applications, enterprise software, utilities, and other programs that perform specific tasks for user and organizations. (end-user programs like Office, apps on smartphones, & complex set of programs that manage a business's inventory, payroll, and accounting)

Which of the following functions is likely to be performed by enterprise software? a) Making PowerPoint Presentations b) Internet Browsing c) Inventory Tracking d) Spreadsheet Accounting e) Word Processing

Internet Browsing

_____ refer to older information systems that are often incompatible with other systems, technologies, and ways of conducting business. a) Data aggregator systems b) Loyalty card systems c) Legacy systems d) Transaction systems e) Mnemonic systems

Legacy systems

Which of the following is an example of application software? a) MS Windows b) Linux c) Mac OS d) Android e) MS Word

MS Word

Genetic Algorithms

Model-building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative function.

Data mining

Process of using computers to identify hidden patterns in, and to build models from, large datasets.

___________ provide the standards, syntax, statements, and instructions, for writing computer software. a) Platforms b) Programming Languages c) Operating systems d) Database Management Systems e) Application servers

Programming Languages

API (Application programming interfaces)

Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data. For example, Amazon.com provides APIs to let developers write their own applications and websites that can send firm orders.

Why do firms need to create separate data repositories for their reporting and analytics work? a) Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters. b) Maintaining huge databases can be a cost-sink for most firms. c) Most organizations need to differentiate data derived in-house and from data aggregators. d) Running analytics against transactional data can bog down a TPS. e) Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team.

Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team.

_____ is by far the most popular language for creating and manipulating databases. a) XML b) HTML c) PHP d) Java e) SQL

SQL

Which of the following is one of the characteristics of using software as a service model? a) Fixed operating systems b) Higher maintenance costs c) Longer deployment times d) Heightened financial risk e) Scalable systems

Scalable systems

Neural networks

Statistical techniques used in AI, and particularly in machine learning. Neural networks hunt down and expose patterns, building multilayered relationships that humans can't detect on their own.

Operating system

The software that controls the computer hardware and establishes standards for developing and executing applications. (Windows, Mac OS X, and Linux)

Platform as a service (PaaS)

Where cloud providers offer services that include the hardware, operating system, development tools, testing, and hosting (i.e., the platform) that its customers use to build their own applications on the provider's infrastructure.

In database terminology, a record represents: a) a list of data, arranged in columns and rows. b) all of the data in a given column. c) a single instance of whatever the table keeps track of. d) a field or combination of fields used to uniquely identify a file. e) one or more keys that relate separate tables in a database.

a single instance of whatever the table keeps track of.

Supporters of net neutrality believe: a) it will improve innovation. b) it will keep costs low. c) it will level the playing field among competitive services offered over the Internet. d) all of the above. e) none of the above.

all of the above

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called ______ systems. a) application server b) business intelligence c) enterprise resource management d) customer relationship management e) supply chain management

business intelligence

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. a) interstitial b) embassy c) canned report d) prediction interface e) dashboard

dashboard

Firms that collect and resell data are known as: a) data barons. b) data mongers. c) knowledge consultancies. d) data miners. e) data aggregators.

data aggregators

The cost of producing an additional unit of a product is known as its: a) isocost. b) transaction cost. c) redundancy cost. d) implicit cost. e) marginal cost.

marginal cost.

A(n) _____ is an AI system that examines data and hunts down and exposes patterns, in order to build models to exploit findings. a) Hadoop b) canned report c) data aggregator d) neural network e) e-discovery

neural network

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _______. a) database management b) user interface c) distributed system d) programming language e) operating system

operating system

Internet networks are _____. a) bit-switched networks b) circuit-switched networks c) data-switched networks d) packet-switched networks e) byte-switched networks

packet-switched networks

A _____ enables communication by defining the format of data and rules for exchange. a) nomenclature b) regulation c) protocol d) dialect e) convention

protocol

Software as a Service (SaaS)

refers to a third-party software - replacing service that is delivered online.

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as: a) return on investment. b) cost to company. c) economies of scale. d) total cost of ownership. e) economic value added.

total cost of ownership

The address one types into a Web browser is also known as a: a) universal redirection link. b) uniform resource locator. c) unique resource locator. d) universal redirection locator. e) uniform resource link.

uniform resource locator

Protocol

Enables communication by defining the format of data and rules for exchange.

Cloud computing is not typically suited for situations: a) characterized by limited-time tasks. b) with no existing regulatory compliance issues. c) where complex legacy systems have to be ported. d) involving offloading of expensive computing tasks. e) where pricing economics favor buying over renting.

where complex legacy systems have to be ported.

Field

A column in a database table. Columns represent each category of data contained in a record (e.g., first name, last name, ID number, date of birth).

Data Mart

A database or databases focused on addressing the concerns of a specific problem (e.g., increasing customer retention, improving product quality) or business unit (e.g., marketing, engineering).

Utility Computing

A form of cloud computing where a firm develops its own software, and then runs it over the Internet on a service provider's computers.

Distributed computing

A form of computing where systems in different locations communicate and collaborate to complete a task.

Scalability

Ability to either handle increasing workloads or to be easily expanded to manage workload increases. In a software context, systems that aren't scalable often require significant rewrites or the purchase or development of entirely new systems. Scalability allows a firm to grow from startup to blue chip without having to simnifically rewrite their code, potentially saving big on software development costs.

What is an example of cybersquatting? a) Overwhelming a firm's Web site by flooding it with seemingly legitimate messages b) Acquiring a domain name to extort a firm, individual, product, or trademark holder c) Slowing down packet transfer to an Internet-connected computer d) Threatening to destroy information stored in a firm's servers e) Hacking into and defacing an organization's public web presence and refusing to let the site's owner regain control

Acquiring a domain name to extort a firm, individual, product, or trademark holder

DBMS (Database Management Systems)

Also referred to as database software; software for creating, maintaining, and manipulating data.

Integrated development environment (IDE)

An application that includes an editor (a sort of programmer's word processor), debugger, and compiler, among other tools. Most professional programmers use IDE to write their code.

Total cost of ownership (TCO)

An economic measure of the full cost of owning a product (typically computing hardware and/or software). TCO includes direct costs such as purchase price, plus indirect costs such as training, support, and maintenance.

Linux

An open source software operating system.

_________ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done. a) Embedded systems b) Applications c) Operating systems d) Emulators e) Platforms

Applications

_____ is a term used to describe unpredictable, but highly impactful events. a) Flash outs b) Black swans c) Power plays d) Straddling e) Viral trojans

Black swans

_____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis. a) Logistics b) Queritic modeling c) Business intelligence d) Electronic trading e) Big Data

Business intelligence

_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference. a) Optical fiber cable b) Coaxial cable c) Ribbon cable d) FTTH cable e) Amdahl cable

Coaxial cable

_____ refers to software for creating, maintaining, and manipulating data. a) Extranet b) ROM c) RAM d) DBMS e) Internet 2

DBMS

_____ refer to databases focused on addressing the concerns of a specific problem or business unit. a) Data marts b) Dashboards c) Hadoop d) Data aggregators e) Data analytics

Data marts

_____ is the process of using computers to identify hidden patterns in and to build models from large data sets. a) Data harvesting b) E-discovery c) Optimization d) Report canning e) Data mining

Data mining

______technology is a broadband technology that can use the wires of a local telephone network. a) Fiber to the Home (FTTH) b) Digital Subscriber Line (DSL) c) Coaxial cable d) Telecom-broadband hybrid e) Broadband over power line (BPL)

Digital Subscriber Line (DSL)

_____ is a set of standards for exchanging messages containing formatted data between computer applications. a) ERP b) EDI c) CPM d) DBMS e) SCM

EDI

Linux is one of the most used operating systems in desktop computers, but can be found only in a tiny fraction of mobile phones, and consumer electronics. a) True b) False

False

Virtualization is unsuitable for use on desktop applications. a) True b) False

False

Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners. a) True b) False

False

When considering overall network speed, a system's speed is determined by its fastest component. a) True b) False

False

URL

Often used interchangeably with "Web address," URLs identify resources on the Internet along with the application protocol needed to retrieve it.

_____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube. a) Ad hoc reporting b) E-discovery c) Data aggregation d) Online analytical processing e) Data adjacency

Online analytical processing

_____ refers to software that is free and where anyone to look at and potentially modify the code. a) Social software b) Software as a service c) Proprietary software d) Open source software e) Licensed software

Open source software

Platform

Operating systems are designed to create a platform. Products and services that allow for the development and integration of software products and other complementary goods. Windows, iOS, Android, and the standards that allows users to create Facebook apps are all platforms.

Which of the following is true of the difference between operating systems and application software? a) Operating systems are software packages that integrate the many functions of a business, while application software works with a minimal degree of overlap b) Operating systems support tasks performed by a single user, while application software support tasks performed by multiple users. c) Operating systems control the hardware elements visible to the human eye, while application software controls the hardware elements invisible to the human eye. d) Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing e) Operating systems are software packages offered by a third party, while application software contains programs that are designed in-house

Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing

Which of the following is one of the sources of revenue for open source vendors? a) Claiming royalties on software based on open source code b) Selling support and consulting services c) Marketing versions of open source software masked as proprietary software d) Licensing OSS for incorporation into subsequent open source products e) Selling open source products at prices well below commercial products

Selling support and consulting services

Firmware

Software stored on nonvolatile memory chips (as opposed to being stored on devices like hard drives or removable discs). Many products allow for firmware to be upgraded online or by connecting to another device.

Open Source Software (OSS)

Software that is free and where anyone can look at and potentially modify the code.

Loyalty Card

Systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity. In addition to enhancing data collection, loyalty cards can represent a significant switching cost.

Business intelligence (BI) systems

Systems that use data created by other systems to provide reporting and analysis for organizational decision making.

Customer relationship management (CRM)

Systems used to support customer-related sales and marketing activities.

Ad hoc tools

Tools that put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters.

The Internet Protocol Suite consists of the Internet Protocol and _____. a) File Transfer Protocol b) Simple Mail Transfer Protocol c) Session Initiation Protocol d) Datagram Congestion Control Protocol e) Transmission Control Protocol

Transmission Control Protocol

Any data-centric effort should involve input not only from business and technical staff, but from the firm's legal team, as well. a) True b) False

True

By loweing the cost to access powerful systems and software, barriers to entry also decrease. a) True b) False

True

Data are raw facts that must be turned into information in order to be useful and valuable. a) True b) False

True

Unfortunately, IPv6 isn't backward compatible with IPv4. a) True b) False

True

While large groups of individuals work on key OSS projects, such as the Linux operating system, some widely used efforts have had fewer developers, creating concerns over quality and security. a) True b) False

True

Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. As a consequence: a) navigational databases are being preferred over transactional databases. b) data is not efficiently transformed into information. c) firms prefer to outsource data mining operations to third-party firms. d) analysts must also become transactional specialists. e) most firms incur additional expenditure to effectively record transactions.

data is not efficiently transformed into information.

A _____ is a system that provides rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of consumer activity. a) sugging report b) canned report c) dashboard d) legacy system e) loyalty program

loyalty program

Cloud computing refers to: a) replacing computing resources with services provided over the Internet. b) manufacturing semiconductors as a stack of multiple, interconnected layers instead of in one flat plane. c) designing microprocessors with two or more calculating processor cores on the same piece of silicon. d) a technology that can make a single computer behave like many separate computers. e) designing computers with many microprocessors that work together, simultaneously, to solve problems.

replacing computing resources with services provided over the Internet.

One of the functions of the IP is to: a) route message packets to the final destination. b) slice up the message into smaller chunks of data called packets, to be sent over the network. c) check for damaged or corrupt message packets and request for replacements, if needed. d) label message packets with source and destination addresses. e) rearrange message packets in the same sequence as they were sent.

route message packets to the final destination.

Knowledge is defined as: a) raw facts and figures. b) the data presented in a context so that it can answer a question or support decision making. c) the insight derived from experience and expertise. d) a listing of primary data. e) the process of breaking a complex topic into smaller parts.

the insight derived from experience and expertise.

Computer hardware refers to: a) the physical components of information technology. b) mobile use outside an office setting. c) a precise set of instructions that orchestrate the functioning of the computer. d) a program that fulfills the requests of a client.handheld computing devices meant largely for e) the mechanism through which users interact with a computer.

the physical components of information technology.


Conjuntos de estudio relacionados

5.5 - The Slave Trade and Its Impact on Africa

View Set

Networking and Internet Technology Midterm Study Guide

View Set

UNIT 2-STATE REGULATION UNDER USA-2.4 (REVIEW QUESTIONS)

View Set

The Respiratory System: Physiology

View Set