ISYS 363
Which of the following is the main objective of information systems that focuses on improving supply chains? Select one: a. decentralizing the organizations b. discouraging vendor-managed inventory systems c. encouraging the bullwhip effect d. discouraging sustainable production processes e. accelerating product development and innovation
Accelerating product development and innovation
Which of the following software tools allows developers to create animation and video that can be compressed small enough for fast download speeds? Select one: a. MySQL b. XML c. Adobe Flash d. HTML e. CSS
Adobe Flash
________ is an example of an electronic conferencing tool. A) MS Outlook B) Apple FaceTime C) Wikipedia D) Google Docs E) MS SharePoint
B) Apple FaceTime
The concept of ________ is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts. Select one: a. cognitive dissonance b. collective intelligence c. preference elicitation d. consensus democracy e. creative commons
Collective Intelligence
________ refers to using multiple communication channels to support the communication preferences of users, such as the Web, the company's Facebook page, industry blogs, telephone, and so on.
Customer interaction center
The technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution is known as ________ management.
Digital Rights
A global project called One Laptop per Child is attempting to distribute low-cost laptop computers to children in developing countries around the world in an attempt to shrink the ________.
Digital divide
The term ________ refers to a class of software that enables people to work together more effectively.
Groupware
________ describes covert activities, such as theft of trade secrets, bribery, blackmail, and technological surveillance, to gain an advantage over rivals.
Industrial espionage
With respect to the types of information systems used in organizations, an automated system for analyzing bank loan applications is an example of a(n) ________ system.
Intelligent
Identify a true statement about a packet sniffer. Select one: a. It is used to test targeted systems for weaknesses. b. It is used to analyze network traffic. c. It is used to redirect Web pages to different sites if any link fails. d. It is used to capture encrypted passwords. e. It is used to break passwords using a brute-force approach.
It is used to analyze network traffic
Amazon.com took crowdsourcing mainstream with its micro-task marketplace called ________.
Mechanical Turk
Systems that are used to interact with customers and run a business in real-time are called ________ systems.
Operational
A(n) ________ network is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication, typically within an area of 10 meters.
Personal Area
________ is the creation of a categorization system by users. Select one: a. Webcasting b. Social cataloging c. Social blogging d. Crowdsourcing e. Podcasting
Social Cataloging
Which of the following is true for tangible costs? Select one: a. They are the same as intangible benefits. b. They are relatively easy to quantify. c. They are always fixed costs. d. They are always non-recurring costs. e. They are recurring costs.
They are relatively easy to quantify
The protocol used by the Internet is called the ________.
Transmission Control Protocol (TCP)
Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
Utility computing
________ is used by organizations to determine patterns in customers' usage data.
Web usage mining
Fen-phen was an anti-obesity medication that consisted of two drugs: fenfluramine and phentermine. Fenfluramine was initially marketed by American Home Products. It was shown to cause potentially fatal pulmonary hypertension and heart valve problems. This eventually led to the withdrawal of the product and legal damages of over $13 billion. This is an example of ________. Select one: a. lean manufacturing b. a product recall c. the bullwhip effect d. production control e. a green business
a product recall
Which of the following portrays the individualized service benefit of a customer relationship management (CRM) system? Select one: a. enabling improved record keeping and efficient methods of capturing customer complaints that help to identify and solve problems faster b. providing product information, sales status, support information, issue tracking, and so on c. integrating all information for all points of contact with the customers so that all who interact with customers have the same view and understand current issues d. providing integrated information which removes information handoffs, thereby speeding both sales and support processes e. learning how each customer defines product and service quality so that customized product, pricing, and services can be designed or developed collaboratively
a. enabling improved record keeping and efficient methods of capturing customer complaints that help to identify and solve problems faster
A(n) ________ system is a special purpose information system designed to provide assistance to organizational decision making related to a particular recurring problem.
decision support
In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A(n) ________ grid, consisting of a large number of homogeneous computers, can help overcome these problems. Select one: a. dedicated b. edged c. clustered d. trusted e. parallel
dedicated
Organizations periodically have an external entity review the controls so as to uncover any potential problems in the controls. This process is called ________.
information systems audit
Which of the following is the host name in the URL "labs.google.co.in/jack carver"?
labs
________ refers to the process of identifying, quantifying, and presenting the value provided by a system.
making the business case
Components to simplify, standardize, and automate business processes related to inbound and outbound logistics, product development, manufacturing, and sales and service are called ________ management.
operations
The several processes associated with the acquiring of goods from external vendors are collectively referred to as the ________ process.
procure-to-pay
________ refers to anything that occurs as part of a daily business of which a record must be kept.
transaction
Employees steal time on company computers to do personal business. This is an example of ________.
unatuhorized access