MIS Quizzes
Which of the following is considered information? Quantity sold; Date sold; Best-selling item by month; Product sold
Best-selling item by month
Cheryl is the operations managers for Nature's Bread Company, which specializes in providing natural products for health conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of knowledge that Cheryl would be using to successfully perform her job?
Best-selling product changes when Tony the best baker is working.
Trina works for Johnson Electric as a corporate lawyer, and part of her duties are to ensure the ethical and legal use of information within the company. Which of the following Trina's primary role at Johnson Electric as described by the text?
Chief Privacy Office (CPO)
A company uses its own computing infrastrure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes
Cloud bursting
Decodes info
Decryption
Information Management
Examines the organizational resource of info and regulates its definition, uses, values, and distribution, ensuring that it has the types of data/info required to function and grow effectively.
What is predictive analytics?
Extracts info from data and uses it to predict future trends and identify behavioral patterns.
Companies do not need a privacy policy for email because an employee's works mail is private and cannot be view by the company.
False
Maintainability means the system functions correctly and provides accurate info.
False
Predictive analytics is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention. True or false?
False
If a business could produce the same product with less expensive inputs it would probably see a decrease in profits. True or false?
False.
Porter has identified three generic business strategies including focused, broad cost leadership, and switching strategy. True or false?
False.
With grid computing, a problem is broken into pieces and distributed to many machines, allowing ______ processing than could occur with a single system
Faster
Shelby Black runs a very successful hair salon in downtown LA. One of Shelby's tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby Gathering?
Feedback
Separate and full equipped facility where the company can move immediately after a disaster and resume business
Hot site
Most secure type of authorization
ID, password, smart card, token, fingerprint, voice signature
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
Which of the following are included as potential external weaknesses in a SWOT analysis that are harmful to an organization?
New entrants, substitute products, shrinking markets, costly regulatory requirements.
Which of the following is considered data?
Quantity sold.
Callie owns and operates one of the most successful local coffee shops in Denver called The Edgewater Cafe. Each time a customer purchases their 100th cup of coffee at the cafe, they receive a free pound of coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marketing program?
Reducing buyer power with a loyalty program.
What in the cloud means that each customer or tenant must purchase and maintain an individual system?
Single-tenancy
Protects a company's brand identity and outlines the corporate principles governing employee online communication
Social media policy
What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part?
Systems Thinking
A sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption
True
An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the internet.
True
An enterprise architect is a person grounded in tech, fluent in business, and able to provide the important bridges between MIS and the business.
True
Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
True
Failback occurs when the primary machine recovers and resumes ops, taking over from the secondary server.
True
Order date, amount sold, and customer number are all forms of data.
True
Order date, amount sold, and customer number are all forms of data. True or false?
True
Supplier power is one of Porter's 5 Forces and it measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, services) True or false?
True
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
True
Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patters, trends, and relationships for strategic decision making. True or false?
True.
Competitive advantages provide the same product or service either at a lower prices or with additional value can heath premium prices. True or false?
True.
FedEx created a first-mover advantage by developing its customer self-service software, which allows people to request parcel pickups, print mailing slips, and track parcels online. True of false?
True.
MIS is a tool that is most valuable when it leverages the talents of people who know how to use and manage it effectively. True or false?
True.
Porters 5 Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability within an industry. True or false?
True.
What is a system weakness that can be exploited by a threat
Vulnerability
All of the following are common tools used in industry to analyze and develop competitive advantages, except
the competitive analysis model.