MIS Final
What is the difference between a cloud service and a web service?
A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.
The acronym for a database administrator is ________.
DBA
The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the
Digital Millennium Copyright Act (DMCA)
Most customer relationship management (CRM) systems help businesses to organize three main functions. These functions include marketing, sales, and inventory control.
False
Which is the best explanation of how the World Wide Web (WWW) differs from the Internet?
How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?
When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have
Increased
Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as
Porter's 5 Forces.
Why is it important to preserve the integrity of data, information, and systems?
These assets are more vulnerable to hackers if they have been obtained in an unethical or illegal manner.
Highlighting points where actual personnel numbers vary from expected norms and allowing the executive to drill down into areas of interest is a key element of the human resources management element of executive information systems applications.
True
What is the term for a CRM that tracks the type of sale that is most likely to make a person purchase an item that they have previously viewed on an e-commerce site?
User Experience
What is the second step that occurs when placing a call on a cellular network?
Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.
Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.
analyzing
Share of wallet is also known as share of
customer
Which business computer application system is focused on helping managers to maintain the business's focus on the individual customer by developing a lasting relationship that promote long-term buying?
customer relationship management (CRM) system
To ensure adequate spacing between flights, track changes in aircraft airspeed and altitude, and issue alerts at any deviations, air traffic controllers use
decision support systems (DSS).
Which type of MIS report pinpoints outliers that vary from the norm, such as when a production quota falls below forecasted levels?
exception reports
The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university, is referred to as a consumer-to-governance transaction.
false
Vector and raster files are
geographic data.
In cybersecurity risk analysis, PML (probable maximum loss) is used to
help determine spending needed to adequately secure an organization's IT infrastructure.
What type of decision-making software can identify issues and find and implement solutions at transactional speed?
high-velocity
Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?
protect government assets against cybersecurity events
Database policies should be created and implemented by all organizations, regardless of the ________ of the organization.
size
Which PESTEL factor can managers monitor by improving communications throughout the organization and gaining better perceptions of consumers' opinions using CRM software?
sociocultural
Keystroke loggers and packet analyzers (sniffers) are two common types of
spyware.
A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of
substitutes
When you revisit a website, your browser will send the website's cookie (a small text file) to the web server which uses this information to customize and optimize your experience.
true