Chapter 9 & Chapter 15 CIS
A ________ is considered a planned activity to achieve a specific business objective.
project
Enterprise applications introduce _________ that describe how once a company adopts an enterprise application from a single vendor, it is very costly to change vendors, and the firm becomes dependent on the vendor.
switching costs Your firm can become dependent on the vendor to upgrade its product and maintain your installation.
Copyright protects creators (individuals) of intellectual property for ________.
70 years after the author's death Copyright is a statutory grant that protects creators of intellectual property from having their works copied for any other purpose for the life for the author plus an additional 70 years after the author's death.
________ targeting techniques increase the effectiveness of banners, rich media, and video ads.
Behavioral Many e-commerce marketing firms use behavioral targeting techniques to increase the effectiveness of banners, rich media, and video ads.
Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a peer-to-peer network nearly instantaneously without a central authority?
Blockchain Blockchain is a distributed database technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority.
Design engineers (knowledge workers) often use ________ as a routine aspect of their work.
CAD Design engineers often use three-dimensional (3D) CAD systems to help create knowledge for the organization.
________ are one of several techniques used to measure the value of investing in long-term capital investment projects.
Capital budgeting models
Who is responsible for educating and training users and information systems specialists about security, keeping management aware of security threats and breakdowns, and maintaining the tools and policies chosen to implement security?
Chief security officer (CSO) The chief security officer (CSO) is in charge of information systems security for the firm and is responsible for enforcing the firm's information security policy.
________ are small text files loaded on a computer when a user visits Web sites.
Cookies Cookies are small text files deposited on a computer hard drive when a user visits Web sites.
A powerful, current example of a rapidly expanding ecosystem is the mobile Internet platform. In this ecosystem there are four industries; select the answer that identifies them.
Device makers, wireless telecommunication firms, independent software applications providers, and Internet service providers Each of these industries has its own history, interests, and driving forces. But these elements come together in a sometimes cooperative, and sometimes competitive, new industry we refer to as the mobile digital platform ecosystem. More than other firms, Apple has managed to combine these industries into a system.
Which of the knowledge management systems' IS activities involve search engines?
Disseminate Disseminate activities include intranet portals, search engines, and collaboration.
Which below is the correct definition of "war driving"?
Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic Wireless networks in many locations do not have basic protections against war driving. An intruder that has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
________ avoid the problem of having databases in areas such as finance, human resources, sales and marketing, and manufacturing that are not capable of sharing information.
Enterprise resource planning (ERP) systems Enterprise systems (also known as enterprise resource planning systems) are based on a suite of integrated software modules and a common central database. The database collects data from many different divisions and departments in a firm.
A(n) ________ is used by senior managers to make decisions.
Executive support systems (ESS) help senior management make decisions.
What type of service can tell you the price of a house you are looking at or about special exhibits at a museum you are passing?
Geoinformation services A geoinformation service can provide a special kind of browser for smartphones equipped with a built-in GPS and compass that can identify your precise location and where the phone is pointed.
Which of the following options is a page description language for generating Web pages (e.g., text, dynamic links)?
HTML Hypertext Markup Language (HTML) is a page description language for specifying how text and graphics are placed on a Web page.
What does HTML stand for?
Hypertext Markup Language HTML (Hypertext Markup Language) is a page description language for specifying how text, graphics, video, and sound are placed on a Web page and for creating dynamic links to other Web pages and objects.
A new version of IP addressing, which contains 128-bit addresses, is called ________.
IPv6 The old addressing system is being replaced by a new version of the IP addressing schema called IPv6 (Internet Protocol version 6), which contains 128-bit addresses (2 to the power of 128), or more than a quadrillion possible unique addresses. IPv6 is not compatible with the existing Internet addressing system, so the transition to the new standard will take years. Next Question
What are the steps that companies go through while practicing business process manage
Identify processes for change, analyze existing processes, design the new process, implement the new process, and continuous measurement.
What are the steps in prototyping?
Identify the user's basic requirements, develop an initial prototype, use the prototype, and revise and enhance the prototype.
The SQL ________ statement allows you to combine two different tables.
JOIN The JOIN statement allows you to combine two more tables in a database.
Managers determine how to measure the effectiveness of an organization by identifying ________.
KPIs
Knowledge workers perform three key roles that are critical to the organization and to the managers who work within the organization. Select the list below that contains these three roles.
Keeping the organization current in knowledge, serving as internal consultants, acting as change agents. Knowledge workers usually have high levels of education and memberships in professional organizations and are often asked to exercise independent judgment as a routine aspect of their work. For example, knowledge workers create new products or find ways of improving existing ones.
Which statement below best describes an enterprise system?
Large scale software that encompasses a whole company across many departments and business functions. Enterprise systems feature a set of integrated software modules and a central database that enables data to be shared by many different business processes and functional areas throughout the enterprise.
________ systems are older transaction processing systems, usually created for mainframes.
Legacy Legacy systems are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.
Which list below contains all the factors you can use to answer the question: How much should our firm spend on IT infrastructure?
Market demand for your firm's services, your firm's business strategy, your firm's IT strategy, infrastructure and cost, information technology assessment, competitor firm services, and competitor firm IT infrastructure investments Your firm does not necessarily need to spend as much as, or more than, your competitors. Perhaps it has discovered much less-expensive ways of providing services, and this can lead to a cost advantage. Alternatively, your firm may be spending far less than competitors and experiencing commensurate poor performance and losing market share.
________ states that the number of components that a computer chip can hold doubles every two years.
Moore's Law In 1965, Gordon Moore, the director of Fairchild Semiconductor's Research and Development Laboratories, an early manufacturer of integrated circuits, wrote in Electronics magazine that since the first microprocessor chip was introduced in 1959, the number of components on a chip with the smallest manufacturing costs per component (generally transistors) had doubled each year. This assertion became the foundation of Moore's Law.
________ is a method for encrypting network traffic on the web.
SSL Secure Sockets Layer is a method for encrypting network traffic during a secure Web session.
n 2002, the ________ Act was passed to help protect investors with new financial statements reforms.
Sarbanes-Oxley Sarbanes-Oxley Act was designed to protect investors with new compliance regulations.
Which item below would be considered direct goods?
Sheet steel used for auto body construction Direct goods are goods used in a production process.
Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.
administrative Formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.
The Law of Mass Digital Storage suggests that the ________.
amount of digital information doubles each year According to the Law of Mass Digital Storage, the amount of digital information is roughly doubling every year.
A risk ________ determines the level of risk to an organization if an activity or process is not properly controlled.
assessment A risk assessment determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all risks can be anticipated and measured, but most businesses will be able to acquire some understanding of the risks they face.
Another name for a database field is a(n) ________.
attribute An attribute and a field are often used interchangeably.
The most common form of organizational change is ________.
automation Automation is the most common form of organizational change. It is considered low risk, low return. Automatically calculating paychecks is an example of simple automation.
The widespread use of personal devices in the workplace and school is often referred to as ________.
bring your own device (BYOD) The popularity, ease of use, and rich array of useful applications for smartphones and tablet computers have created a groundswell of interest in allowing employees to use their personal mobile devices in the workplace, a phenomenon popularly called "bring your own device" (BYOD). Next Question
Global communication and transportation technologies are an example of a(n) ________.
business driver
Databases, data warehouses, data marts, and analytic platforms are part of the ________.
business intelligence infrastructure
When a strategic system is adopted, managers will need to devise new ________ for coordinating their firm's activities with customers, suppliers, and other organizations.
business process Business processes must be created for coordination with customers, suppliers, and other organizations.
A ________ is a component in the computer system data hierarchy that represents an ASCII character like a letter, a number, or another symbol.
byte A group of bits, called a byte, represents a single character, which can be a letter, a number, or another symbol.
Downloading a Kindle e-book from Amazon, buying a computer online at Best Buy, and downloading a music track from iTunes, are examples of how information systems help business processes ________.
change the flow of information New technology can actually change the flow of information, making it possible for many people to perform tasks that can be performed simultaneously.
The person responsible for information security in most organizations is the ________.
chief security officer The chief security officer is responsible for the information security of the firm and for enforcing the firms' security policies.
The ________ model of management describes the five traditional functions of managers as planning, organizing, coordinating, deciding, and controlling.
classical The classical model of management describes what managers do as planning, organizing, coordinating, deciding, and controlling.
Working together as a team to align a competitive strategy with the company's goals is an example of ________.
collaboration Collaboration is working with others to achieve shared and explicit goals.
Craigslist is an example of a massive ________ electronic commerce organization.
consumer-to-consumer (C2C) C2C electronic commerce involves consumers selling directly to consumers. Craigslist and eBay are among the largest C2C organizations.
Allowing each country unit the opportunity to develop an application first in its home country is a(n) ________ strategy.
cooptation
Shopkick is a mobile application that enables retailers to offer customers ________.
coupons Shopkick is a mobile application that enables retailers such as Best Buy to offer coupons to people when they walk into their store. This technology uses GPS to help identify the location of the shopper.
Which of the following is NOT an expected consequence of a systems development project that is poorly managed?
customer satisfaction
Businesses that collaborate and use social business often see benefits in productivity, quality, innovation, sales growth, and ________.
customer service Business benefits of collaboration and social business include productivity, quality, innovation, customer service, and financial performance.
A(n) ________ is a tool which contains information about individual pieces of data and data groupings within a system.
data dictionary
Data cleansing, also known as _________, consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant.
data scrubbing Data cleansing not only corrects errors but also enforces consistency among different sets of data that originated in separate information systems. Specialized data-cleansing software is available to automatically survey data files, correct errors in the data, and integrate the data in a consistent company-wide format.
A(n) ________ is a collection of data organized to serve many applications efficiently.
database A database is a collection of data organized to serve many applications efficiently.
SQL injection attacks are related to ________.
databases An attacker uses a rogue SQL query to the underlying database to access the database or network.
The classical model of management includes the managerial functions of planning, organizing, coordinating, controlling, and _____________.
deciding Deciding is the fifth classical function of management.
A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.
denial of service In a denial-of-service attack, hackers flood a network server with false communications.
U.S. schools are experiencing a(n) ________, which means that students in poorer schools have less access to technology.
digital divide A digital divide exists in U.S. schools, with schools in high-poverty areas less likely to have computers, high-quality educational technology programs, or Internet access availability for their students.
An innovation that dramatically changes the business environment is called a(n) ________.
disruptive technology Disruptive technologies are substitute products that perform as well as or better (often much better) than anything currently produced and so, dramatically change the business environment.
The Domain Name System (DNS) converts ________ to ________.
domain names; IP addresses The Domain Name System (DNS) converts domain names (English-like) to IP addresses.
A company that purposefully centralizes most business activities in its home country is said to utilize a(n) ________ strategy.
domestic exporter
Nike's distributors are ________ in the supply chain.
downstream
Regarding business intelligence and analytics capabilities, a(n) ________ allows moving from a high-level summary to a micro-level view.
drill down Drill down is the ability to move from a high-level summary to a more detailed view.
A(n) ________ is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.
enterprise software application The resulting IT infrastructure links different pieces of computer hardware and smaller networks into an enterprise-wide network so that information can flow freely across the organization and between the firm and other organizations. It can link different types of computer hardware, including mainframes, servers, PCs, and mobile devices, and it includes public infrastructures such as the telephone system, the Internet, and public network services.
A type of Net marketplace that has experienced many failures is the _______, an independently-owned Net marketplace.
exchange Exchanges are independently owned third-party Net marketplaces that connect thousands of suppliers and buyers for spot purchasing.
Systems that are used by senior management to make decisions are called ________.
executive support systems Executive support systems are used to provide senior management with data in order to make decisions.
A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________.
firewall Firewalls prevent unauthorized users from accessing private networks. A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
Norway currently ranks ________ worldwide in the percentage of the total population using the Internet.
first
Information systems can ________ the organization by empowering lower-level employees.
flatten Information systems can decrease the number of levels in an organization, which flattens the organization, by providing lower-level employees more decision-making authority.
A company such as McDonalds or KFC uses a(n) ________ global strategy.
franchiser
The first consideration when considering an international information system architecture includes examining ________.
global environment business drivers and challenges
Information systems project costs include ________.
hardware, software, workspace and human costs
The number of cycles per second that can be sent through a network medium is calculated in ________.
hertz The number of cycles per second that can be sent through a network medium is measured in hertz.
All of the following are important questions about IT governance EXCEPT ________.
how data should be stored in a database IT governance deals with more broad-based and higher-level issues.
For companies practicing business process management, the ________ step is the critical phase where the question, "what business processes need improvement" is asked.
identify processes for change Identify processes for change is the first step in the business processing management procedure.
The first step of the prototyping process is to ________.
identify the user's basic requirements
Immanuel Kant's Categorical Imperative states ________.
if an action is not right for everyone to take, it is not right for anyone to take One question to ask when thinking about this is "If everyone did this, could the organization, or society, survive?"
Advances in data storage techniques and the rapidly declining costs of data storage threaten ________.
individual privacy Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals, employees, customers, and potential customers.
FIP is a set of principles governing the collection and use of ________.
information about individuals FIP (Fair Information Practice) is a set of principles governing the collection and use of information about individuals. It was first set forth in a report written in 1973 by a federal government advisory committee and updated most recently in 2010 to consider new privacy-invading technology (FTC, 2010; U.S. Department of Health, Education, and Welfare, 1973).
A(n) ________ specifies the rules of an organization for sharing and disseminating information.
information policy An information policy specifies the organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information.
Regarding moral dimensions of the information age, ________ include(s) the issue of determining the data that individuals and organizations can protect.
information rights and obligations Information rights and obligations include what information rights individuals and organizations possess with respect to themselves.
E-commerce refers to the use of the ________ and ________ to transact business.
internet and web E-commerce is about digitally enabled commercial transactions between and among organizations and individuals.
A supply chain management system is considered a type of ________ system because it shares data across multiple organizations.
interorganizational Supply chain management systems are one type of interorganizational system.
A scientist who works to create information for organizations is considered a(n) ________ worker.
knowledge Knowledge workers include researchers, scientists, and people who primarily create knowledge and information for organizations.
The global positioning system (GPS) enables ________ -based services for consumers via their smartphones.
location Seventy-four percent of smartphone owners use location-based services. What ties these activities together and provides the foundation for mobile commerce is the global positioning system (GPS)-enabled map services available on smartphones.
The typical computing configuration in 1960 was ________.
mainframe The mainframe computer emerged in 1959.
Determining if you can convince local units to conform to international standards is part of the ________ dimension for developing an international information systems architecture.
management and business processes
In an enterprise system, the integrated software modules that focus on production capacity are related to ________.
manufacturing and production Enterprise systems related to manufacturing and production include production capacity and shipment dates.
The functional area which includes the business process to check quality is called ________.
manufacturing and production Quality assurance is done within the functional area of manufacturing and production.
The fact that universal technical standards for the Internet and electronic commerce exist lowers ________ costs, making it cheaper for merchants to sell their goods.
market entry The universal technical standards of the Internet and e-commerce greatly lower market entry costslong dash—the cost merchants must pay simply to bring their goods to market.
Customer relationship management applications that track campaign data are related to the ________ aspect of customer relationships.
marketing Marketing aspects of CRM include campaign data, content, and data analysis.
The systems development life cycle method for building an information system is a(n) ________ approach.
phased
A(n) ________ is an Internet business model that provides an initial point of entry to the web along with specialized content and other services.
portal Portals are gateways to the Web where users start their Web searching and linger to read news, find entertainment, meet other people, and, of course, be exposed to advertising which provides the revenues to support the portal.
According to the value chain model, sales and marketing is considered a ________ activity of the firm.
primary Sales and marketing is considered a primary activity of the firm.
The coupling of files used to store information and the application program that updates and maintains those files is called ________.
program-data dependence Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.
A positive regarding cloud computing includes ________.
rapid elasticity If you need thousands of servers, you can readily scale up to use them with the cloud.
When thinking about security, controls ________.
refer to policies and procedures that ensure the safety of an organization's assets. Controls are methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its records, and operational adherence to management standards.
A challenge for international networks are the ________ in countries like China, Iran, and Saudi Arabia.
regulatory constraints
The primary benefit of disintermediation to the consumer is ________.
removing layers and reducing costs The primary benefit of disintermediation to the customer includes removing layers (i.e., distribution channels) and lowering costs to customers.
The ________ of the web makes it possible to deliver messages with text, audio, and video simultaneously to large numbers of people.
richness Information richness refers to the complexity and content of a message. The web makes it possible to deliver rich messages with text, audio, and video simultaneously to large numbers of people.
In relational databases, the ________ operation creates a subset of records in the file that meet stated criteria.
select The select operation creates a subset consisting of all records in the file that meet the stated criteria.
Social e-commerce is commerce based on the idea of the digital ________ graph.
social The digital social graph is the mapping of all significant online social relationships.
According to the E-Commerce Presence Map, activities such as conversation and engagement are considered a(n) ________ type of presence.
social media Social media presence includes activities such as conversation and engagement.
A top-down chart showing each level of design, its relationship to other levels, and its place in the overall design structure is a ________.
structure chart The structure chart is a top-down chart, showing each level of design, its relationship to other levels, and its place in the overall design structure.
Examining college admission scores as the sole criteria for admission is an example of a(n) ________ decision.
structured Decisions that always apply under specific conditions or situations are structured decisions.
Ethical issues in information systems have become more of an urgent topic because of the rise of ________.
the Internet and e-commerce Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce. Internet and digital firm technologies make it easier than ever to assemble, integrate, and distribute information, unleashing new concerns about the appropriate use of customer information, the protection of personal privacy, and the protection of intellectual property.
The accessibility, storage, and distribution of information and knowledge is increased dramatically by ________.
the internet The Internet increases the accessibility, storage, and distribution of information and knowledge for organizations. In essence, the Internet is capable of dramatically lowering the transaction and agency costs facing most organizations. Next Question
Senior executives determining five-year goals is an example of a(n) ________ decision.
unstructured Unstructured decisions are those in which the decision maker must provide judgment.
A useful tool for storing and sharing corporate knowledge is a(n) ________.
wiki A wiki is a type of website that makes it easy for individuals to contribute and edit text content as well as graphics.
________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.
In-memory computing Another way of facilitating big data analysis is to use in-memory computing, which relies primarily on a computer's main memory (RAM) for data storage. (Conventional DBMS use disk storage systems.) Users access data stored in system primary memory, thereby eliminating bottlenecks from retrieving and reading data in a traditional, disk-based database and dramatically shortening query response times. In-memory processing makes it possible for very large sets of data, amounting to the size of a data mart or small data warehouse, to reside entirely in memory.
Which of the following is NOT an example of a company's transaction processing system?
Walmart's internal email system
Businesses are using ________ development to create applications for shopping carts, user authentication, search engines, and catalogs with pieces of software for their own unique business requirements.
component-based
A(n) ________ is a major type of KM that collects, stores, and disseminates digital content and knowledge.
enterprise-wide KMS An enterprise-wide KMS is a major type of KM that is used to collect, store, and disseminate digital content and knowledge.
A supply chain management system using a(n) ________ model bases production schedules on actual customer orders.
pull-based In a pull-based model, production master schedules are based on actual trigger events in the supply chain.
According to Panorama Consulting Solutions, in 2018, the average time to implement an ERP project is approximately ________.
17.4 months The average time to implement is 17.4 months with an average cost of 2.8 million dollars.
What is a touch point?
A method of interaction with a customer Also known as a contact point, it is a method of interaction with the customer, such as telephone, e-mail, customer service desk, conventional mail, Facebook, Twitter, Web site, wireless device, or retail store. Well-designed CRM systems provide a single enterprise view of customers that is useful for improving both sales and customer service.
________ help(s) ensure that important network traffic receives high priority, and less-critical network traffic receives lower priority.
Deep packet inspection (DPI) DPI examines data files and sorts out low-priority online material while assigning higher priority to business-critical files.
________ enables the computer-to-computer exchange between two organizations of standard transactions such as invoices, shipment schedules, or purchase orders.
EDI Electronic data interchange enables the computer-to-computer exchange between two organizations of standard transactions such as invoices and bills of lading.
The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.
Privacy Act of 1974 the Privacy Act of 1974 has been the most important act regarding credit reporting, financial records, newspaper records, and electronic communications.
The acronym CRM stands for ________.
customer relationship management CRM stands for customer relationship management. The CRM focuses on improving interactions with past, current, and future customers.
Identifying the projects that deliver the most business value requires organizations to develop a(n) ________.
information systems plan
To reduce agency costs, the text recommends developing ________.
only a few core global systems that are vital for global operations