MIS final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

What is the difference between a DDoS attack and a DoS attack?

A DoS is carried out with one source device and a DDoS attack is carried out with many source devices.

What is the essential purpose of a supply chain management system (SCM)?

A SCM helps managers anticipate supply issues, such as increased demand or production slowdowns, so they can make quick accommodations.

Which of the following is an example of data that would best be conveyed using data visualization to help a manager make a decision?

A manager at a startup wants to decide which city to target based on the percentage of a city's citizens that do not have at home internet access but do have a smartphone. The company has this information for the citizens of 15 similar-sized cities.

What role does AI play in reducing errors and waste in supply chain management?

AI identifies abnormal behaviors causing errors and waste.

Which is the best description of the relationship between "green computing" and management information systems (MIS)?

Advances in MIS technology will help make "green computing" easier and more widespread.

The infection of a digital device by a computer virus happens in stages. What is the second step in this process?

An action such as running or opening a file activates the virus.

In which of the following scenarios would a business use human resource management system software?

An executive wants to know if they should continue to provide two days of paid time off to volunteer at local organizations.

What is conducted in the process modeling step of business process management?

Analysts use flowcharts and other tools to depict workflow.

Which statement best describes the impact of Moore's Law on business management systems?

As computer chips become more powerful, more powerful business management software is written and the overall system's capabilities improve.

How might a professor use an LMS to keep track of attendance in a class that is held face to face?

At the beginning of each class period, students are required to use clickers to take a brief multiple-choice test to indicate they are present.

One of the first computer aided design programs ever developed was also among the first to be integrated into ERP systems. This popular program is

AutoCAD.

Data analysts are likely to have achieved what education level when beginning their career?

Bachelor's degree

Of the following software packages integrated into an enterprise resource planning system, which one is used by engineers in the design process?

CAD software

Alyssa says that no one would risk selling operable or effective malware programs, even on the Dark Web. Why is she wrong?

Criminal hackers do make money by selling actual malware.

The acronym for Data Governance is ________Blank.

DG

Who is primarily responsible for analyzing data to find trends and creating reports?

Data Analyst

What is used to convey meaning from Big Data Analytics to managers who need to make decisions based on this data?

Data Visualization

In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for

Distributed Denial of Service

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.

DoS

Creating efficiencies by ensuring that nearly all aspects of the firm's operations coordinate with each other is why many corporations integrate a SCM system with their

ERP system

What is a key benefit of AI in managerial business environments?

Facilitates the analysis of large data sets for better decision-making

Integrating transaction processing systems (TPS) with ERP allows organizations to streamline services but does not reduce labor costs.

False

A marketing manager requests and receives a report on consumers who use a competing brand of laundry detergent. Included in this report is demographic information such as age, gender, and geographic location; frequency with which the product is purchased; estimated amount of revenue generated by this product per geographic location; and qualities that consumers rank as important to their purchasing decision. These reports represent what function of a marketing information system (MKIS)?

Gathering marketing data

Where is the headquarters of SAP, the recognized leader in the development of HRM software, located?

Germany

ERP software integrates several software packages into a single platform. Which of the following software packages stores employee compensation and performance information?

HRM software

The ________Blank Ladder proposes a series of steps/considerations that breaks down AI strategy into individual pieces or rungs on a ladder to better connect data and Ai systems.

IBM

A company's annual sales conference has been cancelled, but the sales force still needs to receive new product information as soon as possible. An international firm is looking to hire the best candidates worldwide. A consulting firm must conduct remote training. Which of these statements explain what videoconferencing can uniquely provide in these situations?

In addition to "meeting" others through video, documents can be shown, screens shared, and nonverbal messages can be conveyed.

Identify the terms as either a potential positive outcome or drawback of AI.

Increased productivity Potential Positive Outcomes of AI Correct Job losses due to automation Potential Drawbacks of AI Correct Privacy concerns Potential Drawbacks of AI Correct Decreased human risk and injury Potential Positive Outcomes of AI Correct Diminished human-caused errors Potential Positive Outcomes of AI

How does a firewall work?

It determines what Internet traffic can leave or enter a network or computer.

How does a Network Address Translation (NAT) type of firewall work?

It hides internal IP addresses.

What is the benefit of designing data visualizations for the target audience?

It improves communication and understanding.

Which of the following best explains why is data governance important in AI implementation?

It is crucial for maintaining data quality, consistency, and ethical standards

Which of the following is not considered an entity in a university database?

Lecture times

How are managers' jobs expected to change as management information system (MIS) technology and tools improve?

Managers will be freed from tasks performed by online services or staff using collaboration tools.

Which company was formed after Elon Musk's X.com and Peter Thiel's Confinity Inc. merged, when the software that allowed Palm Pilot users to transfer funds to each other had evolved to allow payment transfers over the Internet?

PayPal

What is a primary function of Generative AI in cyber defense?

Predicting and preventing cybersecurity threats

The principle that asks the decision maker to imagine the answer a highly moral person would have for the same question is the

Principle of Virtue.

What is the goal of the modeling step of business process management?

Provide recommendations on handling labor and supply imbalances.

Why is continuous monitoring important in AI model management?

Provides ongoing improvements based on performance assessments.

What is the dominant U.S. financial services software for small business?

Quickbooks

An electrical company has decided to open a new location in California. While it will be relocating a small percentage of executives to this new location, most employees will need to be hired from the local area. The company uses its human resource information system to sort resumes based on key words used to describe skills, college attended, and number of years' experience. Any resumes that do not fit within these parameters are not scheduled for in-person interviews. What function is this HR management system helping the company perform?

Recruiting

________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.

Remote desktop

Arguably the most powerful business intelligence (DSS) software available is Business Objects, offered by Germany-based

SAP.

Keeping in mind that all SCM systems have three basic components, how do individual systems vary?

SCM systems vary according to the product or products provided.

Cloud-based ERP solutions are usually offered as

SaaS

One of the largest suppliers of customer relationship management software solutions is

Salesforce.

Which of the following statements best explains why sleep is a factor in work-life balance?

Sleep is important to memory and brain health.

Cloud-based ERP systems are a form of

Software as a Service (SaaS).

The first two steps in business process management (BPM) are examining the design of the process and modeling the process. What are the third and fourth steps of the process?

Step 3: running the process; Step 4: monitoring the process

Which business software company develops software known to integrate well with existing apps, competes in the same environment as PayPal, and had both Elon Musk and Peter Thiel as early investors?

Stripe

Which software company has expanded its credit card payment processing products to also sell point-of-sale (POS) stations?

Stripe

What is a benefit a student gains by using an LMS?

Student performance is more easily tracked through the gradebook, giving a student a constantly updated view of what their grade will be.

Which system is able to create purchase orders, manage inventory, and forecast future inventory needs?

Supply chain management system

What is the only way to guarantee that computers and networks are safe from cyberattacks?

Take them offline

How can picturing a long series of "if-then" statements best explain how the model of a decision support system works?

The DSS model adapts its processes based on the success of every prior decision.

Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?

The USA PATRIOT Act/USA Freedom Act

What function of a micro-networked POS systems is responsible for increased accuracy of employees when ringing up customer purchases?

The total button which automatically added up the amount owed for items purchased

Which statement best describes the current landscape or state of human resource management software and/or service providers?

There are a variety of HRM companies that serve different business needs.

What is a characteristic shared by all devices that can be infected by a computer virus?

They are connected to the Internet.

How do breach and attack simulation technologies help white-hat hackers test security?

They execute thousands of attack techniques continuously to reveal weaknesses.

In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?

This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.

What was the primary function of the Turing Test as described by Alan Turing in 1950?

To determine whether a machine can engage in conversation indistinguishably from a human.

Accounting system software is designed to perform the necessary financial calculations and ledger journaling for tracking accounts receivable and payable, handling billing and payroll, processing payments, managing expenses and purchase orders, and monitoring and reporting on all of these areas.

True

What SQL syntax is used to filter records based on specific conditions?

WHERE clause

Troy has a customized business management system that he likes. However, it cannot easily scale up to meet his growing database storage needs, offers poor protection from hackers, and requires maintaining a large IT department. Troy should replace this system with

a custom, cloud-based solution (PaaS or IaaS).

In terms of the Internet, a cookie is

a small text file stored on a user's hard disk.

One of the ________Blank of data warehouses is their ability to provide access and analysis of information from a variety of subject areas.

advantages

Managers have the greatest degree of control over a new business management system that is implemented as

an on-premises solution.

Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data

analyst.

Data mining is a means of ________Blank data that can help organizations find patterns and relationships within data sets.

analyzing

Organizations that use an on-premises business management system

are also responsible for maintaining, updating, and securing the system.

The model of a decision support system (DSS), or business intelligence (BI) system, typically adapts its processes based on the degree of accuracy of each prior decision. This type of processing can be called

artificial intelligence (AI).

A marketing manager wants to determine which marketing campaign for a specific product was the most successful as determined by the amount of revenue generated. She uses the company's MKIS to determine how much revenue was generated for each of the three major campaigns run that year to determine revenue generated as compared to the cost of the campaign. This is an example of using an MKIS to

assist with cost-benefit analysis.

Which type of chart is commonly used to create pictographs?

bar or line chart

A common, basic condition for most flextime policies is the requirement that employees must

be able to fulfill their work responsibilities, including attending certain meetings or events in-person.

When should an organization answer the question "Is this the highest priority security risk?"

before data security strategies are created

The variance that exists in the output provided by AI algorithms is referred to as AI

bias.

Who are the users of an executive support systems (ESS)?

business leaders in charge of several functions or separate enterprises

Data analysts must blend facts and data with knowledge about the

business or organization.

How did the first cash registers "register" a transaction?

by adding its value to the total amount of payments already received

How are AI language models trained to understand language patterns?

by training on large volumes of text data

Accepting payment to complete a transaction is called "ringing up a sale" because whenever the till was opened on a(n) ________, a bell would be struck.

cash register

A key component, and major advantage, of an ERP is its

centralized database.

We use a ________Blank field between the two database tables to create a relationship link.

common

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies.

The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally

creating your visuals.

Which business computer application system is focused on helping managers to maintain the business's focus on the individual customer by developing a lasting relationship that promote long-term buying?

customer relationship management (CRM) system

The business management system that collects customers' email, telephone, and social media data and adds information about their buying habits is a(n)

customer relationship management system.

HubSpot, Zoho, and Freshsales focus on

customer relationship management.

A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.

cybercrime

A search engine continually adjusts its algorithms as more data enter its servers. This is an example of the use of

data analytics.

Knowledge Discovery in Data (KDD) is also known as ________Blank.

data mining

Data administration tasks include the development of information policies, data planning, ________Blank, security, and how internal-users and end-users use that data.

database design

What software systems are commonly used across the logistics industry, from railway scheduling to managing port visits for ships to operating locks on waterways?

decision support systems

Which advance in MIS technology or tools could pose the greatest threat to a manager's job security?

decision-making software or apps

Using multiple lists and data sources can lead to a(n) ________Blank in data integrity.

decrease

A type of artificial intelligence that uses data and algorithms to create learning is called ________Blank learning. The algorithms that are developed are designed to execute specific tasks.

deep

Trying to answer questions such as "what happened?" or "what is occurring?" or "what was the ROI?" is the role of

descriptive analytics.

Which type of ERP module collects data such as customer information, order history, shipping information, and customer satisfactions measures?

e-commerce operations

Payscale.com, Payfactors.com, and Salary.com are sites that offer

employee compensation management solutions.

Because accurate tracking of employee performance will always be critical to good management, most firms invest in a software that manages

employee evaluation.

A manager is using the organization's ERP software to generate a report that links its human resources data to its overall financial performance. What is one type of HR data that the ERP accounting module could factor into this report?

employees' payroll and benefits

What role does deep learning play in AI chatbots?

enables more accurate chatbot responses

Living a virtuous life involves acting with high morals that are logically defined or shaped by

ethics.

Decision support system (business intelligence systems) applications, that expressly meet the needs of executives of larger companies or corporations are referred to as executive support systems (ESS) or

executive information systems (EIS).

ERP software allows managers to easily view computer-assisted design (CAD) files and manually decode them to feed specifications into the manufacturing process.

false

Human resource management includes subjectivity and therefore cannot be meaningfully included in enterprise resource management (ERP) systems.

false

Project scheduling and financial transaction analysis are two functions provided by project management (PM) software.

false

What must be integrated into an organization's enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location?

financial management systems software

How many dimensions or categories can the ethical concerns of the digital age be divided into?

five

When conducting a five-step ethical analysis, the first step in the process is

getting the facts.

Management information systems (MIS) for communication directly support organizational decision making by

helping managers communicate, obtain, discuss, and understand the information necessary for strategic decisions.

While ERP systems offer many competitive advantages to users, particularly those in upper management, a significant disadvantage is their

high costs

According to John McCarthy from Stanford University, artificial intelligence (AI) is "the science and engineering of making intelligent machines and intelligent computer programs. It is related to the similar task of using computers to understand ________Blank intelligence, but AI does not have to confine itself to biologically observable methods."

human

What does the Wiretap Act aim to protect against?

identity theft and unlawful access to stored communications

What is the overarching goal of organizations choosing to adopt an enterprise resource planning (ERP) system?

increase operational efficiency

The ultimate purpose of a customer relationship management system (CRM) is to

increase sales, market share, and profit.

To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

information privacy rights

Database forms structure data input to ensure data ________Blank.

integrity

Recruiting and hiring management software can help HR managers evaluate how their organization's future staffing needs are influenced by

internal factors such as employee turnover and external factors such as public demand for the organization's products.

Computing is considered "green" or environmentally responsible when

it reduces the consumption of natural resources and the associated environmental impact.

Users often find it difficult to implement or even comprehend a new ERP system without significant training because of ERPs' steep

learning curves.

What is another term used to describe line charts?

line plots

What is the fourth step in a five-step ethical analysis?

listing options

When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?

listing options

A form of spyware that records all actions typed on a keyboard is called a keystroke

logger.

How does the operational duration of an AI chatbot affect its responses?

longer operation enhances response accuracy

Along with employees themselves, those most responsible for ethical employee behavior are

managers.

What do smaller merchants use to process credit card payments and avoid issues with fund reversals (such as when credit card purchases are returned) or disputes over credit card charges?

merchant service aggregators

What is cherry-picking data in the context of data visualization?

omitting data that contradicts a desired conclusion

Which major category of executive information system application would focus on the process a software company used to launch a new application?

operations management

Traditional file systems use ________Blank, files, and documents.

paper

What is a common concern that arises from the use of AI chatbots?

plagiarism resulting from the use of AI chatbots

Data administrators are responsible for the ________Blank and procedures used to handle the information of an organization. Large companies use/implement the data management policies and procedures most often.

policies

Which of the following is a potential risk associated with the large volumes of data AI chatbots are trained on?

possible generation of inaccurate or misleading responses provided by the AI chatbot

To set a primary key field in a database table, you must click the ________ key button.

primary

How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet

privacy.

The second step of business process management (BPM) involves the use of flowcharts and other tools to examine decision points and inputs. This step is called

process modeling.

What is the primary function of artificial intelligence (AI) language models?

processing and generating human languages

What aspect of today's business environment is central to the need for robust transaction management processing systems?

proliferation of e-commerce-based organizations

Parameter queries ________Blank the user for values to execute/run a query.

prompt

What is the ethical consideration related to how chatbots handle abusive language and controversial content?

properly training chatbots to respond appropriately

Remote desktop software

provides access to all networked devices from a separate computer.

SQL, usually pronounced "sequel," is quite useful when working with large data sets. The Q in SQL stands for

query.

In the initiation phase of project management, the client and project manager determine if the project is SMART. What does the R in SMART refer to?

realistic

Collections of related fields in a database are referred to as

records.

What do scatter plots primarily visualize?

relationships between numerical data pairs

Mainframes were originally developed for their

reliability of handling transactions.

A database record is also referred to as a ________Blank in the table.

row

A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as ______Blank AI.

scalable

Smaller businesses are able to get the benefits of an enterprise resource (ERP) system through

scalable cloud-based ERP systems.

Database policies should be created and implemented by all organizations, regardless of the ________Blank of the organization.

size

Sharing infected files and opening an infected email attachment are ways digital device users

spread computer viruses.

data quality audit uses ________Blank analysis to test data, variabilities, and outcomes against test data.

statistical

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the five steps of the data project life cycle. The final stage in this life cycle is

storage.

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______Blank query language.

structured

Data governance involves the staff, procedures, and technologies needed to ________Blank and protect the data and data properties of an entity.

supervise

A logistician for an oil company receives an alert from the software she uses that a supertanker has been delayed. In addition, she receives a choice of reasonable actions to take. What software is she likely using?

supply chain management software

In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's

syntax

A common SQL term used in queries is FROM. FROM allows the user to choose the _____Blank of the database in which the query is located.

table

When creating a relationship in a relational database management system (DBMS), which object is used?

table

Where are session cookies stored?

temporary memory

The Act that specifically requires all pornographic sites to include some sort of age verification is

the Children's Internet Protection Act of 2000 (CIPA).

Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?

the Digital Millennium Copyright Act (DMCA)

Which 1986 law makes it illegal to intercept calls or messages without a warrant?

the Electronic Communications Privacy Act

The role of managing employee grievances, absences, sick days, and paid-time-off days belongs to

the HR manager.

What are Big Data Analytics?

the technology and processes used to gain intelligent, usable information from applicable databases across the internet

What distinguishes the two main types of cybercrimes?

their frequency (how often they are committed)

When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______Blank data.

third-party

You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called?

third-party data purchase

Every time you view a webpage, your data is captured in small pieces called packets. How are data packets transmitted across the Internet?

through Transmission Control Protocol/Internet Protocol (TCP/IP)

How do AI chatbots improve response accuracy over time?

through natural language understanding

Why is proper citation essential when using information from AI chatbots?

to prevent unintentional plagiarism

What is the primary, underlying goal or purpose of state-sponsored cyberwarfare?

to protect or pursue national security interests

A program that appears to be legitimate but executes an unwanted activity when activated is called a

trojan.

Enterprise resource planning systems allow managers to view reports that integrate data from various operational areas within the organization, thus facilitating informed business decisions.

true

In order to make understanding and interpretation of SQL queries easier, users have the ability to add comments. The symbol(s) that will tell SQL that an entry is a comment and should not be used in the query is(are)

two dashes: "- -."

What is a pictograph used for in data representation?

using pictures to represent data

Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system's security measures?

white-hat hackers


Conjuntos de estudio relacionados

PSYU3339 - Aggression and Bullying

View Set

Chapter 5 Earthquakes Throughout the United States and Canada

View Set

Unit 5 - History (Yellow Journalism, Spanish American War, WW1)

View Set

TAMU - Management 309 - Wesson - Test #3

View Set