MIS FINAL EXAM

¡Supera tus tareas y exámenes ahora con Quizwiz!

The average ERP project takes​ ___________ months to complete.

16

In​ 2015, __________ million Americans purchased something online.

171

​E-commerce began in​ ________ when Netscape earned their first online advertisement from a major corporation.

1995

If you want your cell phone to transmit up to 100​ megabits/second downloads, you would need to upgrade to​ a(n) _____________ network.

4G

​Porter's competitive forces model includes​ _________ forces that impact every organization.

5

​Unfortunately, a majority of enterprise applications deliver​ __________ percent or less of the expected benefits.

50

Businesses retailing products and services directly via the Internet to individual consumers best describes​ ________.

B2C electronic commerce

Which of the following is NOT an example of disruptive​ technologies?

Digital television

Frustrated customers angry about a site not working is an example of which IT cost of ownership​ (TCO)?

Downtime

Concerning​ Porter's model and the​ Internet, which of the following is false​?

Due to technology​ requirements, the threat of new entrants decreases.

Which of the following is a critical security function of senior management in an​ organization?

Establishing the security policy and managing risk

Creating a new system that provides charts and graphs to assist senior management make​ non-routine decisions is called​ (a):

Executive support systems.

Which of the following refers to the capability of a​ computer, product, or system to add additional​ features?

Expandability

What is the understanding that most American and European privacy law is based​ on?

Fair Information Practices​ (FIP)

​_____ is output from an information system that is returned to key people who analyze it​ to, evaluate​ it, and refine inputs for the system.

Feedback

With regard to ERP​ implementation, which of the following is false​?

Firms see immediate operating efficiency and associated profits when first implementing an ERP application.

​_____________ logic is a solution for problems that cannot be limited to a series of​ if-then rules.

Fuzzy

​________ services can tell you the price of a house you are looking at or about special exhibits at a museum you are passing.

Geo information

The ethical principle that calls for hypothetically walking in the other​ person's shoes before making a decision is called the​ ______________.

Golden Rule

Nearly 80 percent of the Internet searches conducted use​ ___________, which makes it the largest data repository in history.

Google

Which of the following businesses uses the portal Internet business​ model?

Google

Which of the following is a file storage and synchronization service for cloud​ storage, file​ sharing, and collaborative​ editing?

Google Drive

​_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing

Grid computing

​_______________ is an upgrade to traditional HTML because it allows the addition of multimedia features​ (i.e., video) without cumbersome​ add-ons.

HTML5

Which of the following statements is NOT a characteristic of​ Hadoop?

Hadoop extracts data from multiple tables that have a relationship.

What is the domestic exporter strategy characterized​ by?

Heavy centralization of corporate activities in the home country of origin

If you are renting a home while going to college and would like to connect to the​ Internet, you will need to contact​ a(n)______________ such as​ EarthLink, NetZero, or​ AT&T to connect.

ISP

​Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed:

IT infrastructure.

Which of the following statements represents a responsibility of the sales and marketing functional​ area?

Identifying customers

A manager upset that he or she is not receiving​ forecasts, sales​ projections, or appropriate dashboards is expressing frustration for having a poor​ ______________ business​ driver:

Improved Decision Making

The​ _______________ has helped level the playing field for companies wanting to do business globally.

Internet

IoT stands for the:

Internet of Things

​___​_____ is a new network backed by​ universities, government, and private companies in more than 100 countries.

Internet2

What primary goal does the San Francisco​ Giants' "dynamic ticket​ pricing" help​ accomplish?

It allows ticket prices to fluctuate according to demand.

​_________ is when a company transfers tasks of the firm to other firms that operate in​ low-wage countries, possibly reducing job opportunities within the U.S.

Offshoring

Where is a cookie that is created during a Web site visit​ stored?

On the​ visitor's computer

​___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits.

Operational excellence

According to the information presented in this​ video, a spreadsheet is great to manage information about one thing​ (e.g., items for​ sale), but a​ _____ is preferred to manage information about more than one thing​ (e.g., items for sale and suppliers of​ items).

database

Using SAP to help determine​ customers' demand for its products is called​ ____________ planning.

demand

In this​ video, Jack describes how metadata​ _____.

describe characteristics of each field

In​ client/server computing, a client normally consists of​ a:

desktop computer.

Network signals that are represented by​ on-off pulses indicate​ a(n):

digital signal.

​A(n) ______________ specifically addresses plans for power​ outages, floods,​ fire, and other calamities.

disaster recovery plan

Delivering products to retail stores is considered the​ _____________ portion of the supply chain.

downstream

If someone at your work accuses you of sending inappropriate​ emails, you should be afforded​ __________________.

due process

The San Francisco Giants sell tickets based on​ ____________, where the prices often change based on demand and other variables.

dynamic pricing

eBay is an example of​ a/n ___________ because it sells products over the Internet.

electronic commerce

As Kevin​ explains, _____ processes support activities in multiple departments and span an organization.

enterprise

ERP stands for​ ___________________________________.

enterprise resource planning

Which of the following is NOT a function of the Internet service provider​ (ISP)?

The ISP provides applications services.

Principles of right and wrong that you use to make choices are called​ _____________.

ethics

A​ _______________ is represented as a column in a database table that represents things like a​ person's first​ name, last​ name, and age.

field

Using a combination of hardware and​ software, _______ are able to control incoming and outgoing data on a network.

firewalls

A​ _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table.

foreign key

A​ __________________ is a popular business organization that has a product or service created in the home country​ (i.e., McDonald's and Chem​ Dry), and distributes the same products worldwide. Individual stores or locations are often owned by a local individual.

franchiser

In this​ video, Samir describes how business executives use a BI application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

granular

Based on the information in this​ video, modern business intelligence reporting tools use​ _____ interfaces that display the results of data analysis.

graphical dashboard

Bandwidth transmission speed is measured in​ ______________.

hertz

A multinational strategy is often described where financial management and strategy operate out of a central​ __________________.

home base

The four major functions of a business include​ manufacturing/production, sales/marketing,​ finance/accounting, and​ _________________.

human resources

Business processes supported by enterprise systems related to travel expense reporting are associated with​ __________________.

human resources processes

Which of the following businesses uses the content provider Internet business​ model?

iTunes

The BPM step which addresses the question of which processes need to be addressed is​ ___________________________.

identifying processes for change

The final phase of the problem solving model is the​ ___________ phase.

implementation

​Mary's company is implementing an ERP system to achieve which main business​ objective?

improved decision making

Automobiles have the opportunity to use​ computer-aided design​ (CAD) to create virtual models of parts and even prototype vehicles. This use of information systems to improve quality is related to​ ______________________.

improving design quality and precision

According to this​ video, behavioral tracking and targeted ads can be seen as a​ double-edge sword because​ _____.

increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy

If two people are trading coins and one has far more knowledge about the hobby than the​ other, this is called​ _________________.

information asymmetry

Information​ systems, management information​ systems, information​ technology, information​ management, and computer information systems are often confused with one another. Which of these focuses primarily on hardware and​ software?

information technology

If you want to collect data​ (i.e., photos) from someone and use the​ data, you must obtain​ _____________.

informed consent

A key benefit of collaboration is​ _______________, which focuses on deriving better and more unique ideas for products and services.

innovation

As Jack explains to​ Kate, a database is a collection of​ _____ records.

integrated

A photo you have taken of your family is considered​ ______________, and is protected by law.

intellectual property

According to the​ decision-making process described in your​ textbook, _____________ includes​ discovering, identifying, and understanding organizational problems.

intelligence

In this video​ dramatization, David diagrams Michael​ Porter's Five Forces Model. The force at the center of this model that is affected by the other forces is the​ _____.

intensity of rivalry within the industry

Which of the following is NOT a step in how​ case-based reasoning​ works?

The system asks the user additional questions to expand the database search.

According to​ Samir's explanation to​ Ryan, all of the following statements about data marts are true except​ _____.

They are larger than data warehouses.

Why are legacy systems still​ used?

They are too expensive to redesign.

According to this​ video, which of the following statements is true regarding enterprise resource planning​ systems?

They integrate data with a centralized database.

Which of the following is NOT part of the description of a value​ web?

They promote communication among units.

One of the characters in this video asks the​ question: "Are there any laws to keep companies from installing trackers on my​ computer?" According to his​ colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is​ used?

The​ Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent.

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology​ implementations?

Total cost of ownership​ (TCO)

The philosophy that quality should be the responsibility of everyone that works in a firm and every business unit is best known as which of the​ following?

Total quality management

​____________ focus on​ day-to-day operations of a business including managing​ sales, payroll, and receipts.

Transaction processing systems

A​ _______________ is a program that seems like a normal​ program, but does something completely unexpected.

Trojan horse

Among the eight unique features of​ e-commerce, which is related to the ability to interact with web technology​ everywhere?

Ubiquity

What type of decisions are the type where a person needs to provide​ judgment, evaluation, and insight to solve the​ problem?

Unstructured decisions

It is possible to use a special​ secure, encrypted​ network, a​ _____, which works on the public​ network, like the Internet.

VPN

​_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location.

Virtualization

Which of the following is an opportunity for threats to gain access to​ assets?

Vulnerability

The Federal Trade Commission Fair Information Practice principle of​ Notice/Awareness states​ that:

Websites must disclose their information practices before collecting data.

This video describes how advertisers use​ _____ in order to display more relevant ads based on a​ user's search and browsing history.

behavioral tracking

Companies often use information systems to improve quality by​ ______________ as a way to set standards for products and services against predefined standards.

benchmarking

The term​ ____________ describes data sets like​ Google's database that are too big for traditional DBMS to handle.

big data

If your computer allows authentication using your​ fingerprint, this technology is considered​ __________________.

biometric authentication

According to the information in this​ video, computers represent data using​ _____.

bits

When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the​ _________________________.

bullwhip effect

​ESS, DSS, and MIS systems all fall under the generic term of​ _______ systems as they help with the decision making process.

business intelligence

Enterprise software includes a database and thousands of predefined​ ________________.

business processes

An antique dealer buying items and hoping to sell them for more than he or she paid for them is the very definition of​ a:

business.

According to the information presented in this​ video, organizations have options for responding to problematic​ user-generated social media content that include all of the follow EXCEPT​ _____.

changing it

The senior leadership position responsible for the​ organization's data is called the​ ____________ officer.

chief data

When a leading discount​ store's database was​ breached, a lot of attention was on the​ company's ____________________, who is specifically responsible for training employees about security.

chief security officer

The​ ________ measures the number of customers who stop purchasing products or using a​ firm's services.

churn rate

Although it may seem innocent​ enough, ___________ is a serious problem for companies that are involved with​ pay-per-click advertising.

click fraud

Tools that record customer activities at websites and store them in a log for further analysis are called​ ________.

clickstream tracking tools

A collection of computers on the Internet that allow for innovations such as software as a service​ (SaaS) is simply called​ (the):

cloud

What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate​ computers?

cloud computing

Based on the information in this​ video, all of the activities listed here describe behavioral tracking except​ _____.

collecting credit card data from online purchases

Putting a key logger on your​ boss's computer without permission would be considered​ a(n) ___________.

computer crime

Some​ firms, like Ernst and​ Young, use​ ______ to carefully collect and maintain data in such a way that they can be used as evidence in a court of​ law, on the behalf of a company or government agency.

computer forensics

If you return to a website that welcomes you back by​ name, you likely have small text file on your computer with information about your prior visits called a​ ___________.

cookie

When a firm does something in which they are a​ world-class leader, that activity would be considered to be a​ _____________ for the company.

core competency

The benefit of a consumer being able to look online to determine the actual cost a business pays for products is called​ ________________

cost transparency

As the two characters describe in this​ video, all of the following are a function of operating systems software except​ _____.

creating a presentation

Kickstarter.com is a popular​ _______________ site where​ start-up companies' ideas are presented to perspective investors.

crowdsourcing

Systems designed to help maintain and improve customer data and its relationship with customers are called​ __________________ systems.

customer relationship management

In this video​ dramatization, Kevin describes which component of an ERP system that consolidates data from​ sales, marketing, and service​ departments?

customer relationship management​ (CRM)

Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ _________________.

cybervandalism

It has been shown that one of the best ways to reduce quality problems is to reduce​ _____________.

cycle time

In its simplest​ form, ___________ represents streams of raw facts with limited usefulness until organized.

data

A location specified to include IT infrastructure such as​ storage, security, and system backup is called​ a:

data center.

As part of a​ DBMS, a(n)​ _________ documents information about a database.

data dictionary

Creating visual representations of data through​ charts, graphs, and dashboards is formally called​ ____________________.

data visualization

Most larger corporations utilize a​ ______ to consolidate data from a business along with external data.

data warehouse

​Typically, executives will review their​ ______________, which is a set of metrics they consider to be vital to understanding how the company is doing and give insight as to what they should be doing next.

key performance indicators​ (KPI)

A computer​ _________________ causes the most repetitive stress injuries.

keyboard

A​ ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.

keylogger

Organizations have institutional knowledge that needs to be​ stored, transferred, and applied as part of a​ _______________ strategy.

knowledge management

Canvas and Blackboard are examples of​ ______________________ systems that help manage employee learning.

learning management systems

As Mike explains to​ Valerie, which of the following is a significant risk of using social​ media?

loss of privacy

A car reservation system requiring processing a thousand transactions per second would likely require a​ __________ to process the transactions.

mainframe

A​ ________ is a​ large-capacity, high-performance computer that can process large amounts of data very rapidly.

mainframe

According to the DHS agent portrayed in this​ video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware

Target was attacked by hackers who installed​ ___________ in the​ company's security and payments system.

malware

​_____________ is the largest single group in the U.S. business labor force and this group dramatically benefits from information to help with the decision making process.

management

Business processes supported by enterprise systems related to quality control are associated with​ __________________.

manufacturing and production processes

​ZipReality, which uses both Zillow and Google​ Maps, is an example of​ a:

mashup.

Compared to​ in-house hosting,​ cloud-based hosting​ ________.

minimizes the risk of investing in technology that will soon become obsolete

As Zero and One explain in this​ video, a​ _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.

modem

When thinking about downloading and using a photo off the​ Internet, don't forget the ethical​ __________ lunch rule.

no free

In this​ video, Katie describes a decision that can be made by following a predetermined set of steps. According to​ Leila, this type of decision most often is made at the​ _____ level of an organization.

operational

Analytical CRM applications are based on data from​ _____________________.

operational CRM systems

Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of​ ________________.

operations management

In this​ video, One-Bit describes​ _____, the method of slicing digital messages into​ parcels, transmitting them across communication​ networks, and reassembling them at their destination.

packet switching

Regarding dimensions of business​ problems, a lack of properly trained employees is considered a​ ______________ dimension.

people

If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ _______________.

phishing

Many business analytics include​ ________, which utilizes statistics and data mining to try to determine the likelihood of future events for planning purposes.

predictive analytics

The benefit of a consumer being able to look online to find a variety of different prices for the same product is called​ ___________________.

price transparency

A​ _______________ uniquely represents a record or row.

primary key

The​ Problem-Solving Model consists of​ __________________, solution​ design, solution evaluation and​ choice, and implementation.

problem identification

What is the name for the process of converting raw data into a more meaningful​ form?

processing

In the information​ age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of​ ________.

property rights and obligations

A​ ________ is a set of rules that programs on two communicating devices follow.

protocol

In this​ video, Samir describes the role of the business intelligence team in three primary activities that include data​ acquisition, data​ analysis, and​ _____.

publishing results

​(A) _______________ is the formal name for questioning or making a data request from the database.

query

A​ just-in-time strategy​ means:

raw materials would arrive​ just-in-time to be transformed into a product and the product would ship as soon as completed.

In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is an example of a​ ______________.

record

The most common type of database is a​ __________.

relational database

If you accept a position as an information systems​ manager, you have​ a(n) ____________ to accept the​ costs, benefits, and obligations for the decisions you make.

responsibility

Establishing a risk level of malware threats to an organization is an example of​ _______________.

risk assessment

​A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and​ self-regulation that meet U.S. guidelines.

safe harbor

Identifying the most profitable customers would utilize the​ _____________ of a CRM system.

sales force automation

​A(n) _________________ policy identifies and ranks information risks and goals.

security

Based on the information provided in this​ video, Porter's Five Forces Model is useful to analyze a business and identify its​ _____.

strategic position within its industry

According to​ David, Walmart negotiates with manufacturers and wholesalers to keep their profit margins low so that Walmart can offer lower prices to its customers. This is an example of​ _____.

strong bargaining power of buyers​ [Walmart is the​ buyer]

A college admission decision that is entirely based on a mathematical formula is called​ a(n) __________________ decision.

structured

According to the information presented in this​ video, determining how many workers are needed to produce​ 1,000 units of a product in a given work week is an example of​ a(n) _____.

structured decision

Knowledge that already exists inside a firm in the form of formal reports or presentations is categorized as​ ________.

structured knowledge

Paying an online journal a monthly fee for access to its content is called the​ __________ model.

subscription revenue

Activities related to procuring materials and refining these materials into finished projects to distribute to retail outlets are a​ firm's ________________.

supply chain

If a competitor to your business introduces an effective product or service​ (i.e., when Citibank first introduced the​ ATM), your need to follow is considered an example of the business​ driver:

survival

The Windows operating system is an example of​ ______________ software.

system

IT professionals working to make a new system work with an existing system is focusing​ on:

systems integration

When a top chef employee leaves without ever writing any recipes​ down, the lost knowledge is​ called:

tacit.

A large corporation managing a network over a global area would be considered a​ ________.

wide area network

A​ __________ is a unique type of malware that replicates itself from one computer to another.

worm

ERP implementations can be very​ expensive, averaging approximately​ _____.

​$2.8 million

​____________________, which is now available for average consumers to​ purchase, has been used in industry to create solid​ objects, layer by​ layer, from specifications in a digital file.

​3-D printing

Based on the information provided in this​ video, which of the following usually happens in a​ denial-of-service attack?

A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.

What is Secure Hypertext Transfer​ Protocol?

A protocol for encrypting data transferred over the Internet

Which of the following most accurately describes an information​ system?

A set of components that​ gather, analyze,​ store, and utilize information for making better decisions for a firm

Which of the following BEST describes a pivot​ table?

A spreadsheet tool that displays two or more dimensions of data in a convenient format.

​_________________ tracks and coordinates the delivery process and associated financial information.

A supply chain execution system

​___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.

Authentication

Which of the following is FALSE about techno​ stress?

Affected people start to behave like​ computers, devoid of emotions.

Which is an essential component in the capability of GDSS to contribute to a collaborative​ environment?

Allows users to contribute simultaneously

​___________________________ is an open source operating system for mobile devices.

Android

Micropayment systems allow for high​ volume, low cost transactions. ​ __________ is considered the largest micropayment system in the world.

Apple

When is business process management​ (BPM) concluded?

BPM is never concluded.

​________ refers to the tracking of individuals on thousands of websites for the purpose of understanding their interests and intentions.

Behavioral targeting

​________ is starting to be used in predictive analytics from both the public and private sectors.

Big Data

For​ technology, which are the three interrelated advances that make MIS so exciting now and into the​ future?

Big​ data, cloud​ computing, and the mobile digital platform

Which of the following is a wireless protocol designed for transmitting data over short​ distances, replacing​ cables?

Bluetooth

Which is eBay an example​ of?

C2C electronic commerce

What is the process of predicting when a computer hardware system will become​ saturated?

Capacity planning

The quality dimension of the​ decision-making process that addresses the ability to articulate the solution is called the​ ____________ dimension.

Coherence

Which of the following is NOT a way that information systems provide a competitive​ advantage?

Collecting and storing large amounts of data

Twitter and Facebook are both examples of the​ _____________ Internet Business Model.

Community provider

Which of the following business problems is NOT a problem in the technology​ dimension?

Complexity of task

​____________ is the final and ongoing step of the business process management model.

Continuous measurement

An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business​ driver:

Customer and Supplier Intimacy

​______________ is the total time it takes a child to purchase lemonade​ ingredients, create the​ lemonade, and set up operations for a neighborhood lemonade stand.

Cycle time

An information system can be defined technically as a set of interrelated components that collect​ (or retrieve),​ process, store, and distribute information to support which of the​ following?

Decision making and control in an organization

The stage of the​ decision-making process where identifying and exploring potential solutions takes place is in the​ ____________ phase.

Design

Which of the following adjusts copyright laws to the Internet age by making it illegal to​ make, distribute, or use devices that circumvent​ technology-based protections of copyrighted​ materials?

Digital Millennium Copyright Act

Which of the following is FALSE about Electronic Data Interchange​ (EDI)?

EDI is a larger firm using a secure website to link to its suppliers and other key business partners.

In this​ video, Kevin describes​ _____ as a set of integrated software modules that support nearly all of their​ organization's business processes.

ERP

According to​ Jack's explanation of the structure of relational database​ tables, which of the following statements about columns and rows is​ true?

Each row is a unique record for one of the items in the table and each column is an attribute of the item.

Which of the following is NOT an application used in social​ business?

Email

Which of the following entities is NOT a part of the​ firm's environment?

Employees

​_____ are the people or​ groups, both internal and external to the​ organization, for whom applications are developed.

End users

What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one​ another?

Enterprise applications

Why is an​ order-to-cash service considered a complex process to implement as an enterprise​ application?

It needs information from many different functions of the enterprise.

​__________________ are designed to capture critical​ processes, procedures, and experience to ensure this critical content​ isn't lost when someone leaves the organization.

Knowledge management systems

​_____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.

Liability

Which of the following is an example of a popular open source operating​ system?

Linux.

What are the four elements of critical​ thinking?

Maintaining doubt and suspending​ judgment, Being aware of different​ perspectives, Testing alternatives and letting experience​ guide, and Being aware of organizational and personal limitations

According to​ Valerie, which of the following describes the identify guideline of social media​ behavior?

Make sure you clarify if views are personal or if they represent a company.

​______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.

Malware

What is the name for the field that deals with behavioral issues as well as technical issues surrounding the​ development, use, and impact of information systems used by managers and employees in the​ firm?

Management information systems

​________________ focus(es) on providing decision making data available for middle managers to make sound business decisions.

Management information systems

​_________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards.

Marketing

Which is NOT a way in which NORA technology can create a detailed dossier of a​ person?

Medical records

According to the information presented in this​ video, which of the following is not an operating system​ software?

Microsoft Office

Which of the following is the best example of a software​ suite?

Microsoft Office 2013

Which is NOT one of the phases in the timeline for the development of an​ e-commerce presence?

Mobile implementation

A networked system configuration supports which of the following international business​ strategies?

Multinational and transnational

A server dedicated to managing HTML pages is called​ a(n):

web server.

Which of the following statements is FALSE regarding​ Pandora's Internet business​ model?

Pandora attracted new users by allowing them to download music for free.

Which of the following is NOT considered to be a typical people​ problem?

Political conflict

​______________ analytics has been used by companies like FedEx to determine the impact of price changes on sales.

Predictive

Which type of activity within the value chain model is directly related to the production and distribution for a​ firm's products and​ services?

Primary activities

What are the steps of the problem solving​ process?

Problem​ Identification, Solution​ Design, Solution Evaluation and​ Choice, and Implementation

​______________ is a​ term, when described from a customer​ perspective, that involves demanding​ durability, safety, ease of​ use, as well as service effectiveness and responsiveness.

Quality

What type of systems provide technology for tracking the movement of goods throughout the supply​ chain?

RFID

​____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.

Ransomware

Which of the following is NOT an impact of the Internet on competitive forces and industry​ structure?

Reduces the price of products and services

Which of the following is an important capability for​ service-category business processes that are found in most major CRM software​ products?

Returns management

Among the eight unique features of​ e-commerce, which is related to a consumer being engaged with an immersive multimedia​ experience?

Richness

​_____ refers to the use of social networking to extend a​ business' collaboration efforts in order to engage and connect better with their​ employees, suppliers,​ and/or their customers.

Social business

​________________ commonly involves sites like Twitter and Facebook to collaborate with customers.

Social business

The social commerce feature that enables a consumer to log into sites through Facebook is called a​ ___________________.

Social​ sign-on

Which of the following is NOT a step in the​ problem-solving process?

Solution analysis

The quality dimension of the​ decision-making process that addresses the resources of affected parties is called the​ __________ dimension.

Speed

Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials as well as to​ customers?

Supply chain management system

When an intelligent system uses nodes that​ interact, similar to the human​ brain, to find hidden patterns within large data​ sets, it is most likely using​ _________.

a neural network

In this video​ dramatization, Valerie describes organizational guidelines for all of the following social media behaviors EXCEPT​ _____.

abstain

A quick report created by the user that is based on his or her own SQL code is called​ a(n) __________ report.

ad hoc

According to the information presented in this​ video, a database management system​ (DBMS) is a software program for​ creating, processing, and​ _____ a database.

administering

Sending customers to a website for a referral fee is called the​ _____________ model.

affiliate revenue

According to the information provided in this​ video, any business that has an online presence is at risk of​ _____.

all of the above

According to this​ video, the business benefits of behavioral tracking include​ _____.

all of the above

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

ambient data

Because so many Web pages use​ databases, _____ is a major malware threat since poorly coded Web application software is vulnerable.

an SQL injection attack

Based on the information in this​ video, which of the following is the most accurate description of a business intelligence​ system?

an information system that processes data into information containing​ patterns, relationships, and trends

In this​ video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing​ a(n) _____.

analog signal

The signal from your iPod earphone is​ a(n):

analog signal.

As explained in this​ video, an inventory management program is an example of​ _____.

application software

In the Star Wars​ movie, C3P0 was a robot that emulated human behavior and thought which is called​ ________________.

artificial intelligence

As David explains to​ Lauren, which of the following can force a business and its competitors to compete on​ price?

bargaining power of buyers

A​ company's marketing managers meet to create a new marketing plan. According to​ Leila, this is an example of​ _____ decision making.

semistructured

Developing a marketing plan could best be characterized as​ a(n):

semistructured decision by middle management.

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.

social engineering

Facebook and Twitter are both companies that enable users to join up with a larger community. The formal name for this type of organization is called​ __________________.

social networking

Google Apps is a popular​ cloud-based:

software as a service​ (SaaS).

The popular USB​ "thumb" drive uses a storage technology very similar​ to:

solid state drives.

In this​ video, Agent Macey explains how a​ _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.

spoofer

In an effort to​ ___________ critical business​ processes, Coca-Cola implemented an SAP enterprise system.

standardize

When talking about changes related to information​ technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital​ platform, ________________________, and the growth of cloud computing.

the growing use of big data

​Walmart's decision to build fulfillment centers illustrates which force in​ Porter's Five Forces​ Model?

threat of new entrants

The social commerce feature that includes a stream of events to create a history for friends to view​ is/are called​ ______________.

timelines

Business intelligence​ (BI) differs from Business analytics​ (BA) because BA focuses more on​ ___________________________.

tools and techniques for analyzing data

The acronym related to organizational​ improvements, TQM, stands for​ ____________________.

total quality management

Interactions are critical when working to improve customer relations. Specific interactions with customers are called​ ____________.

touch points

According to the information presented in this​ video, a​ company's decision to introduce a new product is an example of​ _____ decision making.

unstructured

According to​ Leila, which types of decisions are made at the executive level of an​ organization?

unstructured

A​ company's suppliers and the​ suppliers' suppliers are considered the​ _____________ portion of the supply chain.

upstream

​Disney's Epcot Center has​ ______________ systems that use interactive graphics software to simulate​ real-life experiences to both entertain and educate visitors.

virtual reality

The Apple watch is a new type of mobile digital computing​ called:

wearable computing.

According to the information presented by one of the characters in this​ video, which of the following describes the refrain guideline of social media​ behavior?

​Don't use company resources such as​ logos, photos, company​ email, and so​ on, unless you have permission to use them.

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal?

​Gramm-Leach-Bliley Act

Which of the following is the correct list and correct order of the stages of decision​ making?

​Intelligence, design,​ choice, implementation

What are the dimensions of information​ systems?

​Organizations, People, and Information Technology

A supply chain driven by actual customer orders or purchases follows which​ model?

​Pull-based model

What are the three general business functions that CRM software​ serves?

​Sales, customer​ service, and marketing

According to the information in this​ video, the telephone system is an example of a​ _____ network.

​circuit-switched

In this​ video, Special Agent Macey says the single largest threat to the Internet is​ _____.

​denial-of-service attacks

Application controls can be classified as​ _____ controls,​ _______controls, and​ ________ controls.

​input; processing; output

Customer relationship management typically focuses on three key elements of the customer​ relationship:

​marketing, sales, and service.

According to this​ video, Linux is an example of​ _____.

​open-source software

Security in an information systems context refers to​ ___________________________, which are used to prevent unauthorized access or theft.

​policies, procedures, and technical measures

Six sigma is a specific measure of​ _________, representing​ ____________________.

​quality; 3.4 defects per million opportunities

Disney is using​ a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a​ guest's room​ key, park​ ticket, and eventually a​ vacation-planning system to make the experience more efficient with reduced wait times.

​radio-frequency identification​ (RFID)

The IT infrastructure computer software component includes both​ ____________ and​ __________ software categories.

​system; application

AccuMed is a software package used by doctors to schedule patient appointments. According to the information presented in this​ video, AccuMed is​ _____.

​vertical-market software


Conjuntos de estudio relacionados

MGT 247 FINAL EXAM practice questions

View Set

Abnormal Psychology: Chapter One

View Set

Criminal Justice 100 - Exam one book questions

View Set

Discuss the four key functions of management.

View Set

ASTRONOMY 1010 Questions from Quizzes

View Set