MIS Exam 2
Which of the following statements concerning blogging is false?
A reader can believe all of the details in a blog.
Conversational marketing can take place in which of the following forums?
All forms are correct
Which of the following is not a reason why managing data is difficult over time?
All of these are reasons why managing data is difficult over time.
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n) _________.
Attribute
_______ e-commerce is also known as e-tailing.
B2C
Which of the following is not an example of social commerce?
Best Buy has a website, which can be used to purchase products for pick up in a store.
In the data hierarchy, the smallest element is the _____.
Bit
Place the following members of the data hierarchy in their correct order:
Bit - byte - field - record - file - database
Which of the following is the most appropriate wireless networking standard for creating personal area networks?
Bluetooth
The comments of consumers in the blogosphere concerning a company's products are called ____________________.
Consumer generated media
_________ occurs when various copies of the data agree.
Data Consistency
If you wanted to find out information about why an attribute is needed in a database you should look in the _______.
Data Dictionary
_____ is a formal approach to managing data consistently across an entire organization.
Data Governance
________ occurs when applications cannot access data associated with other applications.
Data Isolation
Which of the following has the broadest impact on an organization?
Decisions about data.
Refer to IT's About Business 3.1 - New York City Opens Its Data to All: What does New York's "Open Data Policy and Technical Standards Manual" do?
Details how city agencies can gather, structure, and automate data flows to comply with local law.
________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen.
Disintermediation
The practice of using similar but not identical domain names is called _____.
Domain tasting
_____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization.
Electronic business, electronic commerce
The major problem with RFID has been _______.
Expense
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge.
Explicit
A wiki is a collection of blogs. True or False
FALSE
Buying a book online at Amazon is an example of social commerce. True or False
FALSE!!
A join operation can only be used to link 2 tables. True or False
False
An organization's data warehouse generally maintains its operational data. True or False
False
Big Data is easy to define. True or False
False
Big data can only come from a trusted source.
False
Even though B2C EC is much larger by volume, B2B is more complex. t or f
False
It is important for applications and data to be dependent on each other. True or False
False
Managing data effectively is inexpensive for organizations. True or False
False
Master data are generated and captured by operational systems. True or False
False
Refer to Closing Case #2 - Can Organizations Have Too Much Data?: Storing vast amounts of data in a data warehouse has little of no additional to the organization. True or False
False
Social computing sites are not utilized by passive job seekers. True or False
False
Tacit knowledge is the more objective, rational, and technical types of knowledge. True or False
False
The relational database model is based on the concept of three-dimensional tables. True or False
False
Today, large corporations are able to process big data but only at great expense. True or False
False
You must be a Web site developer in order to create a mashup. t or f
False
in a data warehouse, existing data are constantly purged as new data come in. True or False
False
A(n) _____ is a logical grouping of related records.
File
Refer to Closing Case 2 - The Omni-Channel Strategy to Compete with Amazon: _______ was first to developed a ship-from-store system to ship in-stock items from a store if the online warehouse is out of that item.
Gap
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class.
Instance
Refer to IT's About Business 3.4 - Data Warehouse Gives Nordea Bank a Single Version of the Truth: Which of the following statement about Nordea's data warehouse is not correct?
It enabled bank to conduct analysis more quickly, but at a higher cost.
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem.
Knowledge, Information
_____ provide(s) companies with a single version of the truth for their data.
Master data management
The data in a data warehouse ___________.
Not Updated!
Amy spent hours looking at ratings, reviews, and recommendations before she bought her new mattress. After the first night, she realized it was definitely not the right mattress for her and she called the store to return it. Why didn't the ratings, reviews, and recommendations help Amy in this purchase?
Not everyone has the same expectations of a mattress
The data in a data warehouse have which of the following characteristics?
Organized by subject
Puja loves to sew and makes beautiful scarves from designer fabric end bolts. She needs to start advertising but doesn't want to spend a lot of money since her profit margins are slim. She has set up a Web site (simple but with no online purchasing) and a Facebook store. She also has her own Facebook page. Which social computing tool would be the most helpful in acquiring new followers/customers?
Post youtube videos
For the following entity-relationship diagram, what could the primary key be in the Grade entity?
Primary key made up of the primary keys from Student entity and Course entity
Content-filtering software performs all of the following functions except:
Proactively monitoring computers to protect against malware attacks.
Refer to IT's About Business 3.1 - New York City Opens Its Data to All: Which is not a goal of New York's Open data policy?
Providing information so users of the data can track others.
A(n) _____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.
Proxy server
Frank and his wife, Paula, run a country store with a special room where husbands can sit while their wives are shopping. The Men's Corner already has a large-screen TV for sports viewing, and they recently added Wi-Fi. Paula says she's heard about people trying to interfere with other people's wireless transmissions. You tell her this is called ______________.
RF jamming
In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
RF jamming
A(n) _____ is a logical grouping of related fields.
Record
Traditional data formats change ______ while big data formats change _______.
Slowly, Rapidly
_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.
Telemetery
Which of the following is an advantage of social commerce over traditional e-commerce?`
The ability to predict buying habits based on real-time data
Refer to IT's About Business 3.3 - The MetLife Wall: Which of the following statements about MetLife's Wall application is not correct?
The application forced MetLife to move all its customer data into one database.
Refer to Closing Case #1 - Tapping the Power of Big Data: Which of the following is not a correct statement?
The data is not reliable
Compared to data warehouses, data marts have which one of the following characteristics?
They cost less
_____ describe(s) the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities.
Transaction, master data
An attribute is any characteristic or quality that describes a particular entity. True or False
True
An entity is a person, place, thing, or event about which information is maintained. True or False
True
Online analytical processing (OLAP) involves the analysis of accumulated data by end users. True or False
True
Refer to IT's About Business 3.3 - The MetLife Wall: MetLife uses the Wall to store employment resumes for later review. True or False
True
Word-of-mouth marketing can be achieved using social shopping. True or False
True
Web. 2.0 is a loose collection of information technologies and applications. t or f
True!
Tacit knowledge has which of the following characteristics?
Unstructured
Refer to Closing Case 2 - The Omni-Channel Strategy to Compete with Amazon: _______ is using store locations as nodes in a broad distribution network that includes storage warehouses and fulfillment centers for online orders.
Walmart
Refer to IT's About Business 3.2 - Google's Knowledge Graph: Google's knowledge graph can be considered ____________.
a vast data base that connects facts on people, places, and things together
For the following entity-relationship diagram, the student name is what kind of field in the Student table?
attribute field
Sean ran a very successful 5K race to support the local food bank. They had 210 runners and raised over $5,000. He wants to continue to raise awareness of the local food bank's activities. Which of the following would be the best use of his time?
blog about the food bank
Using social computing tools to do market research ____________.
can foster closer customer relationships
_____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.
digital wallets
The process of moving data from various sources into the data warehouse is called _________.
extracting, transforming, and loading
A shopping community acts an online intermediary that harnesses the power of a social network for introducing, buying, and selling products and services. t or f
false
Active RFID tags rely entirely on RFID readers for their power. t or f
false
Cyberbanking are those banks that are dedicated only to Internet transactions. t or f
false
Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model. true or false
false
Generating revenue from social networking sites is easy to do. t or f
false
The buy-side marketplace is similar to the business-to-consumer model. t or f
false
You would use a form in SQL searches.
false
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them. t or f
false
Hacking is the indiscriminate distribution of electronic ads without permission of the receiver. t or f
false!
You have a checking account and a separate savings account in your neighborhood bank. You've recently moved and gave the bank your new address for your checking account. You forgot all about the savings account. About three months later you receive a letter about your savings account which was sent to the wrong address. This is an example of __________. Data_______
inconsistency
Which of the following actions is a typical first step that an organization might take towards managing big data?
integrating information silos
You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except ____________.
mulitichanneling
In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically.
sell side
_____ contain a chip that can store information and be used for several purposes
smart cards
The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as _________.
social intelligence
the degree of digitization relates to all of the following except:
the size of e-commerce transactions
In ______ normal form non-key attributes are not allowed to define other non-key attributes.
third
Join operations can only be used in ________ normal form.
third
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.
third *remember different
Refer to IT's About Business 9.4 - Can Simple Disrupt Traditional Banking?: Simple was founded on the idea that __________________.
traditional banks do not provide adequate online and mobile tools
A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users. t or f
true
Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices. t or f
true
Data marts are designed for the end-user needs in a strategic business unit or department. t or f
true
Dematerialization is when the functions of many physical devices are included in one physical device. t or f
true
Domain names are assigned by central nonprofit organizations that check for conflicts and possible trademark infringement. t or f
true
Horizontal exchanges connect buyers and sellers across many industries. t or f
true
Mesh networks are reliable, efficient, and fault tolerant. t or f
true
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments?
ultra wide band
In a database, the primary key field is used to _____.
uniquely identify a record
Ashleigh makes small wrist bag which holds a cell phone, a credit card (or two) and a key. She named her business SmallClutch. She has been doing well when she has set up at craft fairs and has just begun selling online to her target market. She thinks she should be able to use the Internet to buy her supplies. Which of the following is true?
use a sell side market place
In _____, direct and indirect materials in one industry are purchased on an as-needed basis.
vertical
What are the three distinct characteristics that distinguish big data from traditional data?
volume, velocity and variety
_____ networks collect data from many points over an extended space.
wireless sensor
Which of the following attacks is most closely associated with downloading and installing patches immediately?
zero day attacks