INFO 3130 Final Exam Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is NOT a step in the​ problem-solving process? a. solution evaluation and choice b. implementation c. solution analysis d. problem identification e. solution design

Solution analysis

Shipping a product to a customer is an example of a business process. a. True b. False

True

The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:

Websites must disclose their information practices before collecting data.

NORA is:

a data analysis technology that finds hidden connections between data in disparate sources.

due process

laws are well known and understood with an ability to appeal to higher authorities ex: apple & FBI

Which type of software is created and updated by a worldwide community of programmers and is available for free? a. open source b. mashups c. apps d. software packages e. outsourced

open source

Which of the following is a file storage and synchronization service for cloud storage, file sharing, and collaborative editing? a. Apple FaceTime b. Google+ c. Salesforce Chatter d. Google Hangouts e. Google Drive

Google Drive

Which of the following gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

The four major functions of a business include manufacturing/production, sales/marketing, finance/accounting, and _________________. a. big data b. purchasing c. human resources d. instructional design e. customer relations

Human resources

Copyright is the legal protection afforded intellectual property, such as a song, book, or video game.

True

Enterprise Systems often include transactions with customers and vendors. a. True b. False

True

Enterprise systems often include transactions with customers and vendors. a. True b. False

True

In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers. a. true b. false

True

In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company. a. True b. False

True

People, organizations, and information technology are all dimensions of information systems. a. True b. False

True

The dimensions of information systems are management, organizations, and information technology. a. true b. false

True

The most common form of IT-enabled organizational change is automation.

True

With in-memory computing, a computer's primary memory (RAM) is used for processing. a. True b. False

True

All of the following are current hardware platform trends except a. green computing b. virtualization c. cloud computing d. Unix

Unix

Fuzzy logic can describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules. a. True b. False

a. True

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network. a. True b. False

a. True

In general, for digital goods, the marginal cost of producing another unit is about zero. a. True b. False

a. True

In-memory computing relies on a computer's main memory for storing data. a. True b. False

a. True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. a. True b. False

a. True

Structured decision making is most prevalent at lower organizational levels. a. True b. False

a. True

Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs. a. True b. False

a. True

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. a. True b. false

a. True

With in-memory computing, a computer's primary memory (RAM) is used for processing. a. True b. False

a. True

A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to be investing to achieve which business objective? a. customer intimacy b. operational excellence c. survival d. improved reporting

Survival

If a competitor to your business introduces an effective product or service​ (i.e., when Citibank first introduced the​ ATM), your need to follow is considered an example of the business​ driver: a. improved decision making b. operational excellence c. new products, services, and business models d. survival e. customer and supplier intimacy

Survival

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. a. True b. False

a. True

In a relational database, a record is referred to in technical terms as a(n) a. Tuple b. Entity c. Field d. Row

a. Tuple

Among the eight unique features of e-commerce, which is related to the ability to interact with web technology everywhere? a. Ubiquity b. Universal Standards c. Global Reach d. Interactivity e. Richness

a. Ubiquity

Which of the following is not a potential "switching cost"? a. Upgrading software b. New documentation c. Employee training d. New hardware

a. Upgrading software

Enterprise software is built around thousands of predefined business processes that reflect: a. best practices b. government regulations c. cutting edge workflow analyses d. the firms organization e. industry benchmarks

a. best practices

Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication. a. biometric b. data c. smart card d. chemistry e. token

a. biometric

Business processes are analyzed, simplified, and redesigned in a. business process redesign b. automation c. rationalization of procedures d. paradigm shifts

a. business process redesign

The measurement of the number of customers who stop using or purchasing products or services from a company is called ________. a. churn rate b. switching rate c. switching costs d. CLTV e. Cost per lead

a. churn rate

Enterprise systems are strictly internally oriented; other types of enterprise applications must be used for communicating with customers and suppliers. a. True b. False

b. False

In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products. a. True b. False

b. False

Knowledge residing in the minds of employees that has not been documented is called explicit knowledge. a. True b. False

b. False

Over 80% of U.S. Internet users access the Internet via mobile devices. a. True b. False

b. False

Some healthcare facilities create maps to visually show where health risks like RSV are concentrated. This is an example of a ______________ information system. a. Geodesic b. Geographic c. Case d. Map e. Country

b. Geographic

__________________ reports allow users to enter several variables (i.e., region and date) to produce a decision making report. a. Inductive b. Predictive c. Parameterized d. Drill-down e. Integrated

c. Parameterized

The principal liaison between the information systems groups and the rest of the organization is a(n): a. programmer b. information systems manager c. systems analyst d. CIO e. CSO

Systems Analyst

_________________ are information systems professionals who help bridge the relationships between programmers and end users to identify requirements for improved systems. a. Systems analysts b. HTML programmers c. Database Developers d. CIOs e. E-Marketers

Systems Analysts

You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? a. TPS b. TPS with DSS capabilities c. TPS with MIS capabilities d. TPS with ESS capabilities

TPS with MIS capabilities

All of the following are approaches to building information systems, except

Test & Deploy

____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system. a. Identity Theft b. Farming c. Ransomware d. Spam e. Phising

c. Ransomware

The most prominent data manipulation language today is a. Access b. DB2 c. SQL d. Crystal Reports

c. SQL

Knowledge that already exists inside a firm in the form of formal reports or presentations is categorized as ________. a. Semi-structured knowledge b. Unstructured knowledge c. Structured knowledge d. Tacit knowledge e. Explicit knowledge

c. Structured knowledge

privacy

claim to be left alone, free from surveillance or interference from other people/orgs/govts

profiling

combining data and info from multiple sources to create detailed descriptions of people

non obvious relationship awareness

combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists

Which of the following business problems is NOT a problem in the technology​ dimension? a. complexity of task b. incompatibility of old systems c. rapid technological change d. outdated software e. inadequate database capacity

complexity of task

maintaining boundaries

computing, internet use lengthens work day, infringes on personal time ex: working from home

systems design

create design specifications

pros to end user development

created quickly, user friendly

Which of the following is an example of a cross-functional business process? a. identifying customers b. creating a new product c. assembling a product d. paying creditors

creating a new product

The percentage of gross domestic product of the United States that is produced by the knowledge and information sectors is estimated to be about ________ a. 85 b. 65 c. 25 d. 45

d. 45

What is the primary difference between 3G and 4G cellular systems? a. 3G systems have poor security b. 4G systems are digital c. 3G systems are not compatible with text messaging d. 4G systems have greater transmission speeds e. 3G systems are unable to handle web browsing

d. 4G systems have greater transmission speeds

Sending customers to a website for a referral fee is called the _____________ model. a. Subscription revenue b. Freemium revenue c. Google review d. Affiliate revenue e. Transaction fee revenue

d. Affiliate revenue

Which effect is caused by a distortion of information about the demand for a product as it passes from one entity to the next across the supply chain? a. Exponential effect b. Logistics effect c. Replenishment effect d. Bullwhip effect e. Ripple effect

d. Bullwhip effect

Enterprise software includes a database and thousands of predefined ________________. a. Supplier lists b. Spreadsheets c. Training programs d. Business processes e. Customer lists

d. Business processes

eBay is an example of a. B2C e-commerce b. B2B e-commerce c. M-commerce d. C2C e-commerce

d. C2C e-commerce

Reducing the business process layers in a distribution channel is called a. BPR b. Network effects c. Market segmentation d. Disintermediation

d. Disintermediation

In cloud computing, resources are said to be "pooled" because: a. organizations offer their services to each other free of charge b. organizations use the public internet to create the appearance of a private connection c. organizations use open source standards in the cloud d. organizations share the same physical hardware through virtualization e. cloud computing enables users to modify a programs source code

organizations share the same physical hardware through virtualization

3) project management group

oversees specific projects

2) info sys steering committee

review and approaches plans for sys in all divisions

The U.S. Department of Commerce developed a(n) ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

safe harbor

The order fulfillment process involves which of the following functional areas of the business? a. sales, human resources, and manufacturing and production b. human resources, accounting, and service c. sales, human resources, accounting d. sales, accounting, manufacturing and production e. manufacturing and production, human resources, and accounting

sales, accounting, manufacturing and production

advantages to prototyping

useful if there are uncertainty in requirements/design likely to fulfill end-user requirements

internet challenges to privacy

*cookies*(tiny files downloaded by website to visitor's hard drive to track visits) *web beacons/bugs*(tiny graphics embedded in email and webpages to monitor who is reading message) *spyware*(tracks keystrokes)

The HIPAA Act

outlines medical security and privacy rules.

An example of raw data from a national chain of automobile stores would be a. an average of 13 toyotas are sold daily in Kentucky b. 30 percent increase in Toyota RAV4 sales during September in Kentucky c. 1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky d. all of the above

1 Toyota RAV4 sold March 3, 2008 in Louisville, Kentucky

Which of the following choices may lead to competitive advantage: 1. new products, services, and business models; 2. charging less for superior products; 3. responding to customers in real time? a. 1 only b. 1 and 2 c. 2 and 3 d. 1, 2, and 3

1, 2, and 3

Hardware and software acquisition costs account for about ________ percent of TCO. a. 20 b. 40 c. 60 d. 80

20

runaway projects

30-40% of IT projs, exceed schedule & budget, fail to preform as specified

Copyright is protected throughout the life of the author plus an additional ______ years after the author's death.

70

Which of the following projects is the riskiest?

A project that managers are concerned will affect their roles and job descriptions

The introduction of new information technology has:

A ripple effect, raising new ethical, social, and political issues

A feasibility study determines whether a system solution is achievable from a

All of the Above: Organizational standpoint, Technical standpoint, Financial standpoint

At what stage of the systems development process are information/user requirements established?

Analysis

The six stages of the system development process, in the correct order, are:

Analysis, Design, Programming, Testing, Conversion, Production & Maintenance

A ________ is a senior manager who oversees the use of IT in the firm. a. COO b. CIO c. CEO d. CKO e. CFO

CIO

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

When a firm does something in which they are a world-class leader, that activity would be considered to be a _____________ for the company. a. primary activity b. benchmark c. strategic advantage d. core competency e. best practice

Core competency

An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business​ driver: a. New products, services, and business models b. Operational Excellence c. Improved decision making d. Survival e. Customer and Supplier intimacy

Customer and Supplier Intimacy

A location specified to include IT infrastructure such as storage, security, and system backup is called a: a. data management b. SQL site c. Service center d. data mine e. data center

Data center

Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Which of the following is NOT an example of disruptive​ technologies? a. iPad b. Digital Television c. Software as a Service d. Uber

Digital Television

Which of the following entities is NOT a part of the firm's environment? a. stockholders b. suppliers c. competitors d. customers e. employees

Employees

Principles of right and wrong that you use to make choices are called _____________.

Ethics

You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution? a. CRM b.Enterprise System c. Extranet d. Intranet

Extranet

Management information systems typically support non-routine decision making. a. true b. false

False

Transaction processing systems are most commonly used by the senior management level of an organization. a. True b. False

False

Which of the following statements represents a responsibility of the sales and marketing functional area? a. checking for quality b. producing bill of materials c. managing cash accounts d. paying creditors e. identifying customers

Identifying customers

A manager upset that he or she is not receiving​ forecasts, sales​ projections, or appropriate dashboards is expressing frustration for having a poor​ ______________ business​ driver: a. New products, services, and business models b. Operational Excellence c. Improved decision making d. Survival e. Customer and Supplier intimacy

Improved decision making

If you want to collect data (i.e., photos) from someone and use the data, you must obtain _____________.

Informed consent

Which of the following would not be considered a disruptive technology? a. instant messaging b. e-mail c. internet telephony d. PCs

Instant messaging

Which of the following is the BEST description of intellectual property?

Intangible property created by individuals or corporations

Which of the following is FALSE about the digital divide in the U.S.?

It is based only on having fair access to digital technology.

Business processes are analyzed, simplified, and redesigned in

business process redesign.

A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?

Kant's categorical imperative

Which of the following is not a type of output device? a. Speakers b. Cathode ray tube c. Ink jet printer d. Keyboard e. Sensor

Keyboard

Which of the following is an example of a popular open source operating system? a. DOS b. Linux c. Mac OS d. Windows 10 e. DBMS

Linux

A system will be reviewed by both users and technical specialists to determine how well it has met its original objectives and to decide whether any revisions or modifications are required during which phase?

Maintenance

Tracking your movements without consent is most related to the trend, ___________, where technology trends raise ethical issues.

Mobile device growth impact

___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits. a. Customer and Supplier intimacy b. improved decision making c. operational excellence d. competitive advantage e. new products, services, and business models

Operational Excellence

Walmart exemplifies the power of information systems coupled with excellent business practices and supportive management to achieve which of the following? a. new business models b. customer intimacy c. operational excellence d. competitive advantage e. survival

Operational excellence

In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is a. middle management b. service workers c. production management d. operational management

Operational management

Which U.S. act restricts the information the federal government can collect and regulates what it can do with the information?

Privacy Act of 1974

Which of the following restricts the information the U.S. federal government can collect and regulates what it can do with the information?

Privacy Act of 1974

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of ________.

Property rights and obligations

Which of the five moral dimensions of the information age does spamming involve?

Quality of life

The process of creating workable information systems in a very short period of time is called:

RAD

Business processes are collections of a. informal practices and behaviors b. formalized and documented practices c. routines d. rights and privileges

Routines

A ________ is a sophisticated computer used for tasks requiring extremely rapid and complex calculations with thousands of variables, millions of measurements a. supercomputer b. grid computer c. workstation d. personal computer

Supercomputer

Which of the following types of computer is used for weather forecasting on a national or worldwide scale? a. Mainframe b. Server c. Minicomputer d. Supercomputer e. PC

Supercomputer

Which of the following is the biggest risk in using end-user development to create a new information system?

The system may not be able to scale up to handle larger amounts of data.

Which of the following best describes how new information systems result in legal gray areas?

They result in new situations that are not covered by old laws

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

Which system is typically a major source of data for other systems? a. Transaction processing systems b. management information systems c. executive support systems d. decision support systems

Transaction processing systems

A business model describes how a company produces, delivers, and sells a product or service to create wealth. a. True b. False

True

A test plan includes all the preparations for the series of tests to be performed on the system.

True

Craigslist is an example of: a. C2C e-commerce b. B2B e-commerce c. B2C e-commerce d. B2G e-commerce e. M- commerce

a. C2C e-commerce

________ help media firms store and manage unstructured digital data such as photographs, images, videos, and audio files. a. Digital asset management systems b. CMS c. LMS d. CAD e. Knowledge networks

a. Digital asset management systems

Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? a. ERP systems b. Groupware c. CRM software d. Application software e. Process management software

a. ERP systems

The balanced scorecard method is based on __________ dimensions of a firm's performance. a. Four b. Three c. Six d. Two e. Five

a. Four

Geoadvertising sends ads to users based on their: a. GPS locations b. Social media presence c. Shopping preferences d. User addresses e. Website behaviors

a. GPS locations

________ services can tell you the price of a house you are looking at or about special exhibits at a museum you are passing. a. Geo information b. Geo social c. Location-based d. Geo positioning e. Geo advertising

a. Geo information

Business processes supported by enterprise systems related to travel expense reporting are associated with __________________. a. Human resource processes b. Sales and marketing processes c. Financial and accounting processes d. Manufacturing and production processes e. Web development processes

a. Human resource processes

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space whose primary need is to share documents? a. Peer-to-peer network b. PAN c. Domain-based LAN d. Campus area network e. WAN

a. Peer-to-peer network

The benefit of a consumer being able to look online to find a variety of different prices for the same product is called ___________________. a. Price transparency b. Global scale c. Cost transparency d. Information density e. Price check

a. Price transparency

A(n) __________ key uniquely identifies a row or record in a table. a. Primary b. Initial c. Domestic d. Secondary e. Foreign

a. Primary

Relational databases enforce ______________ integrity to ensure, for instance, that a teacher can't be assigned to a CLASS table unless they already exist in the TEACHER table. a. Referential b. Ethical c. Data flow d. Secondary e. Task Model

a. Referential

Knowledge that resides in the minds of employees that has NOT been documented is called ________. a. Tacit knowledge b. Corporate culture c. Structured knowledge d. Organizational memory e. Standard operating procedures

a. Tacit knowledge

A decision can be said to have improved if it can be made more quickly. a. True b. False

a. True

Computer worms spread much more rapidly than computer viruses. a. True b. False

a. True

Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. a. True b. False

a. True

Dashboards and scorecards are visual interfaces used to make a firm's information easier to review quickly. a. True b. False

a. True

Data governance deals with the policies and processes for managing the integrity and security of data in a firm. a. True b. False

a. True

Every record in a file should contain at least one key field. a. True b. False

a. True

Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization a. True b. False

a. True

The data dictionary serves as an important data management tool by a. creating an inventory of the data elements contained in the database b. presenting data as end users or business specialists would perceive them. c. maintaining data in updated form d. assigning attributes to the data

a. creating an inventory of the data elements contained in the database

Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of a. crowdsourcing b. long-tail marketing c. prediction markets d. behavioral targeting

a. crowdsourcing

Data mining is a tool for allowing users to: a. find hidden relationships in data b. quickly compare transaction data gathered over many years c. summarize massive amounts of data into much smaller, traditional reports d. obtain online answers to ad hoc questions in a rapid amount of time e. perform multidimensional data analysis

a. find hidden relationships in data

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as a. hotspots b. wireless hubs c. hot points d. touch points

a. hotspots

The concern that the structure of data is consistent within an information source reflects which quality dimension of information? a. integrity b. accuracy c. consistency d. validity

a. integrity

Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes a/an a. learning management system b. employee enrichment system c. organizational learning system d. investment workstation

a. learning management system

Hadoop is a(n): a. open-source software framework designed for distributing data-processing over inexpensive computers b. pre-configured hardware-software system designed for analyzing big data c. data mining platform designed for storing and analyzing big data produced by web communications and transactions d. high-speed platform used to analyze large data sets e. NoSQL database technology that stores both data and procedures acting on the data as objects

a. open-source software framework designed for distributing data-processing over inexpensive computers

The effort required to locate a suitable product is called: a. search costs b. price discrimination c. market entry costs d. shopping costs e. menu costs

a. search costs

In a relational database, the three basic operations used to develop useful sets of data are a. select, project, and join b. select, project, and where c. select, from, and join d. select, join, and where

a. select, project, and join

Expertise and experience of organizational members that has not been formally documented best describes a. tacit knowledge b. wisdom c. data d. information

a. tacit knowledge

The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain. a. true b. false

a. true

A __________ is a unique type of malware that replicates itself from one computer to another. a. Worm b. Repeater c. Bug d. Bacteria e. Snail

a. worm

responsibility

accepting the potential costs, duties, for decisions

? more tech trends that raise ethical issues

advances in data analysis techniques - companies can analyze vast quantities of data gathered on individuals for: profiling, nonobvious relationship awareness, mobile device growth

outsourcing advantages

allows org flexibility in IT needs

balancing power

although computing decentralizing, key decision making remains centralized

Linux is a. primarily concerned with the tasks of end users b. designed for specific machines and specific microprocessors c. an example of an open-source software d. especially useful for processing numeric data e. the operating system for the Macintosh computer

an example of an open-source software

In a parallel conversion strategy, the new system

and the old are run together.

In the traditional systems development lifecycle, end users:

are limited to providing information requirements and reviewing the technical staff's work.

A ________ in a database represents a single character such as a letter or number. a. Bit b. Byte c. Megabit d. Kilobyte e. File

b. Byte

Tools that record customer activities at websites and store them in a log for further analysis are called ________. a. Filtering tools b. Clickstream tracking tools c. Collaborative filtering tools d. Customer tracking tools e. Personalization tools

b. Clickstream tracking tools

Twitter and Facebook are both examples of the _____________ Internet Business Model. a. E-tailer b. Community Provider c. Transaction Broker d. Portal e. Market Creator

b. Community Provider

Selling a customer with a checking account a home improvement loan is an example of a. Direct marketing b. Cross-selling c. Cross-channel promotions d. Operational CRM

b. Cross-selling

The stage of the decision-making process where identifying and exploring potential solutions takes place is in the ____________ phase. a. Solution b. Design c. Choice d. Intelligence e. Implementation

b. Design

In a student database, a collection of related attributes such as LastName, FirstName, and Student# creates a(n) _______________. a. Record b. Entity c. File d. Bit e. Database

b. Entity

Which of the following is a critical security function of senior management in an organization? a. Monitoring potential malicious activity continuously b. Establishing the security policy and managing risk c. Safeguarding computer hardware and software d. Developing IS security software e. Managing security programs on a real-time basis

b. Establishing the security policy and managing risk

An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. a. True b. False

b. False

An example of the content provider business model is Barnesandnoble.com, a retailer of printed books. a. True b. False

b. False

Disintermediation provides major benefits to the distributor. a. True b. False

b. False

DoS attacks are used to destroy information and access restricted areas of a company's information system. a. True b. False

b. False

rapidity of change

businesses may not have enough time to respond to global competition

What is the first step you should take in managing data for a firm? a. Normalize the data before importing to a database b. Identify the data needed to run the business c. Audit your data quality d. Cleanse the data before importing it to any database e. Back up the data

b. Identify the data needed to run the business

If two people are trading coins and one has far more knowledge about the hobby than the other, this is called _________________. a. Knowledge management b. Information asymmetry c. Price transparency d. Information density e. E-tailing

b. Information asymmetry

Business processes supported by enterprise systems related to quality control are associated with __________________. a. Financial and Accounting processes b. Manufacturing and production processes c. Web development processes d. Sales and marketing processes e. Human resources processes

b. Manufacturing and production processes

A field identified in a table as holding the unique identifier of the table's records is called the: a. Identifying field b. Primary key c. Key field d. Primary field e. Foreign key

b. Primary key

A supply chain driven by actual customer orders or purchases follows which model? a. Replenishment-driven model b. Pull-based model c. Build-to-stock model d. Push-based model e. Just-In-Time model

b. Pull-based model

Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables? a. Open source DBMS b. Relational DBMS c. Pre-digital DBMS d. Two-tiered DBMS e. Hierarchical DBMS

b. Relational DBMS

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. a. Benchmarking b. Security c. Algorithms d. Controls

b. Security

Which of the following is not an example of the benefits enterprise systems provide to firms? a. Products are shipped to stores more quickly b. The cost of information systems falls, making the firm more productive c. There is more accurate sales information for managers to analyze d. When products are ordered, the manufacturing and logistics teams are notified immediately

b. The cost of information systems falls, making the firm more productive

Which of the following best illustrates the relationship between entities and attributes? a. The entity PRODUCT with the attribute CUSTOMER b. The entity CUSTOMER with the attribute ADDRESS c. The entity ADDRESS with the attribute CUSTOMER d. The entity PRODUCT with the attribute PURCHASE e. The entity CUSTOMER with the attribute PRODUCT

b. The entity CUSTOMER with the attribute ADDRESS

Business intelligence (BI) differs from Business analytics (BA) because BA focuses more on ___________________________. a. Data management b. Tools and techniques for analyzing data c. Data warehousing d. Integrating e. SQL

b. Tools and techniques for analyzing data

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the a. Suppliers internal supply chain b. Upstream portion of the supply chain c. External supply chain d. Downstream portion of the supply chain

b. Upstream portion of the supply chain

Which of the following statements about the Internet security is not true? a. A corporate network without access to the Internet is more secure than one provides access. b. VoIP is more secure than the switched voice network. c. The use of P2P networks can expose a corporate computer to outsiders. d. Instant messaging can provide hackers access to an otherwise secure network.

b. VoIP is more secure than the switched voice network.

In a telecommunications network architecture, a protocol is: a. a system by which packets are sent over different networks. b. a standard set of rules and procedures for control of communications in a network. c. the main computer in a telecommunications network. d. a device that handles the switching of voice and data in a local area network. e. a communications service for microcomputer users.

b. a standard set of rules and procedures for control of communications in a network.

The Internet is based on which three key technologies? a. client/server computing, packet switching, and HTTP b. client/server computing, packet switching, and the development of communications standards for linking networks and computers c. TCP/IP, HTML, and HTTP d. TCP/IP, HTTP, and packet switching

b. client/server computing, packet switching, and the development of communications standards for linking networks and computers

E-commerce refers to the use of any networking technologies to transact business. a. true b. false

b. false

Data mining is a tool for allowing users to a. summarize massive amounts of data into much smaller, traditional reports b. find hidden relationships in data c. obtain online answers to ad-hoc questions in a rapid amount of time d. quickly compare transaction data gathered over many years

b. find hidden relationships in data

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that a. are not secure because the technology to secure them did not exist at the time the files were created. b. have the potential to be accessed by large numbers of people and by groups outside of the organization. c. are frequently available on the Internet d. are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.

b. have the potential to be accessed by large numbers of people and by groups outside of the organization.

Through what channel did e-commerce first evolve? a. online book sales b. online advertising sales c. internet portals d. internet service providers

b. online advertising sales

Digital subscriber lines: a. operate over coaxial lines to deliver Internet access. b. operate over existing telephone lines to carry voice, data, and video. c. are very-high-speed data lines typically leased from long-distance telephone companies. d. have up to twenty-four 64-Kbps channels e. are based on radio signals of various frequencies

b. operate over existing telephone lines to carry voice, data, and video.

Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of a. interest b. practice c. knowledge d. professionals

b. practice

The logical view a. presents an entry screen to the user b. presents data as they would be perceived by end users c. shows how data are organized and structured on the storage media d. allows the creation of supplementary reports

b. presents data as they would be perceived by end users

A secure website that links a large firm to its suppliers and other key business partners is called a(n): a. e-hub b. private industrial network c. exchange d. net marketplace e. marketspace

b. private industrial network

An example of phishing is a. sending bulk e-mail that asks for financial aid under a false pretext. b. setting up a fake medical Web site that asks users for confidential information. c. pretending to be a utility company's employee in order to garner information from that company about their security system. d. setting up bogus Wi-Fi hot spots

b. setting up a fake medical Web site that asks users for confidential information.

A keylogger is a type of a. Trojan horse b. Spyware c. worm d. virus

b. spyware

Which of the following statements best describes the term business intelligence? a. Information systems involved in business decisions making b. the infrastructure for collecting and managing business data c. software developed exclusively for business management d. the tools and techniques used to analyze and understand business data

b. the infrastructure for collecting and managing business data

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting

need to efficiently target online ads to users

behavioral targeting ex: google, facebook

Which of the following BEST describes a pivot table? a. A type of relational database b. A tool for performing sensitivity analysis c. A spreadsheet tool that displays two or more dimensions of data in a convenient format d. A graphical display of summarized data e. A chart tool that can rotate columnar data quickly and visually

c. A spreadsheet tool that displays two or more dimensions of data in a convenient format

A characteristic or quality describing an entity is called a(n): a. Field b. Key field c. Attribute d. Tuple e. Table

c. Attribute

You are answering phones for a local utilities provider and are speaking with an extremely angry customer. Because your company manual advises employees to transfer hostile calls to a superior, you do this. What quality dimension of decisions does your action reflect? a. Coherence b. Justice c. Due process d. Accuracy e. Fairness

c. Due process

ERP stands for_________ a. Enterprise resource production b. Entrepreneurship resource planning c. Enterprise Resource Planning d. Efficient Resource Production e. Enterprise Reengineering Planning

c. Enterprise Resource Planning

A schematic of the entire database that describes the relationships in a database is called a(n): a. Field key diagram b. Intersection relationship diagram c. Entity-Relationship diagram d. Data dictionary e. Data definition diagram

c. Entity-Relationship diagram

Which organization helps define the overall structure of the Internet? a. HTTP b. ICANN c. IAB d. None (no one "owns" the Internet) e. W3C

c. IAB

Which of the following best describes the importance of creating an accurate data model for your business's database? a. It is unnecessary, as a well-designed database should not require one. b. It is not essential, as the data model itself is modified by the database continuously. c. It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. d. It is somewhat important, as the type of data model will define what kinds of data will be stored. e. It is essential, as table relationships cannot be created without an accurate data model.

c. It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.

Which of the following is not a characteristic of packet switching? a. Packets travel independently of each other b. Packets are routed through many different paths c. Packet switching requires point-to-point circuits d. packets include data for checking transmission errors e. packet switching makes efficient use of a networks communications capacity

c. Packet switching requires point-to-point circuits

Which of the following is NOT one of the characteristics of enterprise applications that cause challenges in implementation? a. They cause integration difficulties as every vendor uses different data and processes b. They are complex and time consuming to implement c. They support "best practices" for each business process and function d. They require sweeping changes to business processes to work with the software e. They introduce "switching costs," making the firm dependent on the vendor

c. They support "best practices" for each business process and function

The 802.11 set of standards is known as: a. WSN b. WLAN c. Wi-Fi d. Bluetooth e. WiMax

c. Wi-Fi

A company needing a network to connect its offices in Montana, Idaho, and Utah would require a: a. local area network b. regional area network c. wide area network d. metropolitan area network e. tristate area network

c. Wide area network

The "Internet of Things" refers to: a. the rise in mobile gaming b. the trend away from playform-independent web applications to mobile-device specifics apps c. a vision of a pervasive web in which common objects are connected to and controlled over the Internet. d. the increasing focus on shopping as the major user activity on the Internet. e. the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text.

c. a vision of a pervasive web in which common objects are connected to and controlled over the Internet.

Which of the following Internet business models does Amazon.com use? a. market creator b. content provider c. e-tailer d. portal

c. e-tailer

Which of the following businesses uses the content provider Internet business model? a. eBay b. Google c. iTunes d. Facebook

c. iTunes

Compared to traditional markets, digital markets have a. equivalent copying costs b. higher marginal costs per unit c. lower distributed delivery costs d. similar inventory costs

c. lower distributed delivery costs

The data _______________ language would allow you to retrieve information from the database (i.e., using the SELECT, FROM, WHERE commands). a. ask b. definition c. manipulation d. creation e. question

c. manipulation

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________. a. multiplexing b. client server c. packet switching d. software defined network (SDN) e. circuit switching

c. packet switching

The logical view of a database: a. allows the creation of supplementary reports b. presents an entry screen to the user c. presents data as they would be perceived by end users d. shows the relationships between entities and attributes e. shows how data are organized and structured on the storage media

c. presents data as they would be perceived by end users

Which of the following is not one of the main problems with a traditional file environment? a. lack of flexibility in creating ad-hoc reports b. poor security c. program-data independence d. data inconsistency

c. program-data independence

In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a ______________. a. group b. database c. record d. file e. field

c. record

Education being represented by .edu and business represented by .com are examples of: a. predicate logic b. IP addresses c. top level domains d. second level domains e. Internet extensions

c. top level domains

tangible benefits

can be qualified with money value deal with labor and space

intangible benefits

cannot be immediately quantified, but may lead to quantifiable gains in the future (ex: better customer service) influence decision making

If an organization's requirements conflict with the software package chosen and the package cannot be customized, the organization should:

change its procedures.

Improving the tracking of employee training could involve adopting enterprise software focused on _______________________. a. Sales force automation b. Customer service c. Partner relationship management d. Employee relationship management e. Spreadsheets

d. Employee relationship management

A(n) ________ system has capabilities for classifying, organizing, and managing knowledge and making it available throughout the enterprise. a. Neural network b. Genetic algorithm c. Expert system d. Enterprise content management e. Database management system

d. Enterprise content management

What is the name of the organization responsible for assigning public IP addresses? a. ISO b. ISOC c. CERN d. ICANN e. IEEE

d. ICANN

The lowered costs of information storage, processing, and communication, along with the improvement of data quality, has resulted in which unique quality of e-commerce? a. Richness b. Customization c. Interactivity d. Information density

d. Information density

To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use a. CAD system b. Fuzzy logic systems c. Virtual reality systems d. Intelligent agents

d. Intelligent agents

A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers. a. Textlogger b. Cryptologger c. SS Logger d. Keylogger e. Cryptolocker

d. Keylogger

Organizations have institutional knowledge that needs to be stored, transferred, and applied as part of a _______________ strategy. a. Transfer management b. Intelligent management c. Wisdom management d. Knowledge management e. Learning management

d. Knowledge management

At its most basic level, a(n) _________ simply consists of two computers that are connected together. a. Server b. Application c. RFID d. Network e. Oracle

d. Network

Which of the following enables users to view the same data in different ways using multiple dimensions? a. Big data b. Hadoop c. Data mining d. OLAP e. SQL

d. OLAP

Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience? a. Personalization/customization b. Information density c. Interactivity d. Richness e. Ubiquity

d. Richness

Establishing a risk level of malware threats to an organization is an example of _______________. a. Public Company Accounting Reform and Investor Protection Act b. Data anomies c. Affordable use d. Risk assessment e. Data redundancy

d. Risk assessment

In a table for customers, the information about a single customer would reside in a single: a. Field b. Table c. Column d. Row e. Entity

d. Row

The most popular data manipulation language and method to "question" a database is called ______________. a. Structured Question Language b. Standard Query Process c. Simple Question Language d. Structured Query Language e. Data Definition Language

d. Structured Query Language

Which of the following is an opportunity for threats to gain access to assets? a. Threat b. Target c. Safeguard d. Vulnerability e. Attack

d. Vulnerability

In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? a. com b. books c. none; there is no second-level domain in this name d. azimuth-interactive

d. azimuth-interactive

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect. a. whirlpool b. ripple c. network d. bullwhip e. just-in-time

d. bullwhip

In order to achieve maximum benefit from an enterprise software package, a business a. customizes the software to match all of its business processes b. uses only the processes in the software that match its own processes c. selects only the software that best matches its existing business processes d. changes the way it works to match the softwares business processes

d. changes the way it works to match the softwares business processes

The five classical functions of managers are planning, organizing, deciding, controlling, and a. leading b. managing c. negotiating d. coordinating

d. coordinating

In order, which are the value-adding steps in the knowledge business value chain? a. acquire, disseminate, apply, feedback, management and organizational activities b. data and information acquisition, store, disseminate, feedback, apply c. acquire, store, disseminate, apply, feedback d. data and information acquisition, acquire, store, disseminate, supply

d. data and information acquisition, acquire, store, disseminate, supply

Bandwidth is determined by: a. determining the lowest frequency on a channel b. calculating hertz per second c. calculating hertz per microsecond d. determining the difference between the highest and lowest frequency on a channel e. determining the highest frequency on a channel

d. determining the difference between the highest and lowest frequency on a channel

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. a. twenty b. ten c. four d. eight e. six

d. eight

Which of the following statements best describes the business value of improved decision making? a. improved decision making strengthens customer and supplier intimacy, which reduces costs b. improved decision making creates better products c. improved decision making enables senior executives to more accurately foresee future financial trends d. improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values

d. improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values

Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. a. entity-relationship diagrams b. intersection relations c. foreign keys d. referential integrity rules e. one-to-one ordering

d. referential integrity rules

Examining a map that depicts different colors based on flu outbreaks is an example of a digital ____________. a. SQL b. Operating System c. Dashboard d. Support e. transaction processing systems

dashboard

In its simplest​ form, ___________ represents streams of raw facts with limited usefulness until organized. a. data b. information c. output d. analyses e. instruction

data

crypto currency

digital currency that uses method of security to prevent counterfeiting (zero govt interference)

tech trends that raise ethical issues

doubling of computer power, rapidly declining data storage costs(org never deletes info), networking advances & the internet (accessing data from remote location),

Which of the following best describes the digital social graph? a. All of the online and offline relationships a person has b. All of a person's closest digital relationships c. A person's direct and indirect relationships d. A map of your 10 closest friends e. A mapping of all online social relationships

e. A mapping of all online social relationships

In a student database, a column called LastName would be an example of a(n) _____________. a. Database b. Record c. Entity d. File e. Attribute

e. Attribute

Businesses retailing products and services directly via the Internet to individual consumers best describes ________. a. B2B Electronic Commerce b. C2C Electronic Commerce c. M-Commerce d. Disintermediation e. B2C Electronic Commerce

e. B2C Electronic Commerce

Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as: a. DSS b. OLAP c. In-memory computing d. Data mining e. Business intelligence

e. Business intelligence

Which of the following is FALSE about Electronic Data Interchange (EDI)? a. EDI is a computer-to-computer exchange between two organizations of standard transactions such as invoices b. About 80% of online B2B commerce is based on EDI c. EDI supports the automatic transmission of transactions from one information system to another through a network d. Standards define the structure and information fields of electronic documents e. EDI is a larger firm using a secure website to link to its suppliers and other key business partners

e. EDI is a larger firm using a secure website to link to its suppliers and other key business partners

______________________ is a general security term that includes computer viruses, worms, and Trojan horses. a. Bugger b. Mindware c. Fair use d. Drive-by-download e. Malware

e. Malware

Which of the following is FALSE regarding public-key encryption? a. The sender encrypts the message with the recipient's public key b. The public key is shared using a directory c. The private key is kept secret d. It uses two keys that are mathematically related e. On receiving the message, the recipient uses the public key to decrypt it

e. On receiving the message, the recipient uses the public key to decrypt it

A ________ is a set of rules that programs on two communicating devices follow. a. packet b. codec c. signal d. URL e. protocol

e. Protocol

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? a. Demand planning b. Just-In-time strategies c. Bullwhip effect d. Continuous replenishment e. Safety stock

e. Safety stock

What are the three general business functions that CRM software serves? a. ERM, PRM, and CRM b. Sales, human resources, and finance and accounting c. Marketing, sales, and human resources d. Marketing, customer service, and human resources e. Sales, customer service, and marketing

e. Sales, customer service, and marketing

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n): a. Marketing channel b. Distribution channel c. Value chain d. Enterprise system e. Supply chain

e. Supply chain

Which of the following is NOT a function of the Internet service provider (ISP)? a. ISPs serve as your gateway to the Internet b. ISPs collect money from their customers and pay access fees c. The ISP provides a legitimate IP address d. ISPs receive communications from the Internet and pass them on to you e. The ISP provides applications services

e. The ISP provides applications services

T1 Lines: a. have up to twenty-four 64-Kbps channels b. operate over coaxial lines to deliver Internet access. c. are used in connection with satellite Internet access. d. operate over existing telephone lines to carry voice, data, and video. e. are high-speed, leased data lines providing guaranteed service levels.

e. are high-speed, leased data lines providing guaranteed service levels.

Exposing an individual to ads that are chosen and based on the online behavior of the individual is referred to as: a. long tail marketing b. clickstream advertising c. online profiling d. prediction marketing e. behavioral targeting

e. behavioral targeting

Which of the following is a key problem in managing knowledge? a. locating knowledge b. storing knowledge c. distributing knowledge d. sharing knowledge e. classifying knowledge

e. classifying knowledge

Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising. a. fishing b. click-n-go c. evil twins d. mousing fraud e. click fraud

e. click fraud

Bandwidth is the: a. number of cycles per second that can be sent through a medium. b. number of packets sent per minute over a medium c. total number of bytes that can be sent though a medium per second d. number of frequencies that can be broadcast through a medium e. difference between the highest and lowest frequencies that can be accommodated on a single channel.

e. difference between the highest and lowest frequencies that can be accommodated on a single channel.

A(n) __________ is a popular way to describe relationships (i.e., one-to-one, one-to-many) in a relational database. a. Total Quality Management b. Six Sigma c. Task Model d. Data Flow Diagram e. Entity Relationship diagram

e. entity relationship diagram

A VPN: a. formats web pages with dynamic links to other documents b. is more expensive than a dedicated network c. is an Internet-based service for delivering voice communications d. provides secure, encrypted communications using Telnet. e. is an encrypted private network configured within a public network.

e. is an encrypted private network configured within a public network.

If you were building a network intended to service two buildings that were next to each other, you would construct a: a. Metropolitan area network b. block area network c. micro area network d. wide area network e. local area network

e. local area network

Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively. a. freemium b. subscription c. transaction fee d. mobile payment e. micropayment

e. micropayment

Market creators: a. provide an online meeting place where people with similar interests can communicate b. create revenue by providing digital content over the web c. save users money and time by processing online sales transactions d. sell physical products directly to consumers or individual business e. provide a digital environment where buyers and sellers can establish prices for products

e. provide a digital environment where buyers and sellers can establish prices for products

If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to assign network addresses and move packets of data to your different devices. a. database b. WAN c. swtich d. bandwidth e. router

e. router

Specific security challenges that threaten the communications lines in a client/server environment include: a. hacking, vandalism, and denial of service attacks b. errors, vandalism, and malware c. unauthorized access, errors, and spyware d. theft, copying, alteration of data, and hardware or software failure e. tapping, sniffing, message alteration, and radiation

e. tapping, sniffing, message alteration, and radiation

The child domain of the root is the: a. domain extension b. second-level domain c. base domain d. host name e. top-level domain

e. top-level domain

The six important business objectives of information system investment include all of the following except: a. competitive advantage b. employee morale c. improved decision making d. survival e. new products

employee morale

tech solutions to internet privacy challenges

encrypted solutions, cookies prevention, browser privacy, TOR anonymity network

end user development

end users create simple systems with little assistance to be user friendly difficult to mange the process & standards ex: wix

systems failure

fails to meet requirements, provide org any benefits, inaccurate data

A systems analysis includes a ________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint.

feasibility study

patents

grants creator of invention an exclusive monopoly on ideas behind invention for 20 years

outsourcing disadvantages

hidden costs, opening up business to third party

1) corporate strategic planning group

responsible for firms strategic plan - long term

SaaS refers to a. supplying online access over networks to storage devices and storage area network technology b. managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the internet c. hosting and managing access to software applications delivered over the internet to clients on a subscription basis d. none of the above

hosting and managing access to software applications delivered over the internet to clients on a subscription basis

info sys development plan

identifies projects that will deliver the most value. links development to plan

systems analysis

identify problem, establish information requirements

Immanuel Kant's categorical imperative states that:

if an action is not right for everyone to take, it is not right for anyone to take.

if software fails, who is responsible?

if machine that harms - producer & operator if similar to original - difficult to hold creator responsible

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

project management

includes all activities (scope, time, cost, quality, risk)

5 moral dimensions of the info age

information rights, property rights, accountability & control, system quality, quality of life

trade secrets to protect

intellectual work or product belonging to business not the public domain

for effective development plan -

inventory & document all applications. clear understanding of long/short term requirements. KPI's

__________________ are designed to capture critical processes, procedures, and experience to ensure this critical content isn't lost when someone leaves the organization. a. Management information systems b. knowledge management systems c. computer information systems d. information systems e. customer relationship management systems

knowledge management systems

Among fields such as​ accounting, finance, ​marketing, and​ others, which has undergone the most change because of technology in the past 5​ years? a. finance b. engineering c. accounting d. psychology e. marketing

marketing

4) project team

responsible for individual sys proj

cons to prototyping

may skip over important steps may not accommodate large quantities of data/users may not undergo full testing

capital budgeting modules

measure value of investing in long term capital investments

accountability

mechanisms for identifying responsible parties

Compared to in-house hosting, cloud-based hosting ________. a. minimizes the risk of investing in technology that will soon become obsolete b. results in in-depth visibility of security c. provides better disaster-preparedness capabilities d. provides greater control over the location of data e. requires a significant amount of capital

minimizes the risk of investing in technology that will soon become obsolete

mobile application development

mobile sites/apps, smaller screens, multi-touch gestures, different memory/processing

FIP principles are based on the notion of the:

mutuality of interest between the record holder and the individual.

cons to end user development

not meant to process intense applications poor control/management/testing loss of control over data

FTC fair information practices principles

notice/awareness, choice/consent, access/participation, security, enforcement

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer.

production & maintenance

operate, evaluate & modify

liability

permits individuals (and firms) to recover damages done to them

conversion

plan conversion, prepare documentation, train users and technical staff

Which of the following is NOT considered to be a typical people​ problem? a. difficulties of evaluating performance b. work environment c. wrong incentives d. political conflict e. lack of employee training

political conflict

rapid action development (RAD))

process of creating workable systems very quickly

copyright to protect

protecting intellectual property from being copied for the life of the author, plus 70 years

Acceptance testing:

provides the final certification that the system is ready to be used in a production setting.

dependance and vulnerability

public and private orgs more defendant on computer sys

info sys ethics

raise new ethical Q's, create opportunities for intense social change, new kinds of crime, silk road(dark web), bitcoin

A/an ________________________ is a document provided to potential external vendors allowing the vendor to compete with a proposal.

request for proposal (RFP)

changed management

required for successful system building. new sys have behavioral impacts. change breeds resistance

Which process develops a detailed description of the functions that a new information system must perform?

requirements analysis

european directive on data protection

requires companies to inform people when they collect info about them & disclose how it will be stored /used - *informed consent of customer*

fair info practices circa 1973

set of rules governing the collection & use of info, based on relationship of record holder & individual

According to the ________ rule, if an action cannot be taken repeatedly, it is not right to take at all.

slippery-slope/Descartes Rule of Change

agile development

speeds up programming & testing - develop breaks projects up into smaller sub projects (development sprints)

In what stage of systems development are design specifications created?

systems design

Unit testing

tests each program separately.

Which of the following statements about client/server computing is not true? a. the client provides the user interface b. the bulk of processing occurs on the client c. computing on the internet is based on the client/server model d. the client is normally a desktop or laptop computer e. the server provides security, remote access, and user authentication

the bulk of processing occurs on the client

When talking about changes related to information​ technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital​ platform, ________________________, and the growth of cloud computing. a. faster networks b. the growing use of big data c. home computing d. the internet e. improved application software

the growing use of big data

_______ gives money its value

the market

Which conversion process introduces the system first to a limited portion of the organization?

the pilot study strategy

Which is TRUE of a multi-tiered network? a. processing is handled by one large central computer b. the work of the entire network is centralized c. the work of the entire network is balanced over several levels of servers d. processing is split between clients and servers e. processing is handled by multiple, geographically remote servers

the work of the entire network is balanced over several levels of servers

mobile device growth

tracking of individual mobil phones/devices

____________ focus on day-to-day operations of a business including managing sales, payroll, and receipts. a. auto processing systems b. operational processing systems c. transaction processing systems d. big data systems e. spreadsheets

transaction processing systems

programming

translate design specifications into code

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. a. service-oriented b. on-demand c. grid d. multi-tiered client/server e. two-tiered client/server

two-tiered client/server

testing

unit & systems & acceptable test

real options pricing modules

use when futures revenues streams of IT projects are uncertain and expensive. test with small pilot projects

joint application design JAD

used to accelerate analysis & design brings end-users and specialists together

portfolio analysis

used to evaluate project options. based on risk & benefits. scoring models

Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of: a. virtualization b. it boosts server utilization rates to 70% or higher c. morphing d. customization e. multiplexing

virtualization

traditional systems lifecycle

waterfall approach, formal specifications & paperwork, lots of time, costly, inflexible


Kaugnay na mga set ng pag-aaral

Intermediate Accounting II Final

View Set

RN Pediatric Nursing Online practice 2023A

View Set

Chapter 11 - Customer Relationship Management

View Set

Ch. 18: Nutrition for Patients with Disorders of the Lower GI tract and Accessory Organs

View Set

Accounting concepts and terms Ch.3

View Set

Ch. 16 Appraising and estimating market value

View Set