Introduction to Management Information Systems (BADM 2301) Final Review
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ___________.
Accuracy
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Additional management support
__________ causes pop-up advertisements to appear on your screen.
Adware
The primary purpose of the systems __________ stage is to gather information about the existing system to determine the requirements for an enhanced system or a new system.
Analysis
Which of the following is FALSE of the Apple Watch release in April 2015?
Apple's supplier in China could not meet their quality standards, so they switched to a supplier in the US.
The ___________ layer of TCP/IP enables client application programs to access the other layers.
Application
Ukraine's protection of their SCADA systems is ______ than in the US but was vulnerable because of its use of ______.
Better; VPN
Chevron supported internal improvement efforts by getting its suppliers involved using a unified _______ approach that involved standardizing processes across the entire company and consolidating process information within a central repository.
Business Process Management (BPM): A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes
_______ is an extended ERP module.
Business intelligence
The top technology job is _________.
Chief Informations Officer (CIO)
Most countries don't accept electronic transactions from _________ because of fraud concerns.
China
FanDuel and DraftKings rely on ________ to manage the scalability of their websites; this means _________.
Cloud computing; they have to be ready to accept a huge increase in fans right before big games
__________ is a cable medium.
Coaxial
_______________ refers to efforts by two or more entities who work together to accomplish certain tasks.
Collaboration
Under __________'s rules, marijuana growers must put a ________ on each plant so it can be recorded and monitored by the state's enforcement system.
Colorado; microchip
Obamacare was created to address the _________ approach.
Common good
The main drawback to Google Fiber for Google is _________.
Cost
______ is a disadvantage of ERP.
Cost
You want to implement an ERP system, but you do not want to buy something from SAP or Oracle. Since you are building an ERP system from scratch, this is called a(n) ______ approach to ERP implementation.
Custom
Ashley Madison's data was first released on the _________ by ________.
Dark Web; The Impact Team
Affinity analysis is a(n) _________ application.
Data mining
You would use OLAP and DSS as statistical procedures for __________ analytics.
Descriptive
__________ analytics answers the question "what has happened".
Descriptive
____________ conversion is the most risky.
Direct
You get a sales report every month to show the products sold from each state. You notice the sales from California are down from last month, so you click on the state to get more detailed information on each sales person. You notice one salesperson sold 10% of what he did the previous year. This is an example of a(n) ________ report.
Drill-down
ERP systems that include administrative, sales, marketing, and HR processes are referred to as ______.
ERP II
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Encryption
The category "student" is a(n) _________.
Entity
The "right to be forgotten" court order occurred in _________.
Europe
Functional dependencies are similar to ______ keys.
Foreign
The _______ creates links between two tables.
Foreign
Only a few ________ satellites are needed for global coverage.
GEO
____________ is the second step in the general framework for ethics.
Get the facts
________ is a market pressure.
Globalization
A _______ site is the most expensive option.
Hot
A __________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.
Hot
Which of the following is an accessibility issue?
How much should companies charge for permitting access to information in their databases?
_____ consists of 32 bits.
IPv4
In the ______ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution.
Improve
You work on the assembly line of a BMW in South Carolina. This is a(n) _____ activity.
Internal
An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network.
Intranet
___________ delivers the precise number of parts to be assembled into a finished product at precisely the right time.
JIT
A(n) ______ report summarizes the performance of critical activities.
Key indicator
Medium-range wireless networks are ______ technology.
LAN
_________________ are/is a tool for democratizing higher education.
MOOCs
The planning process that integrates production, purchasing, and inventory management of interdependent items is called _______.
MRP
___________ is a more complex, integrated software that can handle money and labor in addition to production, purchasing, and inventory management planning.
MRP II
If you analyze a data cube, this is an example of using ______
OLAP.
___________ is a software company that compares a homeowner's energy use to the average energy use of his or her neighbors.
OPower
You decide to purchase Oracle's Netsuite CRM+ system. This is an example of a(n) __________ CRM system.
On-premise
You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.
Passive RFID codes
Your company decides to implement SAP in the United States before implementing it in Canada. This is an example of _______ conversion.
Pilot
The ___________ process originates in the warehouse department and ends in the warehouse department.
Production
________ is a societal pressure.
Protection against terrorist attacks
Colorado uses _______ to track marijuana.
RFID
_______ is a decisional role.
Resource allocator
In the _______ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products.
Return
You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ______.
Rot
_________ is a customer-facing CRM application.
SFA
__________ is the best-known on-demand CRM vendor.
Salesforce
_______ is a wireless network proposal that creates long-distance wireless internet connections; it uses the lower-frequency "white spaces" between broadcast TV channels.
Super Wi-Fi
A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.
Systems analyst
________ is the cumulative store of subjective or experiential learning.
Tacit knowledge
________ feasibility determines whether the company can develop or otherwise acquire the hardware, software, and communications components needed to solve the business problem.
Technical
Capital One's insourcing initiative meant it had to build its reputation as a ______ company.
Technology
Information overload is a _________ pressure.
Technology
Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?
Technology is getting cheaper to acquire, operate, and maintain
__________ does not allow participants to communicate face to face.
Teleconferencing
_________ enables participants to seamlessly share data, voice, pictures, graphics, and animation by electronic means.
Telepresence
FedEx used _________ to improve dock operations.
The IoT
___________________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
The IoT
_________ involves system developers writing a business case to justify funding one or more specific applications or projects.
The business case approach
_____________ is an advantage of the buy option.
Time
_________ is NOT a major task of the IT steering committee.
Training the top managers from each functional area
__________ is a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. It is a ______-range wireless network technology.
UWB; short
Most oncology data is _________ and ________.
Unstructured; uncodified
__________ are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly.
Users
With the ______ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options.
Vanilla
__________ is a business strategy in which a company purchases its _____ suppliers to ensure that its essential supplies are available as soon as the company needs them.
Vertical integration; upstream
__________ is the most recent example of ethical misbehavior in organizations.
Wells Fargo bank
Which of the following is a privacy issue?
What information about individuals should be kept in databases, and how secure is the information there?
The Caribou Coffee case is an example of ________.
an extranet for a company and its dealers, customers, or suppliers
Which of the following is an accurate representation of the data hierarchy from smallest to largest?
bit, byte, field, record, file, database
Companies purchase digital dossiers to _________.
create customer intimacy
If a company wants to write some computer code, it would choose to ________.
customize a prewritten application
St. Louis Cardinal scouting director Christopher Correa hacked the Houston Astros' system. This was an example of _________.
espionage
The Sarbanes-Oxley Act requires publicly held companies to implement _______ controls; it was passed to address the ______ crisis.
financial; Enron
In public-key encryption, the ________ key is used for locking and the _______ key is used for unlocking.
public; private
Trustev was created to __________.
reduce online fraud
Simpa Networks uses a __________ model to provide solar power.
rent-to-own
You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.
sensitivity
Client/server computing links two or more computers in an arrangement in which powerful _______ provide computing services for _______.
servers; user PCs
Simpa Networks provides
solar power to people and small businesses.
As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.
structured
You are the CEO of Widgets R Us. You know your widgets need to be more efficient and cost less, so you ask R&D to develop a plan. This is a(n) _____ task and a(n) ______ decision.
unstructured; strategic planning