MIS hw exam 3
Which of the following is classified as cloud computing? Dropbox Google Docs Office 365 All of the choices are correct
All of the choices are correct
_________ refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions.
Business intelligence
It is very difficult to manage data for which of the following reasons?
Data are scattered throughout organizations
Which capability of digital dashboards enables users to go into greater detail?
Drill down
The MOST popular BI tool is
Excel.
A database must be associated with only one computer program or information system. True False
False
A relational database typically consists of one large two-dimensional table. True False
False
BI refers to only those technologies that obtain data from warehouses. True False
False
BI software is not yet available to "frontline personnel" (such as call center operators) within an organization. True False
False
Social data is NOT a form of big data. True False
False
The _____ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the goals of the organization.
IT strategic plan
What is meant by velocity of Big Data?
It is the rate at which data flows into an organization.
Which of the following statements concerning the agile method is NOT TRUE? It focuses on rapid development. It requires only infrequent user contact. It focuses on end goals rather than immediate needs. It understands that all problems cannot be fully understood from the start.
It requires only infrequent user contact.
In _________, applications can run on as many servers as necessary and this is transparent to the user.
Software as a Service
Big Data predictions come from applying mathematics to huge quantities of data to infer probabilities. True False
True
The amount of data is increasing exponentially over time. True False
True
_________ is the study of the impact of a change in the assumptions (input data) on the proposed solution.
What-if analysis
Advantages of Rapid Application Development include which of the following? active involvement of users in the development process faster development process system better meets user needs reduction in training costs all of the choices are correct
all of the choices are correct
The feasibility study addresses which of the following issues? economic feasibility technical feasibility behavioral feasibility all of the choices are correct
all of the choices are correct
When customers access a Web site and make purchases, they generate
clickstream data.
The management of data across the entire organization is most accurately defined as
data governance.
Which of the following is NOT a reason that managers need IT support? number of alternatives is increasing decisions must typically be made under time pressure decisions are becoming less complex need to access remote information sources decision makers are often in different locations
decisions are becoming less complex
A(n) _________ provides rapid access to timely information and direct access to management reports.
digital dashboard
The MOST distinguishing characteristic of geographical information systems is
every record or digital object has an identified geographical location.
In ___________ conversion, a firm implements a new information system in one of its plants, assesses the new system's performance, and then implements the new system in its other plants.
pilot
The cloud service in which customers rent servers and operating systems over the Internet is called
platform as a service.
Gretchen is looking for the class and grade information for a specific student. When she searches the school's system, she ends up on a page that displays the student's name, class, grade, parents' names, address, and medical information. The page on which she ends up is an example of a(n)
record.
The type of decision that can be made by following a definite procedure is called a(n) _________ decision.
structured
All of the following are cloud computing security issues EXCEPT sensitive data access. users technical ability. privacy. malicious insiders.
users technical ability.
The type of cloud used to build cloud infrastructure and applications for different businesses is called a ________ cloud.
vertical