MISY Ch. 5, 9, 14

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a primary benefit of implementing an ERP system?

(all answers that follow are correct) Elimination of costly, inefficient legacy systems. Easing adoption of improved work processes. Improving access to quality data for operational decision making

Many multinational companies roll out standard IS applications for all to use. However, standard applications often don't account for all the differences among business partners and employees operating in other parts of the world. Which of the following is a frequent modification that is needed for standard software?

(all answers that follow are correct) Software might need to be designed with local language interfaces to ensure the successful implementation of a new IS. Customization might be needed to handle date fields correctly. Users might also have to implement manual processes and overrides to enable systems to function correctly.

Just over ____________ crime reports were made to the Internet Crime Computer Center in 2010.

300,000

A byte is typically __ bits.

8

Which of the following is not one of the basic components of a TPS?

Analytical models

Because firms must ensure the reliable operation of their TPSs, they must also engage in disaster recovery planning and TPS ________

Audits

With ______________ processing systems, business transactions are accumulated over a period of time and prepared for processing as a single unit.

Batch

With ____________ systems, business transactions are accumulated over a period of time and prepared for processing as a single unit or batch.

Batch Processing

Employees' demand for videos and music to be delivered to company personal computers can exceed a firm's Internet capacity and create a major ____________.

Bottleneck

The process of gathering information in a timely manner and in a usable form so that it positively affects business strategy, tactics, and operations is called ____.

Business Intelligence

____________ is the process of gathering enough of the right information in a timely manner and usable form and analyzing it to have a positive impact on business strategy, tactics, or operations.

Business Intelligence (BI)

A ________ is a radical redesign of organizational structure, IS, and values of an organization to achieve a breakthrough in business results.

Business Process Re-engineering

A(n) ___ interprets and carries out basic instructions that operate a computer

CPU

A _______ is a type of high speed memory that a processor can access more rapidly than mass memory

Cache

The _______ is that part of the computer that consists of three associated elements the arithmetic/logic unit, the control unit, and the register areas.

Central Processing Unit

Third Step of SAP

Change Customer

The _________ is typically in charge of the IS dept. in an organization.

Chief Information Officer

A(n) _______ involves using a giant cluster of computers that service as a host to run applications that requite high-performance computing.

Cloud Computing

___________ is one aspect of business intelligence and is limited to information about competitors and the ways that knowledge affects strategy, tactics, and operations.

Competitive Intelligence

___________ is the inappropriate use of computer technology and resources.

Computer Waste

A(n) ____ directs and coordinates operations in a computer.

Control Unit

Second Step to SAP

Create Contact Person for Customer

Fourth Step of SAP

Create Customer Inquiry

Fifth Step of SAP

Create Customer Quotation

First step to SAP

Create New Customer

Sixth Step of SAP

Create Sales Order Referencing a Quotation

_________________ is any premeditated, politically motivated attack against information, computer systems. computer programs , and data which results in violence against noncombatant targets by subnational groups or clandestine agents.

Cyberterrorism

Capturing and gathering all the data necessary to complete the processing of transaction is called _________________.

Data Collection

_____________ involves reentering data that was not typed or scanned properly.

Data Correction

_________ is the process of checking data for validity and completeness.

Data Editing.

A _____________ is a subset of a data warehouse.

Data Mart

An information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse is called ____

Data Mining

A ____________ is a database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.

Data Warehouse

A(n) ____ holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.

Data Warehouse

The ____ approach provides a pool of related data shared by multiple information systems.

Database

A group of programs that manipulate the database and provide an interface between the database and the user of the database and other application programs.

Database Management System (DBMS)

The gap between the groups having access to, or knowledge of information and communication technology is known as

Digital Divide

_________________ refers to going through trash cans to find secret of confidential information.

Dumpster diving

A ___________ is the measure of the extent to which a system attains its goals.

Effectiveness

Which of the following is not an object of an organization's transaction processing system?

Ensure that data is processed immediately upon occurrence of a business transaction

A(n) ____ system is central to a system and ensures that information can be shared across all business functions and all levels of management to support running and managing of a business.

Enterprise

An ________ is a generalized class of people, places, or things for which data is collected, stores, and maintained.

Entity

Deleting files and emptying the Recycle Bin ensures that others cannot view the personal data on your recycled computer. True or False?

False

Online processing methods are most appropriate and cost effective for all forms of transaction processing systems. True or False?

False

Unfortunately, there are few choices for software packages that provide integrated transaction processing system solutions for small and medium sized enterprises. True or False?

False

A _________is a simple database program whose records have no relationship to one another.

Flat File

The ______ utilities can check the status of all parts of the PC, including hard disks, memory, and other peripheral devices.

Hardware

A(n) ____________ is a set of interrelated components that collect, manipulate and disseminate data and information and provide feedback mechanism to meet an object.

Information System

____ involves combining two or database tables.

Joining

A field or set of fields in a record that is used to identify the record.

Key

A ______ is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization's experience and knowledge.

Knowledge Management System

The result of processing business transactions is that the organization's records are updated to reflect the status of the operation at the time of the ________.

Last processed transaction

The ______ Online Web-based service system is used by law enforcement to recover stolen property.

Leads

The software that allows different systems to communicate and exchange data is ______.

Middleware

___________ allows users to explore data from a number of perspectives.

Online Analytical Processing (OLAP)

With ____________ systems. each transaction is processed immediately.

Online Transaction Processing

A(n) ________ is a formal collection of people and other resources established to accomplish a set of goals.

Organization

A _________ refers to simultaneous execution of the same task on multiple processors to obtain results faster.

Parallel Computing

________________ is a small program hidden in a network or computer system that records identification numbers and passwords.

Password Sniffer

_______________ refers to the use of any of several technologies to enforce policies for controlling access to digital media.

Patent

Access is a popular DBMS for ____.

Personal Computers

Which represents a large amount of data?

Petabyte

____ allows users to predict the future based on database information from the past and present.

Predictive Analysis

A(n) ____ is a field or set of fields that uniquely identifies a database record.

Primary Key

In a value chain analysis _______ refers to business processes that make, deliver, market/sell, and service the organizations' products and services.

Primary business activities

_________________ software provides a means for managing all the data associated with the product development, engineering design, production, support , and disposal of manufactured products.

Product life cycle management

Which organizational structure is centered on the major product or services?

Project

_______ provides permanent storage for data and instructions do not change; such as programs and data from the computer manufacturer.

ROM

A collection of related data fields is a __________.

Record

_________ are high-speed storage areas used to temporarily hold small units of program instructions and data immediately before during, and after execution by the CPU.

Register

What data base model places data in two-dimensional tables?

Relational

Preventing waste and mistakes involves establishing, implementing, and ____________ policies and procedures.

Reviewing

The ability of the computer to handle an increasing number of concurrent users smoothly is known as ___________

Scalability

Because the DBMS is responsible for providing access to a database, one of the firs steps in installing and using a database involves telling the DBMS the logical and physical structure of the data and relationships among the data in the database. This description of an entire database is called a(n) ______

Schema

______________ is a derogatory term for inexperienced hackers who download programs called scripts that automate the job of breaking into computers.

Script Bunny

The term ________ is used to describe devices that store larger amounts of data, instructions, and information more permanently than allowed with main memory.

Secondary Storage

______ involves the manipulation of data to eliminate rows according to certain criteria.

Selecting

The ________________ is a fundamental concept of good internal controls that ensures that the responsibility for the key steps in a process is spread among more than one person.

Separation of Duties

Talking a critical computer password out of an individual is an example of ___________.

Social Engineering

The term _________ refers to data that is captured and edited where it is initially created and in a form that can be directly entered into a computer, thus ensuring accuracy and timeliness.

Source Data Automation

In the value chain of an organization, human resource management is an example of

Support

A ___________ is a set of elements or components that interact to accomplish a goal

System

In a systems development process _________ defines the problems and opportunities of the existing system.

System Analysis

In a systems development process the goal of ________________ is to gain a clear understanding of the problem to be solved or opportunity to be addressed.

Systems Investigations

Business data goes through a ____________________ that includes data collection, data editing, data correction, data manipulation, data storage, and documentation production.

Transaction Processing Cycle

A ______ is an organized collection of people, procedures, software, databases, and devices used to record completed business transactions

Transaction Processing System

A ___________ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.

Trojan Horse

A record is made up of multiple fields. True or False?

True

A trend in database management, known as Database as a Service, places the responsibility of storing and managing a database on a service provider. True or False?

True

Child identity theft is a rapidly growing area of computer crime. True or False?

True

Heavy computer use can negatively affect ones physical health. True or False?

True

The Association of Computing Machinery has a code of ethics and professional conduct that includes eight general moral imperatives that can be used to help guide the actions of IS professionals. True or False?

True

The CompStat program uses Geographic Information System software to map crime and identify problem precincts. True or False?

True

The hosted software model for enterprise software helps customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start up costs. True or False?

True

The use of nonintegrated information systems that make it difficult for decision makers to collaborate and share information is an example of computer waste. True or False?

True

The term _________ is used to describe a series of activities that includes inbound logistics warehouse and storage, production, finished product storage, outbound logistics, marketing and sales, and customer service.

Value Chain

A(n) ____ database acts independently of the physical servers, disk drives, and other database components that can be located around the world.

Virtual

The individual application modules of an ERP system are designed to support __________, the most efficient ways to complete a business process.

best practices

A(n) ____ is a skilled and trained IS professional who directs all activities related to an organization's database.

database administrator (DBA)

According to the Internet Crime Computer Center, the two most common online crimes reported include the nondelivery of payments or merchandise amounting to millions of dollars and ______________.

scams involving people posing as FBI agents


Conjuntos de estudio relacionados

Anaya has heart disease. What kind of diet does her doctor recommend?

View Set

Old Testament History--Summer: 1 Samuel 1-17 (Flashcard Style)

View Set

Peds - Ch. 44: Mobility/Neuromuscular or Musculoskeletal Disorder

View Set

Old Testament final exam JCJC Bishop

View Set

Foundations Chapter 39: Fluid and Electrolyte Balance

View Set

Chapter 8: Central America and the Caribbean

View Set