MIS Test 2 (CH6-9)
3. According to Panorama Consulting Solutions, the average cost of an ERP project is approximately ________.
2.8 million dollars
A(n) ________ signal is a discrete, binary waveform. A. digital B. tenuous C. business process D. analog E. ERD
A
An emerging non-relational database management system is called ________. A. NoSQL B. XBRL C. Oracle D. an information-base E. a relational database
A
Another term for a key field is a ________. A. primary key B. foreign key C. data key D. surrogate key E. null key
A
IS security firewalls are an example of a ________. A. gatekeeper B. backup plan C. network topology D. human safeguard E. virus
A
If someone loads a program that tracks everything you type, the specific spyware is a ________. A. key logger B. denial-of-service attack C. SQL injection attack D. data mining error E. digital footprint
A
If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are ________. A. phishing B. fishing C. trolling D. perching E. smacking
A
In 2002, the ________ Act was passed to help protect investors with new financial statements reforms. A. Sarbanes-Oxley B. HIPO C. ERD D. HIPAA E. FERPA
A
MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted. A. disaster recovery planning B. processing C. business intelligence D. output E. data mining
A
Microsoft's DBMS that includes built-in report generation and reporting is called ________. A. Access B. SQL Server C. MySQL D. Spreadsheets E. DB2
A
Microsoft's most powerful DBMS is ________. A. SQL Server B. MySQL C. DB2 D. Oracle E. Excel
A
Using your handprint to access a safe deposit box is an example of ________ authentication. A. biometric B. cloud computing C. password D. spreadsheet E. network
A
________ are data files used to identify and protect online transactions using a trusted third party. A. Digital certificates B. SSL C. Digital confirmations D. Analog confirmations E. Analog certificates
A
________ is a method for encrypting network traffic on the Web. A. SSL B. XML C. ITLS D. Http E. XBRL
A
________ is the most popular NoSQL DBMS. A. Hadoop B. MySQL C. SQL Server D. Paradox E. ID2
A
________ is used to ensure the person is who he/she claims to be. A. Authentication B. A production worker C. Knowledge management D. An encryption E. Data mining
A
802.11 is also known as ________. A. hardware B. Wi-Fi C. XML D. XBRL E. www
B
A router is a communications processer used to route ________ through different networks. A. databases B. packets of data C. data drivers D. data blasts E. data cycles
B
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data. A. database B. information policy C. database approach D. data model E. data requirements
B
A(n) ________ outlines acceptable uses of information systems assets. A. hardware policy B. acceptable use policy C. phishing plan D. entity-relationship diagram E. data policy
B
A(n) ________ uses the Internet to create a secure network connection. A. management systems private network (MSPN) B. virtual private network (VPN) C. information systems private network (ISPN) D. technology private network (TPN) E. systems private network (SPN)
B
Amazon is one of the first to provide cloud computing relational databases. This effort is called ________. A. CloudDB B. Amazon Relational Database Service C. ConnectDB D. Amazon Cloud E. Amazon DBMS
B
An Internet Protocol (IP) address ________. A. is a 16-bit number assigned only to servers on the Internet B. is a 32-bit number assigned to every computer on the Internet C. contains the mailing zip code of the network D. is a 32-bit number assigned only to servers on the Internet E. is a 16-bit number assigned to every computer on the Internet
B
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A. A. byte B. field C. bit D. file E. record
B
A ________ provides the link from one table to another table's primary key. A. surrogate key B. foreign key C. primary key D. data key E. referential key
B
The domain extension .mil represents ________. A. manufacturing sites B. the U.S. Military C. commercial sites D. educational institutions E. business firms
B
The field that uniquely identifies a row in a relational database table is called a ________. A. foreign key B. primary key C. column D. data definition language E. null value
B
The number of cycles per second that can be sent through a network medium is calculated in ________. A. data per second B. hertz C. seconds D. minutes E. bytes per second
B
The ________ is the world's most extensive, public communication system. A. Google search engine B. Internet C. Intranet D. LAN E. Datanet
B
The world's largest network is the ________. A. intranet B. Internet C. enterprise system D. digital firm E. brick-and-mortar
B
_________ is a widely used open source DBMS. A. Word Star B. MySQL C. SQL Server D. Excel E. DB2
B
1.________ in enterprise applications provides features for managers to obtain meaningful information from massive amounts of data.
Business intelligence
Although "Big Data" doesn't refer to a specific amount of data, it usually does involve ________. A. bits B. bytes C. petabytes D. gigabytes E. megabytes
C
An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats. A. intelligence B. accounting C. audit D. operations E. data mining
C
An intrusion detection system (IDS) ________. A. creates phishing problems B. is a hardware component related to computer monitors C. helps protect a system using full-time monitoring tools D. causes damage to a system E. is a social media application
C
Another name for a database field is a(n) ________. A. database B. tuple C. attribute D. row E. record
C
A ________ is a program that monitors information traveling over a network and ________. A. sniffer; is never legitimately used B. sniffer; is always legitimately used C. sniffer; can be used for criminal purposes D. dribble file; can be used for criminal purposes E. network; is always legitimately used
C
A ________ is the smallest component in the computer system data hierarchy. A. byte B. field C. bit D. record E. file
C
Coaxial cable is a(n) ________ for linking network components. A. processing device B. database system C. connection medium D. output device E. input device
C
The Domain Name System (DNS) converts ________ to ________. A. IP addresses; domain names B. data; zip codes C. domain names; IP addresses D. IP addresses; zip codes E. zip codes; IP addresses
C
The SQL ________ statement allows you to combine two different tables. A. SELECT B. GROUP BY C. JOIN D. COMBINE E. ORDER BY
C
________ are used to track movements of products through the supply chain. A. Digital footprints B. System trackers C. RFIDs D. Digital trackers E. Digital firms
C
________ includes computer viruses, worms, and Trojan horses. A. Wi-fi B. Security C. Malware D. Firewall E. Click fraud
C
A network that spans between Montana and Washington is a(n) ________. A. unorganized network B. binding network C. local area network D. wide area network E. nationwide network
D
A small business that connects personal devices within a 500-meter radius is a(n) ________. A. wide area network B. unorganized network C. worldwide network D. local area network E. binding network
D
According to McAfee, ________ now pose the greatest security risks. A. software as a service B. social media C. email D. mobile devices E. databases
D
A ________ is a component in the computer system data hierarchy consists of multiple records of the same type. A. bit B. field C. byte D. file E. record
D
A ________ is a component in the computer system data hierarchy that represents an ASCII character. A. bit B. field C. record D. byte E. file
D
A ________ is a software program that mimics another program and often causes damage. A. quarter horse B. wild horse C. database D. Trojan horse E. mustang
D
Bluetooth is another name for the ________ wireless networking standard. A. coaxial B. 802.11 C. database of D. 802.15 E. Wi-Fi
D
Digital information transfer speeds are measured in ________. A. bytes per second B. bytes per minute C. bits per minute D. bits per second E. data per second
D
If a computer is sending a file, and a packet being sent is damaged, the ________ computer asks the ________ computer to retransmit it. A. sending; receiving B. network cable; receiving C. receiving; end-user D. receiving; sending E. receiving; network cable
D
SQL injection attacks are related to ________. A. spreadsheets B. bit firms C. output devices D. databases E. word processing
D
Slicing digital messages into parcels is called ________. A. packet drops B. bit firms C. network binders D. packet switching E. digital footprints
D
TCP/IP was original developed in the 1970s to support ________. A. Web developers B. e-commerce organizations C. database managers D. the Department of Defense E. the U.S. Treasury
D
The most commonly used authentication technique used for end users is a(n) ________. A. hand scan B. voice recognition C. email address D. password E. chip
D
________ deal(s) with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by managers and employees. A. Management information systems (MIS) B. Information C. Data D. Information systems (IS) E. Information technology (IT)
D
________ was passed in 1996 to protect medical records. A. ERD B. FERPA C. HIPO D. HIPAA E. Sarbanes-Oxley
D
A(n) ________ is the most popular method to model a database. A. EM model B. normalization C. model relationship (MR) D. enterprise model E. entity-relationship (ER) model
E
Another term for a database row is a(n) ________. A. database B. spreadsheet C. field D. attribute E. record
E
A ________ links two or more computers which enable the sharing of information. A. hardware B. cloud computing C. spreadsheets D. social media E. network
E
Data cleansing, working to identify and fix incorrect data, is also called ________. A. ER diagramming B. data chop C. normalization D. data vacuum E. data scrubbing
E
EarthLink and NetZero are examples of ________. A. databases B. data mining companies C. processing devices D. social media E. Internet service providers
E
On a client/server system, most of the powerful processing is handled by the ________. A. input devices B. software C. client D. data connection E. server
E
Public key encryption uses ________ key(s). A. four B. one C. three D. zero E. two
E
Regarding IS security, DoS represents ________. A. date of security B. directives of security C. Department of Security D. denial of security E. denial of service
E
SQL stands for ________. A. Special Question Language B. Structured Question Language C. Streamlined Question Language D. Structured Questioning Language E. Structured Query Language
E
Software that allows an organization to manage and provide access to data is a ________. A. system network B. systems process C. word processor D. spreadsheet E. database management system (DBMS)
E
Someone who intends to gain unauthorized access to a computer system is considered to be a ________. A. compromiser B. malware specialist C. virus D. Trojan horse E. hacker
E
The formal process to remove data problems such as repeating groups is called ________. A. ER Diagramming B. DBMS C. primary key D. data network E. normalization
E
22. ________ help businesses become more flexible and productive by integrating groups of processes so they focus on efficient management of resources and customer service such as sales, marketing, and accounting.
Enterprise resource planning (ERP) systems
Record
a group of related fields
Byte
a single character
12. Analytical CRM includes applications that ________.
analyze customer data for improving business performance
15. Enterprise applications have drawbacks mainly because they ________.
are very expensive to purchase and implement
20. When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________.
bullwhip effect
23. Customer relationship management primarily includes ________.
capturing and integrating customer data
13. Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called ________.
customer lifetime value
11. SAP is the best-selling ________.
enterprise software
16. In an enterprise system, the integrated software modules that focus on customer credit are related to ________.
finance and accounting
25. If a supply chain includes organizations from the United States and China, it is considered a(n) ________.
global supply chain
Field
group of bytes that form a thing (name, place, etc)
File
group of records
10. In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to ________.
human resources
Database Normalization
making small data structures from complex groups
14. In an enterprise system, the integrated software modules that focus on production capacity are related to ________.
manufacturing and production
21. Customer relationship management applications that track campaign data are related to the ________ aspect of customer relationships.
marketing
24. More advanced CRM applications include ________ and ________.
partner relationship management (PRM); employee relationship management (ERM)
Data Redundancy
presence of multiple instances of the same data
5. Customer relationship management applications that track Web sales and retail store sales are related to the ________ aspect of customer relationships.
sales
4. In an enterprise system, the integrated software modules that focus on return requests are related to ________.
sales and marketing
9. Customer relationship management applications that track social networking data are related to the ________ aspect of customer relationships.
service
Bit
smallest unit of measure
18. Incorporating applications that allow customers to chat with one another about company products is an example of ________.
social CRM
17. A ________ is a network of organizations for obtaining raw materials.
supply chain
7. The ________ portion of the supply chain includes organizations that supply materials.
upstream
8. An example of ________ includes someone taking out a loan and then being sold a checking account as well.
cross-selling
19. A supply chain management system using a(n) ________ model bases production schedules on actual customer orders.
pull-based
2. If a company produces a custom-made automobile only after a customer has placed an order, it is an example of a ________ production model.
pull-based
6. A supply chain management system using a(n) ________ model bases production schedules on forecasts.
push-based