BMIS 311 Final
How do information systems improve business processes?
. Information systems improve the efficiency and/or effectiveness of business processes.
In 2017, American business spent ________ on information systems hardware, software, and telecommunications equipment.
1 trillion
Unfortunately, enterprise applications fail to meet expectations ________ percent of the time.
44
Studies of actual managerial performance indicate that managers perform work at a pace of _______ different activities each day.
600
In 2018, mobile marketing constitutes ________ percent of all online marketing.
70
According to Panorama Consulting Solutions, in 2018, the average time to implement an ERP project is approximately ________.
A. 17.4 months
________ is used to ensure the person is who he/she claims to be.
A. Authentication
Which of the following is NOT part of the analysis of a situation that presents an ethical issue?
A. Avoid actions with extremely low failure costs.
________ help(s) ensure that important network traffic receives high priority, and less-critical network traffic receives lower priority.
A. Deep packet inspection (DPI)
________ are data files used to identify and protect online transactions using a trusted third party.
A. Digital certificates
________ avoid the problem of having databases in areas such as finance, human resources, sales and marketing, and manufacturing that are not capable of sharing information.
A. Enterprise resource planning (ERP) systems
What type of systems contain redundant hardware, software, and power supply components to create an environment that provides continuous, uninterrupted service?
A. Fault-tolerant computer systems
________ percent of online retailers have m-commerce Web sites.
A. Fifty-five
What revenue model offers basic services or content for free, while charging a premium for advanced or special features?
A. Free/freemium revenue model
________ consists of processes and tools to identify the valid users of a system.
A. Identity management
________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.
A. In-memory computing
E-commerce refers to the use of the ________ and ________ to transact business.
A. Internet; Web
How is a knowledge asset different from a physical one?
A. Knowledge is not subject to the law of diminishing returns as physical assets are.
________ is the study of how computers can potentially improve without human programming.
A. Machine learning
________ includes computer viruses, worms, and Trojan horses.
A. Malware
Chapter 3 Video_Porters Competitive Forces_3.03 mins3 Firms that have computer-based, efficient supply chains can manage their suppliers' pricing behavior. This is an example of managing which of Porter's competitive forces?
A. Power of suppliers
In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.
A. Sarbanes-Oxley
A ________ is a software program that mimics another program and often causes damage.
A. Trojan horse
The most commonly used authentication technique used for end users is ________.
A. a password
Regarding moral dimensions of the information age, ________ include(s) the issue of who can and will be held liable for harm done to property rights.
A. accountability and control
The doubling of computing power every 18 months has raised questions about the ________.
A. accuracy and reliability of information systems
Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.
A. administrative
To describe datasets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze, the term __________ is used.
A. big data
Some ERP vendors include in-memory-computing technology that provides ________ tools for ad hoc analysis, what-if scenario analysis, and machine learning that analyzes very large data sets.
A. business intelligence
A strong foundation in database technology is required for ________.
A. business intelligence and analytics
A(n) ________ is an Internet business model in which information content is sold and distributed.
A. content provider
Companies that establish a competitive advantage by having the lowest prices in an industry are using a ________ approach.
A. cost-leadership
Customer relationship management includes ________.
A. customer support applications
What type of attack consists of malware that comes with a downloaded file that a user intentionally requests, such as a free game or coupon?
A. drive-by download
If a Web site changes its prices based on the demand characteristics (e.g., concert tickets), this would be an example of ________.
A. dynamic pricing
The acronym EDI stands for ________
A. electronic data interchange
A(n) ________ is a major type of KM that collects, stores, and disseminates digital content and knowledge.
A. enterprise-wide KMS
A record describes a(n) ________ which is a person, place, thing, or event on which we store and maintain information. Each characteristic or quality describing a particular ________ is called a(n) ________
A. entity; entity; attribute
In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to ________.
A. human resources
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.
A. information policy
The ________ strategy focuses on having components arriving exactly at the time they are needed.
A. just-in-time
Expert systems model human knowledge in a structure known as a(n) ________.
A. knowledge base
According to your reading, Coca-Cola implemented an SAP enterprise system to overcome a ________.
A. lack of standard, companywide business processes
A comprehensive CRM package contains modules for ________ and _______ relationship management.
A. partner; employee
Although "Big Data" doesn't refer to a specific amount of data, it usually does involve ________.
A. petabytes
The primary benefit of disintermediation to the consumer is ________.
A. removing layers and reducing costs
The ________ of the web makes it possible to deliver messages with text, audio, and video simultaneously to large numbers of people.
A. richness
In an enterprise system, the integrated software modules that focus on return requests are related to ________.
A. sales and marketing
According to the e-commerce presence map, activities including conversation are a(n) ________ type or presence.
A. social media
Enterprise applications include high ________, making it difficult to change vendors.
A. switching costs
Regarding moral dimensions of the information age, ________ include(s) the issue of what standards should we demand to protect the safety of society.
A. system quality
The accessibility, storage, and distribution of information and knowledge is increased dramatically by ________.
A. the Internet
Which of the knowledge management systems' IS activities involve data mining?
Acquire
What is a disaster recovery plan?
B. A plan to restore disrupted computing and communications services
________ feature(s) monitor the network at its most vulnerable points.
B. Intrusion detection systems
________ deals with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by managers and employees
B. Management information systems (MIS)
Select the answer that lists all of the business benefits of collaboration and social business.
B. Productivity, quality, innovation, customer service, and financial performance
Regarding business intelligence and analytics capabilities, a(n) ________ allows users to generate their own reports based on searches.
B. ad hoc query
Enterprise systems include ________ tools for analyzing overall organizational performance.
B. analytical
When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________.
B. bullwhip effect
A collection of routines for producing goods and services is called a(n) ________.
B. business process
When a strategic system is adopted, managers will need to devise new ________ for coordinating their firm's activities with customers, suppliers, and other organizations.
B. business processes
Technical standards for conducting e-commerce have been adopted ________.
B. by all nations around the world
An example of ________ includes someone taking out a loan and then being sold a checking account as well.
B. cross-selling
Businesses that collaborate and use social business often see benefits in productivity, quality, innovation, sales growth, and ________.
B. customer service
Data cleansing, working to identify and fix incorrect data, is also called ________.
B. data scrubbing
A(n) ________ enables an organization to centrally manage and organize data.
B. database management system
A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.
B. denial of service
A display which presents graphs and charts of key performance indicators on a single screen for managing a company is called a ________.
B. digital dashboard
MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted.
B. disaster recovery planning
Substitute products that perform as well as or better than anything currently produced are called ________.
B. disruptive technologies
A set of principles governing the collection and use of information about users is called ________.
B. fair information practices
A ________ provides the link from one table to another table's primary key.
B. foreign key
Mapping areas of the country with higher RSV rates is an example of a ________.
B. geographic information systems (GIS)
In Europe, before data is gathered, ________ must be given by customers with knowledge of all the facts needed to make a rational decision.
B. informed consent
Canvas and Blackboard are examples of ________.
B. learning management systems
The competitive rivalry force of the Internet is strong because it has ________.
B. made it easier for companies to compete on price alone
If your firm is locked into older information systems that are expensive to maintain, this makes your firm vulnerable to _________.
B. new market entrants with the latest technology
According to the value chain model, operations are considered a ________ of the firm.
B. primary activity
Nike sells customized sneakers through NIKEiD to establish ________.
B. product differentiation
Regarding business intelligence and analytics capabilities, a(n) ________ could include submitting financial documents to the SEC using XBRL (industry-specific requirements).
B. production report
Regarding moral dimensions of the information age, ________ is the standard by which cultural values are evaluated and supported in a digital society.
B. quality of life
Examining college admission scores in addition to interviewing the applicant is an example of a(n) ________ decision.
B. semi-structured
Related to social e-commerce, small world theory suggests you are only ________ link(s) from every other person on earth.
B. six
The knowledge an employee has in his mind that has not been documented is called ________.
B. tacit knowledge
Ethical issues in information systems have been given new urgency by ________.
B. the rise of the Internet and electronic commerce
A(n) ________ is an Internet business model where users save time and money by processing online sales transactions and generating a fee for each transaction.
B. transaction broker
________ targeting techniques increase the effectiveness of banners, rich media, and video ads.
Behavioral
________ of an organization's profits can be attributed to the alignment of IT with the business.
C. About 50 percent
What would describe proper use of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet?
C. Acceptable use policy
Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a peer-to-peer network nearly instantaneously without a central authority?
C. Blockchain
Which of the knowledge management systems' IS activities involve search engines?
C. Disseminate
Which of the following is NOT a challenge to the implementation of an ERP?
C. Dramatic reductions in inventory costs and order to delivery time
What is structured knowledge?
C. Explicit knowledge that exists in formal documents, as well as in formal rules.
________ include(s) the strategy and policies for using information technology within an organization.
C. IT governance
________ represents an organization's business processes that are designed to create, store, transfer, and apply knowledge.
C. Knowledge management
All of the following are types of information obtained from data mining EXCEPT ________.
C. Web beacons
________ is the collective and individual experience applied to solving problems.
C. Wisdom
Data mining and big data analytics are examples of ________.
C. a business analytics toolset
From an information technology perspective, ________ includes the infrastructure for warehousing, integrating, reporting, and analyzing data from the business environment.
C. business intelligence (BI)
Viruses differ from worms because worms ________.
C. can operate on their own without attaching to other computer program files
Storing past experiences in the form of cases is a KM method called ________.
C. case-based reasoning (CBR)
Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called ________.
C. customer lifetime value
A(n) ________ is a database that stores historic and current data for the use of decision makers in the organization.
C. data warehouse
The two most important management challenges when building an e-commerce site include knowing how to choose the right technology and ________.
C. developing a clear understanding of your business objectives
Regarding business intelligence and analytics capabilities, a(n) ________ allows moving from a high-level summary to a micro-level view.
C. drill down
The fastest growing form of retail trade in the United States, Europe, and Asia is ________.
C. e-commerce
Newsletters, updates, and sales are activities related to the ________ e-commerce presence map.
C. e-mail
The principles of right and wrong that guide an individual are called ________.
C. ethics
In an enterprise system, the integrated software modules that focus on cash management and forecasting are related to ________.
C. finance and accounting
Information technology today can change the ________, making it possible for people to share information.
C. flow of information
Knowledge management ________ the ability of the organization to learn from its environment.
C. increases
Knowledge workers usually have ________ as a routine aspect of their work.
C. independent judgment
Advances in data storage techniques and the rapidly declining costs of data storage threaten ________.
C. individual privacy
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.
C. information policy
Neural networks are used for ________.
C. knowledge discovery
Vail Ski Resort implemented a decision support system (DSS) in order to ________.
C. make better decisions about how to target their marketing programs
The most common type of computer security incident is ________.
C. malware infection
Business strategy is considered part of the ________.
C. managerial users and methods
The fact that universal technical standards for the Internet and electronic commerce exist lowers ________ costs, making it cheaper for merchants to sell their goods.
C. market entry
Information systems can be used to create products and services that are personalized to meet a specific customer's requirements, termed __________.
C. mass customization
Management information systems (MIS) provide ________.
C. middle managers with reports on the organization's current performance
The formal process to remove data problems such as repeating groups is called ________.
C. normalization
Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital society.
C. property rights and obligations
A supply chain management system using a(n) ________ model bases production schedules on forecasts.
C. push-based
A collaborative business culture is characterized by:
C. reliance on teams of employees to achieve and implement the results.
E-commerce has become more ________.
C. social, mobile, and local
In order to align IT with business as well as use information systems correctly managers need to perform a(n) ________.
C. strategic systems analysis
Functional information systems that operate independently of one another are becoming a thing of the past because ________.
C. they make sharing information across functional systems difficult
A decision about whether or not to enter a new market would be characterized as ________ and is the responsibility of _______ management.
C. unstructured; senior
According to your readings, ________ was able to link external suppliers, which allowed it to obtain more than 70 percent of parts from outside the organization.
Chrysler
The study of information systems is a multidisciplinary field. Which of the following lists accurately includes all of the disciplines?
Computer Science, Operations Research, Sociology, Management Science, Economics, Psychology
________ are small text files loaded on a computer when a user visits Web sites.
Cookies
What is a touch point?
D. A method of interaction with a customer
________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law
D. Computer forensics
________ businesses gather and sell personal information to government agencies.
D. Data broker
________ are currently the most successful (revenue) online marketing and advertising format.
D. Display ads
________ use a more flexible data model and are designed for big data.
D. Non-relational database management systems
________ encompasses a set of assumptions about what an organization should produce, how it is produced, and for whom.
D. Organizational culture
What is a Web beacon?
D. Small software programs that keep a record of users' online clickstream
All of the following are methods of authentication EXCEPT ________.
D. TCP/IP
Which of the following is NOT an example of a company's transaction processing system?
D. Walmart's internal email system
An extranet is a system that shares data ________.
D. across multiple organizations
Enterprise applications have drawbacks mainly because they ________.
D. are very expensive to purchase and implement
The use of computers (hardware and software) to emulate human behavior is called ________.
D. artificial intelligence (AI)
Based on your reading, information systems help businesses compete ________.
D. but sustaining a competitive advantage is challenging
The sales, manufacturing, and inventory systems at a bicycle manufacturer use different codes to represent bicycle frame sizes. For example, in the sales system, a large bike frame is coded with "L", while the inventory system codes a large bike frame with "LG". This situation illustrates ________.
D. data inconsistency
A(n) ________ is a collection of data organized to serve many applications efficiently.
D. database
One downside to complex enterprise software occurs when it ________.
D. degrades system performance
The Internet has made intellectual property ________.
D. difficult to protect
All of the following are technology trends that raise ethical issues EXCEPT ________.
D. disruptive technologies
An innovation that dramatically changes the business environment is called a(n) ________.
D. disruptive technology
The ________ role is NOT one of the activities that managers are expected to perform in an organization.
D. high velocity
The iPhone voice Siri is a type of ________.
D. intelligent agent
If someone loads a program that tracks everything you type, the specific spyware is a(n) ________.
D. key logger
Behavioral models of managerial behavior state that managers exhibit all of the following behaviors EXCEPT being ________.
D. less informal
In an enterprise system, the integrated software modules that focus on production capacity are related to ________.
D. manufacturing and production
Behavioral models suggest that the actual actions of managers are ________ than previously believed.
D. more informal
FedEx has been using ________ to develop models of how customers will respond to price changes and new services.
D. predictive analytics
The knowledge management value chain begins with the ________.
D. procurement of knowledge
A supply chain management system using a(n) ________ model bases production schedules on actual customer orders.
D. pull-based
Managers often maintain a(n) ________ as a buffer during unforeseen events.
D. safety stock
If a cookie company uses Facebook to help sell a product, they are embracing ________.
D. social business
Chapter 3 Video_Porters Competitive Forces_3.03 mins1 Porter's competitive forces are useful to analyze a firm's information systems and identify its _____.
D. strategic position within its industry
The strategy used by an expert system to search the rule base to arrive at a conclusion is called ________.
D. the inference engine
A raw fact would be considered ________.
Data
How do information systems support the activities in a supply chain?
E. By reducing inventory levels
The law that requires financial institutions to ensure confidentiality of customer data is called the ________.
E. Gramm-Leach-Bliley Act
Which of the following statements about information systems and business processes is correct?
E. Information systems may make it possible to completely change a business process.
Which of the following options is NOT a unique feature of e-commerce technology?
E. Our geographic boundaries now determine our network experience.
What are knowledge work systems?
E. Specialized systems for discovering and creating new knowledge.
SQL stands for ________.
E. Structured Query Language
The introduction of new information technology has a ripple effect which raises many issues. These issues have the following moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and ________.
E. accountability and control
Analytical CRM includes applications that ________.
E. analyze customer data for improving business performance
According to your text, Elemica's Web site for buying and selling chemicals is an example of ________ electronic commerce.
E. business-to-business (B2B)
BarnesandNoble.com is an example of ________ electronic commerce.
E. business-to-consumer (B2C)
In many companies, the information systems department is headed by a(n) ________.
E. chief information officer (CIO)
The person responsible for information security in most organizations is the ________.
E. chief security officer
The ________ model of management describes the five traditional functions of managers as planning, organizing, coordinating, deciding, and controlling.
E. classical
The most widely used model for understanding competitive advantage is Michael Porter's ________.
E. competitive forces model
The most common source of business system failure is (are) ________.
E. data quality
The corporate function that is responsible for defining and organizing the content of the database as well as database maintenance is ________.
E. database administration
U.S. schools are experiencing a(n) ________, which means that students in poorer schools have less access to technology.
E. digital divide
About 80 percent of online B2B e-commerce is still based on proprietary systems for ____________.
E. electronic data interchange (EDI)
A(n) ________ makes values from a central database available for applications that support all of an organization's internal business activities.
E. enterprise resource planning (ERP) system
A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________.
E. firewall
Business processes that cross many different functional areas and require coordination across departments are supported by ________ among the participants.
E. flows of material, information, and knowledge
Regarding moral dimensions of the information age, ________ include(s) the issue of determining the data that individuals and organizations can protect.
E. information rights and obligations
A(n) ________ system helps capture, manage, and apply the experience of the organization.
E. knowledge management (KM)
One of the reasons that information technology flattens an organization is ________.
E. managers receive much more timely and accurate information, thus requiring fewer managers
The multidimensional analysis tool in spreadsheets is called a ________.
E. pivot table
The field that uniquely identifies a row in a relational database table is called a ________.
E. primary key
Asking what happens to mining profits if the price of silver drops by 5 percent is an example of ________.
E. sensitivity analysis
Facebook, Twitter, and blogs represent the typical platforms for the ________ e-commerce presence map.
E. social media
In information systems, SaaS stands for ________.
E. software as a service
In the United States, the claim to privacy is protected primarily by ________.
E. the First Amendment
Ethical issues in information systems have become more of an urgent topic because of the rise of ________.
E. the Internet and e-commercec
The most popular type of database today for PCs as well as for larger computers and mainframes is ___________ database.
E. the relational
________ enables the computer-to-computer exchange between two organizations of standard transactions such as invoices, shipment schedules, or purchase orders.
EDI
Which below is the correct definition of "war driving"?
Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
_________ help businesses become more efficient by integrating functional business processes into a single information system that spans all business areas.
Enterprise resource planning (ERP) systems
________ refers to the principles of right and wrong that individuals use to make choices.
Ethics
Which of the following statements is NOT accurate regarding how information systems are transforming business?
Fifty-five percent of the entire population now use desktop computers, and their sales are soaring.
________ algorithms were inspired by biological systems that examine optimal solutions for a given problem based on big data.
Genetic
The act that aims at protecting medical records is the ________.
HIPAA
________ is the most popular NoSQL DBMS.
Hadoop
Which answer contains the correct list of moral dimensions of the Information Age?
Information rights and obligations, property rights and obligations, accountability and control, system quality, quality of life
________ includes hardware and software an organization needs to compete in the marketplace.
Information technology (IT)
What makes a Blockchain system possible and attractive to business firms?
Its encryption and authentication processes make it highly secure for storing many kinds of data.
Identifying ________ is a way for managers to determine how to measure the effectiveness of an organization.
KPIs
Which statement below best describes an enterprise system?
Large scale software that encompasses a whole company across many departments and business functions
A massive online course available to the general public is called a ________ .
MOOC
The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.
Privacy Act of 1974
________ include two organizations sharing expertise.
Synergies
30. Which answer best describes what the information systems department is responsible for maintaining?
The information systems department is responsible for maintaining the hardware, software, data storage, and networks that comprise the firm's IT infrastructure.
Microsoft's DBMS that includes built-in report generation and reporting is called ________.
access
A scanner used to capture a product's code (i.e., SKU) is considered ________.
an input
Organizational learning is the result of knowledge ________.
application
A risk ________ determines the level of risk to an organization if an activity or process is not properly controlled.
assessment
An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats.
audit
The field of management information systems (MIS) deals with ________ issues as well as technical issues related to the development and use of information systems in an organization.
behavioral
Companies analyzing huge amounts of data, social media, and other data points represent an emerging area of ________.
big data
Using your handprint to access a safe deposit box is an example of ________ authentication.
biometric
The data and software tools for organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions are referred to as ________ systems.
business intelligence
How a company produces, delivers and sells its products and services in the marketplace is called a(n) ________.
business model
Every business can be seen as a collection of ________.
business processes
Working together as a team to align a competitive strategy with the company's goals is an example of ________.
collaboration
Which one of the following is NOT one of the major business functions or specialized tasks performed by business organizations and supported by information systems?
collective bargaining
Firms that do better than others are said to have a ________.
competitive advantage
When a manager is provided all the facts necessary to support a decision, the ______ dimension of information quality is satisfied.
completeness
The technical approach to information systems includes ________.
computer science and management science
Based on Sam's description of an information system, all of the following are components of an IS except _____.
culture
Chapter 1 Video_The Importance of MIS_4.35 mins2 As explained in this video, the _____ component of an information system is considered a bridge that connects the computer side and the human side of the system.
data
The millions of product bar codes scanned at supermarket checkout counters everyday are examples of ________.
data
A(n) ________, such as a clerk, uses data for things such as scheduling.
data worker
When technology must be changed and designed to fit the needs of the organization and individuals, it may need to be ________ to adjust the fit between the organizational needs and the technology.
de-optimized
Which of the following systems would BEST support managers who focus on unique problems for which the procedure to arrive at a solution may not be fully predefined in advance?
decision-support
A manager's ________ role includes handling disputes.
decisional
DBMS have a data________ capability that is used to specify the structure of the content of the database.
definition
If almost all an organization's significant business relationships are digitally enabled, it would be called a(n) ________.
digit firm
A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the globe, with special time-keeping tools to synchronize the data and ensure the data are always consistent.
distributed
When the data in a message is converted from plain text to cipher text, a process called _________ is used.
encryption
A person, place, or thing which is stored in a database is called a(n) ________.
entity
A(n) ________ is used by senior managers to make decisions.
executive support system
A(n) ________ system is a decision-making tool that follows a series of IF-THEN-ELSE rules.
expert
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A.
field
A ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.
file
Information systems can ________ the organization by empowering lower-level employees.
flatten
IS security firewalls are an example of a ________.
gatekeeper
The term data ________ is used to describe the policies and processes for managing the availability, usability, integrity, and security of the data employed in an enterprise.
governance
The power of the customer ________ if they have an easy time switching from one company (e.g., not having to pay an exit fee) to another.
grows
A business model describes ________.
how a company produces, delivers, and sells a product or service to create wealth
Data is considered to be ________ when the same attribute has different values.
inconsistent
A manager's ________ role includes obtaining the most up-to-date information.
informational
All of the following are general controls EXCEPT ________ controls.
input
Which of the following options has drastically reduced the costs of operating and transacting on a global scale?
internet
A supply chain management system is considered a type of ________ system because it shares data across multiple organizations.
interorganizational
When managers act as leaders, motivating, counseling, and supporting their subordinates, they are performing the ___________ role.
interpersonal
Using Internet technology to create an internal system is called a(n) ________.
intranet
To transform information into ________, a firm must expend additional resources to discover patterns, rules, and contexts.
knowledge
To transform information into _________, resources are used to discover patterns, rules, and context.
knowledge
A supply chain ________.
links suppliers, manufacturing plants, distribution centers, retail outlets, and customers
The global positioning system (GPS) enables ________ -based services for consumers via their smartphones.
location
The functional area which includes the business process to check quality is called ________.
manufacturing and production
A broad term to describe extending a marketplace beyond traditional boundaries is called ________.
marketspace
The fastest growing type of B2C e-commerce is ________.
mobile
A virtual company uses ________ to link people, assets, and ideas.
networks
A(n) ________ network learns from identifying patterns in large datasets.
neural
The most common reason for failure of large projects to succeed is ________.
organizational resistance to change
Because Walmart has an efficient inventory replenishing system, they are able to reduce ________ costs.
overhead
The Children's Online Privacy Protection Act (COPPA) focuses on ________.
parental permissions
A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years.
patent
Transaction processing systems (TPS) are information systems that ________.
perform and record sales, receipts, cash deposits, payroll, and credit decisions in a factory
All of the following disciplines contribute to the contemporary approaches to information systems EXCEPT ________.
philosophy
According to the value chain model, sales and marketing is considered a ________ activity of the firm.
primary
Combining data from multiple sources to create digital dossiers of detailed information on individuals is called ________.
profiling
The behavioral approach to information systems includes ________.
psychology and sociology
All of the following are interrelated changes in the technology area that impact businesses EXCEPT ________.
quantum computing
A decision where only part of the problem has an obvious answer is an example of a(n) ________ decision.
semistructured
All of the following are examples of functional business processes EXCEPT ________.
shipping a product
The ________ view jointly optimizes the social and technical systems used in production.
sociotechnical
The information systems approach to this textbook is the ________.
sociotechnical approach
Examining college admission scores as the sole criteria for admission is an example of a(n) ________ decision.
structured
Last quarter's sales figures are considered ________ knowledge.
structured
Not allowing credit if an individual's credit score is below 600 is an example of a(n) ________ decision.
structured
A ________ chain is a network of organizations for obtaining raw materials.
supply
According to the value chain model, employee recruiting, hiring, and training are considered a ________ activity of the firm.
support
According to the value chain model, technology is considered a ________ of the firm.
support activity
When Sam describes modeling the inputs and outputs of an IS and understanding how they relate to other systems she is describing _____.
systems thinking
A lead chef quitting at a restaurant and taking his secret recipes with him or her is considered ________ knowledge.
tacit
Information in folders, messages, memos, proposals, emails, graphics, electronic slide presentations, and even videos created in different formats and stored in many locations is considered ________ knowledge.
unstructured
Senior executives determining five-year goals is an example of a(n) ________ decision.
unstructured
A report showing an employee's age as a negative number is useless because it lacks ________.
validity