MIS 309 Posey Ole Miss Test 1 Excel Terms + CH 1-6, MIS 309 posey test 2, MIS 309 Posey Chapters 10-12
business analyst
A __________________ is a person who is well versed in organizational strategy and system alignment theory, and who also understands the proper role for technology.
Technical writer
A __________________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
phisher
A __________________ pretends to be a legitimate company and sends an email requesting confidential data, such as account number Social Security numbers, account passwords, and so forth.
Gantt Chart
A __________________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.
system analyst
A __________________ work with users to determine system requirements, designs and develop job descriptions and procedures, and helps determine test plans
worm
A(n) __________________is a type of virus that propagates using the Internet or other computer networks.
Which of the following is an example of IaaS?
Amazon EC2
documents the current situation of a business process
An as-is model
Repository
An inventory or a database is an example of a(n) _____________ which is defined as a collection of something
Which of the following is true of unsupervised data mining?
Analysts do not create a model or hypothesis before running the analysis.
Which of the following is a mobile operating system licensed by Google?
Android
"FIle"
Anything you can do with a file
________ is a wireless protocol designed for transmitting data over short distances, replacing cables.
Bluetooth
Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent customer surveys. Bryan feels that Andrea is just throwing her weight around. Which of the following is a valid observation of this scenario?
Bryan needs to learn to receive feedback.
________ is the activity of altering and designing business processes to take advantage of new information systems.
Business process reengineering
Which of the following is the smallest data element in a database?
Byte
Bits are grouped into 8-bit chunks called
Bytes
A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following is lacking in this activity?
Collaboration
________ is the activity of two or more people working together to achieve a common goal, result, or work product.
Collaboration
________ occurs when a group of people working together to achieve a common goal via a process of feedback and iteration.
Collaboration
________ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.
Customer relationship management
Which of the following statements is true about data marts?
Data marts address only a particular component or functional area of a business.
A(n) ________ is a self-describing collection of integrated records.
Database
________ is the process of converting a data model into tables, relationships, and data constraints.
Database design
information systems
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the __________________ department.
Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.
Development
Which of the following data elements is placed higher than records in the data hierarchy?
File
The tables that appear in a database are known as ________.
Files
) Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?
Finalizing
Which of the following is an open source browser?
Firefox
________ is installed in special, read-only memory in devices like printers or communication devices.
Firmware
Which of the following statements is true of good information?
Good information should be based on correct and complete data.
The world's best-known indexing engine is operated by ________.
Who pioneered Web 2.0 advertising?
Which of the following statements is true about working with Google Docs?
Google tracks document revisions, with brief summaries of changes made.
________ is the most common language for defining the structure and layout of Web pages.
HTML
A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.
HTML tag
Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?
HTTP
Which of the following protocols guarantees secure data transmission?
HTTPS
Amazon S3 (Simple Storage Service) is an example of ________.
IaaS
Which of the following is the most basic cloud offering?
IaaS
Which of the following is a valid observation of MySQL?
It is license-free for most applications.
Which of the following statements is true about reporting applications?
Two important reporting applications are RFM analysis and OLAP.
Which of the following statements is true about IEEE 802.3?
It is the protocol for wired LAN connections.
Which of the following is the operating system designed by Apple?
Mac OS
Physical security procedures
Maintaining the computers that run a DBMS in a locked room is a part of ___________________.
Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
Managerial
Project leaders have to take decisions on the allocation and utilization of materials and labor. Such decisions are called ________ decisions.
Managerial
Which of the following is a key difference between strategic decisions and managerial decisions?
Managerial decisions concern allocation and utilization of resources, whereas strategic decisions concern organizational issues
Identify a key difference between managerial decisions and operational decisions.
Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities
honeypots
Many companies create ___________________ , which are false targets for computer criminals to attack.
Which of the following is a valid guideline for maintaining good password etiquette?
Never ask someone else for their password.
Which of the following is an example of a dynamic process?
Nike uses Facebook and Twitter to generate buzz about its new line of running shoes.
brute force
Nonword passwords are vulnerable to a __________________ attack, in which the password cracker tries every possible combination of characters.
________ is the process of converting a poorly- structured table into two or more well-structured tables.
Normalization
Which of the following best represents the value of social capital?
Number of Relationships * Relationship Strength * Entity Resources
An ________ and an OLAP report are the same thing.
OLAP cube
Which of the following observations about RFM and OLAP reports is true?
OLAP reports are more dynamic than RFM reports
system conversion
Once a system has passed integrated testing, the organization installs the new system. Which term is used to refer to this activity?
assess feasibility
Once we have defined a project's goal and scope, the next step is to __________________.
cap an organization's financial exposure
One of the reason outsourcing is undertaken is to __________________.
Which of the following statements is true of closed source projects?
Only trusted programmers are allowed to make changes to a closed source project.
Kyra, a plant supervisor, orders 500 units of Type-2 steel beams for the coming month. In doing so, she has made a(n) ________ decision.
Operational
The database administrator of an organization constantly manages the processing rights and responsibilities of employees. This is an example of a(n) ________ task.
Operational
________ decisions are decisions that support day-to-day activities.
Operational
________ decisions are the most structured and have very little need for collaboration.
Operational
You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action
The information that your secretary gave will be considered as good information.
________ is a standard for subscribing to content sources.
Real Simple Syndication (RSS)
U.S. Steel Corp. is a well known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
________ is an example of an interenterprise information system.
SCM
________ are the companies that operate the SM sites.
SM application providers
A(n) ________ is an IS that supports the sharing of content among networks of users.
SMIS
Which of the following TCP/IP application-layer protocols is used for e-mail transmission?
SMTP
Which of the following is an international standard language for processing a database?
SQL
Which of the following is an example of an enterprise DBMS?
SQL Server
Which of the following questions is best answered through unstructured decision making?
Should we continue to outsource our bookkeeping processes?
________ is an add-on to browsers that was developed by Microsoft and provides animation, movies, and other advanced graphics inside a browser.
Silverlight
Web storefronts
Sites like Amazon.com provide __________________ for product vendors and distributors who choose not to develop ther own online presence.
Which of the following is a characteristic of dynamic processes?
They are adaptive processes that change structure rapidly and readily.
Which of the following observations concerning expert systems is true?
They are difficult and expensive to develop.
Which of the following statements about enterprise information systems is true?
They are very difficult to change
Which of the following is true of N:M relationships?
They can have more than one entity on each side of the relationship.
Which of the following is a reason why discussion forums are better than emails in asynchronous communication?
They keep the discussion from getting off track.
Which of the following is true about cable modems?
They rely on high-capacity optical fiber cables and use their own protocols for data transmission.
Which of the following statements is true of defenders-of-belief communities?
They seek conformity and want to convince others of the wisdom of their belief.
Which of the following statements is true regarding departmental information systems?
They support 10 to 100 users.
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?
FTP
Free data communications and data storage will make collaboration systems cheaper and easier to use by 2022. Which of the following is the most likely consequence of this development?
Face-to-face (F2F) meetings will become very rare
In which of the following situations would the bargaining power of suppliers be highest? A) a single vendor providing raw materials to many department stores B) a fashion outlet catering to a niche market C) a bank liquidating during a fire sale D) a large retailer buying goods from many small suppliers
a single vendor providing raw materials to many department stores
model processes, create components, model processes; assess results
Which of the following is an accurate representation of the steps in a business process management cycle?
Salesforce.com
Which of the following is an example of a company that offers SaaS?
adware
Which of the following is an example of a sniffing technique?
deciding what customer data from the order-entry system will be shared with other organizations
Which of the following is an example of a system specific security policy?
firewalls
Which of the following is an example of a technical safeguard?
A loss of customer goodwill due to an outage
Which of the following is an example of an intangible consequence?
licensed software
Which of the following is an outsourcing alternative that provides hosted applications and data storage?
hacking of information systems
Which of the following is considered a computer crime?
An employee inadvertently installs and old database on top of the current one.
Which of the following is considered a threat caused by human error?
consumer financial data stored by financial institutions
Which of the following is covered by the Gramm-Leach-Bliley Act of 1999?
following security and backup procedures
Which of the following is generally a responsibility of user of information systems?
an unexplained reduction in your account balance
Which of the following is most likely to be the result of hacking?
assess the threat and vulnerabilities
Which of the following is the first step in risk management?
It involves fixing problems or adapting existing systems to support new features.
Which of the following is true abou the "maintenance" of information systems?
It saves both direct and indirect management time
Which of the following is true about outsourcing?
Changing IS infrastructure is expensive and time-consuming
Which of the following is true about the IS infrastructure?
Fewer applications will be developed in-house and software customization will become easier.
Which of the following is true about the changes and developments foreseen for 2022?
They must learn standard techniques and procedures for the applications they use.
Which of the following is true about users of information systems?
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.
Which of the following is true for the relationship between business processes and information systems?
Business processes in these organizations are service-oriented.
Which of the following is true of business processes in nonprofit and government organizations?
Database data for information systems is provided in-house.
Which of the following is true of information systems?
facial features
Which of the following is used for biometric authentication?
It is a useful hybrid of symmetric and asymmetric encryption techniques.
Which of the following observations concerning Secure Socket Layer (SSL) is true?
It requires customers to install and manage systems themselves
Which of the following observations is true of a cold site?
Users' computer accounts should give users the least possible privilege necessary to perform their jobs.
Which of the following statements about human safeguards for employees is true?
Its meetings are conducted by the IS department
Which of the following statements is true about the steering committee of an IS department?
It often faces resistance from users for its invasive nature.
Which of the following statements is true for biometric identification?
It monitors the user experience and responds to user problems
Which of the following statements is true of the operations group in an organization's IS department?
backing up system databases
Which of the following systems procedures is specifically the responsibility of operations personnel?
A hacker floods a Web server with millions of bogus service requests.
Which of the following usually happens in a malicious denial-of-service attack?
HIPAA
Which of the following was passed to give individuals the right to access their own health data created by doctors and other health care providers?
Enterprise application integration is ________.
a suite of software applications that links existing systems by providing layers of software that connect applications together
Most SM applications earn revenue through ________.
a type of advertising model
Beacons
__________________ , tiny files that gather demographic information, use a single code to identify users by age, gender, location, likely income, and online activity.
Cookies
__________________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in everytime.
Trojan horses
__________________ are viruses that masquerade as useful programs or files.
Systems analysts
__________________ integrate the work of programmers, testers, and users.
Buying off-the-shelf software.
__________________ is a form of outsourcing.
Sniffing
__________________ is a technique fro intercepting computer communications, either through a physical connection to a network or, in the case of wireless networks, with no physical connection.
Outsourcing
__________________ is the process of hiring another organization to perform a service.
Encryption
__________________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
Malware
__________________ is the term used to denote viruses, worms, Trojans horses, spyware and adware.
Incorrect data modification.
__________________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
Hacking
__________________ occurs when a person breaks into a network to steal data such as customer lists, product inventory, employee data, and other proprietary and confidential data
Usurpation
__________________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legit applications and substitute their own processing to spy, steal manipulate data, or other purposes.
Pretexting
__________________ occurs when someone deceives by pretending to be someone else.
Natural disasters
__________________ present the largest risk for an organization's infrastructure loss.
Uncertainty; risk
__________________ refers to thing we do not know, while __________________ is the likelihood of an adverse occurrence.
Drive-by sniffers
__________________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
Hardening
___________________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system, and eliminating operating systems features and functions that are not required by the application.
passwords
___________________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
Business Process Modeling Notation
___________________ is a standard set of terms and graphical notations for document business processes.
Focused differentiation occurs when ________. A) a better product is provided within an industry segment B) there is limited competition in an industry C) the customers are highly price sensitive D) product quality improves across an entire industry
a better product is provided within an industry segment
________ is a hierarchical arrangement of criteria that predict a classification or a value.
a decision tree
Which of the following is a low-tech information system?
a file of email addresses stored in an email program
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? A) a used car dealership in New York B) a convenience store that sells retail products C) a firm that sells the only drug for a disease D) corner latte shops in Atlanta
a firm that sells the only drug for a disease
Workbook
a group of sheets comprise the workbook
"range"
a selected number of cells
Which of the following is a primary purpose of collaboration?
becoming informed
) Identify the least important characteristic for an effective collaborator.
being an experienced businessperson
sheets tab
bottom left of the page
________ is defined as information containing patterns, relationships, and trends.
business intelligence
A(n) ________ is a network of activities that generate value by transforming inputs into outputs. A) business process B) competitive strategy C) linkage D) information system
business process
________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain. A) Internal supply chain design B) Product differentiation model C) Market differentiation model D) Business process design
business process design
Porter defined value as the ________. A) amount of money that a customer is willing to pay for an offering B) extent of after-sale service provided to customers C) perceived satisfaction of the customers and sellers after a transaction D) actual money exchanged in return of a product/service
amount of money that a customer is willing to pay for an offering
"Dialog Box Launcher"
button on the lower right of of each tab that allows you to see the all options under that category
Which of the following is an input hardware device?
bar code scanner
A group of grain farmers in a surplus year will have reduced ________. A) bargaining power B) threat of substitutes C) risk of rivalry D) threat of new entrants
bargaining power
Which among the following is the most appropriate technique for creating memorable, strong passwords?
base your password on the first letters of the words in a phrase
PowerCruise, a holiday cruise firm, recently offered its existing customers an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement? A) creation of a new service B) product differentiation C) locking in of customers D) locking in of suppliers
locking in customers
Which of the following principles of competitive advantage is related to process implementations? A) creating new products B) enhancing products C) locking in suppliers D) differentiating products
locking in suppliers
A data model is a ________.
logical representation of database data
The primary risk of peer-to-peer support is ________.
loss of control
Which of the following is a significant risk of using social media for inbound and outbound logistics?
loss of privacy
In which phase of the customer life cycle do processes categorize customers according to value and attempt to win back high-value customers?
loss/churn
Which of the following refers to the problem that exists in database applications when two users update the same data item, but only one of those changes is recorded?
lost-update problem
A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________. A) low threat of substitutions B) high bargaining power of customers C) high threat of new entrants D) low bargaining power of suppliers
low threat of substitutions
To run a program or process data, the computer first transfers the program or data from disk to the ________.
main memory
Which of the following devices is used during the processing stage of computing?
main memory
Abstract reasoning is the ability to ________.
make and manipulate models
Information silos are also referred to as ________.
islands of automation
Which of the following describes a dimension in an OLAP report?
it is a characteristic of a measure
Information is considered to be bad if ________.
it is irrelevant to the subject
A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________
data
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
data
The words that you type in an MS Word document is an example of ________.
data
You have a spreadsheet that provides the airfares to different cities from New York. If this is used to make a decision, it will be considered as ________.
data
Which of the following is the least critical aspect of good information?
data abundance
Which of the following is an operational cost of an information system?
data acquisition costs
A data integrity problem will occur only if ________.
data are duplicated
Instructions are moved from main memory to the CPU via the ________.
data channel
Which of the following is a development cost of an information system?
data conversion costs
________ forms are used to read, insert, modify, and delete data.
data entry
In a database, when data items disagree with one another, this leads to a(n) ________.
data integrity problem
Which of the following is a fundamental category of BI analysis?
data mining
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
data mining
A ________ describes the data and relationships that will be stored in a database.
data model
An administrator should create a(n) ________ before developing a database design.
data model
Metadata are ________.
data that describe data
A ________ takes data from the data manufacturers, cleans and processes the data, and then stores it.
data warehouse
Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.
data warehouse
A ________ is a collection of forms, reports, queries, and programs that process a database.
database application
When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is ________.
developing committees and steering groups
One of the procedures of a collaboration project is task status reporting. This is performed in the ________ phase of the project.
doing
A ________ is a worldwide-unique name that is affiliated with a public IP address.
domain name
The remarkable characteristic of OLAP reports is that they are ________ , as they are online and the viewer of the report can change their format.
dynamic
A sales report that is current, as of the time the user accessed it on a Web server, is an example of a(n) ________.
dynamic report
Which of the following is a common description of information?
knowledge derived from data
Which of the following terms is used as a synonym for data mining?
knowledge discovery in databases
________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.
knowledge management
Formula Bar
large bar under ribbon -select cells, clink "enter" will do the math for you
To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used.
layered protocol
Which of the following business processes is related to sales and marketing?
lead tracking
Edwin leads a team of fifteen programmers. He constantly changes the procedures that he uses to monitor, evaluate, and control the way his subordinates function. This shows his ability to ________.
experiment
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
extensions
The columns in a database are called ________.
fields
If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.
leave it
When you buy an operating system for your personal computer, you are actually buying a software ________.
license
In market-basket terminology, the ratio of confidence to the base probability of buying an item is called the ________.
lift
According to Porter's model of business activities, interactions across value activities are called ________. A) support activities B) models C) linkages D) cross-functionalities
linkages
In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.
links
Which of the following business processes is related to operations?
finished-goods inventory management
"Select all button"
located between the columns and rows
View Buttons
located on the status bar "view, zoom, page break"
July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing? A) differentiating the product B) enhancing the product C) locking in customers D) standardizing the product
locking in customers
According to Hackman, which of the following is a primary criterion for judging team success?
growth in team capability
The storage disk in your computer is an example of the ________ component of information systems.
hardware
Which of the following components in the five-component model of information systems is considered an actor?
hardware
Which of the following components of an information system is the easiest to change and causes the least amount of organizational disruption when changed?
hardware
Which of the following components constitute the computer side of information systems?
hardware and software
ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors ________. A) faces very low threat of substitute products B) has high bargaining power over its suppliers C) faces very low threat of new entrants to market D) has very high bargaining power over its customers
has high bargaining power over its suppliers
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________. A) low threat of substitutions B) high bargaining power of suppliers C) high levels of rivalry D) low bargaining power of customers
high levels of rivalry
A spreadsheet program is an example of a(n) ________.
horizontal-market application
The attribute for a hyperlink is ________, whose value indicates which Web page is to be displayed when a user clicks on a link.
href
A student invests money and time in taking a business administration course. In this example, the student invests in ________.
human capital
The process of automation is a process of moving work from ________.
human side to computer side
A(n) ________ organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
hyper-social
A(n) ________ contains the URL of the Web page to find when a user clicks on it.
hyperlink
Each entity in a database has a unique attribute called a(n) ________.
identifier
Bargaining power of customers is likely to be the highest for markets involving ________. A) public transportation B) industrial products C) patented drugs D) luxury goods
industrial products
Porter's five forces model is used to assess ________. A) industry structure B) market share C) internal competition D) lifecycles of products
industry structure
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
industry-specific solutions
An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________. A) focused cost-leadership B) industry-wide differentiation C) industry-wide cost leadership D) focused differentiation
industry-wide differentiation
Which of the following conditions exists when data are isolated in separated information systems?
information silo
A stored procedure is a ________.
computer program stored in a database that is used to enforce business rules
Your company uses a software tool to manage its supply chain. This software tool is a(n) ________ of your company's information system.
instruction on the computer side
The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n) ________.
interenterprise information system
Organizations can lock in suppliers by making it difficult to switch to another organization or by ________. A) making it easy for the customers to switch products B) reducing investments in their supply chain C) making it easy to work with the organization D) reducing the bargaining power of consumers
making it easy to work with the organization
Which of the following database administration tasks is related to adaptation?
managing configuration changes in systems
The difference between the value that an activity generates and the cost of the activity is called the ________. A) margin B) turnover C) revenue D) value-addition
margin
Which of the following is used to show the products that customers tend to buy together?
market-basket analysis
In which phase of the customer life cycle are messages sent to the target market to attract customer prospects?
marketing
A data ________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.
mart
Web 2.0 encourages ________, which occur(s) when the output from two or more Web sites is combined into a single user experience.
mashups
Who is most likely to use asynchronous communication?
members of a team who work in different time zones
If there is not enough memory for a newly requested program, the operating system will remove something to place the just-requested program into the vacated space. This process is called ________.
memory swapping
BI servers use ________ to determine what results to send to which users and on which schedule.
metadata
________ records the source, format, assumptions and constraints, and other facts about the data.
metadata
Which of the following major companies is a traditional software vendor?
microsoft
In which of the following would rivalry be considered as a weak force affecting the market? A) military services B) used car dealers C) book sellers D) packaged food manufacturers
military services
Compared to in-house hosting, cloud-based hosting ________.
minimizes the risk of investing in technology than will soon become obsolete
) Constraints on the number of entities in a relationship are called ________ cardinalities.
minimum
A(n) ________ converts an analog signal to a digital one during data transmission.
modem
The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the details of each invoice drawn up in the previous quarter. This information is not good because it is ________.
more than what is required
"Home"
most frequently done things with excel
Which of the following statements is true of business process designs? A) Most process designs require people to work in new ways. B) Business process designs do not involve change in procedures. C) Business process designs should be accompanied by a change in management. D) Process designs attract very little employee resistance.
most process designs require people to work in new ways
Which of the following activities would seekers of the truth facilitate?
operations
Which of the following value chain activities involves transforming raw materials into a finished product or service? A) operations B) inbound logistics C) marketing D) maintenance
operations
Which of the following devices is an example of a storage hardware device?
optical disk
Which of the following is a nonvolatile memory device?
optical memory device
According to the five-component model of information systems, the ________ component functions as instructions for the people who use information systems.
procedure
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. These steps that you follow are examples of the ________ component of an information system.
procedure
It is generally more difficult to make changes to the ________ of an information system than to the databases itself.
procedures
The inherent processes defined in an ERP solution are known as ________.
process blueprints
Users employ servers for ________.
processing shared databases
When you modify or delete data present in a database, you are ________.
processing the database
Short cut menu
right click, must frequently done things whatever you click on
"mini tool bar"
right click, the small bar that appears full of tools
A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.
router
) In a manufacturing business, the ________ process transforms finished goods into cash. A) inbound operations B) operations C) sales D) inbound logistics
sales
Defenders-of-belief communities facilitate activities like ________.
sales and marketing
Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so? A) inbound logistics B) operations C) sales and marketing D) outbound logistics
sales and marketing
An OLAP report has measures and dimensions. Which of the following is an example of a dimension?
sales region
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.
seekers of the truth
In most cases, a business manager has no role in the specification of a ________.
server computer's hardware
Which of the following terms refers to a collection of servers?
server farm
Which of the following is a design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using standards?
service-oriented architecture
The fundamental purpose of the starting phase of a project is ________.
setting the ground rules for the collaboration
Which of the following is a support activity in the value chain? A) receiving inputs to operationalize the production B) distributing the products to retailers or buyers directly C) assisting customers in using the product or service D) setting up contractual arrangements for procurement
setting up contractual arrangements for procurement
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of ________.
signals
Which of the following is the distinguishing feature of a LAN as compared to a WAN?
single location
Every table in a normalized database has a(n) ________.
single theme
Which of the following formations on a line in an E-R diagram means that the relationship need not have an entity of that type?
small oval
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.
social
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
social capital
Being linked to a network of highly regarded contacts is a form of ________.
social credential
The first step that any hyper-organization should take is to develop and publicize a(n) ________ policy.
social media
________ is the use of information technology to support the sharing of content among networks of users.
social media
Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________.
software
An operating system like Windows or Linux is an example of the ________ component of an information system.
software
Traditional software vendors depend on ________.
software license fees
According to Porter's five forces model, which of the following would be most affected by the threat of substitutes? A) Microsoft Windows OS B) Boeing jets C) Southwest Airlines' services D) Google Adwords
southwest airlines services
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
sponsors
An organization defines the rules that govern a project that it needs to undertake and the people who should perform the tasks. The project is in the ________ phase of project management.
starting
The decision about team members' roles and authorities is made during the ________ phase of a project.
starting
ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?
steps for using the ERP applications to accomplish the activities in processes
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?
the cloud
Which of the following describes the meaning of 'sense' activity, in the SEAMS dynamic process?
the communities which are important to a person
Which of the following factors determines the structure, features, and functions of the information system used in a company? A) the competitive strategy B) the brand value of its brands C) the size of the company D) the technology used by competitors
the competitive strategy
Deleting problematic content on social networking sites is best reserved for when ________.
the content is obscene and inappropriate
In-house hosting, delivered via Web service standards that can be configured dynamically, is referred to as ________.
the private cloud
Responding to problematic content on social networking sites is best reserved for when ________.
the problematic content has caused the organization to do something positive as a result
Which of the following is considered information rather than mere data?
the return on investment of an advertising campaign
Managerial decisions in an organization concern ________.
the utilization of resources
Server farms are used when ________.
the website has large numbers of users
An application that requires support beyond a browser on the user's computer is known as a(n) ________.
thick-client application
A client-server application that requires nothing more than a browser is called a ________.
thin-client application
A digital divide exists between ________. A) U.S. software companies and European software companies B) hardware companies and software companies C) those who have Internet access and those who do not D) employees of a software company and the managers of the company
those who have internet access and those who do not
The net result of the difference between the total value added and the total costs incurred is the ________ of the value chain. A) actual value B) total margin C) gross revenue D) gross turnover
total margin
Version-management systems ________.
track changes to shared documents
Which of the following information system requirements falls into the content sharing category?
tracking versions of many documents
ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers, in training sessions called ________.
train the trainer
The connection between a VPN client and a VPN server is called a(n) ________.
tunnel
"Name Box"
under "clipboard" used to name individual cells -Helpful when trying to make sense of formulas
Information silos are not a problem until they begin to ________.
use and store data about the same entities
The ________ tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages.
user
What are the three tiers in three-tier architecture?
user, server, and database
________ is the essence of SM relationships.
user-generated content
________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
users
A characteristic of Web 2.0 is that the value of a Web site increases ________.
with users and use
Focused cost leadership is observed when a product has the lowest cost ________. A) within an industry segment B) within the product range offered by a company C) within an industry D) within the supply chain of a company
within an industry segment
Users employ client computers for ________.
word processing
Collaboration occurs when a number of people ________.
work together to achieve a common goal
plunge
A __________________ installation is the riskiest because the old system is shut down and the new system is turned on.
trade-off
A __________________ is a balancing of three critical factors: requirements, cost, and time.
Activities
_______________ are collections of related tasks that receive inputs and produce outputs.
IDS
A __________________ is a computer program that senses when another computer is attempting to scan the disk or other access a computer.
test plan
A __________________ is a formal description of a system's response to use and misuse scenarios.
Identify the project management phase in which the tasks of a project are performed.
doing
Which of the following is a component of an information system but not of information technology?
people
steering committee
A __________________ is a group of senior managers from the major businesses functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives
threat
A __________________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.
10 TB is equivalent to ________ Gigabytes.
10,240
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
113
Ajax is one of the customers of a well known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.
511
smart
A __________________ card has a microchip in it to hold data.
Which of the following components constitute the human side of information systems?
people and procedures
Business Process
A ___________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function
Interenterprise
A business process that crosses into multiple companies is known as an __________________ business process.
issue-specific policy
A security policy covering the matters related to the personal use of computers at work would be an example of a __________________
Kerberos
A system called __________________ authenticates users without sending their passwords across a computer network.
payload
A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the __________________.
Which of the following statements regarding information technology (IT) is true?
A) Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information
Which of the following is an example of a database management system?
Access
________ is an example of a personal DBMS.
Access
delay the projects completion
According to Brooks' Law, adding more people to a late project will __________________.
departmental
Accounts payable is an example of the _________________ scope of business processes addressed by business process management.
With ________, Google searches an organization's Web site and inserts ads that match content on that site. When users click those ads, Google pays the organization a fee.
AdSense
With Google's ________ software, vendors pay a certain amount for particular search words
AdWords
The top layer of TCP/IP Protocol architecture is related to ________.
Applications
the organization should protect you computer and its files
As an IS user, you have a right to a secure computing environment. This means that __________________.
Which of the following statements is true about BI publishing alternatives?
BI servers extend alert/RSS functionality to support user subscriptions.
ERP vendor Infor acquired which of the following ERP products?
Baan
key escrow
Because encryption keys can be lost or destroyed a copy of the key should be stored with a trusted third party. This procedure is called ___________________.
Which of the following is a nonrelational data store developed by Google?
Bigtable
Communications speeds are expressed in ________.
Bits
________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.
Cable
Which of the following is a nonrelational data store developed by Facebook?
Cassandra
Which of the following is true about the database development process?
Changing a relationship from 1:N to N:M is simply a matter of changing the notations.
________ differentiates SMIS from Web site applications.
Connection data
________ is data and responses to data that are contributed by users and SM sponsors.
Content Data
Which of the following is a major implication of Moore's law?
Costs of data communications and storage have become very low.
A(n) ________ is a program used to create, process, and administer a database.
DBMS
Which of the following is true of DSL modems?
DSL modem signals do not interfere with telephone signals
business and system analysts
During the requirements definition stage of developing and information system, the project team will include mostly __________________.
________ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial decisions and activities.
Dynamic processes
Which of the following is a nonrelational data store developed by Amazon?
Dynamo
phishing
Email spoofing is a synonym for __________________.
Which of the following statements is true of social CRM?
Each customer crafts his or her own relationship with the company.
Computer security is constrained by societal factors
Employees resent physical searches when arriving at and departing from work. Which aspect of computer security described in the NIST Handbook is reflected here?
A(n) ________ DBMS is designed to process large organizational and workgroup databases.
Enterprise
________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
Enterprise resource planning
The IEEE 802.3 protocol standard is also known as ________.
Ethernet
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
Experimentation
________ attempt to capture human expertise and put it into a format that can be used by nonexperts.
Expert systems
maintenance
Fixing a system so that it work correctly, or adapting it to changes in requirements, occurs in the __________________ phase of the SDLC
________ is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.
Flash
________ is a major task when implementing enterprise systems.
Gap identification
Spreadsheet
General type of software -Excel is the leader
Which of the following decisions is least likely to involve collaboration?
How much of product A should be ordered from vendor B?
The organization responsible for assigning public IP addresses is called ________.
ICANN
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.
IP
A(n) ________ is a number that identifies a particular device.
IP address
Which of the following is the most common format for IP addresses?
IPv4
business and systems analysts.
If an organization does not develop programs in-house then the development group of the IS department will be staffed primarily by __________________.
CFO
If the primary information systems in an organization support only accounting and financing activities, the CIO should most likely report to the
business function
In 2005, Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of __________________ outsourcing.
an activity is independent of the process and is defined in detail in another diagram
In BPMN diagrams, a square with a plus sign means that __________________.
diamonds
In BPMN notation, __________________ represents decisions and usually contain a question that is answered with yes or no.
solid arrows
In BPMN, __________________ depict the flow or sequence of activities in a process.
rectangle with rounded corners
In a BPMN process diagram, a __________________ represents an activity
circle
In a BPMN process diagram, a __________________ represents the start of a process.
swim lane
In a BPMN process diagram, all activities for a given role are shown in it's _________________
square with a folded corner
In a BPMN process diagram, data is represented by a _______________.
messages and data flows
In a BPMN process diagram, dotted arrows depict the flow of __________________ in the process.
parallel
In a __________________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
a collection of activities
In a business process, a role refers to ____________
people or computer applications that are assigned to roles
In a business process, resources are ________________
hot site
In a disaster-preparedness terminology, a ___________________ is a utility company that can take over another company's processing with no forewarning.
create system components
In business process management, once the as-is model is created, the team must
BPM authority is shared across several departments in an organization
In enterprise business processes, ____________________.
chief executive officer
In organizations that operate significant non-accounting information systems, the chief information officer is most likely to report to the __________________.
deliverables
In systems development, documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of __________________.
operations
In the IS department, the __________________ group manages computing infrastructure, including the individual computers, in-house server farms, networks, and communications media.
development
In the IS department, the __________________ group manages the process of creating new information systems as well as maintaining existing information systems.
form the project team
In the SDLC, if a defined project is determined to be feasible, the next step is to __________________.
plan the project
In the SDLC, the first major task for an assembled project team is to __________________.
Which of the following is true about the quality of information?
Information should be just barely sufficient for its purpose
________ are predesigned procedures for using software products
Inherent processes
________ are commands that the central processing unit can process.
Instruction sets
The primary purpose of an ERP system is ________.
Integration
Which of the following is true about a VPN?
It encrypts messages to ensure secure transmissions.
A private internet that is used exclusively within an organization is called a(n) ________. A) ethernet
Intranet
Which of the following is true of the model of social media developed by Gossieaux and Moran?
It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.
Which of the following statements is true about the IEEE 802.11 protocol?
It allows speeds of up to 600 Mbps.
Which of the following statements is true of enterprise application integration?
It connects system "islands" via a new layer of software.
Which of the following observations is true about a hyper-social organization?
It creates relationships in which both parties perceive and gain value.
Which of the following is true of source data for a BI system?
It refers to data that the organization purchases from data vendors.
Which of the following is a function of an ISP?
It serves as a gateway to the Internet.
Which of the following collaboration activities is mainly concerned with content sharing rather than communication?
Iteration
Which of the following statements about a structured interenterprise information system is true?
Its procedures are formalized and the problem solutions affect multiple organizations.
A ________ is equivalent to 1,024 bytes.
Kilobyte
With version-control systems, shared documents are placed into shared directories called ________.
Libraries
Which of the following is an SM application provider?
________ is a version of Unix that was developed by an open source community.
Linux
The four major ERP products of ________ are AX, Nav, GP, and Solomon.
Microsoft Dynamics
Which of the following is an example of a closed source project?
Microsoft Office
The ________ is the most popular BI server today.
Microsoft SQL Server Report manager
Identify the most popular version control application for general business
Microsoft SharePoint
Which of the following alternatives for sharing content provides version control?
Microsoft SharePoint
Which of the following is an example of an application program?
Microsoft Word
________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.
Moore's Law
Which of the following observations is true?
Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.
From among the following, identify the open source DBMS product.
MySQL
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
N:M
Which of the following is the device that connects a computer's or printer's circuitry to network wires?
NIC
Vera wants to create a password. Which of the following is the strongest password that she can use?
NOOCSmyPw$42
________ typically have transmission speeds less than 56 Kbps.
Narrowband lines
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
Network
Which ERP vendor acquired PeopleSoft and Siebel?
Oracle
Who are the top two ERP vendors?
Oracle and SAP
Which of the following is an example of a PaaS?
Oracle on Demand
legal requirements
Organizational feasibility concerns whether the new system aligns with __________________.
vendor
Outsourcing gathers all of the possible risks into the risk of choosing the right __________________.
Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.
PC virtualization
With ________, a personal computer, such as a desktop or portable computer, hosts several different operating systems.
PC virtualization
A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?
PaaS
A(n) ________ is a piece of a message that is handled by programs that implement IP.
Packet
direct
Plunge installation is sometimes called __________________ installation.
by the departmental manager
Problems related to departmental business processes are resolved __________________
________ is a measure of the ratio of process outputs to inputs.
Process efficiency
Ribbon
Runs the length of the interface, has all frequently used tools from the tabs
work-breakdown structure
Project teams create a __________________, which is a hierarchy of the tasks required to complete a project.
Which of the following is an output device?
Projector
A ________ is a set of rules that programs on two communicating devices follow.
Protocol
Which of the following statements is true about operational data?
Purchased operational data often contains missing elements.
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
RFM
With a(n) ________ , users can subscribe to content sources and be notified when they have been changed.
RSS reader
Minimum cardinalities in an E-R diagram refer to the minimum number of entities required in a(n) ________.
Relationship
________ refers to a person's belief that he or she can be successful at his or her job.
Self-efficacy
Identify a key difference between a client computer and a server computer.
Servers are faster and usually have multiple central processing units
The directors of a company meet to decide if they should start a new product line or not. This is an example of a ________ decision.
Strategic
The need for collaboration is greatest for ________ decisions.
Strategic
________ decisions are those that support broad-scope, organizational issues
Strategic
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
Structured
Using a standardized procedure to calculate the incentives of employees is an example of a(n) ________ decision.
Structured
________ processes span an organization and support activities in multiple departments.
Structured enterprise
________ are formally defined, standardized processes that involve day-to-day operations.
Structured processes
The use of a conference call is an example of ________ communication.
Synchronous
________ communication occurs within a team when all team members meet at the same time.
Synchronous
________ refers to the ability to model components and show how the components' inputs and outputs relate to one another.
Systems thinking
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
TCP/IP
implementation
Tasks in the __________________ phase of the SDLC are to build and test system components and to convert users to the new system.
Wired Equivalent Privacy
The IEEE 802.11 Committee, the group that develops and maintains wireless standards, first developed a wireless security standard called __________________
CORBIT
The Information Systems Audit and Control association has created a set of standard practices called ________________ that are often used in the assessment stage of the BPM cycle.
records held by the US government
The Privacy Act of 1974 covers __________________.
OMG
The _________________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes
Critical path
The __________________ is a sequence of activities that determines the earliest date by which a project will be completed.
CIO
The __________________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problems solution, proposals, and new initiatives..
requirements analysis
The __________________ phase of the SDLC involves identifying what is to be produced, how frequently and how fast it is to be produced.
component design
The __________________ phase of the SLDC involves determining hardware and program specifications, planning the database and procedures, and creating job definitions.
baseline
The final WBS plan, denoted as the __________________ WBS, shows planned tasks dependencies, durations, and resource assignments.
maintaining the system
The final stage of system development involves __________________.
determine the goals and scope
The first step in the system definition phase of systems development is to __________________.
Which of the following observations about the relationship between decision type and decision process is true?
The higher levels of decision making are associated with unstructured decision processes.
In SOA terminology, what does it mean if the production of a service is said to be encapsulated
The methodology and location of the service is private.
the systems development life cycle
The most common technique for developing information systems is __________________.
According to Moore's law, the ________.
The number of transistors per square inch on an integrated chip doubles every 18 months
data administration
The purpose of the __________________ group is to protect data and information assets by establishing data standards and data management practices and policies.
CTO
The responsibilities of a __________________ include advising the CIo, executive group, and project managers on emerging technologies.
installing software and repairing networks
The responsibilities of a computer technician include __________________.
How should a sales team respond to a customer who has an RFM score of 545?
The sales team should let go of this customer; the loss will be minimal.
diseconomies of scale
The situation that occurs when adding more resources creates inefficiencies is known as __________________.
configuration control
The term __________________ refers to a set of managment policies, practices, and tools that developers use to maintain control over the project's resources.
bot
The term ___________________ refers to any type of program that is surreptitiously installed and that take actions unknown and uncontrolled by the computer's owner/administrator.
Which of the following would be a consequence of teleaction?
The value of robotics would increase.
Title bar
The very top center; is the name of the workbook
multiply likelihood by the cost of the consequences
To obtain a measure of probable loss, companies __________________.
diseconomies of scales
To which of the following does Brooks' Law apply?
Quick Access Tool Bar
Top left of page, right above "file"
A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.
Trigger
When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.
URL
Most LAN connections are made using ________.
UTP cable
Which of the following is an example of an open source operating system?
Ubuntu
Which of the following is a key difference between collaboration and cooperation?
Unlike cooperation, collaboration gives importance to iteration and feedback
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making
Unstructured
Which of the following statements is true of firmware?
Users do not need to load firmware into the devices' memory.
personal identification number
Users of smart cards are required to enter a __________________ to be authenticated.
learn basic computer skills
Users should not bother IS personnel for trivial reasons, so they have a responsibility to __________________.
A(n) ________ uses the Internet to create the appearance of private point-to-point connections
VPN
________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.
Version control
Computers that reside in different geographic locations are connected using a(n) ________.
WAN
For a printer or laptop to connect to a wireless LAN, it must have a(n) ________.
WNIC
A service provider creates a service description, which documents how to use a service, and publishes that description using a standardized language called ________.
WSDL
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Web servers
A(n) ________ is an encapsulated software service provided over the Internet using standard protocols.
Web service
________ is a popular commercial webinar product used in virtual sales presentations.
WebEx
cost, schedule, technical, and organizational feasibility
What are the four dimensions of feasibility?
Unlike spyware, adware does not perform malicious acts
What is the major difference between spyware and adware?
vendor
When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the __________________.
remover user accounts and passwords
When an employee is terminated, IS administrators should receive advance notice so they can ___________________.
unauthorized data disclosure.
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of __________________.
"Screen Tips"
When you hold your mouse over a button, the description of the button comes up
the general statement of the security policy
Which element of a security policy specifies how organization will ensure the enforcement of security programs and policies?
likelihood
Which factor of risk assessment refers to the probability that a given asset will be compromised by a given threat, despite the safeguards?
conducting external audits
Which of the following is NOT a function of the information systems department?
establishing the security policy and managing risk
Which of the following is a critical security function of senior management?
cloud hosting
Which of the following is a form of hardware outsourcing?
setting IS priorities
Which of the following is a function of the steering committee for an IS department?
investigating new IS technologies
Which of the following is a function of the technology office in an organization's IS department?
receiving effective training according to their requirements
Which of the following is a right of users of informations systems?
It involves the potential loss of intellectual capital
Which of the following is a risk of outsourcing IS/IT functions?
symmetric
With __________________ encryption, the sender and receiver transmit a message using the same key
pilot
With __________________ installation, the organization implements the entire system/business processes on a limited portion of the business.
________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
XML
https
You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in you browser's address bar will let you know that the bank is using the SSL protocol?
As the IT manager of your organization, you need to use a coworker's account to access some information. In keeping with password etiquette, how would you go about getting his password?
You ask the coworker to type in the password where required, while you look away.
Identify how information technology differs from information systems.
You can buy information technology, but not information systems.
An ERP solution does not include ________.
a company's operational data
Which of the following is an example of computer hardware?
a computer monitor
Being ________ is one of the most important characteristics of an effective collaborator.
able to give negative feedback
Kerin is a business student interning at Benson and Hodgson, a firm specializing in exports of sophisticated equipment to other countries. She finds that she is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that she lacks ________ skills.
abstract reasoning
Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?
access point
Which of the following is a function of an application program?
accessing a customer database
Push publishing delivers business intelligence ________.
according to a schedule or as a result of an event or particular data condition
Which of the following business processes is related to customer service?
account tracking
Which of the following types of skills is most likely be outsourced to the lowest bidder?
accounting skills
Which of the following is a critical characteristic of good information?
accuracy
Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.
acquisition
A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
active lurker
The hardware components of an information system will act as a(n) ________.
actor on the computer side
When using the relational model to represent data, one must ________.
add a foreign key to one of the tables
Social capital depreciates, but such depreciation can be ameliorated by ________.
adding something of value of the interaction
The Web 2.0 business model relies on ________.
advertising
"Formulas"
any toll that regards a formula
"Data"
anything you can do with data and what you can do with it
"Insert"
anything you can insert into a spreadsheet
Programs that perform business functions such as general ledger and accounting are known as ________.
application software
Bits are used for computer data because they ________.
are easy to represent electronically
Server application programs are programs that ________.
are processed on server computers
Web 2.0 companies provide software ________.
as a free service
Source code is computer code ________.
as written by humans
Which of the following business processes is related to human resources?
assessment
Entities in a data model have ________ that describe the characteristics of the entity.
attributes
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.
authoring
The term "open source" means that the source code of the program is ________.
available to the public
Which of the following is an example of a measure in an OLAP report?
average cost
Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
buying and installing new computers in the new outlets
Which of the following tasks should be performed during the planning phase of project management?
determining schedule
The CPU keeps frequently used instructions in the ________.
cache
Which of the following memory devices is volatile in nature?
cache
Which of the following is a basic operation used by reporting tools to produce information from data?
calculating
Machine code ________.
cannot be modified by humans
Top Level tabs
categories of sub-categories
The ________ is called the "brain" of the computer.
central processing unit
Which of the following would be the most disruptive to an organization when implementing an information system?
changing reporting relationships
With ________, statistical techniques can identify groups of entities that have similar characteristics.
cluster analysis
When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.
collaboration
A primary key used in a database is a ________.
column or group of columns that identifies a unique row in a table
A decision is called an operational decision if it ________.
concerns day-to-day activities
When using volatile memory, the ________.
contents are lost when power is off
Which of the following is considered a support activity in the value chain of a business? A) operations B) customer service C) contract negotiation D) marketing
contract negotiation
Information systems improve process quality by ________.
controlling process flow
A client operating system is a program that ________.
controls the client computer's resources
The cost of the business process is the sum of the cost of the inputs and the ________. A) cost of the activities B) cost of the outputs C) value of the outputs D) value of the product/service
cost of the activities
Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________. A) created entry barriers B) introduced product differentiation C) locked in its suppliers D) reduced the cost of operations
created entry barriers
Identify the first step in transforming a data model into a relational database design.
creating a table for each entity
Which of the following is a developmental task of database administration?
creating and staffing the DBA function
In marketing transactions, the fact that customers who buy product X also buy product Y creates a(n) ________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."
cross-selling
A line on an E-R diagram that indicates a 1:N relationship between two entities is referred to as ________.
crow's feet
________ is the dynamic social media process of employing users to participate in product design or product redesign.
crowd sourcing
Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.
curse of dimensionality
Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's value? A) inbound logistics B) customer service C) operations D) outbound logistics
customer service
Which of the following is the first step in preparing a departmental hardware budget?
determining the base requirements of the system
Which of the following is an example of a strategic decision?
deciding to open a centralized distribution system
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
defenders-of-belief
"Page layout"
describes things you can do to the whole sheet/pages
Which of the following is an example of project data?
design document
Which of the following terms refers to the process of a single server hosting many versions of desktop operating systems?
desktop virtualization
The main purpose of the planning phase in a project is to ________.
determine who will do what and by when
An organization purchases server and client computers to build an information system. This is an example of a(n) ________ cost.
developmental
"View"
different ways of viewing the page
Which of the following principles of competitive advantage is associated with product implementations? A) locking in customers B) differentiating service offerings C) locking in suppliers D) establishing alliances
differentiating service offerings
Problematic operational data are termed ________.
dirty data
Which of the following tools facilitates asynchronous communication?
discussion forum
Asynchronous communication occurs when team members ________.
do not meet at the same time
A project manager has to manage tasks and budgets and solve problems during the ________ phase of project management.
doing
status bar
green bar at the bottom contains quick view button and zoom button
Process ________ is a measure of how well a process achieves organizational strategy.
effectiveness
The two dimensions of process quality are ________.
efficiency and effectiveness
Emergence in the context of management means loss of control of ________.
employees
Which of the following is a major category of knowledge assets?
employees
The major benefit of enterprise application integration is that it ________.
enables organizations to use existing applications
________ is the application of social media to facilitate the cooperative work of people inside organizations.
enterprise 2.0
Which of the following information systems minimizes data duplication among departments?
enterprise information systems
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.
entities
In a data model, a(n) ________ is something that a user wants to track.
entity
A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________. A) differentiating the industry B) establishing standards C) establishing alliances D) enhancing the products
establishing alliances
An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that? A) establishing alliances B) creating new products C) enhancing products D) differentiating services
establishing alliances
A ________ is content structure that has emerged from the processing of many user tags.
folksonomy
A database design team transforms entities into tables and expresses relationships by defining ________.
foreign keys
Columns that belong to a different table than the one in which they reside are called ________.
foreign keys
Relational databases represent relationships using ________.
foreign keys
SM communities differ from communities in the past because they are ________.
formed based on mutual interests
________ is a term used to refer to the level of detail represented by the data.
granularity
Which of the following is a benefit of in-house hosting?
greater visibility of security and disaster preparedness
You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is ________.
inaccurate
) Identify the activity in the value chain that involves receiving, storing, and disseminating inputs to the product. A) inbound logistics B) procurement C) operations D) outbound logistics
inbound logistics
A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________. A) outbound logistics B) inbound logistics C) operations D) internal marketing
inbound logistics
Mae manages delivery at a custom-kitchen outlet. Working with her customer's specifications, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here? A) inbound logistics B) operations C) customer service D) marketing
inbound logistics
Which of the following is a part of the materials ordering process? A) outbound logistics B) marketing C) operations D) inbound logistics
inbound logistics
________ is the single most important content function in knowledge management applications.
indexing
Which of the following refers to a program that controls the computer's resources?
operating system
Which of the following is an example of a vertical-market software?
inventory tracking software for an auto manufacturer
The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.
irrelevant
You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.
irrelevant
Virtualization is the process by which ________.
one computer hosts the appearance of many computers
With server virtualization, a server computer hosts ________.
one or more server computers
The viewer of an OLAP report can change its format. Which term implies this capability?
online
OLAP stands for ________.
online analytical processing
Linux is an example of a(n) ________.
open source operating system
Which of the following is a program that controls the computer's resources?
operating system
In cloud computing, resources are said to be "pooled" because ________.
organizations share the same physical hardware through virtualization
Which of the following statements is consistent with the central idea of business process design? A) Technology should be used to supplement the existing value chain. B) Business processes should not focus on the core competencies of organizations. C) Organizations should create new business processes rather than improving existing systems. D) Technology should be used to modify and improve standard business processes.
organizations should create new business processes rather than improving existing systems
Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing? A) inbound logistics B) marketing C) customer service D) outbound logistics
outbound logistics
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A) inbound logistics B) operations C) customer service D) outbound logistics
outbound logistics
Which of the following devices is an example of an output hardware device?
overhead projector
Project data is data that is ________.
part of the collaboration's work product
The five-component framework considers individuals who maintain the data and who support the networks of computers as ________ components
people
An organization buys a proprietary database application to be used by a small workgroup of five people. This is an example of a(n) ________ DBMS
personal
Which of the following types of DBMS products is designed for smaller and simpler database applications?
personal DBMS
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management
planning
Which of the following business processes is related to manufacturing?
planning and scheduling
Which of the following is a risk associated with human resources using social media to form conclusions about employees?
possibility of error
Which of the following ratios has fallen as a result of Moore's law?
price/performance
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.
primary key
Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing? A) creation of entry barriers B) product differentiation C) reduction of cost D) locking in of suppliers
product differentiation
N-joi Ice Cream was facing competition to their flagship brand of "black currant ice cream". The competitor began offering three varieties of "black currant ice cream." N-joi decided to counter the threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing? A) cost leadership B) product differentiation C) cost differentiation in the segment D) service focus
product differentiation
"Review"
proofing, thesaurus, research, research, translate etc
RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart company distinguishes itself from competitors by ________. A) providing an enhanced product B) locking in its suppliers C) locking in its customers D) offering low-cost operations and services
providing an enhanced product
________ requires the user to request BI results.
pull publishing
RFM analysis is used to analyze and rank customers according to their ________.
purchasing patterns
Which of the following is an example of a structured process?
purchasing the right amount of raw materials
A ________ is a request for data from a database.
query
Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.
query
Main memory is also known as ________.
random access memory
Which of the following is a primary activity in the value chain? A) receiving and disseminating inputs to the product B) negotiating prices with vendors C) finding suitable vendors to supply raw materials D) setting up contractual arrangements with various suppliers
receiving and disseminating inputs to the product
Which of the following is the best description of data?
recorded facts or figures
The rows in a database are called ________.
records
An organization implements an information system to optimize its supply chain. The system helps the organization reduce wastages and inventory charges. Hence, the system provides a competitive advantage to the organization. Here, the information system helped the organization achieve competitive advantage by ________. A) locking in customers B) reducing costs C) locking in suppliers D) differentiating the products
reducing costs
Which of the following is an example of a supervised data-mining technique?
regression analysis
In an E-R diagram, a line between two entities represents a(n) ________.
relationship
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?
relationship management
Good information must be ________.
relevant
A database is an example of a(n) ________. A) repository B) software C) linkage D) value chain
repository
A(n) ________ is a collection of something, such as data and raw materials. A) value chain B) cache C) linkage D) repository
repository
To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
strength of a relationship
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.
supervised data mining
In market-basket terminology, ________ is the term that describes the probability that two items will be purchased together.
support
RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________. A) primary business processes B) core activities C) strategic activities D) supporting business processes
supporting business processes
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
switch
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. A) entry barriers B) switching costs C) product standards D) value differentiation
switching costs
A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. Identify the strategy used here. A) switching costs strategy B) low cost operation strategy C) differentiation strategy D) consumerist strategy
switching costs strategy
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
systems thinking
You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.
systems thinking
Which of the following is a nonroutine cognitive skill?
systems thinking ability
Business users who administer the development of information systems should ________.
take an active role in that system's development
The term ________ refers to a collaboration tool where team members can easily respond and the management can easily identify the people who have not responded to a request.
team surveys
A social media policy is a statement ________.
that delineates employees' rights and responsibilities
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?
training employees on the successful use of the new system
Glazer & Hicks is a firm that offers enterprise software solutions to independent retailers. The firm recently bagged a contract from a major national retail chain to develop and implement a proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?
training the employees to use and manage the new system
Project metadata is data that is ________.
utilized to manage the project
According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
value of social capital
In an E-R diagram, a(n) ________ on a line means that at least one entity type of that type is required.
vertical bar
DenTimes, a software package for dentists, is an example of a(n) ________.
vertical-market software
A ________ is an inducement for passing the message along through the tiers.
viral hook
In the Web 2.0 world, new features are released and vendors wait for users to spread the news to one another in a process called ________.
viral marketing
Which one of the following characteristics is true for companies such as Google, Amazon.com, and eBay that exemplify Web 2.0?
viral marketing
Which of the following is the most important trait that an effective collaborator should have?
willingness to enter into difficult conversations