BCIS 3610 EXAM 2 (USING MIS 7-12, ACCESS 5-8) All

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Cross selling

"If somone buys X, sell them Y. If someone buys Y, sell them X."

Which is true regarding workgroup info systems?

-10 to 100 users -solve probs within a group -diff to change -support one or more workgroup processes

The Software component of BI System is called____

-BI application

____is defined as information containing patterns, relationships, and trends of various forms of data.

-Business intelligence

Remarkable characteristic of OLAP reports is that they are ____, as they are online and viewer of report can change their format

-Dynamic

Data acquisition is the process of creating BI

-FALSE

Data warehouses do not include data that are purchased from outside sources

-FALSE

It is better to have data with too coarse a granularity, than data with too fine a granularity.

-FALSE

Placing BI apps on operational servers can dramatically increase system performance

-FALSE

TotalSales, avg sales, and avg costs are examples of dimensions used in olap report

-FALSE

RFM analysis considers how recently (R) a customer ordered, how frequently (F) they ordered, and how much margin (M) the comp made on order

-FALSE, m=money

A data mart is a lot larger than data warehouse

-FALSe

Drawback associated with OLAP reports is their inability to let users drill down in data

-FALSe

In market basket term, a conditional prob estimate is called lift

-FALse

A data ____ is data collection, smaller than data warehouse that addresses a particular department or functional area of the business

-MART

The ____ is most popular BI server today.

-Microsoft SQL server report manager

Which of following observations about RFM and OLAP reports is true

-OLAP reports are more dynamic than RFM reports

Components of BI System

-Operational DBs -Social Data -Purchased Data -Employee Knowledge -BI applications -Knowledge workers

____requires user to request BI results

-Pull Publishing

___ analysis is way of analyzing and ranking customers according to purchasing patterns

-RFM

Cloud vendor who provides hosted comps and handles all aspects of application programs is offering following services?

-SAAS

SAMCROW, one customer of US steel corp holds an RFM score of 111. Which of following characteristics relates SAMCROW w/RFM score?

-SAMCROW has ordered recently, frequently, and orders the most expensive goods

An OLAP cube and an OLAP report are same thing

-TRUE

Cluster analysis is used to ID groups of entities that have similar characteristics.

-TRUE

Granularity is a term that refers to level of detail represented by data

-TRUE

In an OLAp report, a measure is the data item of interest

-TRUE

The 5 basic reporting operations that produce BI call all be accomplished using SQL and basic HTML or simple writing tool

-TRUE

____provides secure communication even tho transmitted thru internet

-VPN

Focused differentiation occurs when ____

-a better product is provided within an industry segment

Kevin is business student specializing in exports of equip to other countries. Can't create representative chart depicting relation between processes. Lacks_____ skills

-abstract reasoning...a non cognitive skill

Data___ is process of obtaining, cleaning, organizing, relating, and cataloging source data.

-acquisition

Which of the following is true of unsupervised data mining?

-analysts don't create model or hypothesis before running the analysis

Which of following is ex of a measure in OLAP report?

-avg cost

Which of following is true about KM?

-boosts revenues by getting products and services to market faster

Which of following is a basic operation used by reporting tools to produce info from data?

-calcualating

Which of following is true about data marts?

-data marts address only a particular component or functional area of a business

Which is fundamental category of BI analysis?

-data mining

A ____ takes data fro data manufacturers, cleans and processes the data, and then stores it

-data warehouse

Because of various problems w/operational data, large organizations choose to extract operational data and store them into a____

-data warehouse

Problematic operational data are termed

-dirty data

Which of following is benefit of in house hosting?

-disaster prep/in depth visibility

A sales report that is current as of the time the user accesed it on a web server, is example of a___

-dynamic report

KM benefits orgs bc It___

-enables emps and partners to work smarter

Major benefit of enterprise application integration is____

-enables org to se existing application

In data model a ___is something a user wants to track

-entity

_____attempt to directly capture employee expertise.

-expert systems

Data mart is another term used for a data warehouse

-false

_____is major challenging task when implementing enterprise systems.

-gap identification

____is term that refers to level of detail represented by the data.

-granularity

which of following decisions is least likely to involve collaboration?

-how much of product to order from vendor b...

An automobile comp decides to improve quality of all its products and bring more variety into its product line. Comp decided to adopt____

-industry wide differentiation

Business process crossing into mult companies

-inter enterprise BP

Which of following is example of vertical market software?

-inventory tracking software for auto manufacturer

Which of following is accurately defines a dimension in OLAP report?

-it is a characteristic of a measure

Which of following is true of source data for BI system?

-it refers to data that the org purchases from data vendors

Which of following shows the products that customers tend to buy together?

-market basket analysis

____records the source, format, assumptions and constraints, and other facts about the data

-metadata

The viewer of an OLAP report can change its format. Which term implies this capability?

-online

Which is a nonvolatile memory device?

-optical memory device

Which of following components of 5 component model of IS is considered an actor?

-people and hardware

When you midf or delete data in database, you are ____

-processing database

A ___is set of rules that programs on 2 communicating devices follow.

-protocol

Which of following statements is true about operational dta?

-purchased operational data often contains missing elements

An org implements an IS to optimize its SC. The system helps the org reduce wastages and inventory charges. Provides competitive advantage to org. Helped org achieve competititve advantage thru___

-reduced costs

An olap report has measures and dimensions. Which of following is ex of dimension?

-sales region

Which of following is a support activity in value chain?

-setting up contractual arrangements for procurement

How should sales team respond to customer with RFM of 545?

-should let the customer go, loss will be minimal

With ___, data miners develop a model prior to analysis and apply stat techniques to data to estimate parameters of the model

-supervised data mining

Which of following is an effective technique to overcome emp resistance when implanting new enterprise systems?

-training emp on successful use of new system

A data mart is a data collection that addresses a particular functional area of the business

-true

A reporting app is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence

-true

A value of 999-999-9999 for US ohone number is ex of dirty data for BI purpose

-true

Hadoop is an open source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers

-true

It is possible to capture the customer's clicking behavior using clickstream data.

-true

KM fosters innovation by encouraging the free flow of ideas

-true

Knowledge discovery in databases (KDD) is used as synonym for data mining

-true

OLAP provides the ability to sum, count, avg, and perform other simple arithmetic operations on groups of data

-true

Operational data is structured for fast and reliable transaction processing

-true

Problematic data are termed dirty data

-true

Regression analysis measures effect of a set of variables on another

-true

Report servers are specialized web servers

-true

The 3 primary activities in the BI process are to acquire data, perform analysis, and publish results

-true

the remarkable characteristic of OLAP reports is that they are dynamic

-true

which of following statements is true about reporting apps?

-two inporant reporting apps are RFM analysis and OLAP

3 major disadvantages of Expert Systems

1. Expensive 2. Unpredictable to Maintain 3. Overhyped

Primary bennefits of KM

1. fosters innovation by encouraging free flow of ideas 2. provides customer service by streamlining response time 3.boosts revenue by getting products to market faster 4. enhances employee retention by recognizing and rewarding them 5.streamlines operations & reduces costs by eliminating uneccesary processes

A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________. 311 545 555 113

113

A sales team should attempt to up-sell more expensive products to customers with RFM score of ___

113

The DatePart function has ________ required parameters. 1 2 3 4

2

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________. 511 555 151 155

511

Ajax has not ordered linen in some time,when it did in past ordered frequently, and its orders were of highest money value. Under given circumstances, their RFM score is most likely

511

21) What type of knowledge management system did Procter & Gamble implement in order to increase the efficiency of their research and development organization? A. content management system B. digital asset management system C. learning management system D. knowledge network system

A

30) What is meant by the statement "knowledge is sticky"? A. Knowledge is hard to move. B. Knowledge is universally applicable. C. Knowledge works only in certain situations. D. Knowledge is intangible.

A

33) Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of A. practice. B. professionals. C. interest. D. knowledge.

A

35) Specialized systems built for engineers, scientists, and other knowledge workers charged with discovering and creating new knowledge for a company are called A. KWS. B. LMS. C. wikis. D. CAD systems.

A

38) Which of the following would NOT considered semistructured knowledge? A. request for proposals B. voice-mail C. videos D. e-mail

A

40) Once a knowledge taxonomy is developed, documents are all ________ with the proper classification. A. tagged B. linked C. tupled D. referenced

A

45) Most knowledge workers require specialized knowledge work systems, but they also rely on A. office systems. B. schools and universities. C. imaging systems. D. data transferring systems.

A

48) CAD workstations A. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management.

A

57) Forward chaining is A. a strategy searching for the rule base in an expert system that begins with information entered by the user. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy for searching the rule base in an expert system that begins with a hypothesis.

A

63) In this technique, descriptions of past experiences of human specialists are stored in a database for later retrieval when the user encounters a situation with similar characteristics. A. CBR B. fuzzy logic C. data mining D. LMS

A

65) Hardware and software that attempts to emulate the processing patterns of the biological brain best describes A. a neural network. B. an expert system. C. case-based reasoning. D. fuzzy logic.

A

66) Genetic algorithms A. develop solutions to particular problems using fitness, crossover, and mutation. B. represent knowledge as groups of characteristics. C. do not work for most problems. D. are based on logic.

A

68) Software programs that work in the background without direct human intervention to carry out specific, repetitive, and predictable tasks for individual users, business processes, or software applications, are called A. intelligent agents. B. intelligent techniques. C. business intelligence. D. AI hybrid systems.

A

In a business process, a role refers to ________.

A collection of activities

Before exporting a table to another database, what must be done first?

A database must be created.

What happens when you double-click an attachment field in a table?

A dialog box opens with options

What happens when you double-click an attachment field in a table? The attachment is saved to a file. The attachment is removed. The attachment opens. A dialog box opens with options.

A dialog box opens with options.

Which fields in a table are required fields by definition?

A field with a primary key

What happens each time you open an attachment file in Access?

Access creates a temporary file on your computer's hard drive.

What happens each time you open an attachment file in Access? The attachment opens in Design view. The attachment opens in a form or report. Access creates a temporary file on your computer's hard drive. The attachment opens as a hyperlink.

Access creates a temporary file on your computer's hard drive.

What happens when you click a hyperlink field value while in Datasheet view?

Access launches the program required to display the file or Web page

________ is a form of outsourcing. Customizing information systems Buying off-the-shelf software Acquiring licensed software Updating data standards

Acquiring licensed software

________ is a form of outsourcing. Updating data standards Customizing information systems Acquiring licensed software Buying off-the-shelf software

Acquiring licensed software

Why should you backup your database before running an action query?

Action queries are irreversible.

Why should you backup your database before testing an action query?

Action queries change data in your database that cannot be reversed.

Which of the following is an alternative to a combo box?

Add a data validation rule

To avoid a mistake when using an update query that includes making calculations on a field, what is one thing you can do to prevent losing the original information?

Add an additional field with the original figures.

________ is similar to spyware but it watches user activity and produces pop-ups. A cookie Shareware Adware A payload

Adware

A(n) ________ performs calculations on an entire column of data and returns a single value.

Aggregate function

Sum, Min, Max, and Average are examples of which kind of functions?

Aggregate functions

Where do the row headings display in a crosstab query?

Along the left side of a crosstab query

Where do the row headings display in a crosstab query? Along the bottom of a crosstab query Along the top of a crosstab query Along the right side of a crosstab query Along the left side of a crosstab query

Along the left side of a crosstab query

Where do the column headings display in a crosstab query?

Along the top of a crosstab query

Which of the following is true of unsupervised data mining? Unsupervised data mining requires tools such as regression analysis. Neural networks are a popular unsupervised data mining application. Unsupervised data mining requires analysts to fit data to suggested hypotheses. Analysts do not create a model or hypothesis before running the analysis.

Analysts do not create a model or hypothesis before running the analysis.

What can you do if a comparable table already exists when you import a spreadsheet?

Append a copy of the Excel records to the table

What can you do if a comparable table already exists when you import a spreadsheet? Append a copy of the Excel records to the table Link the table to the Access table Export the table to Excel Copy the table to Access

Append a copy of the Excel records to the table

Moving records from one table to another can be accomplished with the combination of what two types of queries?

Append and delete

The process of creating a make table query is very similar to which other type of query?

Append query

With ________, the sender and receiver transmit a message using different keys.

Asymmetric encryption

Where is a Group Header located?

At the start of each new group

In Access, what is a reference to an external file called?

Attachment

In Access, what is a reference to an external file called? Field Attachment OLE object Paperclip

Attachment

In Access, what is a reference to an external file called? OLE object Attachment Paperclip Field

Attachment

Which of the following fields enables you to add multiple files of different types to a table?

Attachment

Which of the following fields enables you to add multiple files of different types to a table? Text OLE Attachment Caption

Attachment

Which of the following allows you to manage attached files in forms and reports?

Attachment control

Which of the following is an example of a measure in an OLAP report?

Average Cost

24) The flow of events or transactions captured by an organization's system describes A. information. B. data. C. wisdom. D. knowledge.

B

29) Which of the following statements is NOT an accurate description of the importance of knowledge to a firm? A. Knowledge-based core competencies are key organizational assets. B. Knowledge should be seen as similar to any other key asset, such as a financial asset or a production facility. C. Knowledge enables firms to become more efficient in their use of scarce resources. D. Knowledge is not subject to the law of diminishing returns as are physical assets.

B

32) In order, which are the value-adding steps in the knowledge business value chain? A. acquire, store, disseminate, apply, feedback B. data and information acquisition, acquire, store, disseminate, apply C. acquire, disseminate, apply, feedback, management and organizational activities D. data and information acquisition, store, disseminate, feedback, apply

B

37) Which of the following is NOT a typical component or capability of an enterprise-wide knowledge management system? A. collaboration tools B. KWS C. document management D. LMS

B

39) You are advising a multimedia company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs? A. enterprise content management system B. digital asset management system C. knowledge network system D. VRML system

B

41) Which of the following is NOT a Web 2.0 tool firms are using to foster collaboration? A. blogs B. intranets C. wikis D. social bookmarking

B

47) ________ often are designed and optimized for the specific tasks to be performed. A. Graphics programs B. Knowledge workstations C. Virtual simulators D. CAD stations

B

53) Which of the following is a type of intelligent technique? A. knowledge networks B. case based reasoning C. computer-aided design D. VRML

B

61) Virtually all expert systems deal with problems of A. policy development. B. classification. C. logic and control. D. high complexity.

B

69) What type of intelligent technique helped Procter & Gamble determine the most efficient methods for their trucks to deliver goods? A. fuzzy logic B. intelligent agents C. genetic algorithms D. none of the above

B

Which of the following is not a basic role of managers? a) interpersonal b) processor c) informational d) decisional

B) Processor

Static Reports

BI Documents that are fixed at the time of creation and do not change

Dynamic Reports

BI Documents that are updated at the time they are requested

Which of the following statements is true about BI publishing alternatives?

BI servers extend alert/RSS functionality to support user subscriptions

ERP vendor Infor acquired which of the following ERP products? A. Epicore 9 B. Solomon C. GP D. Baan

Baan

What should be the first step taken before creating an update query?

Back up the database

After becoming familiar with the data in a database, what should be the first step when creating an action query?

Backup the database

What differentiates a hyperlink from text?

Blue underline

When creating a parameter query, the text phrase should be enclosed in which of the following?

Brackets [ ]

________ is a standard set of terms and graphical notations for documenting business processes.

Business Process Execution Language

During the requirements definition stage of developing an information system, the project team will consist mostly of ________.

Business and systems analysts

22) The percentage of gross domestic product of the United States that is produced by the knowledge and information sectors is estimated to be about ________ percent. A. 20 B. 40 C. 60 D. 80

C

23) Which of the following statements best describes the relationship between collaboration and knowledge management? A. Without knowledge, collaboration is difficult. B. Knowledge doesn't exist without collaboration. C. Knowledge is useful only when shared with others. D. As knowledge increases, so does collaboration.

C

27) The set of business processes, culture, and behavior required to obtain value from investments in information systems is one type of A. knowledge culture. B. knowledge discovery. C. organizational and management capital. D. organizational routine.

C

28) Which of the following systems digitizes, indexes, and tags documents according to a coherent framework? A. wikis B. CAD C. document management D. LMS

C

31) Which of the following is NOT one of the main four dimensions of knowledge described in the chapter? A. Knowledge is a firm asset. B. Knowledge has different forms. C. Knowledge has no locations. D. Knowledge is situational.

C

36) Fuzzy logic is a type of A. data mining. B. neural network. C. intelligent technique. D. business intelligence.

C

42) Which of the following statements about the use of wikis by firms is NOT true? A. They are inexpensive and easy to implement. B. Users are able to modify wiki content contributed by others. C. They are most appropriate for information that must be revised but does not need to be available 24/7. D. They can be used as a central repository for all types of corporate data such as spreadsheets and e-mail.

C

55) Technology that consists of computer-based systems that attempt to emulate human behavior is called A. fuzzy logic. B. neural networks. C. AI technology. D. genetic algorithms.

C

59) Expert systems A. solve problems too difficult for human experts. B. are based on DO WHILE rules. C. work in very limited domains. D. share characteristics with mainframe computing.

C

60) It is unlikely you could represent the knowledge in the Encyclopedia Britannica with an expert system because: A. there is no one expert who understands all the material contained within the encyclopedia. B. the knowledge changes radically over a short time. C. not all the knowledge in the encyclopedia can be represented in the form of IF-THEN rules. D. the knowledge is too general.

C

62) Expert systems are expensive and time-consuming to maintain because A. their rule base is so complex. B. they rely on equipment that becomes outdated. C. their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules. D. only the person who created the system knows exactly how it works, and may not be available when changes are needed.

C

64) You are an automotive engineer working on an application that will automatically parallel park a car. The intelligent technique you may find most useful is: A. case-based reasoning. B. artificial intelligence. C. fuzzy logic. D. expert system.

C

67) Which of the following describes a difference between neural networks and genetic algorithms? A. Genetic algorithms are designed to process large amounts of information. B. Genetic algorithms are a type of knowledge discovery, while neural networks are an intelligent technique. C. Neural networks are programmed to "learn." D. All of the above

C

________ uses a comma to separate one column from the next, enabling the receiving software to distinguish one set of field values from the next.

CSV text files

Which of the following fields is an example of a field that would not require a tab stop?

Calculated field

Packet-filtering firewalls ________.

Can filter both inbound and outbound traffic

Which of the following is NOT used when laying out forms and reports?

Changing the Allow Edits property to No

The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives.

Chief Information Officer

The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.

Chief Technology Officer

How do you hide details in a report?

Click Hide details in the Grouping & Totals group on the Design tab

How do you hide details in a report? Click Hide details in the Grouping & Totals group on the Design tab Click Hide details in Page Options Click Hide details in the Header/Footer Options Close the detail section in Design view

Click Hide details in the Grouping & Totals group on the Design tab

How do you insert blank lines above a table after exporting it from Access into Word?

Click immediately before the first value in the first cell of the table and press Enter to add an additional line.

To move a text box label, what action must you take?

Click the Tabular Layout in the Table group of the Arrange tab while both the label and text box controls are selected.

On a form, what type of control provides a drop-down menu displaying a list of options from which the user can choose a single value?

Combo box

Which type of control does a lookup field become in a form?

Combo box control

Which type of control does a lookup field become in a form? Calculated control Combo box control Unbound control Bound control

Combo box control

Which type of control does a lookup field become in a form? Unbound control Combo box control Bound control Calculated control

Combo box control

________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. Data Transfer Protocols (DTP) Decision Support Systems (DSS) Content Management Systems (CMS) Online Analytical Processing (OLAP) applications

Content Management Systems (CMS)

________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.

Conversion rate

Which of the following is NOT a correct way to Add a calculated control to a form or report?

Create a formula in a bound control

What should be done before converting a text box to a combo box?

Create a new table and enter the values for the option list

What should be done before converting a text box to a combo box? Create a new table and enter the values for the option list Switch to Form view and attempt to change the data in the first record Set a default value to appear on the form Check the tab order of the form

Create a new table and enter the values for the option list

What should be done before converting a text box to a combo box? Set a default value to appear on the form Check the tab order of the form Switch to Form view and attempt to change the data in the first record Create a new table and enter the values for the option list

Create a new table and enter the values for the option list

What is the first step in creating an append query?

Create a select query

What does Access do when you link a table to another Access database?

Creates a new table called a linked table

What summarizes a data source into a grid of rows and columns?

Crosstab query

Which type of query calculates data using a sum, average, or other function and groups the results by two sets of values?

Crosstab query

________ is the dynamic social media process of employing users to participate in product design or product redesign. Homesourcing Crowdsourcing Farmshoring Outsourcing

Crowdsourcing

25) Expertise and experience of organizational members that has not been formally documented best describes A. wisdom. B. information. C. data. D. tacit knowledge.

D

26) Changing organizational behavior by sensing and responding to new experience and knowledge is called A. change management. B. knowledge networking. C. the knowledge value chain. D. organizational learning.

D

34) Which of the following are the three major types of knowledge management systems? A. management information systems, decision support systems, and transaction processing systems B. enterprise systems, customer support systems, and supply chain management systems C. database management systems, expert systems, and knowledge work systems D. enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques

D

43) Which of the following is a collaboration tool used to support knowledge management systems? A. blogs B. wikis C. social bookmarking D. all of the above

D

44) Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes a(n) A. investment workstation. B. organizational learning system. C. employee enrichment system. D. learning management system.

D

46) A ________ is very important to a knowledge worker's system. A. careful filing system B. financial analysis system C. CAD capability D. user-friendly interface

D

49) Which of the following would NOT be classified as a knowledge work system? A. computer-aided design system B. 3D visualization system C. investment workstations D. expert system

D

50) Virtual reality systems A. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. provide architects, engineers, and medical workers with precise, photorealistic simulations of objects.

D

51) Investment workstations A. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. are used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management.

D

52) Which of the following systems is NOT used to capture tacit knowledge? A. expert system B. case-based reasoning C. fuzzy logic D. neural network

D

54) Which of the following techniques is used for knowledge discovery? A. expert system B. transaction processing systems C. case-based reasoning D. data mining

D

56) An inference engine is A. a strategy for searching the rule base in case-based reasoning. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy used to search through the rule base in an expert system by forward chaining or backward chaining.

D

58) Backward chaining is A. a strategy for searching the rule base in an expert system that begins with information entered by the user. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy for searching the rule base in an expert system that begins with a hypothesis.

D

70) To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use A. CAD systems. B. virtual reality systems. C. fuzzy logic systems. D. intelligent agents.

D

What are the three primary activities in the BI process?

Data Aquisition, BI Analysis, Publishing results

When an organization has inconsistent duplicated data, it is said to have a problem of ________.

Data Integrity

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Data encryption Data acquisition Data mining Data entry

Data acquisition

Which of the following is NOT a rule for appending queries?

Data field types do not have to be the same.

Which of the following is NOT a rule for appending queries? A field from the source table does not exist in the destination table. Data field types do not have to be the same. The destination table should not contain an AutoNumber field. All the normal rules for adding a new record to the destination table apply.

Data field types do not have to be the same.

Which data validation method enables you to execute programming tasks whenever data in a table is changed?

Data macro

________ is similar to a validation rule except the logic is more complex and the actions taken are more powerful when table data is changed.

Data macro

________ is similar to a validation rule except the logic is more complex and the actions taken are more powerful when table data is changed. Input mask Required text Data macro Validation text

Data macro

Which of the following statements is true about data marts?

Data marts address the needs of a particular department or functional area of a business.

Which of the following statements is true about data marts? A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. Data mart users possess the data management expertise that data warehouse employees have. Data marts address the needs of a particular department or functional area of a business. Data marts are larger than data warehouses.

Data marts address the needs of a particular department or functional area of a business.

Which of the following statements is true about data marts? Data marts are larger than data warehouses. Data marts address the needs of a particular department or functional area of a business. A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. Data mart users possess the data management expertise that data warehouse employees have.

Data marts address the needs of a particular department or functional area of a business.

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Data mining Database normalization Data optimization Data warehousing

Data mining

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Data warehousing Data mining Database normalization Data optimization

Data mining

________ protect databases and other organizational data. Data safeguards Payloads Data strings Cookies

Data safeguards

________ protect databases and other organizational data. Payloads Data strings Data safeguards Cookies

Data safeguards

A(n) ________ is a set of constraints or rules that help control how data is entered into a field.

Data validation

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.

Data warehouse

An Access function that examines a date and returns a portion of the date is:

DatePart function.

An Access function that examines a date and returns a portion of the date is: <<interval>>. Date formatting. DatePart function. <<firstweekofyear>>.

DatePart function.

Assuming a hire date of 7/31/2016, which of the following would be the correct DatePart Function for the correct day of the week?

DatePart("w",[HireDate])

Assuming a hire date of February 15, 2017, which of the following date part functions would return the number of days since the beginning of the current year?

DatePart("yyyy",[HireDate])

Which data validation property specifies a value that is automatically entered into a field?

Default value

Which data validation property specifies a value that is automatically entered into a field? Input mask Default value Required Validation rule

Default value

Which data validation property specifies a value that is automatically entered into a field? Validation rule Default value Required Input mask

Default value

What do you do if you make a mistake when running a Find Unmatched query?

Delete the query and start over, then reverse the order of the tables.

In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.

Deliverables

Which view do you use to modify lines or rectangles?

Design view

Which view do you use to modify lines or rectangles? Design view Datasheet view Layout view Form or Report view

Design view

Which view gives a designer a higher level of control when creating forms and/or reports?

Design view

Which view gives a designer a higher level of control when creating forms and/or reports? Datasheet view Design view Form or Report view Layout view

Design view

Where would you go to change tab order in a form?

Design view - Tab order in Tools group

Which sections display on forms and reports by default?

Detail and form/report header and footer

Which of the following statements is true with regard to human safeguards? Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk. System administrators should retain user accounts after an employee has been terminated. Holding public users of Web sites accountable for security violations is quite easy and inexpensive. All employees must be provided with uniform, general training on security, regardless of their position's sensitivity.

Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.

To find the same values in a table, you would use the Find ________ Query Wizard. Matching Repeated Duplicates Alike

Duplicates

_____ is the process by which organizational goals are achieved through the use of organizational resources. a) Organizational decision making b) Operations c) Organizational strategy d) Organizational productivity e) Management

E) Management

Which of the following statements is true of social CRM?

Each customer crafts his or her own relationship with the company

Which of the following statements is true of social CRM? Customers likely to generate the most business get the most attention from the organization. Though relationships emerge from joint activity, companies control the customers. All the customer relationship processes in social CRM are structured and controlled. Each customer crafts his or her own relationship with the company.

Each customer crafts his or her own relationship with the company.

Refer to the Opening Case - EarthRisk Technologies: Which of the following is true about the startup company EarthRisk? a) It makes decisions for its users.. b) EarthRisk uses the same models used by current meteorologists. c) EarthRisk uses data mining against decades of weather data. d) EarthRisk focuses on weather less than two weeks away. e) EarthRisk results can only be used by meteorologists.

EarthRisk uses data mining against decades of weather data.

Knowledge management (KM) benefits organizations because it ________.

Enables employees and partners to work smarter

________ processes span an organization and support activities in multiple departments.

Enterprise

_______ is the application of social media to facilitate the cooperative work of people inside organizations.

Enterprise 2.0

________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. Customer relationship management Enterprise resource planning Enterprise application integration Business process reengineering

Enterprise resource planning

Which of the following statements is true of information systems?

Every information system has at least one application.

Which of the following enables you to create mathematical functions in Access?

Expression builder

Which of the following enables you to create mathematical functions in Access? Expression builder Macro builder Precision builder Excel builder

Expression builder

1) Knowledge residing in the minds of employees that has not been documented is called explicit knowledge.

F

10) Expert systems are the primary tools used for knowledge discovery.

F

11) Intelligent agents can discover underlying patterns, categories, and behaviors in large data sets.

F

13) Given their limitations, expert systems are seldom used for making discrete, highly structured decision-making situations.

F

14) Expert systems work by applying a set of AND/OR rules against a knowledge base, both of which are extracted from human experts.

F

15) Case-based reasoning is not well-suited for diagnostic systems in medicine.

F

17) Fuzzy logic systems "learn" patterns from large quantities of data by sifting through data, searching for relationships, building models, and correcting over and over again the model's own mistakes.

F

18) Because neural network applications cannot always explain why they arrive at a particular solution, they are not well suited for use in the medical profession.

F

3) Knowledge is universally applicable and easily moved.

F

5) COPs are formalized groups of professionals and employees within and outside the firm who have similar work-related activities and interests.

F

6) Structured knowledge is explicit knowledge that exists in informal documents.

F

7) Semistructured information is all the knowledge in a firm that resides in the heads of experienced employees.

F

8) Knowledge workers are primarily clerical and data workers who usually do not possess high levels of education.

F

9) VRML requires the use of a powerful server as well as large amounts of bandwidth.

F

A sales report that is current as of the time the user accessed it on a Web server is a static report.

FALSE

Content data differentiates SMIS from Web site applications.0/1 pts

FALSE

Expert systems are rule-based systems that use "If . . . then" rules unlike those created by decision tree analysis.

FALSE

Knowledge management was done only after the advent of social media.

FALSE

Neural networks are a popular unsupervised data mining technique used to predict values and make classifications.

FALSE

A computer crime is committed if an employee inadvertently installs an old database on top of the current one

False

A decision tree analysis is a supervised data mining technique.

False

A manager's primary function is strategic planning. T or F?

False

A sales report that is current at the time the user accessed it on a Web server is a static report

False

All business processes must include one or more information systems

False

An information system need not relate to any business process, but a business process should relate to at least one information system.

False

As IS development projects are difficult to budget and schedule, technical and organizational feasibilities are only approximate analyses.

False

Business requirements do not necessitate opening information systems to non employee personnel, such as temporary personnel, vendors, or partner personnel.

False

Changing the structure of a process always involves a change in resources as well, even if it is only a simple reordering of tasks.

False

Control Objectives for Information and related Technology (COBIT) practices were created by Object Management Group (OMG) for documenting business processes.

False

Converting to an ERP system is not nearly as disruptive as converting to an EAI system

False

Corporate performance management (CPM) is involved with monitoring and managing an organization's performance according to its budget. T or F?

False

Data safeguards are measures used to protect computer hardware from external threat

False

Decision-support systems support only lower- and middle-level managers. T or F?

False

Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.

False

Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.

False

Digital dashboards provide support primarily to analytical, quantitative types of decisions. T or F?

False

Homesourcing is the dynamic social media process of employing users to participate in product design or product redesign.

False

If a reasoned, non defensive response generates continued and unreasonable UGC from the same source, it is best to respond to or delete the problematic content.

False

In Business Process Modeling Notation (BPMN), dotted arrows depict the flow or sequence of the activities in a process.

False

In all companies, the chief information officer reports directly to the chief financial officer

False

In the choice phase of the decision-making process, managers construct a model that simplifies the problem. T or F?

False

In the implementation phase of the decision-making process, managers set criteria for the evaluation of alternative potential solutions. T or F?

False

In the system implementation phase of the SDLC, with pilot installation, the new system/business processes are installed in phases across an entire organization.

False

In the system implementation phase of the SDLC, with plunge installation, existing systems are used by the organization until the new one is fully operational.

False

It is the chief information officer's responsibility to establish and communicate IS priorities to the executive group, while the responsibility for enforcement rests with the chief executive officer

False

KPI stands for key process information. T or F?

False

Knowledge management was done only after the advent of social media.

False

Refer to IT's About Business 5.1 - Analytics in the National Basketball Association: Key to the success of Stats is its ability to identify dribbles and passes based on the movement of the players. T or F?

False

Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.

False

Social networking procedures are more informal for SM sponsors than they are for social networking users.

False

Targeted marketing is a good example of the discovery of previously unknown or hidden patterns. T or F?

False

The structure of the IS department remains constant across organizations.

False

The use of BI is limited to large corporations. T or F?

False

Total sales, average sales, and average cost are examples of dimensions used in an OLAP report.

False

True of False: Web 2.0 does not allow mashups, which occur when the output from two or more Web sites is combined into a single user experience.

False

True or False: A trigger is a computer program stored in a database that is used to enforce business results.

False

True or False: According to Gossieaux and Moran's model of hyper-social organization, channels transmit knowledge, whereas networks transmit data.

False

True or False: An ERP solution consists of application programs, databases, and business process procedures, but does not contain training and consulting.

False

True or False: Both structured processes and dynamic processes are formally defined processes.

False

True or False: Business process re-engineering is a quick process, but it is exceedingly expensive.

False

True or False: CRM is an example of a structured inter-enterprise information system.

False

True or False: CRM systems incorporate accounting, manufacturing, inventory, and human resources applications.

False

True or False: Changing the structure of a process always involves a change in resources as well, even if it it only a simple reordering of tasks.

False

True or False: Content data differentiates SMIS from Web site applications.

False

True or False: Converting to an ERP system is not nearly as disruptive as converting to an EAI system.

False

True or False: Defenders of belief communities are highly effective for activities that involve innovation or problem solving.

False

True or False: Defenders of belief communities provide better and faster problem solutions to complex supply chain problems.

False

True or False: Deleting content on user-generated content site should be reserved for contributions that criticize a firm's products or services.

False

True or False: Dynamic processes are more specific.

False

True or False: Dynamic processes support operational activities.

False

True or False: Enterprise application integration is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.

False

True or False: Epicor and Microsoft Dynamics are the highest ranked ERP vendors in the market.

False

True or False: Human capital is the investment in social relations with the expectation of returns in the marketplace.

False

True or False: If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.

False

True or False: In enterprise systems, a single department manager is in charge.

False

True or False: In inter-enterprise information systems, procedures are simple and generally not documented on formalized in any way.

False

True or False: In the context of CRM, hyper-social means that the vendor gains control of the customer relationship.

False

True or False: In the customer acquisition phase of the customer life cycle, an organization categorizes its customers according to value and attempts to win back high-value customers.

False

True or False: Industry-specific solutions contain program and database configuration files, but not the process blueprints that apply to ERP implementations in specific industries.

False

True or False: Key users submit ideas and responses to nonkey users for publication in communities.

False

True or False: Only social networking sites present user and responder content, but both Web sites and social networking applications store and processes connection data.

False

True or False: Order and account tracking are business processes concerning the operations department

False

True or False: Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign.

False

True or False: Seekers of the truth communities facilitate activities like sales and marketing.

False

True or False: Service-oriented architecture is a software design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using process-oriented architecture standards.

False

True or False: Social capital does not depreciate.

False

True or False: Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.

False

True or False: Social media sponsors are the companies that operate the SM sites.

False

True or False: Structured processes are adaptive processes that change structure rapidly and readily.

False

True or False: The number of ERP solutions moving to the cloud is expected to increase because of its low cost.

False

True or False: The problems of duplicated data, disjointed systems, limited information, and inefficiencies are solved by spreading the data across multiple databases.

False

True or False: The solutions to problems in an enterprise system usually involve a single department of the organization.

False

True or False: The structure of a process has no bearing on its efficiency.

False

True or False: The term use increases value means that the value of a web site is indirectly proportional to the number of people using it.

False

True or False: Triggers and stored procedures are not components of an ERP solution.

False

True or False: Unlike humans, organizations do not have social capital.

False

True or False: Web 2.0 applications are characterized y frequent releases of thick-client applications.

False

True or False: Web 2.0 includes Web-delivered services and content that are paid for by users.

False

Unlike business analysts, systems analysts work more with managers and executives

False

Unstructured decisions require a combination of standard solution procedures and individual judgment. T or F?

False

Validation rules are entered in the ________ pane. Field Properties Data macro Validation Rules

Field Properties

What do you do if you only want to export part of a table to Excel?

Filter the table first

Which query identifies multiple instances of the same information in a table?

Find duplicates

________ allocate a certain number of characters for each field.

Fixed-length text files

________ allocate a certain number of characters for each field. Linked files Excel tables CSV text files Fixed-length text files

Fixed-length text files

Which of the following is generally a responsibility of users of information systems?

Following security and backup procedures

What appears below the Page Footer section in a report or form?

Form Footer or Report Footer

Which of the following appears at the bottom or each form or report?

Form or Report Footer

Which of the following appears at the top of each form or report?

Form or Report Header

Which of the following appears once at the bottom of each page in a form or report?

Form or Report Page Footer

Which of the following appears once at the bottom of each page in a form or report? Form or Report Header Form or Report Footer Form or Report Page Footer Form or Report Page Header

Form or Report Page Footer

Which of the following appears once at the bottom of each page in a form or report? Form or Report Page Footer Form or Report Footer Form or Report Header Form or Report Page Header

Form or Report Page Footer

Which of the following appears once at the top of each page in a form or report?

Form or Report Page Header

Which of the following appears once at the top of each page in a form or report? Form or Report Page Header Form or Report Page Footer Form or Report Footer Form or Report Header

Form or Report Page Header

________ affects the display of the date without affecting the underlying value.

Formatting

To test an update query before running the query, what should you do first?

From Design view, click View in the Results group and click Datasheet view.

Refer to IT's About Business 5.3 - SecureAlert: SecureAlert uses an integration of which two technologies? a) data warehouse and DSS b) DSS and data mining c) GIS and GPS d) data mining and clustering

GIS and GPS

A ________ shows the tasks, dates, and dependencies for the tasks of a project.

Gantt Chart

________ is a term that refers to the level of detail represented by the data. Elaboration Intricacy Granularity Complexity

Granularity

________ is a term that refers to the level of detail represented by the data. Intricacy Complexity Elaboration Granularity

Granularity

How would you add grouping to a report?

Group & Sort button

How would you add grouping to a report? Form header Group & Sort button Form footer Page footer

Group & Sort button

How would you add grouping to a report? Page footer Form footer Group & Sort button Form header

Group & Sort button

The ________ appears after adding a grouping to a form or report.

Group Header

After adding grouping, a ________ appears just above the Detail section in Design view, along with the name of the field by which you are grouping.

Group header

After adding grouping, a ________ appears just above the Detail section in Design view, along with the name of the field by which you are grouping. Group footer Group header Form header Page header

Group header

Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?

HTTPS

________ a Web site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system. Pretexting Spoofing Phishing Hardening

Hardening

________ is the application of social media and related applications for the management and delivery of organizational knowledge resources.

Hyper social knowledge mgmt

The ________ function evaluates an expression and displays one value when the expression is true and another when the expression is false.

IIF

Which of the following is a form of outsourcing hardware infrastructure exclusively? PaaS IaaS cloud hosting SaaS acquiring licensed products

IaaS cloud hosting

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.

Information systems

Which data validation method forces users to conform to a specific data-entry format for a given field?

Input mask

Which data validation method forces users to conform to a specific data-entry format for a given field? Default value Input mask Data macro Validation text

Input mask

Which of the following forces you to enter the phone number in a consistent manner in the database table?

Input mask

Which of the following forces you to enter the phone number in a consistent manner in the database table? Validation rule Input mask Lookup list Default value

Input mask

Which of the following function checks to see if a field has no value?

IsNull

Which of the following function checks to see if a field has no value? IsNotNull Sum Average IsNull

IsNull

________ function checks to see if a field does not contain a value.

IsNull

Which of the following statements is true of enterprise application integration? It connects system "islands" via a new layer of software. It leads to data duplication because each application has its own database. It prevents existing applications from communicating and sharing data. It leverages existing systems and enhances the capabilities of functional applications.

It connects system "islands" via a new layer of software.

Which of the following statements is true of enterprise application integration? A. It leverages existing systems, and enhances the capabilities of functional applications. B. It prevents existing applications from communicating and sharing data. C. It connects system "islands" via a new layer of software. D. It leads to data duplication because each application has its own database.

It connects system "islands" via a new layer of software.

What is the purpose of a ScreenTip?

It displays when you point your mouse over the hyperlink text

What is the purpose of a ScreenTip? It displays when you point your mouse over the hyperlink text. It modifies what the user sees in Datasheet view. It launches the hyperlink. It edits the hyperlink.

It displays when you point your mouse over the hyperlink text.

Which of the following statements is true of the swim-lane layout used for modeling the business processes? It complicates the process diagrams. All activities for a given role are repeated in all the swim lanes. It draws attention to the interactions among components of the diagram. Each role in the business process has to share the swim lane with other roles.

It draws attention to the interactions among components of the diagram.

Which of the following statements is true about data administration?

It establishes standards to protect information assets.

Which of the following is true of SOA? A. It enables the requesting and releasing of cloud resources. B. It allows cloud based applications to follow their own standard and structure. C. It has access to cloud storage, but it cannot enable the releasing of cloud resources. D. It has no access to cloud storage

It has access to cloud storage, but it cannot enable the releasing of cloud resources.

Which of the following statements is true about the "maintenance" of information systems? It is overseen by the chief technology officer. It involves adapting existing systems to support new features. It is undertaken by the business analysts. It comprises developing test plans and designing automated test scripts.

It involves adapting existing systems to support new features.

Which of the following is a risk of outsourcing IS/IT functions?

It involves the potential loss of intellectual capital

Which of the following accurately defines a dimension in an OLAP report?

It is a characteristic of a measure.

According to Gossieaux and Moran, which of the following observations is true about a hyper-social organization? It is characterized by a transformation of thinking from market segments to tribes. It creates relationships in which only one of the parties perceives and gains value. It uses social media in an organization-centric manner. It is an organization that transitions from a dynamic process to a structured one.

It is characterized by a transformation of thinking from market segments to tribes.

Which of the following statements is true of the operations group in an organization's IS department?

It monitors the user experience and responds to their problems

Which of the following is true of source data for a BI system? It refers to data that the organization purchases from data vendors. It refers to the organization's metadata. It refers to the level of detail represented by the data. It refers to the hierarchical arrangement of criteria that predict a classification or a value.

It refers to data that the organization purchases from data vendors.

Which of the following statements about a structured inter-enterprise information system is true?

Its problem solutions affect multiple organization

Which of the following statements about a structured inter-enterprise information system is true? A. It is flexible and easily adaptable to organizational changes. B. Its procedures are formalized and the problem solutions affect multiple organizations. C. It does not require users to have any formal training. D. It increases data duplication among departments.

Its procedures are formalized and the problem solutions affect multiple organizations.

Which of the following file types increases the database size byte for byte when attached in Access?

JPEG and other photo formats

Which of the following file types increases the database size byte for byte when attached in Access? Word and JPEG files Excel and JPEG files JPEG and other photo formats Word and Excel files

JPEG and other photo formats

Joseph wishes to increase the operational efficiency of his new startup. What should Joseph do? If Joseph plans to include less specific and fluid activities in his firm, he should use a structured planning system over a dynamic planning system. If Joseph plans to support formally defined and documented activities in his firm, he should use a dynamic planning system over a structured planning system. Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities. Joseph should avoid analyzing his firm's distribution systems as they do not play a role in its daily activities.

Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.

Joseph wishes to increase the operational efficiency of his new startup. What should Joseph do? If Joseph plans to support formally defined and documented activities in his firm, he should use a dynamic planning system over a structured planning system. Joseph should avoid analyzing his firm's distribution systems as they do not play a role in its daily activities. If Joseph plans to include less specific and fluid activities in his firm, he should use a structured planning system over a dynamic planning system. Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.

Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.

Joseph wishes to increase the operational efficiency of his new startup. What should Joseph do? Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities. If Joseph plans to include less specific and fluid activities in his firm, he should use a structured planning system over a dynamic planning system. If Joseph plans to support formally defined and documented activities in his firm, he should use a dynamic planning system over a structured planning system. Joseph should avoid analyzing his firm's distribution systems as they do not play a role in its daily activities.

Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.

Where does a Group Footer appear?

Just below the Detail section

Where does a Group Footer appear? Just above the Page Header Just below the Detail section Just below the Form Footer Just below the Page Footer

Just below the Detail section

________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it

Knowledge management

________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it

Knowledge mgmt

A ________ describes the data associated with a text box.

Label control

A ________ describes the data associated with a text box. Form control Design control Text control Label control

Label control

A ________ describes the data associated with a text box. Form control Text control Label control Design control

Label control

Which of the following displays when you insert a text box?

Label control

Which of the following displays when you insert a text box? Text box control Design view control Label control Section control

Label control

Which of the following displays when you insert a text box? Text box control Section control Design view control Label control

Label control

Which two views make it easy to edit the design of a form?

Layout view and Design view

When you use the ________ operator, each criterion must be true for the compound criterion to be true.

Like

Which of the following controls can you use to add emphasis to your form or report?

Line control and rectangle control

What are two options for adding emphasis to your form or report?

Line or rectangle control

Which of the following is an SM application provider? SAP McAfee LinkedIn Oracle

LinkedIn

________ allows you connect to a table without having to import the table data into your database.

Linking

________ allows you connect to a table without having to import the table data into your database. Copying Pasting Linking Moving

Linking

________ allows you connect to a table without having to import the table data into your database. Pasting Copying Moving Linking

Linking

The ________ creates a menu of finite values by asking you questions and using your answers to create the options list.

Lookup Wizard

The ________ creates a menu of finite values by asking you questions and using your answers to create the options list. Input Mask Wizard Lookup Wizard validation rule default value

Lookup Wizard

A field with a number of repeated values may be better suited as what kind of field?

Lookup field

A field with a number of repeated values may be better suited as what kind of field? Input mask Lookup field Data macro Validation text field

Lookup field

An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated

Loss of control

The final phase of the systems development life cycle (SDLC) is ________.

Maintaining the System

Which type of query automatically creates a new table from data that already exists in a database?

Make Table

________ is the term used to denote viruses, worms, and Trojan horses. Spam Malware Cookie Firewall

Malware

2 Main Functions of a BI Server

Management & Delievery

________ is a technique for harnessing the power of thousands of computers working in parallel.

MapReduce

________ records the source, format, assumptions and constraints, and other facts about the data. Dimensional data Outsourced data Metadata Clickstream data

Metadata

AX, Nav, GP, and Solomon are the four major ERP products of ________. Epicor SAP Microsoft Dynamics Oracle

Microsoft Dynamics

AX, Nav, GP, and Solomon are the four major ERP products of ________. Epicor SAP Oracle Microsoft Dynamics

Microsoft Dynamics

AX, Nav, GP, and Solomon are the four major ERP products of ________. SAP Epicor Microsoft Dynamics Oracle

Microsoft Dynamics

The four major ERP products of _____ are AX, Nav, GP, and Solomon.

Microsoft Dynamics

What is the default software application associated with a CSV file?

Microsoft Excel

The ________ is the most popular BI server today. Microsoft Windows Vista Microsoft SQL Server Report manager Pentaho BI Server Oracle BI Server

Microsoft SQL Server Report manager

The ________ is the most popular BI server today. Oracle BI Server Pentaho BI Server Microsoft SQL Server Report manager Microsoft Windows Vista

Microsoft SQL Server Report manager

Indexing

Most important content function in Knowledge Management, keyword search that provides quick response at high document relevancy

Which of the following statements is true about the changes and developments foreseen by the year 2024

Most organizations will move their internal hardware infrastructure into the cloud

Which of the following statements is true about the changes and developments foreseen by the year 2024? Licensed, off-the-shelf software will become less configurable, less adaptable, and less flexible. Most organizations will move their internal hardware infrastructure into the cloud. Small computing devices will lose their popularity and become more expensive. SDLC will be typically used for systems development.

Most organizations will move their internal hardware infrastructure into the cloud.

Google's ________ is an excellent mashup example. Jetpack MyMaps Ubiquity Archy

MyMaps

When two functions are not sufficient to evaluate an expression, you may need to use a(n):

Nested function.

When two functions are not sufficient to evaluate an expression, you may need to use a(n): Parameter query. IsNull function. Round function. Nested function.

Nested function.

________ functions refers to using one formula within another one.

Nesting

Which of the following is an example of a dynamic process? A. Nike uses Facebook and Twitter to generate buzz about its new line of running shoes. B. Amazon.com hires customer service representatives to help customers with their online order. C. Samsung accepts a return of a defective television from its dealer. D. Starbucks places an order from coffee beans from its local supplier.

Nike uses Facebook and Twitter to generate a buzz about its new line of running shoes.

Which of the following best represents the value of social capital? (Number of Relationships × Relationship Strength) / Entity Resources Number of Relationships - Relationship Strength - Entity Resources Entity Resources - (Number of Relationships + Relationship Strength) Number of Relationships × Relationship Strength × Entity Resources

Number of Relationships × Relationship Strength × Entity Resources

Which of the following best represents the value of social capital? Number of Relationships - Relationship Strength - Entity Resources (Number of Relationships × Relationship Strength) / Entity Resources Number of Relationships × Relationship Strength × Entity Resources Entity Resources - (Number of Relationships + Relationship Strength)

Number of Relationships × Relationship Strength × Entity Resources

_____ is one of the SOA protocols.

OData

How often does a Form/Report Header appear? Once Once per page Once per record in the record source At the start of each group

Once

Once per record in the record source

Once

OLAP stands for___

Online Analytical Processing

The expression IIf(IsNull([ClosedDate]),"Open","Closed") displays ________. Closed when the ClosedDate field has no value and Open otherwise Closed when the ClosedDate field has no value and nothing otherwise Open when the ClosedDate field has no value and Closed otherwise Open when the ClosedDate field has no value and nothing otherwise

Open when the ClosedDate field has no value and Closed otherwise

The expression IIf(IsNull([ClosedDate]),"Open","Closed") displays ________. Open when the ClosedDate field has no value and nothing otherwise Closed when the ClosedDate field has no value and nothing otherwise Closed when the ClosedDate field has no value and Open otherwise Open when the ClosedDate field has no value and Closed otherwise

Open when the ClosedDate field has no value and Closed otherwise

In an IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

Operations

Which ERP vendor acquired PeopleSoft and Siebel?

Oracle

The top two ranked ERP vendors are _____.

Oracle and SAP

In information security, which of the following is true of managing risk?

Organizations should implement safeguards that balance the trade-off between risk and cost

________ is the process of hiring another organization to perform a service.

Outsourcing

If you want to share an Access report with someone who does not have Microsoft Office, you can export the report as a(n) ________ file. PDF DOC DOCX XLXS

PDF

The ________ file format does not allow you to edit the exported documents.

PDF

The ________ file format does not allow you to edit the exported documents. Word RTF Excel PDF

PDF

The ________ file format was created by Adobe Systems for document exchange independent of software application and operating system environment.

PDF

________ documents cannot be edited after being exported.

PDF or XPS

_____ is an example of an inter-enterprise information system?

PRIDE

What type of break is used to cause each group to print on a separate page?

Page

How is an attachment field identified in a table?

Paperclip

________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access. Private keys Passwords User names Personal identification numbers

Passwords

Its problem solutions affect multiple organization

Plunge

According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ____.

Points

Before running a delete query, what should you do?

Preview the datasheet to verify that the records are those that you intend to delete.

Before running a delete query, what should you do? View the results in Design view. Create the table, you can always delete it if the information is wrong. Manually go through the table and delete the information, then use the delete query to verify all information is removed. Preview the datasheet to verify that the records are those that you intend to delete.

Preview the datasheet to verify that the records are those that you intend to delete.

Before running a make table query, what should you do?

Preview the datasheet to verify that the records are those that you intend to insert into the table.

Before running a make table query, what should you do? Create a delete query at the same time. Preview the datasheet to verify that the records are those that you intend to insert into the table. View the results in Design view. Create the table, you can always delete it if the information is wrong.

Preview the datasheet to verify that the records are those that you intend to insert into the table.

________ is a measure of the ratio of process outputs to inputs.

Process efficiency

________ is a measure of the ratio of process outputs to inputs. Process effectiveness Process efficiency Process conformance Process reliability

Process efficiency

BI Systems are used for all four Collaborative tasks, name these 4 tasks:

Project mgmt, problem solving, deciding, informing

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

Provide physical security

________ requires the user to request BI results. Push publishing Desktop publishing Pull publishing Accessible publishing

Pull publishing

Which of the following statements is true about operational data?

Purchased operational data often contains missing elements

Which of the following statements is true about operational data? Purchased operational data often contains missing elements. It is always better to have data with too coarse a granularity than with too fine a granularity. If the data granularity is too coarse, the data can be made finer by summing and combining. Problematic operational data are termed rough data.

Purchased operational data often contains missing elements.

________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.

RFM

What type of file does Access create when exporting to Word?

RTF

________ is a useful format for basic formatted text documents such as instruction manuals, resumes, letters, and other documents.

RTF

________ is a useful format for basic formatted text documents such as instruction manuals, resumes, letters, and other documents. RTF HTML DOCX JPEG

RTF

Which of the following displays one time at the bottom of a report?

Report footer

Which data validation method forces data entry in a field?

Required

How do you switch on or off sections of a report or form?

Right-click a blank area

How do you switch on or off sections of a report or form? Grey out a section Hide the detail section Right-click a blank area Go to the property sheet

Right-click a blank area

________ is the correct syntax for the Round function.

Round(expression, precision)

________ is the correct syntax for the Round function. Round(expression, interval) Round(expression) Round(expression, truepart, falsepart) Round(expression, precision)

Round(expression, precision)

U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?

SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods. SAMCROW has ordered recently and orders frequently, but it orders the least expensive goods. SAMCROW has not ordered for some time and it did not order frequently, but when it did order, it bought the least-expensive items. SAMCROW has not ordered in some time but when it did order in the past, it ordered frequently, and its orders were of the highest monetary value.

SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

________ are the companies that operate SM sites.

SM application providers

________ are the companies that operate SM sites. Defenders of belief SM application providers SM sponsors Seekers of the truth

SM application providers

____are the companies that operate SM sites

SM application providers

____the IS the supports the sharing if content amoung networks of users

SMIS

Which of the following marks the top boundary of a section in a form or report?

Section bar

________ is the first method for controlling data input in a field of a table.

Selecting an appropriate data type

What must you do once a text box has been converted to a combo box?

Set a source for the combo box

A(n) ________ has a microchip in it to hold data.

Smart Card

________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks. Phishing Spoofing Sniffing Pretexting

Sniffing

________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks. Sniffing Spoofing Pretexting Phishing

Sniffing

Which of the following observations regarding the value of social capital is true? People should ideally ignore entity assets and try to connect to more people with stronger relationships. Social capital depreciates and such depreciation can be ameliorated by adding something of value to interactions. A huge network of relationships to people who have few resources is of greater value than that of a smaller network with people with substantial resources. The value of social capital is best expressed as the summation of the number of relationships in a social network and the resources controlled by those related.

Social capital depreciates and such depreciation can be ameliorated by adding something of value to interactions.

Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased? virtualization Software as a Service (SaaS) Infrastructure as a Service (IaaS) cloud hosting licensed software

Software as a Service (SaaS)

Which of the following statements is true about losses due to computer security threats? Losses due to human error are insignificant. Some organizations don't report all their computer crime losses, and some won't report such losses at all. Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs. Losses due to natural disasters can be measured accurately.

Some organizations don't report all their computer crime losses, and some won't report such losses at all.

Real Simple Syndication (RSS)

Standard for subscribing to content sources

6 Data Mining Origins

Statistics/mathmatics, artificial intelligence machine learning, huge database, cheap computer processing and storage, sophisticated marketing, finance and other professionals, data mgmt technology.

12) Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization.

T

16) Fuzzy logic can describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules.

T

19) Intelligent agents are used primarily for specific, repetitive and predictable tasks.

T

2) Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.

T

20) Shopping bots are a form of intelligent agent.

T

4) The chief knowledge officer is the organizational role responsible for the firm's knowledge management program.

T

The objects you select to export from Access to Word should have which of the following types of layout?

Tabular

The objects you select to export from Access to Word should have which of the following types of layout? Tabular Block Outline Stepped

Tabular

A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.

Technical Writer

________ are common methods of exchanging information between two computer systems.

Text files

________ are common methods of exchanging information between two computer systems. Access tables Text files Access forms Excel spreadsheets

Text files

________ are common methods of exchanging information between two computer systems. Excel spreadsheets Access forms Access tables Text files

Text files

Which of the following statements is true about IS planning functions?

The CEO and other executive staff decide the membership of the steering committee

Data Mining

The application of statistical techniques to find patterns and relationships amaong data for classifications and prediction.

What happens when you export a form with a subform to Excel?

The form exports but the subform does not

What happens when you export a form with a subform to Excel? The subform exports but the form does not. The original form is deleted when the export is completed. The form exports but the subform does not. The results can be unpredictable.

The form exports but the subform does not.

When exporting to a PDF, what should you check for when the objects are exported?

The number of pages

Which of the following statements is true of an IS department? Programs used in all information systems are developed in-house by the development group. If the IS primarily supports accounting and finance activities, the CFO is appointed as the CIO. The operations group monitors user experience and responds to user problems. Data administration is performed exclusively by the outsourcing relations group.

The operations group monitors user experience and responds to user problems.

Which of the following statements is true of an IS department? The operations group monitors user experience and responds to user problems. Programs used in all information systems are developed in-house by the development group. Data administration is performed exclusively by the outsourcing relations group. If the IS primarily supports accounting and finance activities, the CFO is appointed as the CIO.

The operations group monitors user experience and responds to user problems.

Support

The porbability that two items will be purchased together

Knowledge Management (KM) Systems

The process of creating value from intellectual capital and sharing that knowledge with others who need it

When running an append query, what happens if a record violates the primary key rule for the destination table?

The record is rejected.

What happens to the size of an Access database when a table is linked to an Excel spreadsheet?

The size of the database remains the same.

BI Application

The software component of a BI system

Which of the following statements is true about the steering committee of an IS department?

The steering committee's meetings are conducted by the IS department

If you run a make table query again at a later time, what happens?

The table is replaced with the new up-to-date table.

Which of the following observations concerning expert systems is true?

These systems encode human knowledge in the form of "If...Then" rules.

Which of the following observations concerning expert systems is true?

These systems encode human knowledge in the form of "If/Then" rules

Which of the following statements is true regarding workgroup information systems?

They Support 10 to 100 users

Which of the following is a characteristic of dynamic processes? They are usually formally defined and documented. They support operational and managerial decisions and activities. They are adaptive processes that change structure rapidly and readily. They are standardized processes.

They are adaptive processes that change structure rapidly and readily.

Which of the following is a characteristic of dynamic processes? They support operational and managerial decisions and activities. They are adaptive processes that change structure rapidly and readily. They are standardized processes. They are usually formally defined and documented.

They are adaptive processes that change structure rapidly and readily.

Which of the following is a characteristic of dynamic processes? A. They support operational and managerial decisions and activities. B. They are adaptive processes that change structure rapidly and readily. C. They are standardized processes. D. They are usually formally defined and documented.

They are adaptive processes that change structure rapidly and readily.

Which of the following statements about enterprise information systems is true?

They are very difficult to change

Which of the following statements about enterprise information systems is true? A. They are very difficult to change. B. They do not require formal training. C. They support 10 to 100 users. D. The procedures are not documents, but are understood within the group.

They are very difficult to change.

According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities? They are very effective for activities that involve innovation or problem solving. They seek conformity and want to convince others of the wisdom of their beliefs. They are open to changing their beliefs when confronted with contrary evidence. They make ineffective sales and marketing professionals.

They seek conformity and want to convince others of the wisdom of their beliefs.

Which of the following statements is true about users of information systems? They should learn to install hardware and software on their own. They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. They should ensure the availability of reliable and secure Internet connections. They should learn standard techniques and procedures for the applications they use.

They should learn standard techniques and procedures for the applications they use.

Which of the following statements is true regarding workgroup information systems? They are easy to change. They can be operated without training. They support 10 to 100 users. They minimize data duplication among departments.

They support 10 to 100 users.

Which of the following statements is true regarding workgroup information systems? A. They support 10 to 100 users. B. They are easy to change. C. They can be operated without training. D. They minimize data duplication amoung departments

They support 10 to 100 users.

What is the purpose of a find unmatched query?

To compare records in two related tables and display the records found in one table and not the other.

Where is the Page Header located?

Top of each page

Where is the Page Header located? Top of form/report Bottom of each page At the end of each group Top of each page

Top of each page

What is the group footer used for?

Totaling the data at the end of each group

A ________ involves balancing three critical factors: requirements, cost, and time

Trade-off

________ are viruses that masquerade as useful programs or files. Adware programs Spyware programs Worms Trojan horses

Trojan horses

A BI server extends alert/RSS functionality to support user subscriptions.

True

A characteristic of Web 2.0 is that the value of a site increases with an increase in users and use

True

A digital dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors. T or F?

True

A project plan is a list of work breakdown structure (WBS) tasks, arranged to account for task dependencies, with durations and resources applied.

True

A project team that develops an IS will comprise business and systems analysts during the requirements definition phase

True

A value of 999—999—9999 for a U.S. phone number is an example of dirty data for BI purpose.

True

Adding process resources increases process effectiveness, but it adds costs.

True

Agile development methodologies welcome changes in requirements

True

All management data needed by any of the BI servers is stored in metadata.

True

An OLAP cube and an OLAP report are the same thing.

True

An intrusion detection system (IDS) is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

True

By outsourcing IS, organizations reduce risks associated with implementation.

True

Cookies enable an individual to access Web sites without having to sign in every time

True

Dynamic reports are BI documents that are updated at the time they are requested.

True

Gap identification is a major task when implementing enterprise systems.

True

Goal-seeking analysis attempts to find the value of the inputs necessary to achieve a desired level of output. T or F?

True

Hadoop is an open-source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers

True

Human intuition often plays a role in making unstructured decisions. T or F?

True

If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.

True

Implementing the new or changed process is the third activity in business process management.

True

In Business Process Modeling Notation (BPMN), diamonds represent decisions and usually contain a question that is answered with yes or no.

True

In expert systems, the programs that process a set of rules are called expert systems shells.

True

In marketing transactions, the fact that customers who buy product X also buy product Y creates a cross-selling opportunity.

True

In the system definition phase of the SDLC, schedule feasibility is difficult to determine because it is hard to estimate the time it will take to build the system.

True

In the system definition phase of the SDLC, technical feasibility refers to whether existing information technology is likely to be able to meet the needs of a new system.

True

Information systems improve process quality by augmenting the actions of the human who is performing that activity.

True

Inter-enterprise information systems support one or more inter-enterprise processes.

True

It is possible to capture the customers' clicking behavior using clickstream data

True

Management control is the acquisition and efficient use of resources in accomplishing organizational tasks. T or F?

True

Modern information systems support all three managerial roles. T or F?

True

Not just financial concerns, even time and events could force a company to decide to outsource

True

One of the major sources of UGC problems is inappropriate content.

True

SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.

True

Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption

True

Social media sponsors may or may not pay a fee, depending on the application and on what they do with it.

True

Static reports are BI documents that are fixed at the time of creation and do not change.

True

Structured decisions address routine, repetitive problems for which standard solutions exist. T or F?

True

Structured processes are standardized processes that involve day-to-day operations

True

The actors or participants in a business process are the users of information systems.

True

The most obvious reason for changing a process is that it has efficiency or effectiveness problems

True

The most obvious reason for changing a process is that it has efficiency or effectiveness problems.

True

The number of alternatives to be considered in decisions today is increasing. T or F?

True

The ratio between organizational inputs and outputs is an indication of the organization's productivity. T or F?

True

The swim-lane layout for modeling business processes is used to draw attention to interactions among components of the diagram.

True

True or False: A characteristic of Web 2.0 is that the value of a site increases with users and use.

True

True or False: A folksonomy is content structure that has emerged from the processing of many user tags.

True

True or False: A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.

True

True or False: A service provider creates a service description and publishes it using a standardized language called HyperText Markup Language (HTML).

True

True or False: A viral hook is something that induces people to share a message with others.

True

True or False: A workgroup information system is an organizational structure where a separate department is established by the organization to support and manage its information.

True

True or False: A workgroup processes exists to enable workgroups to fulfill the charter, purpose, and goals of a particular group or department.

True

True or False: According to Hank Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.

True

True or False: Adding process resources increases process effectiveness, but it adds cost.

True

True or False: An ERP solution includes a database design as well as initial configuration data.

True

True or False: An active lurker is someone who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.

True

True or False: An information silo is a condition that exists when data are isolated in separated information systems.

True

True or False: An organization has a strong relationship with you if you buy its products and write positive reviews about it.

True

True or False: Before initiating a social networking presence, organizations must develop procedures for creating content managing user responses, removing obsolete or objectionable content, and extracting value from content.

True

True or False: Both community users and employees of SM sponsors process SM sites using communications devices.

True

True or False: Business process re-engineering is the the activity of altering and designing business processes to take advantage of new information systems.

True

True or False: Choosing an ERP solution that has applications that function close to the organization's requirements is critical to its successful implementation.

True

True or False: Content data is data and responses to data that are contributed by users and SM sponsors.

True

True or False: Defenders of belief are communities that share a common belief and form their hive around that belief.

True

True or False: ERP vendors sometimes train an organization's employees to become in-house trainers in training sessions called train the trainer.

True

True or False: Emergence in the context of management means loss of control of employees.

True

True or False: Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.

True

True or False: Enterprise processes span an organization and support activities in multiple departments.

True

True or False: Facebook, Twitter, LinkedIn, and Google are all SM application providers.

True

True or False: Gap identification is a major task when implementing enterprise systems.

True

True or False: Google publishes Google Maps and provides tools for users to make custom modifications to those maps, which is an example of mashup.

True

True or False: Information systems improve process quality by augmenting the actions of the human who performs that activity.

True

True or False: Inter-enterprise information systems support one or more inter-enterprise processes.

True

True or False: One of the major sources of UGC problems is inappropriate content.

True

True or False: Placing an order is an example of a structured process.

True

True or False: Process efficiency is a measure of the ratio of process outputs to inputs.

True

True or False: Relationship management processes increase the value of existing customers by selling them more product.

True

True or False: SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.

True

True or False: SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.

True

True or False: Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours.

True

True or False: Social CRM is a dynamic, SM-based CRM process.

True

True or False: Social CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most effect on the organization.

True

True or False: Social media is the use of information technology to support the sharing of content among networks of users.

True

True or False: Social networking procedures are more informal for SM sponsors than they are for social networking users.

True

True or False: Someone who sees and interesting feature in an SM presence and sends a link to that feature to friends can be called an active lurker.

True

True or False: Standards such as http, https, CSS3, JavaScript, and others enable programs to receive data form, and display data to, a variety of mobile and desktop devices.

True

True or False: Structured processes are standardized processes that involve day-to-day operations.

True

True or False: The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.

True

True or False: The inherent processes that are defined in an ERP solution are known as process blueprints.

True

True or False: The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.

True

True or False: The primary purpose of an ERP system is integration.

True

True or False: The primary risk of peer-to-peer support is loss of control.

True

True or False: The procedures for using workgroup information systems need to be understood only by the It department of an organization.

True

True or False: Transitioning to a new enterprise system requires careful planning and substantial training.

True

True or False: User-generated content (UGC) is the essence of SM relationships.

True

True or False: Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.

True

True or False: Using social networking sites to generate a buzz about a company's new product line is an example of a dynamic process.

True

True or False: When a business participates in a social network or opens its site to UGC, it protects itself fro misguided people who post junk unrelated to the site's purpose.

True

True or False: When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your social capital.

True

True or False: Workgroup information systems typically support 10 to 100 users.

True

True or False: Workgroups can develop information systems for their own needs, but over time, they would result in information silos.

True

True or False; Lead generation and lead tracking are processes concerning the sales and marketing department.

True

User-generated content (UGC) is the essence of SM relationships

True

Web 2.0 used free content and free software as the principal means to attract viewers.

True

When considering a merger, it is important that the company consider integration of information systems in the merged entities

True

Workgroup information systems typically support 10 to 100 users

True

in marketing transactions, the fact that customers who buy product X also buy product Y creates a cross-selling opportunity.

True

What must be present for a find unmatched query to work?

Two tables share a common field.

What must be present for a find unmatched query to work? Two tables have no relationship. All fields in the tables should be the same. There is nothing necessary for the query to work properly. Two tables share a common field.

Two tables share a common field.

Which of the following is true of paired programming?

Two team members share the same computer to write a computer program together

A(n) ________ is the location of a Web site or Web page on the Internet.

URL

________ is the essence of SM relationships.0/1 pts

USG

Which of the following controls contains to decorative elements, such as the title of the report?

Unbound

Which of the following controls contains to decorative elements, such as the title of the report? Unbound Calculated Bound Rectangle and line

Unbound

Which of the following generally refers to decorative elements such as the title of a report?

Unbound control

Once records with missing data are found, what type of query can you use to add the needed information?

Update

Once records with missing data are found, what type of query can you use to add the needed information? Delete Update Find duplicates Make table

Update

________, which refers to the matter in an SM site that is contributed by nonemployee site visitors, is the essence of SM relationships.

User-generated content

What is the reason for making a form read-only?

Users can lookup information but not modify the data

What data validation method is designed to restrict the data values entered into a field?

Validation rule

Which data validation method provides an error message when a validation rule has been broken?

Validation text

BI Server

Web aplication that is purpose built for the publishing of business intelligence (Example: Microsoft SQL Server report Manager)

When would a calculated field need to be added to a form or report?

When a formula is needed in the form or report

When would a calculated field need to be added to a form or report? When you want to add some explanatory text to the form or report When a formula is needed in the form or report When using an unbound control in the form or report When using a bound control in the form or report

When a formula is needed in the form or report

When are subforms created?

When the main form displays records from a related table

What does the type of data displayed in a crosstab query depend on?

Which aggregate function used when the query was created

When you double-click on a document with a RTF file extension, which of the following programs does Windows open by default?

Word

What type of files are compressed by Access when you attach them?

Word and Excel files

What type of files are compressed by Access when you attach them? JPEG and other photo formats Word and Excel files Excel and JPEG files Word and JPEG files

Word and Excel files

What type of files are compressed by Access when you attach them? Word and JPEG files Excel and JPEG files JPEG and other photo formats Word and Excel files

Word and Excel files

Project teams create a ________, which is a hierarchy of the tasks required to complete a project

Work breakdown structure

The ________ file format is considered an alternative to PDF.

XPS

The ________ file format is considered an alternative to PDF. DOCX XPS XLS RTF

XPS

The ________ file format is considered an alternative to PDF. XPS XLS RTF DOCX

XPS

What is the main reason for exporting data to Excel instead of Word?

You are not able to analyze the data as you can in Excel.

How is a crosstab query different from other queries?

You can only reference one object (table or query) as the data source

How is a crosstab query different from other queries? You can only reference one object (table or query) as the data source. You can select a data source with several grouping fields. You can use records from several objects in a crosstab query. You can preview the data before finalizing the query.

You can only reference one object (table or query) as the data source.

What is one reason to import an Excel worksheet into Access instead of linking it?

You have more control over the imported data

Which application allows you to view XPS documents if the XPS viewer has not been installed?

Your browser

Which application allows you to view XPS documents if the XPS viewer has not been installed? Adobe Acrobat Reader Microsoft Word Microsoft Excel Your browser

Your browser

Which application allows you to view XPS documents if the XPS viewer has not been installed? Microsoft Excel Your browser Microsoft Word Adobe Acrobat Reader

Your browser

reporting application

a BI tool that inputs data from one or more sources and applies reporting operations to that data to produce Business Intelligence

An ERP solution does not include _____.

a company's operational data

Which of the following usually happens in a malicious denial-of-service attack? a phisher pretends to be a legitimate company and requests confidential data an intruder uses another site's IP address to masquerade as that other site a hacker monitors and intercepts wireless traffic at will a hacker floods a Web server with millions of bogus service requests

a hacker floods a Web server with millions of bogus service requests

Enterprise application integration is _____.

a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.

Credit card companies would most likely use which of the following to check for fraudulent credit card use? a) Data mining b) Expert systems c) Neural networks d) Multidimensional data analysis e) Structured query language

a) data mining

Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. She has developed a few alternatives. Elena built a model in Excel so she could test her assumptions. This is an example of a) decision support system b) digital dashboard c) functional area information system d) group decision support system e) expert system

a) decision support system

82) Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. Which of the following statements is true? a) If Shawn changes one of his assumptions, Excel will automatically recalculate the budget numbers. b) Shawn would use sensitivity analysis to check the impact of changing his price. c) Shawn would use roll-up to review his summary numbers. d) Shawn would use what-if analysis to check the impact of changing his price and the commission he pays his sales people. e) Shawn would use goal-seeking analysis to examine the impact of changing his forecast of units sold. Answer: a

a) if shawn changes one of his assumptions, excel will automatically recalculate the budget numbers

Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases. a) implementation b) choice c) design d) intelligence e) consideration

a) implementation

Geocoding involves: a) integrating maps with spatially oriented databases and other databases b) encrypting spatial information c) accessing geographical information d) integrating organizational transactions with spatially oriented databases e) programming spatially oriented databases

a) integrating maps with spatially oriented databases and other databases

Being a figurehead and leader is part of the _____ managerial role. a) interpersonal b) processor c) informational d) decisional e) confrontational

a) interpersonal

_____ is the efficient and effective execution of specific tasks. a) Operational control b) Management control c) Strategic planning d) Expertise e) Wisdom

a) operational control

Calculating gross pay for hourly workers is an example of ________ decision making. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural

a) structured

Rank-and-file employees tend to make more _________ decisions. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural

a) structured

The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a) structured b) unstructured c) undocumented d) semistructured e) procedural

a) structured

________ decisions are more common at lower organizational levels. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural

a) structured

Which of the following is not a reason why managers need IT support? a) The number of alternatives is decreasing. b) Decisions must typically be made under time pressure. c) Decisions are becoming more complex. d) There is a growing need to access remote information sources. e) Decision makers are often based in different locations.

a) the number of alternatives is decreasing

Which of the following is not a characteristic of decision support systems? a) They support only lower- and middle-level managers. b) They are easy to use and construct. c) They can adapt to changing conditions. d) They usually utilize quantitative models. e) They support all phases of the decision-making process.

a) they support only lower and middle level managers

Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. One of her recent projects was to build a model of revenue that would allow her boss to test a variety of price points against forecasts of units sold for each product in a product line. Sally will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation.

a) what-if

Push publishing delivers BI____

according to a schedule or as a result of an event or particular data condition

Which of the following workgroup processes is related to customer service? A. account tracking B. accounts payable C. assessment D. sales forecasting

account tracking

A person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium is called a(n) ________. key user active lurker nonkey user SM sponsor

active lurker

In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.

activities

most SM apps earn revune thru___

ad models

Web 2.0 refers to Web-delivered services and content paid for by ________.

advertisers

Web 2.0 relies on ________ for revenue. advertising controlled, fixed interfaces venture capital software license fees

advertising

Rapid application development, the unified process, extreme programming, and scrum have led to ________.

agile development

In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that ________. an activity is considered to be a subprocess of a process a question can be answered with no a question can be answered with yes it is the end of the process

an activity is considered to be a subprocess of a process

Which of the following is most likely to be a result of hacking?

an unauthorized transaction from a user's credit card

unsupervised data mining

analysts do not create a model or a hypothesis before running the analysis

Access is not able to ________ an attachment.

analyze the data within

A(n) ________ query can be used for adding records to an existing table.

append

A(n) ________ query is used to copy new employee records from one table and add them to an existing table. make table select append dispose

append

A(n) ________ appears next to a linked table name in the Navigation Pane.

arrow

A(n) ________ appears next to a linked table name in the Navigation Pane. arrow ampersand star pound sign

arrow

Web 2.0 encourages companies to provide software ________.

as a free service

Which of the following can be represented using the Business Process Modeling Notation? PERT charts showing the critical path Gantt charts as-is models scatter plots

as-is models

Once the project's goals and scope have been defined, the next immediate step in the system definition phase of the SDLC is to ________. form a project team assess feasibility plan the project determine system requirements

assess feasibility

Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle.

assessment

Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle. process modeling component creation assessment implementation

assessment

Which of the following workgroup processes is related to human resources? assessment lead tracking order management customer support

assessment

Which of the following workgroup processes is related to human resources? A. assessment B. customer support C. order management D. lead tracking

assessment

Expert Systems

attempt to capture human expertise and put it in to a system that can be used by non experts, uses rule based "if/then" statements but unlike desision trees, expert systems can have hundreds of thousands of rules (expensive and hard to maintain)

In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.1/1 pts

authoring

In McAfee's SLATES Enterprise 2.0 model, "A" stands for ________. alerts auditing announcements authoring

authoring

_____ is the acquisition and efficient use of resources in accomplishing organizational goals. a) Operational control b) Management control c) Strategic planning d) Expertise e) Wisdom

b) Management Control

Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. She has developed a few alternatives. Elena is in the ______________ phase of the decision-making process a) implementation b) choice. c) design d) intelligence e) consideration

b) choice

In the _____ phase of the decision-making process, managers test potential solutions "on paper." a) implementation b) choice c) design d) intelligence e) consideration

b) choice

You've started an internship at the major hospital in your city. Your boss gave you ten minutes of training on the data warehouse that you have access to. She then asked you to see if there is any correlation between treatments and day of the week. To do this, you will be doing: a) Transaction processing. b) Data mining c) What-if analysis. d) Goal-seeking e) Exception reporting

b) data mining

Refer to the Closing Case #1 - Procter & Gamble Uses Analytics: When executives are changing the screen in the Business Sphere room to change the image from a view of the world map to a graph of toothpate prices in India, they are a) doing what-if analysis. b) drilling down. c) looking at key performance indicators. d) doing sensitivity analysis. e) looking at an expert system.

b) drilling down

A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision? a) structured b) semistructured c) unstructured d) informational e) wisdom

b) semi-structured

Which type of decision requires a combination of standard solution procedures and individual judgment? a) structured b) semistructured c) unstructured d) informational e) wisdom

b) semi-structured

Computer support is least for which of the following problems? a) semistructured and strategic planning b) unstructured and strategic planning c) semistructured and management control d) unstructured and operational control e) structured and strategic planning

b) unstructured and strategic planning

The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS. benchmark test standard baseline

baseline

The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS. standard test baseline benchmark

baseline

A(n) ________ is a control that is connected to a field in a table or query.

bound control

A(n) ________ is a control that is connected to a field in a table or query. combo box control unbound control bound control calculated control

bound control

A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies. business supervisor business analyst business application programmer business administrator

business analyst

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function

business process

_____ is the activity of altering and designing business processes to take advantage of new information systems.

business process re-engineering

Searching for valuable business information in a database, data warehouse, or data mart is referred to as _____. a) structured queries b) database queries c) data mining d) query by example e) expert system queries

c) data mining

Amanda is working for the CEO of a small company. He asks her to develop a dashboard. Amanda starts thinking about the questions she needs to ask. Which of the following questions would not on Amanda's list? a) How many levels do you wish to drill down? b) What are your key performance indicators? c) Do you need real-time data? d) Do you want graphs and charts or text? e) Should it run on your iPhone?

c) do you need real-time data?

In the _____ phase of the decision-making process, managers construct a model that simplifies the problem. a) implementation b) choice c) design d) intelligence e) consideration

c) intelligence

A company's annual employee evaluation best fits which type of decision? a) unstructured b) structured c) semistructured d) confrontational e) wisdom

c) semi-structured

Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. He would like to check the impact of changing his price and the commission he pays his sales people. Shawn will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation.

c) sensitivity analysis

Which of the following is not a characteristic of unstructured decisions? a) They are complex. b) They typically are fuzzy and unclear. c) Standard solutions exist. d) Human intuition is involved. e) The first three phases of the decision-making process occur in no particular sequence.

c) standard solutions exist

Which capability of digital dashboards enables users to obtain the latest data available on key performance indicators or some other metric, ideally in real time? a) Drill-down b) Key performance indicators c) Status access d) Trend analysis e) Exception reporting

c) status access

Computer support is greatest for which of the following problems? a) semistructured and strategic planning b) unstructured and operational control c) structured and operational control d) semistructured and management control e) structured and management control

c) structured and operational control

When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a) undocumented b) structured c) unstructured d) semistructured e) documented

c) unstructured

A(n) ________ contains an expression that generates a calculated result.

calculated control

Which of the following is a basic operation used by reporting applications to produce business intelligence?

calculating

One of the reasons outsourcing is undertaken is to ________. diversify the business portfolio increase costs for the outsourcing vendor enhance management's focus on nonessential functions cap an organization's financial exposure

cap an organization's financial exposure

which of following would be most disruptive to an org while implementing an IS?

changing reporting relationships

Dimension

characteristic of a measure

The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. chief operating officer chief technology officer chief executive officer chief information officer

chief information officer

The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. chief technology officer chief executive officer chief information officer chief operating officer

chief information officer

The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies. system analyst chief technology officer chief financial officer technical writer

chief technology officer

With ________, statistical techniques can identify groups of entities that have similar characteristics.

cluster analysis

The storage of ________ differentiates SMIS from Web site applications

connection data

The storage of ________ differentiates SMIS from Web site applications. secondary data connection data continuous data content data

connection data

________ differentiates SMIS from Web site applications.0/1 pts

connection data

________ is data and responses to data that are contributed by users and SM sponsors.1/1 pts

content data

Information systems improve process quality by _____.

controlling process flow

Information systems improve process quality by ________.

controlling process flow

An append query is a query that:

copies records from one table to another.

An append query is a query that: removes records from a table based on criteria. changes the data values in one or more fields that meet specific criteria. copies records from one table to another. automatically creates a new table from data that already exists.

copies records from one table to another.

Which of the following are the four dimensions of feasibility?

cost, schedule, technical, and organizational feasibility

According to Brooks' Law, adding more people to a late project will ________. guarantee efficiencies reduce the need for coordination create diseconomies of scale speed up the project

create diseconomies of scale

According to Brooks' Law, adding more people to a late project will ________.

create diseconomies of scale extent the time needed to complete

Which of the following systems procedures is specifically the responsibility of operations personnel? using systems to perform job tasks knowing whom to contact when a security breach occurs writing software program codes creating back up of system databases

creating back up of system databases

A ________ is a sequence of activities that determine the earliest date by which a project can be completed.

critical path

A ________ is a sequence of activities that determine the earliest date by which a project can be completed. critical path Pareto chart Venn diagram scatter plot

critical path

In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."

cross selling opportunity

________ is the dynamic social media process of employing users to participate in product design or product redesign.1/1 pts

crowdsourcing

Due to a phenomenon called the ___, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor

curse of dimensionality

Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.

curse of dimensionality

_____ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.

customer relationship management (CRM)

Which of the following is not a characteristic of a structured decision? a) It is routine. b) It is repetitive. c) Human intuition is not involved. d) The first three phases of the decision-making process need not occur in any particular sequence e) Standard solutionsexist.

d) The first three phases of the decision-making process need not occur in any particular sequence

Refer to the Closing Case #2 - Predictive Policing: The software that Santa Cruz Police Department is using is an example of a) doing what-if analysis. b) doing sensitivity analysis c) looking at key performance indicators. d) data mining, e) an expert system.

d) data mining

Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role. a) interpersonal b) processor c) informational d) decisional e) confrontational

d) decisional

Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. He is fairly confident about his estimated expenses. He is also sure that his current price is the best price he can get for his product. He would like to know how many units he needs to sell at that price (and his cost per product from his supplier) to cover his expenses. Shawn will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation. Answer: d

d) goal seeking

At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis? a) What-if b) Qualitative c) Sensitivity d) Goal-seeking e) Simulation

d) goal-seeking

Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. One of her recent projects was to use the insights from the data mining to determine the sales level that will cover expected expenses for the upcoming year for one product line. Sally will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation.

d) goal-seeking

_____ attempts to find the value of the inputs necessary to achieve a desired level of output. a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) Simulation

d) goal-seeking

In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. a) implementation b) choice c) design d) intelligence e) consideration

d) intelligence

Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment. a) less, decreased b) more, decreased c) less, increased d) more, increased e) neither more nor less, decreased

d) more, increased

You've started an internship at the major hospital in your city. Your boss gave you ten minutes of training on the data warehouse that you have access to. The last thing she told you was to do some analysis on the Visit cube. Which of the following statements is false? a) One dimension of the cube is (probably) day. b) One dimension of the cube is (probably) treatment. c) One dimension of the cube is (probably) doctor. d) One dimension of the cube is (probably) month. e) One dimension of the cube is (probably) patient.

d) one dimension of the cube is probably month

The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies. data communication data warehousing data administration data mining

data administration

When an organization has inconsistent duplicated data, it is said to have a problem of _____.

data integrity

When an organization has inconsistent duplicated data, it is said to have a problem of ________. data integrity error of omission data segregation information silo

data integrity

Measure

data item of interest

Supervised data mining

data miners develop a model prior to the analysis and estimate parameters for the model

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

data mining

A(n) _____ provides rapid access to timely information and direct access to management reports. a) decision support system b) expert system c) neural network d) digital dashboard e) data warehouse

data warehouse

ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category? A. obtaining top-level management support B. steps for using applications to accomplish the activities in processes C. preparing the organization for change D. dealing with employees resistance to the new system

dealing with employees resistance to the new system

Refer to IT's About Business 5.2 - Using Analytics to Save the Grevy's Zebra: The work done to understand what was happening to the Grevy's zebra and the communities they exist in was done using a) decision support system b) expert system c) digital dashboard d) functional area information system e) group decision support system

decision support system

________ is a hierarchical arrangement of criteria that predict a classification or a value.

decision tree

When most people in a database reside in New York, you should make NY the ________ value for the State field. default input mask data validation rule lookup field

default

When most people in a database reside in New York, you should make NY the ________ value for the State field. input mask default lookup field data validation rule

default

A(n) ________ helps to reduce editing time when there is a common value in a field.

default value

A(n) ________ helps to reduce editing time when there is a common value in a field. default value data macro validation rule input mask

default value

A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario?

defenders of belief

A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario? defenders of belief

defenders of belief

The first phase of the systems development life cycle (SDLC) is ________. defining the system determining the requirements maintaining the system implementing the system

defining the system

A(n) ________ query removes records from a table based on criteria that you specify.

delete

Push Publishing

delivers BI without reguest from user

Amanda is working for the CEO of a small company. He is trying to make a strategic decision about a new product. He has asked Amanda to build a model the represents and simplifies the problem. Amanada's boss is in the ______________ phase of the decision-making process a) implementation b) choice. c) design d) intelligence e) consideration

design

The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.

determine the goals and scope

When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is to ________. communicate the need for change to the employees establish clear and absolute contractual guidelines develop committees and steering groups reinforce employees' sense of self-efficacy

develop committees and steering groups

When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is to ________. establish clear and absolute contractual guidelines develop committees and steering groups communicate the need for change to the employees reinforce employees' sense of self-efficacy

develop committees and steering groups

In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. operations outsourcing relations development technology

development

In a Business Process Modeling Notation (BPMN) diagram, ________ represent decisions and usually contain a question that is answered with yes or no. circles rectangles squares diamonds

diamonds

In a Business Process Modeling Notation (BPMN) diagram, ________ represent decisions and usually contain a question that is answered with yes or no. rectangles circles squares diamonds

diamonds

The Management Cockpit best exemplifies which type of system? a) decision support system b) expert system c) digital dashboard d) functional area information system e) group decision support system

digital dashboard

Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down? a) decision support systems b) digital dashboards c) functional area information systems d) group decision support systems e) expert systems

digital dashboards

Problematic operational data are termed ________. rough data granular data metadata dirty data

dirty data

Problems with operational data (6)

dirty data, missing values, inconsistent data, data not integrated, wrong granularity, too much data

The situation where addition of resources creates inefficiencies is known as ________. marginal utility break-even diseconomies of scale marginal returns

diseconomies of scale

Tony requests for a credit approval of $25,000 and instead gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? disjointed processes isolated decisions data duplication limited information

disjointed processes

Tony requests for a credit approval of $25,000 and instead gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? limited information data duplication isolated decisions disjointed processes

disjointed processes

Tony requests for a credit approval of $25,000 and instead gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? limited information disjointed processes isolated decisions data duplication

disjointed processes

kate has to organize asynch meeting which tool should she use?

disscusion forum

In business process management (BPM), an as-is model ________.

documents the existing business process

In business process management (BPM), an as-is model ________. represents the desired state of a business process represents the ideal state of a business process contrasts the former and current states of a business process documents the existing business process

documents the existing business process

In business process management (BPM), an as-is model ________. represents the ideal state of a business process contrasts the former and current states of a business process documents the existing business process represents the desired state of a business process

documents the existing business process

To open the Attachments dialog box, you ________. point to the paperclip icon and press F2 double-click the paperclip icon right-click the paperclip icon click the paperclip icon

double-click the paperclip icon

To open the Attachments dialog box, you ________. right-click the paperclip icon click the paperclip icon point to the paperclip icon and press F2 double-click the paperclip icon

double-click the paperclip icon

The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format.

dynamic

The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. extensible dynamic specific informal

dynamic

_____ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial and activities.

dynamic processes

A company wants to use data from past promotional mailings to identify people who would likely respond favorably to future mailings. This company would most likely use: a) Structured Query Language b) multidimensional data analysis c) neural networks d) expert systems e) data mining

e) data mining

Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. She tells you she does data mining all day long. Which of the following statements is false? a) Data mining can be used to prove assumptions. b) Data mining is used to identify unknown patterns. c) Data mining can explain why things happened. d) Data mining can predict what will happen. e) Data mining can be used to identify customers.

e) data mining

Refer to IT's About Business 5.4 - Catalina Marketing: Catalina Marketing systems use which two technologies? a) data warehouse and DSS b) DSS and data mining c) GIS and GPS d) data mining and clustering e) data warehouse and data mining

e) data warehouse and data mining

_____ provides users with a view of what is happening, whereas _____ addresses why it is happening. a) Multidimensional data analysis, Structured Query Language b) Data mining, multidimensional data analysis c) Data mining, expert system d) Multidimensional data analysis, neural networks e) Multidimensional data analysis, data mining

e) multi-dimensional data analysis, data mining

Process _____ is a measure of how well a process achieves organizational strategy.

effectiveness

The two dimensions of process quality are _____.

efficiency and effectiveness

Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. Which of the following statements is true? a) During the intelligence phrase, Elena will build a model using assumptions about the business. b) During the design phrase, Elena will define the opportunity. c) During the choice phase, Elena will lay out her options. d) During the implementation phase, Elena will implement two of her solutions. e) Elena will use test data to validate her model.

elena will use test data to validate her model

The major benefit of enterprise application integration is that it _____.

enables organizations to use existing applications.

Duplicate values in a table can prevent you from:

enforcing referential integrity.

_____ processes span an organization and support activities in multiple departments.

enterprise

________ is the application of social media to facilitate the cooperative work of people inside organizations.1/1 pts

enterprise 2.0

_____ is a suite of applications called modules, a database, an a set of inherent processes for consolidating business operations into a single, consistent, computing platform.

enterprise resource planning

Calculated controls begin with a(n):

equal sign (=).

Calculated controls begin with a(n): bracket ([ ]). equal sign (=). pound sign (#). plus sign (+).

equal sign (=).

Which of the following is a critical security function that the senior management should address in an organization?

establishing the security policy

The primary distinguishing characteristic of geographical information systems is: a) every record or digital object has a unique identifier b) every record or digital object is visible to the user c) every record or digital object must be accessed by programmers d) every record or digital object has an identified geographical location e) every record or digital object is encrypted

every record or digital object has an identified geographical location

In expert systems, the programs that process a set of rules are called____

expert system shells

In the context of KM systems, ________ attempted to directly capture employee expertise. expert analyses expert networks expert systems expert decisions

expert systems

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

extension

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.0/1 pts

extensions

Data Warehouse

facility for managing an organizations BI data (larger than data mart)

A delete query automatically creates a new table from data that already exists in a database.

false

A find duplicates query compares records in two related tables and displays the values found in one table but not the other.

false

A find unmatched query compares records in two related tables and displays the records found in both tables.

false

A hyperlink field enables you to attach multiple files of different types.

false

A linked table is marked with an asterisk in the Navigation Pane.

false

A lookup list accepts multiple values in a single field.

false

A page footer appears at the bottom of the last page of a form or report.

false

A parameter query prompt is enclosed in parentheses.

false

A required field can be left blank when entering a record.

false

Access does not have a way to identify duplicate values.

false

After you export an Access table to an RTF file, the file cannot be edited in Word.

false

An append query changes the data values in one or more fields for all records that meet specific criteria.

false

An append query deletes records from one or more tables and adds them to an existing table.

false

An append query is used to update or change data automatically based on criteria that you specify.

false

An append query selects records from one or more tables and uses then to create a new table.

false

An imported Excel spreadsheet displays in the Navigation Pane as a linked table.

false

An input mask can be used when there is a common value in many records.

false

Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services. 1/1 pts

false

Duplicate values should always be deleted from a database table.

false

Exporting data from Access to Excel is generally very complicated because the format of Access is different than Excel.

false

Find unmatched queries provide a subset of the data that answers most questions that users ask about the data in their databases.

false

If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.0/1 pts

false

If the destination table exists and you run the make table query, Access automatically deletes the source table.

false

In the criteria of a query, Access encloses date fields with & symbols.

false

It is impossible to cap financial risk by outsourcing

false

It is not recommended to preview the datasheet prior to running a make table query.

false

Linking and importing produce the same result in Access.

false

Once a hyperlink has been added to a table, it cannot be edited.

false

Once an attachment is added, the only way to delete the attachment is to delete the record.

false

Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.1/1 pts

false

Outsourcing neither saves time for direct management nor for indirect management.

false

PDF is a file format created by Microsoft.

false

Social networking procedures are more informal for SM sponsors than they are for social networking users.0/1 pts

false

Subforms have to be created using the Form Wizard.

false

Tab order cannot be changed in a form once it has been created.

false

The Tab order of a form cannot be changed.

false

The default Required setting for all fields except the primary key field is Yes.

false

The file extension for a Rich Text Format file is slx.

false

The terms "information systems" and "information technology" can be used interchangeably.

false

The user provides the criterion at run time when using a lookup list.

false

There is no way to verify that the correct records will be updated when using an update query.

false

Unbound controls are controls that are tied to specific fields.

false

Validation text restricts the data value that can be entered into a field.

false

When a business participates in a social network or opens its site to UGC, it protects itself from misguided people who post junk unrelated to the site's purpose.0/1 pts

false

When running an append query, the data types of the source fields do not have to match the data types of the destination fields.

false

When using an input mask, data is still not necessarily consistent.

false

When using an input mask, parentheses and hyphens are automatically stored with the data.

false

When you export a table from Access, the table must be closed for the export to complete.

false

When you violate a validation rule, Access allows you to continue entering the record.

false

You can use Undo when running an update or delete query.

false

Which of the following workgroup processes is related to operations? A. account tracking B. treasury management C. finished-goods inventory management D. Sales forecasting

finished-goods inventory management

Which of the following workgroup processes is related to operations? A. sales forecasting B. finished-goods inventory management C. treasury management D. account tracking

finished-goods inventory management

Which of the following is classified as a technical safeguard? cookies passwords firewalls key escrow

firewalls

A ________ is content structure that has emerged from the processing of many user tags in social media. folksonomy viral hook mashup taxonomy

folksonomy

A ________ is content structure that has emerged from the processing of many user tags.1/1 pts

folksonomy

If a defined project is determined to be feasible in the SDLC, the next immediate step is to ________. assess process results maintain the system create and test components form the project team

form the project team

If a defined project is determined to be feasible in the SDLC, the next immediate step is to ________. form the project team maintain the system create and test components assess process results

form the project team

Which of the following is one of the principal means that companies implementing Web 2.0 are most likely to use to attract viewers? controlled releases fixed product value free content fixed interface

free content

Since the features and functions of complex products like CRM or ERP are not easy to identify, ________ is a major task when implementing enterprise systems. gap identification data duplication encapsulation virtualization

gap identification

_____ is a major task when implementing enterprise systems.

gap identification

Which of the following usually happens in a malicious denial-of-service attack?

hacker floods a Web server with millions of bogus service requests

Which of the following is considered a computer crime? poorly written programs resulting in data losses deletion of records by an employee who is unaware of operating procedures loss of data as a result of flooding hacking of information systems

hacking of information systems

Responding to problematic content on social networking sites is best reserved for when the problematic content ________. has caused the organization to do something positive as a result is obscene and inappropriate does not affect the site where the content has been posted represents reasonable criticism of the organization's products or services

has caused the organization to do something positive as a result

Responding to problematic content on social networking sites is best reserved for when the problematic content ________.

has caused the organizations to do something positive as a result

Descision Tree

hierarcheal arrangement of criteria that predict a classification or a value, creates groups that are as "pure" as possible using "if/then" statements to create rules

Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol? ftp https www .com

https

A student invests money and time in a business administration course. In this example, the student invests in ________. human capital social capital process capital structural capital

human capital

According to Gossieaux and Moran, a(n) ________ is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.

hyper-social organization

A ________ enables you to quickly link to any file on your computer or to any Web page on the Internet.

hyperlink

A characteristic of Web 2.0 is that the value of a Web site increases as the number of users ________. fluctuates over time increases over time remains constant over time decreases over time

increases over time

A characteristic of Web 2.0 is that the value of a Web site increases as the number of users ________. remains constant over time increases over time fluctuates over time decreases over time

increases over time

Albert creates rational database to store emp performance stats. He stores each employees data in independent rows and creates columns called "emp #" to give unique # to each employee. This column is called ____

indicator

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide _____.

industry-specific solutions

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.

industry-specific solutions

According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________.

influence

Which of the following conditions exist when data are isolated in separated information systems? A. information overload B. data segregation C. information silo D. encapsulation

information silos

_____ are pre-designed procedures for using software products.

inherent processes

A(n) ________ forces users to conform to a specific data entry format for a given field.

input mask

When data is entered, a(n) ________ is used to have a consistent format. field property data macro input mask data validation rule

input mask

The responsibilities of a computer technician include ________.

installing software and repairing networks

The responsibilities of a computer technician include ________. advising the CIO on emerging technologies managing and protecting databases installing software and repairing networks writing program documentation

installing software and repairing networks

The responsibilities of a computer technician include ________. managing and protecting databases advising the CIO on emerging technologies writing program documentation installing software and repairing networks

installing software and repairing networks

The primary purpose of an ERP system is _____.

integration

The primary purpose of an ERP system is ________. integration customer acquisition duplication customization

integration

The information system that a restaurant uses to order supplies and ingredients form its suppliers is an example of a(n) _____.

inter-enterprise information system

Which of the following is a function of the technology office in an organization's IS department?

investigating new information systems

Amanda is working for the CEO of a small company. He asks her to develop a dashboard. Amanda starts thinking about the questions she needs to ask. She asks her boss for his critical success factors and how he will measure them. The measures of CSF's are called a) clustering b) classification. c) real-time data d) key performance indicators e) status access

key performance indicators

A(n) ________ is text not tied to a specific field.

label

Which of the following workgroup processes is related to sales and marketing? A. order management B. customer support C. lead tracking D. accounts receivable

lead tracking

Users should not bother IS personnel for trivial issues, instead they should fulfill their responsibilities by ________.

learning basic computer skills

If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________. 1/1 pts

leave it

When you buy an Operating System for your personal comp, you are buying a software____

license

In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________.

lift

When you ________ an external table, you connect to the table without actually importing the table's data. associate embed join link

link

When you ________ an external table, you connect to the table without actually importing the table's data. associate join embed link

link

When you ________ an external table, you connect to the table without actually importing the table's data. join link associate embed

link

which is SM app provider?

linkedin

In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.0/1 pts

links

A(n) ________ allows the user to select a field value from a list of options. field property data macro input mask lookup field

lookup field

The data validation method that causes fields to be limited to predefined list of values is a:

lookup list.

An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated? de facto sole source loss of control diseconomies of scale superfluous CIO

loss of control

The primary risk of peer-to-peer support in the context of social media and customer service is ________. loss of control loss of credibility increase in expenses lack of privacy

loss of control

In 2024, emergence in the context of management would most likely mean a(n) ________.

loss of control over employees

In 2024, emergence in the context of management would most likely mean a(n) ________. increase in the control over culturally-diverse customers loss of control over employees loss of loyal customers increase in the use of social media for managing employees

loss of control over employees

Which phase of the customer life cycle categorizes customers according to value and attempt to win back high-value customers?

loss/churn

Fixing a system so that it works correctly, or adapting it to changes in requirements, occurs during the ________ phase of the SDLC. component design maintenance implementation requirements analysis

maintenance

Before linking to a spreadsheet, you must first:

make sure the data is organized.

A(n) ________ query can be used to archive older records that need to be stored outside of the current table.

make table

A(n) ________ query can be used to archive older records that need to be stored outside of the current table. make table append update delete

make table

You use a ________ query to select records of former employees from a table and use them to create a new table. merge tables combine tables make table create table

make table

Which of the following shows the products that customers tend to buy together? neural networks regression analysis market-basket analysis cluster analysis

market-basket analysis

Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects?

marketing

Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects? loss/churn customer acquisition relationship management marketing

marketing

A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.

mart

A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. cube model mart mine

mart

Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience. fixed interfaces mashups viral hooks web beacons

mashups

Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience. mashups fixed interfaces viral hooks web beacons

mashups

In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process.

messages and data

In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process. messages and data tasks and activities resources control

messages and data

BI servers use ________ to determine what results to send to which users and on which schedule.

metadata

Which of the following are the steps in the business process management (BPM) cycle? model processes; implement processes; assess results; create components implement processes; create components; model processes; assess results model processes; create components; implement processes; assess results create components; model processes; implement processes; assess results

model processes; create components; implement processes; assess results

The more technical an organization, the ________ the social policies. less important more stringent more lenient less open

more lenient

A(n) ________ accepts two or more options in a lookup field.

multiple-value field

four functions of a Data warehouse

obtain, clense, organize, catalog

OLAP stands for ________. online analytical processing object-based lead analysis procedure object-oriented analytical protocol organizational lead analysis process

online analytical processing

A small and midsized org w/limited budget may consider ___ vs microsoft

open office

According to Gossieaux and Moran, which of the following activities are seekers of the truth most likely to facilitate? marketing sales operations human resources

operations

A ________ examines each part of a message and determines whether to let that part pass.

packet-filtering firewall

In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational

parallel

In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. pilot parallel phased plunge

parallel

In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. pilot parallel plunge phased

parallel

Business Intelligence

patterns, relationships, trends, and predictions

Which of the following revenue models is most likely followed by companies providing Web 2.0 services? traditional marketing pay-per-click user participation venture capital

pay-per-click

A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.

payload

In the system implementation phase of the SDLC, with the ________ installation, the organization installs the next piece of the system only after the previous piece works

phase

Email spoofing is a synonym for ________.

phishing

In the system implementation phase of the SDLC, with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business

pilot

In the system implementation phase of the SDLC, with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business. parallel pilot phased plunge

pilot

In the system definition phase of the SDLC, the first major task for an assembled project team is to ________. plan the project

plan the project

Which of the following workgroup processes is related to manufacturing?

planning and scheduling

Which of the following workgroup processes is related to manufacturing? product and brand management order entry and tracking planning and scheduling finished goods inventory management

planning and scheduling

Which of the following workgroup processes is related to manufacturing? A. order entry and tracking B. planning and scheduling C. product and brand management D. finished-goods inventory management

planning and scheduling

In the context of system implementation phase of the SDLC, a ________ installation is the riskiest because the old system is shut down and the new system is introduced. pilot phased parallel plunge

plunge

Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?1/1 pts

possibility of error

Confidence

probability estimate of buying and item

Lift

probability of buying X without Y

it is generally more difficult to make changes to ______of an IS than to database itself

procedures

The inherent processes defined in an ERP solution are known as _____.

process blueprints

The inherent processes defined in an ERP solution are known, by some ERP vendors, as ________.

process blueprints

The inherent processes defined in an ERP solution are known, by some ERP vendors, as ________. stored procedures process blueprints transaction logs database transactions

process blueprints

The inherent processes defined in an ERP solution are known, by some ERP vendors, as ________. transaction logs stored procedures process blueprints database transactions

process blueprints

_____ is a measure of the ratio of process outputs to inputs.

process efficiency

BI Analysis

process of creating business intelligence through reporting, data mining, and knowledge mgmt

Data Aquisition

process of obtaining, cleaning, organizing, relating, and cataloging source data

A stored procedure is a _____.

program stored in a database that keeps the database consistent when certain conditions arise.

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. stop SQL injection attacks prevent brute force attacks provide physical security protect against email spoofing

provide physical security

Which of the following is an example of a structured process? A. using social media to create buzz about a new product B. solving the problem of excessive product returns C. purchasing raw materials D. deciding on the location of a new store

purchasing raw materials

If you want users to view a form but not make any changes to its data, you would use a ________ form. locked secure read-only protected

read-only

A ________ is a form that enables users to view but not change data.

read-only form

granularity

refers to the level of detail represented by the data

Which of the following is an example of a supervised data mining technique? click streaming market-basket analysis cluster analysis regression analysis

regression analysis

Which of the following is an example of a supervised data-mining technique?

regression analysis

When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is _____.

reinforce employees' sense of self-efficiency

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling more product?

relationship management

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?

relationship management

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product? loss/churn marketing customer acquisition relationship management

relationship management

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product? marketing loss/churn relationship management customer acquisition

relationship management

RFM Analysis

reporting technique that considers how RECENTLY a customer has ordered, how FREQUENTLY they order, and how much MONEY the spent.

Online Analytical Processing (OLAP)

reporting technique that provides the ability to sum, count, average, and perform other simple arithmatic operations on a group of data, OLAP reports are dynamic, meaning viewers can change the format.

In a business process, an inventory or a database is an example of a ________.

repository

In a business process, an inventory or a database is an example of a ________. decision tree repository botnet cookie

repository

A(n) ________ sets the property of a field to force data entry.

required

A field that cannot be left blank when you create a new record is a:

required field.

Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced?

requirements analysis

Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced? component design system definition requirements analysis system implementation

requirements analysis

Pull Publishing

requires user to request BI

Defenders-of-belief communities facilitate activities like ________. inbound logistics customer service functions manufacturing and operations sales and marketing

sales and marketing

An OLAP report has measures and dimensions. Which of the following is an example of a dimension? average cost total sales average sales sales region

sales region

An OLAP report has measures and dimensions. Which of the following is an example of a dimension? average sales total sales average cost sales region

sales region

Info Silos arise as consequence of org's?

se workgroup IS

_____ refers to a person's belief that he or she can be successful at his or her job.

self-efficiency

According to the SEAMS dynamic process, which of the following activities is most likely to involve the identification of important communities, what they do, where they hang out, what they care about, and how organizations relate to them? activating sensing measuring engaging

sensing

Flexible communication among distributed applications is possible because of a set of standards that support a design philosophy known as _____.

service oriented architecture

Which of the following is a function of the steering committee for an IS department? imparting training writing program code adapting software setting IS priorities

setting IS priorities

According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.

signals

According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component. 1/1 pts

signals

SM communities differ from in past bc--

sm communities firmed on mutual interests

Data Mart

smaller than a data warehouse, and addressed the needs of a particular department or functional area of a business

A(n) ________ has a microchip in it to hold data. ATM card smart card cookie key escrow

smart card

A(n) ________ has a microchip in it to hold data. cookie key escrow ATM card smart card

smart card

When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her ________. process capital social capital human capital structural capital

social capital

Being linked to a network of highly regarded contacts is a form of ________. viral marketing crowdsourcing human capital social credential

social credential

The first step that any hypersocial organization should take is to develop and publicize a(n) ________ policy.0/1 pts

social media

the use of IT to support the sharing of content among network of others____

social media

A ________ is an information system that supports the sharing of content among networks of users.

social media information system (SMIS)

A ________ is an information system that supports the sharing of content among networks of users. database management system (DBMS) social media information system (SMIS) human resource information system (HRIS) transaction processing system (TPS)

social media information system (SMIS)

A ________ is an information system that supports the sharing of content among networks of users. social media information system (SMIS) database management system (DBMS) transaction processing system (TPS) human resource information system (HRIS)

social media information system (SMIS)

In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process. dotted arrows solid arrows circles diamonds

solid arrows

5 basic reporting operations

sorting, filtering, grouping, calculating, formatting

Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites

sponsors

A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives. discussion forum steering committee IS department board of directors

steering committee

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization.

strength of a relationship

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. coefficient of relationship customer lifetime value value of human capital strength of a relationship

strength of a relationship

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. customer lifetime value strength of a relationship coefficient of relationship value of human capital

strength of a relationship

org uses formula to calc the ROP. example of a ______ decision process

structured

_____ are formally defined, standardized processes that involve day-to-day operations.

structured processes

By using a ________, you can create a form that displays records from two related tables. mini-form subform linked form subordinate form

subform

By using a ________, you can create a form that displays records from two related tables. subform mini-form subordinate form linked form

subform

By using a ________, you can create a form that displays records from two related tables. subform subordinate form linked form mini-form

subform

Enterprise application integration is a ________.

suite of software applications that consolidates existing systems by providing layers of software that connect applications together

Enterprise application integration is a ________. suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform strategy that uses business process management to radically enhance the customer service experience from any customer base suite of software applications that consolidates existing systems by providing layers of software that connect applications together

suite of software applications that consolidates existing systems by providing layers of software that connect applications together

With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. click streaming cluster analysis unsupervised data mining supervised data mining

supervised data mining

With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. unsupervised data mining click streaming supervised data mining cluster analysis

supervised data mining

In market-basket terminology, ________ describes the probability that two items will be purchased together.

support

To test an update query before running it, you can:

switch to Datasheet view.

A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans. user support representative business analyst systems auditor system analyst

system analyst

During the system implementation phase of the SDLC, once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?

system conversion

BI Systems

systems that process operational and other data to identifie patterns, relationships, and trends for use among other workers and business professionals

The ________ is the sequential advancing in a form from one field to the next.

tab order

A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials. system analyst programmer technical writer consultant

technical writer

A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials. technical writer consultant system analyst programmer

technical writer

A social media policy is a statement ________.0/1 pts

that declines emps rights and responsibilities

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? the Privacy Act of 1974 the Sarbanes-Oxley Act the Gramm-Leach-Bliley Act the HIPAA of 1996

the HIPAA of 1996

Deleting problematic content on social networking sites is best reserved for when ________.1/1 pts

the content is obscene and inappropriate

Responding to problematic content on social networking sites is best reserved for when ________.1/1 pts

the problematic content has caused the organization to do something positive as a result

Organizations like Oracle and SAP find it difficult to move toward low-cost cloud solutions as _____.

they cannot walk away from the revenue of lucrative support contracts that they entail.

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. threat key escrow target vulnerability

threat

Drill Down the Data

to further divide the data into more detail

as ceo you ask for sales figures of prev qtr. mgmr sends you detailed invoices this info no good bc ____

too much info

Which of following IS requirements falls into content sharing category?

tracking versions of many docs

A ________ involves balancing three critical factors: requirements, cost, and time. critical path test plan trade-off WBS

trade-off

A ________ involves balancing three critical factors: requirements, cost, and time. trade-off critical path test plan WBS

trade-off

ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called _____.

train the trainer

ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________. employ the employer train the trainer on-the-job training top-down training

train the trainer

ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________. on-the-job training train the trainer employ the employer top-down training

train the trainer

Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems? A. coercing employees to learn the new system B. paying employees straight-out for transitioning to the new system C. training employees on the successful use of the new system D. giving employees ultimatums and deadlines

training employees on the successful use of the new system

Digital dashboards provide all of the following capabilities except: a) drill-down b) transaction processing c) status access d) key performance indicators e) exception reporting

transaction processing

A(n) _____ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.

trigger

A Multivalued Lookup field accepts numerous options instead of just one field choice.

true

A calculated control contains an expression that generates a calculated result.

true

A common business application of decision trees is to classify loans by likelihood of default.

true

A crosstab query works best when the data source has at least two grouping fields.

true

A folksonomy is content structure that has emerged from the processing of many user tags.0/1 pts

true

A form or report header appears one time at the top of each form or report.

true

A linked file opens in Access even though the data resides in an external Excel file.

true

A lookup field can be used when there is repetitive data in a field.

true

A parameter query is similar to creating most other query types.

true

A read-only form is a form that enables users to view but not change data.

true

A required field indicates that a value for the field must be entered.

true

A required field is one that cannot be left blank when you create a new record.

true

Access creates a temporary file on your computer each time you open an attachment file.

true

Action queries display different icons than select queries in the Navigation Pane.

true

Action queries include update, append, make table, and delete.

true

After exporting a file, if the document is too wide to display all the text, it will display on two pages.

true

After inserting a line into a form or report, you can modify the color, thickness and line type.

true

An action query can be used to add, edit, or delete data in a database.

true

An append query is used to add records to an existing table.

true

An attachment appears as a paperclip in a table.

true

An explanatory note added to a form or report is considered a label because it is not tied to a specific field.

true

An input mask forces users to conform to a specific data-entry format for a given field.

true

Backing up the database prior to running an update query is the best precaution.

true

Before exporting a table to another database, the new database has to be created.

true

Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content.1/1 pts

true

Both community users and employees of SM sponsors process SM sites using communications devices. 0/1 pts

true

Both forms and reports have a text box control, which displays the data found in the record source.

true

Both label controls and text box controls are known as bound controls.

true

Bound, unbound, and calculated controls are not found on the Controls group on the Design tab.

true

By creating an input mask you can further restrict the data being input into a field by specifying the exact format of the data entry.

true

Changes to a subform are easier to make in Layout view.

true

Choosing the wrong matched field in an unmatched query will cause you to query incorrect information.

true

Columnar forms and reports do not export to Word properly.

true

Content data is data and responses to data that are contributed by users and SM sponsors.0/1 pts

true

Dynamic reports are BI documents that are updated at the time they are requested.

true

Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.1/1 pts

true

Exporting tables and queries to Excel is usually predictable and consistent because of the similarity between an Access datasheet and an Excel spreadsheet.

true

Facebook, Twitter, LinkedIn, and Google are all SM application providers.

true

For an import to be successful, column headings and data formats should be an exact match, and in the same order, to those in your database.

true

For phone numbers, the input mask helps ensure consistency in data entry.

true

Forms and reports based on a query can display calculated fields like any other field.

true

If no caption has been set for a field, the label will default to the field name.

true

If you add a validation rule to a table with existing records, some data in those records may violate the rule.

true

If you create a form based on a table with a lookup field, the lookup field becomes a combo box control on the new form.

true

If you want to export specific records in a table to Excel, you can either filter the table or create a query for the needed records.

true

If you want to see records with a field within a certain date range, you could use the Between operator.

true

In a report, click the next and previous arrows on the Attachment toolbar to advance from one attachment to the next.

true

Instead of modifying the query grid each time a new criteria is needed, a parameter query can be created to enter the criteria.

true

It is important to ensure that when you delete duplicate records, you do not delete associated records in a related table.

true

It is recommended to preview results before running a delete query.

true

It is usually better to enter the value of zero rather than have a null value in a field.

true

JPEG and other photo formats increase the database size byte for byte.

true

Like any other field, a calculated field using DatePart can have criteria applied to it.

true

Moving records from one table to another can be accomplished with the combination of an append query and a delete query.

true

Once an attachment is added to a database table the file is saved as long as you have clicked the record below the current record.

true

Once you run an action query, you are committing yourself to an irreversible change.

true

One of the main reasons for importing a spreadsheet into Access is that you have more control over the imported data.

true

One of the major sources of UGC problems is inappropriate content.0/1 pts

true

One reason an append query can fail is because of duplicate primary keys in the source and destination tables.

true

PDF documents are the preferred format when exporting from Access.

true

PDF or XPS documents can be opened by their respective document readers, which are free downloads.

true

Page breaks can be added at specific locations in forms or reports.

true

Prior to updating data in a table, you must first locate the records that need to be modified.

true

Reports can be created based on the results of a parameter query.

true

Rich Text Format (RTF) is a format that enables documents created in one software application to be opened with a different software application.

true

SM communities formed on mutual interests and transend family and geographic boundaries

true

SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.1/1 pts

true

Saving the export steps is the last step in the export process.

true

Simple forms created with a Form tool will handle most basic database solution needs.

true

Tables, queries, forms and reports can all be exported to a PDF or XPS document.

true

The Date function calculates the current date.

true

The Date function is commonly used as a default value for a date field.

true

The delete query saves you the chore of having to locate and delete records manually.

true

The detail section of a form or report displays in between the headers and footers sections.

true

The find unmatched query only works if two tables share a common field.

true

The find unmatched query requires two tables with a common field where one of the tables is missing information.

true

The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.1/1 pts

true

The grouping in a crosstab query comes from the definitions of row and column headings.

true

The options for a lookup field can be stored in a separate table.

true

The skill used to create a form can be used to create a report as well.

true

The three views in Access are Form or Report view, Layout view, and Design view.

true

The type of data displayed in a crosstab query depends on which aggregate function you choose when creating the query.

true

To add emphasis to a form or report, use the Line control or the Rectangle control.

true

To ensure the integrity of records in a table, you should set the required property to Yes for critical fields.

true

To remove a tab stop, click the Other tab in the Property sheet and change the Tab Stop setting to No.

true

Unbound controls do not require data entry so a tab stop can be removed.

true

User-generated content (UGC) is the essence of SM relationships.1/1 pts

true

Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.1/1 pts

true

Validation rules limit the type or range of data a user can enter into a field.

true

Validation rules prevent invalid data from being entered into a field.

true

When a form has been created as read-only, it should be renamed to indicate it is read-only.

true

When a report has been created and used in Access, it can be formatted and laid out differently than the original design.

true

When adding a file to an attachment field, the file is actually copied into the database itself.

true

When choosing fields from two different tables using the Form Wizard, Access automatically assumes you want a form with a subform.

true

When creating a form or report, you can insert an image file containing the company logo.

true

When creating a lookup field, it is important to only allow options from the lookup table.

true

When creating a subform, Access automatically names the subform for you or you can create your own name.

true

When exporting a table to Excel, all records in the table are exported, even if they are not needed.

true

When exporting from Access to Word, you are not able to analyze the data in Word.

true

When running a delete query, you are prompted with a warning message.

true

When running an append query, an append query warning message appears specifying the number of rows to be appended.

true

When there is more than one parameter in a query, Access asks for the information starting from the left and moving to the right.

true

When updating records, convert the select query to an update query and insert the missing information.

true

When using the Lookup Wizard to create a lookup field, Access creates a hidden relationship between two tables-the table that contains the lookup field and the table that holds the options.

true

When you export a table structure from one Access database to another, the new database has to be created.

true

When you export a table to Excel, the field names become the column headings and the records become the rows in the Excel spreadsheet.

true

When you export an object from Access to Word, Access creates a file in the PDF format.

true

When you save an RTF file, you might want to change the file type to a Word document in order to make formatting and editing easier.

true

Word and Excel files are compressed by Access when you attach them.

true

XPS is a file format that displays a printed page onscreen identically on any computer platform.

true

You can use Date() in the default value property to insert the current date when a new record is added.

true

You can use a make table query to copy some or all records from a source table to a destination table even if the destination table does not exist.

true

You should NOT rerun an action query.

true

[Enter city] on the criteria line of a query is an example of the criteria in a parameter query.

true

Which of the following is true of paired programming? two processors are required to run one program two team members write the same program by coordinating from different locations two team members share the same computer to write a computer program together two programs are run simultaneously on one device

two team members share the same computer to write a computer program together

Which of the following is true of paired programming? two team members write the same program by coordinating from different locations two team members share the same computer to write a computer program together two programs are run simultaneously on one device two processors are required to run one program

two team members share the same computer to write a computer program together

regressional analysis

type of supervised data mining, measures the impact of one set of variables on another

Neutral networks

type of supervised data mining, predicts values and makes classifications such as "good prospect" and "poor prospect"

Cluster analysis

type of unsupervised data mining, identifies groups of entities that have similar characteristics

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. faulty services incorrect data modification unauthorized data disclosure loss of infrastructure

unauthorized data disclosure

Market Basket Analysis

unsupervised data mining technique for determing sales patterns, shows the products that customers tend to buy together

A(n) ________ query is used to update or change data automatically based on criteria that you specify.

update

A(n) ________ query is used to update or change data automatically based on criteria that you specify. make table update delete append

update

A(n) ________ can be used when records with missing data have been found.

update query

A(n) ________ would be used to replace null values with zeros?

update query

A(n) ________ would be used to replace null values with zeros? delete query make table query append query update query

update query

Information silos are not a problem until they begin to _____.

use and store data inconsistently across separate databases

Subscriptions

user requests for a particular BI result on a particular schedule or in response to an event

A ________ rule limits the type of data a user can enter into a field.

validation

A ________ rule limits the type of data a user can enter into a field. lookup macro validation default

validation

a _____ is inducement for passing message thru tiers

viral hook

The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ________. swim-lane method agile development method waterfall method scrum process

waterfall method

Which of the following information system minimizes data duplication among departments? A. personal information systems B. workgroup information systems C. departmental information systems D. enterprise information systems

workgroup information systems

A ________ is a type of virus that propagates using the Internet or other computer networks. sniffer Trojan horse worm phisher

worm


Kaugnay na mga set ng pag-aaral

*Chapter 3 (Where Prices Come From) // *Chapter 4 (Economic Efficiency, Government Price Setting, and Taxes)

View Set

PrepU Fluid & Electrolyte Balance

View Set

psych 230- chapter 7: information processing

View Set

Ch 35, 36, 37 Musculoskeletal Functions, Disorders, and Trauma REVIEW QUESTIONS

View Set