Mis test, Business inteligence test, plugin 6 and 5- security and privacy, CIS 3380 Angelow Final Review, CIS 3380 David Angelow TXState Final Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A(n) ________ being simply a business task, such as checking a potential customer's credit rating when opening a new account.

service

Data _______ is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.

steward

Which of the following are types of unstructured data?

text messages Twitter tweets emails

A(n) ________ is an act or object that poses a danger to assets.

threat

A(n) ____________ process is often referred to as the technical core, especially in manufacturing organizations, and is the actual conversion of inputs to outputs.

transformation

Historically, the percentage of IT projects that fully meet their goals is approximately ______%.

33%

Cash flow analysis

A means to conduct a periodic check on the company's financial health.

What is software written with malicious intent to cause annoyance or damage?

A virus

Break-even analysis

A way to determine the volume of business required to begin to make a profit at the current prices charged for the products or services.

A(n) ________ is software written with malicious intent to cause annoyance or damage.

virus

Account matches

An existing business relationship exists and can include customers, prospects, partners, and competitors.

__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.

Analytical

What is the science of fact-based decision making?

Analytics

If a CEO wanted to know which systems were used to automate the business processes of the company, he would use the _____ area of enterprise architecture.

Application

Users of software typically interact with which of the following:

Applications Software

What simulates human thinking and behavior, such as the ability to reason and learn?

Artificial intelligence

Select 3 goals or objectives that a leadership plan might include to achieve a solid business strategy.

Attracting new customers Increasing sales Decreasing costs

What are the data elements associated with an entity?

Attributes

What is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system?

Autonomic Computing

What is the name of software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires?

Autonomous Agent

What are defects in the code of an information system?

Bugs

_______ e-commerce is also known as e-tailing.

Business-to-consumer

Software engineers use ___________ (use acronym) tools, which provide automated support for the development of the system.

CASE

Select the five primary reasons project fail.

Changing technology Skipped SDLC phases The cost of finding errors Unclear or missing business requirements Balance of the triple constraints

What is the electronic defacing of an existing website?

Cybervandalism

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

Digital Certificate

Which system coordinates the process of transporting materials from a manufacturer to distribution centers to the final customers?

Distribution management systems

What includes the variables that marketing managers can control in order to best satisfy customers in the target market?

Marketing mix

Which company is using a broad market and high cost strategy?

Neiman Marcus

What is the manipulation of information to create business intelligence in support of strategic decision making?

Online Analytical Processing (OLAP)

What extracts information from data and uses it to predict future trends and identify behavioral patterns?

Predictive Analytics

Select the five key competitive priorities associated with operations management.

Quality Delivery Flexibility Cost Service

What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part?

Systems Thinking

Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation?

Systems development life cycle.

What provides an end-to-end view of how operations work together to create a product or service?

Systems thinking

Which of the following is NOT a goal of supply chain management?

To increase cycle time

What produces graphical displays of patterns and complex relationships in large amounts of data?

Visualization

In the __________ phase the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.

analysis

Enterprise resource planning systems _____.

are utilized to enable cross-functional business processes

In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n)

attribute

Which of the following are the three areas of information security?

authentication and authorization prevention and resistance detection and response

A(n) __________ integration takes information entered into a given system and sends it automatically to all upstream systems and processes.

backward

Outbound logistics matches

, Distributes goods and services to customers. Distributes goods and services to customers. Marketing

Organizations address security risks through two lines of defense, what are they?

1. People 2. Technology

What is an example of a semi-structured decision?

Changing Employee Benefits

Which is a semistructured decision?

Changing employee benefits

Two major options for IT capabilities organizations can choose from are?

Cloud or On-Premise

What is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed?

Competitive intelligence

What is the science that studies encryption? which is the hiding of messages so that only the sender and receiver can read them.

Cryptography

analytics involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.

Customer

Which of the following is true about the impact of social computing on customer service?

Customers themselves can be used to reduce problems

Which phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation?

Design phase

The management cockpit best exemplifies which type of system?

Digital dashboard

What refers to a period of time when a system is unavailable?

Downtime

What enables users to view details, and details of details, of information?

Drill-down

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Ediscovery Electronic discovery

______ which is a broader concept than ______, is the buying and selling of goods and services as well as servicing customers, collaborating with business partners, and performing transactions within an organization.

Electronic business; electronic commerce

Analytical information

Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks.

The major problem with RFID has been ______.

Expense

Human Resources departments only use social computing for external tasks.

False

What is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions?

Feedback

Select the four gates of the RUP methodology.

Gate one: Inception Gate four: Transition Gate two: Elaboration Gate three: Construction

Select the four common reasons companies outsource.

Improve financial savings Expansion and rapid growth Gain core competencies The Internet and globalizatio

Who are the individuals valued for their ability to interpret and analyze information?

Knowledge workers

What is an old system that is fast approaching or beyond the end of its useful life within an organization?

Legacy system

Which of the following is a challenge to outsourcing?

Length of contract

What is a business function that moves information about people, products, and processes across the company to facilitate decision making and problem solving?

Management Information Systems (MIS)

CRM systems are primarily concerned with _____ and SCM systems are mainly concerned with ______?

Marketing; operations

What is the manipulation of information to create business intelligence in support of strategic decision making?

Online analytical processing (OLAP)

What deals with the day-to-day procedures for performing work, including scheduling, inventory, and process management?

Operational planning and control

For a company to have business intelligence capabilities which of the following are required?

Operational systems data

Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?

Optimization Analysis

What uses a zombie pharm, often by an organized crime association, to launch a massive phishing attack?

Pharming attack

What is a masquerading attack that combines spam with spoofing?

Phishing Expedition

What type of analytics takes past purchasing data as inputs into a model that recommends the best pricing strategy across all flights allowing an airline company to maximize revenue?

Prescriptive analytics

What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?

Primary value activities

What is a modern design approach where the designers and system users use an iterative approach to building the system?

Prototyping

Which methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates?

RUP methodology

Which system allows users to create, read, update, and delete data in a relational database?

Relational database management system

Capital

Represents money whose purpose is to make more money, for example, the money used to buy a rental property or a business.

In ______ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins.

Reverse

Select the three variables included in the triple constraint.

Scope Resources Time

What is the name of the software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability?

Shopping Bot

Which policy outlines the corporate guidelines or principles governing employee online communications?

Social media policy

______ handles all aspects of an application - the application software, the computing resources to run it, and data storage.

Software-as-a-service model

Select the three correct criteria for SMART objective creation.

Specific Realistic Time Frame measurable agreed upon

A(n) ______ refers to the flow of materials, information, money, and services from raw materials suppliers, through factories and warehouses tot eh end customers.

Supply chain

What are easy to quantify and typically measured to determine the success or failure of a project?

Tangible benefits

E-commerce and E-business are enabled by using the internet to enable access to ERP or FAIS systems?

True

Which of the following questions can be answered using CRM predicting technologies?

Which products will customers buy?

What breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete?

XP methodology

sales

is the function of selling a good or service and focuses on increasing customer sales, which increases company revenues.

What are the 4 costs of downtime?

1. Financial Performance: Revenue recognition, cash flow, payment guarantees, credit rating, stock price. 2. Revenue: Direct loss, compensatory payments, lost future revenue, Billing losses, Investment losses, Lost Productivity. 3. Damaged Reputation: Customers, Suppliers, Financial Markets, Banks, Business Partners. 4. Other Expenses: Temporary employees, Equipment rentals, overtime costs, extra shipping charges, travel expenses, legal obligations.

Reconciling bank accounts is an example of a(n):

Accounting Business Process

Sales opportunity matches

An opportunity exists for a potential sale of goods or services related to an account or contact.

__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

Competitive

What is the process of transferring information from a legacy system to a new system?

Conversion

What creates, reads, updates, and deletes data in a database while controlling access and security?

Database management system

A business process always includes information systems.

False

Which of the following is false?

Functional area information systems easily communicate with each other.

Which of the following is a benefit to outsourcing?

Increased quality and efficiency of business processes.

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information

What is the act of conforming, acquiescing, or yielding information?

Information Compliance

What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?

Mail bomb

Two alternatives for ERP system computing environments are:

On Premise or SeaS

What activity can run over the Internet (or on a CD or DVD), allowing employees to complete their training on their own time at their own pace?

Online training

What is a graphical network model that depicts a project's tasks and the relationships between them?

PERT chart

What is a technique used to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?

Phishing

What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?

Physical security

What makes system changes to reduce the chance of future system failure?

Preventive maintenance

What is a temporary activity a company undertakes to create a unique product, service, or result.

Project

Who is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget?

Project manager

What describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project?

Project scope

Which tool helps users graphically design the answer to a question against a database?

Query-by-example

Select the four primary forms of agile methodologies.

RAD methodology RUP methodology Scrum methodology XP methodology

What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises?

Real-Time Adaptive Security

What is a collection of related data elements?

Records

________ analytics involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.

Sales

A primary concern in using E-business capabilities is ______.

Security risks from exposing systems to internet threats

__________ is the ability to look at information from different perspectives.

Slice-and-Dice

Traditional data formats change __________ while big data formats change ___________

Slowly, rapidly

What modifies software to meet specific user or business requirements?

Software customization

__________ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet.

Software-as-a-Service

What is a report that is created once based on data that does not change?

Static Report

Internal rate of return

The rate at which the net present value of an investment equals zero

What is Augmented Reality?

The viewing of the physical world with computer-generated layers of information added to it?

Supply chains structured with various links, the concept of managing a company's suppliers and suppliers', is the:

Upstream portion of the supply chain

________-if analysis checks the impact of a change in a variable or assumption on the model.

What

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?

Workplace MIS monitoring

At the _________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.

managerial

The __________ methodology is a sequence of phases in which the output of each phase becomes the input for the next.

waterfall

What are the 6 common types of hackers?

1. Black-Hat hackers: break into other people's computer systems and may just look around or may steal and destroy information. 2. Crackers: Have criminal intent when hacking. 3. Cyberterrorists: Seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction. 4. Hactivists: Have philosophical and political reasons for breaking into systems and will often deface the website as a protest. 5. Script Kiddies (Script Bunnies): Find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses. 6. White-Hat hackers: Work at the request of the system owners to find system vulnerabilities and plug the holes.

What are the 5 scientific methods that organizations use to anticipate, forecast, and assess future events?

1. Trend Analysis 2. Trend Monitoring 3. Trend Projection 4. Computer Simulation 5. Historical Analysis

In the video on artificial intelligence from DARPA they discuss past project involving self-driving cars. The duration from no one successfully completing the project to having several teams successfully complete the project was

12 months

The _____ is erratic shifts in orders up and down the supply chain.

Bullwhip effect

Which of the following is a challenge for organizations following the traditional SDLC method?

Compressing time to build a system.

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

Copyright

Select the three structured decisions that almost repetitive in nature and affect short-term business strategies.

Creating weekly production schedules Creating employee staffing schedules Reordering inventory

Searching for valuable business information in a database, data warehouse, or data mart is referred to as _______.

Data mining

What are logical data structures that detail the relationships among data elements using graphics or pictures?

Data models

What is a report that changes automatically during creation?

Dynamic Report

Analytic CRM systems help a company by interacting with its customers.

False

What is the best way to support users and respond to users' questions?

Help desk

Buyer power

High because customers have many airlines to choose from

Threat of new entrants

High because new airlines are continuously entering the market

What is it that examines the organizational resource of information and regulates its definitions, uses, value, and distribution. Ensuring that it has the types of data/information required to function and grow effectively?

Information Management

What is it that details how an organization will implement the information securities policies?

Information Security Plan

Which policy contains general principles to guide the proper use of the Internet?

Internet use policy

What is the process associated with promoting the sale of goods or services?

Marketing

In the video artificial intelligence from DARPA they discuss utilizing which of the following intelligent

Neural Networks

______ offer(s) consumers incentives to accept advertising and e-mail voluntary.

Permission marketing

What are the three categories of analytics?

Predictive analytics Descriptive analytics Prescriptive analytics

Which type of analysis studies the impact on other variables when one variable is changed repeatedly?

Sensitivity Analysis

_______-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.

Service

The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as _______.

Social intelligence

Contact matches

Specific individual representing the account.

Select the three characteristics of online transactional processing.

Stores the information Processes the information according to defined business rules Updates existing information to reflect the new information

What includes firm infrastructure, human resource management, technology development, and procurement?

Support value activities

What details the steps the system must perform along with the expected result of each step?

Test conditions

Which phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase?

Testing phase

What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?

Threat of substitute products or services

What is the term used to describe the difference between the cost of inputs and the value of price of outputs?

Value-added

Which type of analysis checks the impact of a change in a variable or assumption on the model?

What-If Analysis

Which of the following E-commerce activities would be utilized when interacting with suppliers?

eAuctions

Information __________ is the duplication of data, or the storage of the same data in multiple places.

redundancy

The Internet of Things (IoT) is a world where interconnected Internet-enabled devices or "things" have the ability to collect and share data __________ human intervention.

without

Which of the following is a good example of a system, since removing one part will cause the entire system to stop working?

A car engine

How will a business estimate the impact on profits from increases or decreases in costs?

By manipulating variables

What helps an organization predict customer behavior, such as which customers are at risk of leaving?

CRM predicting technologies

Based on the information in the assigned McKinsey article, which of the following practices and systems have an outsized impsact on performance?

CRM/salesforce systems to enable and empower the salesforce

The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

Child

What occurs when a complex system, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis?

Computer Simulation

What occurs when a system produces incorrect, inconsistent, or duplicate data?

Data integrity issues

_____________ occurs when the same data are stored in many places.

Data redundancy

Which of the following is the correct hierarchy from the lowest level to the highest level?

Data, information, knowledge

What type of analytics is best described with a report that includes charts and graphs explaining the data?

Descriptive analytics

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

Digital Rights Management

An organization's IT platform consists of the IT components and IT Services.

False

Enterprise resource management is an enterprise-wide effort to acquire and retain customers.

False

Examples of Functional Area Information Systems (FAIS) are CBIS, ERP, TPS, and SCM.

False

eBay uses an ______ auction.

Forward

_________ logic is a mathematical method of handling imprecise or subjective information.

Fuzzy

What includes the policies, plans, and procedures for the effective management of employees?

Human resources

For most companies, the Web ____ the threat that new competitors will enter the market by _____ traditional barriers to entry.

Increases, decreasing

What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, distribution, and processing of information itself?

Information Ethics

What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?

Information Property

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information Secrecy

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

Information Security

_________ management and control systems provide control and visibility to the status of individual items maintained in inventory.

Inventory

_________ switch is a trigger that enables a project manager to close the project before completion.

Kill

_____ are the physical products, raw materials, and supplies that flow along a supply chain.

Material flows

What provides details about data?

Metadata

What is a category of AI that attempts to emulate the way the human brain works?

Neural network

What is the creation of goods and services using the factors of production: land, labor, capital, entrepreneurship, and knowledge?

Production

Select the two benefits a business that sold hamburgers would experience if it could produce a hamburger with less expensive inputs or produce more hamburgers with the same inputs.

Rise in productivity A likely increase in profits

What evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies?

SWOT analysis

The __________ that changes are made in the systems development life cycle, the _______ expensive these changes become.

Sooner, less.

At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan?

Strategic level

What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?

Three generic business strategies

What are small electronic devices that change user passwords automatically?

Tokens

A business process has inputs and outputs.

True

The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs.

True

The number of alternatives to be considered in decisions today is increasing.

True

The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets.

True

The two major categories of software are systems software and applications software.

True

True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.

True

True or false: The graphical user interface (GUI) is commonly way of interacting with an an information system.

True

True or false: The value of information is only as good as the people who make use of the information.

True

Select the three things a supplier can do to influence an industry if it has high supplier power.

charging higher prices limiting quality or services shifting costs to industry participants

Select the three things a supplier can do to influence an industry if it has high supplier power.

charging higher prices shifting costs to industry participants limiting quality or services

The ____________ phase takes all the detailed design documents from the design phase and transforms them into the actual system.

development

A(n) __________ privacy policy details the extent to which email messages may be read by others.

email

A(n) ______ is a simplified representation or abstraction of reality.

model

As discussed in class, completing the Foodmart exercise was an example of conducting business intelligence

true

What are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services?

web services

What are the 3 areas of Information Security?

1. People: Authentication and Authorization 2. Data: Prevention and Resistance 3. Attacks: Detection and Response

Inbound logistics matches

Acquires raw materials and resources and distributes to manufacturing as required.

Enterprise resource planning systems take a(n) _____ view of the overall organization.

Business process

What is the series of activities that determine the earliest time by which the project can be completed?

Critical path

Which of the following is an example of a tangible benefit?

Decreased processing error

Which of the following is not an affect that E-commerce has had on organizations?

E-commerce is a costly medium for increasing market share

Customers that are using software-as-a-service are not using cloud computing.

False

What is a mathematical method of handling imprecise or subjective information?

Fuzzy Logic

Which system provides the ability to locate, track, and predict the movement of every component or material anywhere upstream or downstream in the production process?

Global inventory management systems

Threat of substitute products or services and

High because of alternatives, such as videoconferencing and virtual meetings

What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information secrecy

Supply chain management is comprised of core components; the components are:

Plan, source, make, deliver, return

The name of the company who delivered the in-class meeting on SaaS ERP software was

Plex

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?

Pretexting

What is a form of malicious software that infects your computer and asks for money?

Ransomware

What stores information in the form of logically related two-dimensional tables?

Relational database model

IOS technologies assist with a number of SCM tasks, which of the following is NOT a benefit of IOS?

Removing uncertainty in demand forecasts

Which of the following are examples of analytical information?

Sales projections Product statistics

_____ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future. (Enter one word in the blank.)

Strategic

________ costs are costs that make customers reluctant to switch to another product or service.

Switching

Which of the following is not a characteristic of a structured decision?

The first three phases of the decision-making process need not occur in any particular sequence

An attribute is any characteristic or quality that describes a particular entity

True

_____ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Typosquatting

What is created that highlights how to use the system and how to troubleshoot issues or problems?

User documentation

Which of the ERP implementation approaches is used when a company decides to adopt the best-practices include in ERP systems?

Vanilla approach

A(n) ____________ integration takes information entered into a given system and sends it automatically to all downstream systems and processes.

forward

Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _________.

industry

The structure of a typical organization is similar to a __________, and the different levels require different types of information to assist in decision making, problem solving, and opportunity capturing.

pyramid

What is the difference between transactional information and analytical information? (transactional is listed first and analytical is second)

1- Encompasses all of the information contained within a single business process or unit of work, supports the performance of daily operational or structured decisions. Ex: Purchasing stocks, making airline reservations, and withdrawing cash from an ATM. 2- Encompasses all organizational information (including transactional information), its primary purpose is to support the performance of managerial analysis or semistructured decisions. Ex: trends, sales, product statistics, and future growth projections.

What are 5 potential features included in a dashboard designed for a manufacturing team?

1. A hot list of key performance indicators, refreshed every 15 minutes 2. A running line graph of planned versus actual production for the past 24 hours 3. A table showing actual versus forecasted product prices and inventories 4. A list of outstanding alerts and their resolution status. 5. A graph of stock market prices

What are the four common forms of viruses?

1. Backdoor Programs: Opens a way into the network for future attacks 2. Denial-of-service attack (DoS): Floods a website with so many requests for service that it slows down or crashes the site. (if done with multiple computers it is called Distributed Denial-of-service attack (DDoS) 3. Polymorphic viruses and worms: Change their form as they propagate. 4. Trojan-Horse Virus: Hides inside other software, usually as an attachment or downloadable file.

What are the 4 components of the digital dashboard analytical capabilities?

1. Consolidation: The aggregation of data from simple roll-ups to complex groupings of interrelated information. Ex: data for different sales reps can be rolled up to an office level, then a state level, then a regional sales level. 2. Drill-Down: Enables users to view details, and details of details, of information. This is the reverse of consolidation; a user can view regional sales data and then drill down all the way to each sales reps data at each office. Lets managers view monthly, weekly, daily, or even hourly information. 3. Slice-and-Dice: The ability to look at information from different perspectives. One slice of information can display all product sales during a given promotion. Another slice could display a single product's sales for all promotions. Slicing and Dicing is often performed along a time axis to analyze trends and find time-based patterns in the information. 4. Pivot (rotation): rotates data to display alternative presentations of the data. Ex: a pivot can swap the rows and columns of a report to show the data in a different format. (Think pivot table)

What are some examples of hacker weapons? (8 listed)

1. Elevation of Privilege: User misleads system into granting unauthorized rights, usually to destroy the system. 2. Hoaxes: Attack computer systems by transmitting a virus hoax with a real virus attached. 3. Malicious Code: A variety of threats such as viruses, worms, and trojan horses. 4. Packet Tampering: Altering the contents of packets as they travel the internet or altering data on computer disks after penetrating a network. 5. Sniffer: Program or device that can monitor data traveling over a network. 6. Spoofing: Forging the return address on an email so the message appears to come from someone other than the actual sender. 7. Splogs (Spam Blogs): Fake blogs created solely to raise search engine rank of affiliate websites. 8. Spyware: Software hidden in free downloadable software that tracks online movements, mines information stored on computers, or uses a computer's CPU and storage for some task the user knows nothing about.

What are the 5 areas where we are seeing artificial intelligence? and give examples of AI from each one.

1. Expert Systems: Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. Ex: Computers Playing Chess 2. Neural Networks: Category of AI that attempts to emulate the way the human brain works. Ex: Credit Card companies checking for fraud 3. Genetic Algorithms: An AI system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. Ex: Investment companies in trading decisions 4. Intelligent Agents: Special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users. Ex: Environmental scanning and competitive intelligence. 5. Virtual Reality: Computer-Simulated environment that can be a simulation of the real world or an imaginary world. Ex: Working virtually around the globe.

What are the 5 ethical guidelines for Information Management?

1. Information Secrecy 2. Information Governance 3. Information Management 4. Information Compliance 5. Information Property

What are the two sources of Unstructured Data?

1. Machine-Generated: includes satellite images, scientific atmosphere data, and radar data. 2. Human-Generated: Includes text messages, social media data, and emails.

What are the 3 challenges when it comes to managerial decision making?

1. Managers need to analyze large amounts of information. 2. Managers must make decisions quickly. 3. Managers must apply sophisticated analysis techniques, such as porter's strategies or forecasting, to make strategic decisions.

What are the 3 levels to a common company structure? and what are the objectives of each level? (Starting with the bottom and working upwards)

1. Operational Level: (Structured decisions) Employees develop, control, and maintain core business activities required to run the day-to-day operations. 2. Managerial Level: (Semistructured decisions) Employees are continuously evaluating company operations to hone the firm's ability to identify, adapt to, and leverage change. 3. Strategic Level: (Unstructured Decisions) Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan. - With Unstructured Decisions, there are no procedures or rules that exist to guide decision makers toward the correct choice.

What are the 6 steps in the decision making process?

1. Problem Identification: Define the problem as clearly and precisely as possible. 2. Data Collection: Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem. 3. Solution Generation: Detail every solution possible, including ideas that seem farfetched. 4. Solution Test: Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or temporary fix?), and acceptability (can all participants form a consensus?). 5. Solution Selection: Select the solution that best solves the problem and meets the needs of a business 6. Solution Implementation: If the solution solves the problem, then the decisions made were correct. If not, then the decisions were incorrect and the process begins again.

What are the 3 characteristics of online transaction processing?

1. Process the information according to defined business rules. 2. Stores the information. 3. Updates existing information to reflect the new information.

What are 7 trends that the book highlights that have the potential to change our world, our future, and our lives?

1. The world's population will double in the next 40 years. 2. People in developed countries are living longer. 3. The growth in information industries is creating a knowledge-dependent global society. 4. The global economy is becoming more integrated. 5. The economy and society are dominated by technology. 6. The pace of technological innovation is increasing. 7. Time is becoming one of the world's most precious commodities.

What is Big Data?

A collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

Partnership agreement

A legal agreement between two or more business partners that outlines core business issues.

What spreads itself from file to file but also from computer to computer causing annoyances as well as damage in a computer?

A worm

Match the departments on the left with their primary data types on the right.

Accounting matches Choice, Transactional data Sales matches Choice, Potential customer data Operations management matches Choice, Manufacturing data Marketing matches Choice, Promotion data Human resources matches Choice, Employee data Finance matches Choice, Investment data

Match the characteristic of high-quality information on the left with its corresponding question on the right. Instructions

Accurate matches Choice, Is there an incorrect value in the information? Is there an incorrect value in the information? Complete matches Choice, Is a value missing from the information? Is a value missing from the information? Consistent matches Choice, Is aggregate or summary information in agreement with detailed information? Is aggregate or summary information in agreement with detailed information? Timely matches Choice, Is the information current with respect to business needs? Is the information current with respect to business needs? Unique matches Choice, Is each transaction and event represented only once in the information? Is each transaction and event represented only once in the information?

What is it that the National Institute of Standards and Technology (NIST) introduced? Designed to keep government information secure.

Advanced Encryption Standard (AES)

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows internet advertisers to display advertisements without the consent of the computer user?

Adware

What aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements?

Agile methodology

Match the testing type on the left with its correct definition on the right.

Alpha Testing matches Choice, Assess if the entire system meets the design requirements of the users Assess if the entire system meets the design requirements of the users Development Testing matches Choice, Test the system to ensure it is bug-free Test the system to ensure it is bug-free Integration Testing matches Choice, Verify that separate systems can work together, passing data back and forth correctly Verify that separate systems can work together, passing data back and forth correctly System Testing matches Choice, Verify that the units or pieces of code function correctly when integrated Verify that the units or pieces of code function correctly when integrated User Acceptance Testing (UAT) matches Choice, Determine if the system satisfies the user and business requirements Determine if the system satisfies the user and business requirements Unit Testing matches Choice, Test individual units or pieces of code for a system Test individual units or pieces of code for a system

Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:

Benefits tend to be more tangible than costs

Which of the following are examples of information as opposed to data? (Check all that apply.)

Best customer Best-selling product Worst-selling product

What is the identification of a user based on a physical characteristic? such as fingerprint, iris, face, voice, or handwriting.

Biometrics

In the data Hierarchy, the smallest element is the _______.

Bit

group data and corresponding processes into objects. (Enter one word in each blank.)

Blank 1: Object Blank 2: oriented Blank 3: languages

___________ is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.

Brainstorming

A company can create a competitive advantage by executing well designed business processes. An organization seeking significant improvement requiring complete redesign of their business processes would likely use which of the following methods?

Business Process Reengineering

attempts to understand and measure the current process and make performance improvements accordingly.

Business process improvement

Porter's 5 forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____.

Business strategies, activities

What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?

Business-critical integrity constraints

In _____ e-commerce, the sellers and buyers are organizations.

Business-to-business

Which type of electronic commerce is the largest by dollar volume?

Business-to-business

If you are a worker managing your fringe benefits over your company's intranet, you are engaging in _______ e-commerce.

Business-to-employee

The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the

CIO

What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors?

COBIT

What helps an organization segment their customers into categories such as best and worst customers?

CRM analysis technologies

Lead

Choice, A person or company that is unknown to your business. A person or company that is unknown to your business.

Marketing and sales matches Choice

Choice, Promotes, prices, and sells products to customers. Promotes, prices, and sells products to customers.

Service

Choice, Provides customer support after the sale of goods and services Provides customer support after the sale of goods and services

Operations

Choice, Transforms raw materials or inputs into goods and services. Transforms raw materials or inputs into goods and services.

__________-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

Click

Cloud computing provides a financial advantage over on premise computing because:

Cloud computing is an operating expense while on premise computing is a capital expense

Match the PMBOK term on the left with its definition on the right.

Communication plan matches Choice, Defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations Defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations Executive sponsor matches Choice, The person or group who provides the financial resources for the project. The person or group who provides the financial resources for the project. Project assumption matches Choice, Factors considered to be true, real, or certain without proof or demonstration. Factors considered to be true, real, or certain without proof or demonstration. Project constraint matches Choice, Specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies Specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies Project deliverable matches Choice, Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Project objective matches Choice, Quantifiable criteria that must be met for the project to be considered a success. Quantifiable criteria that must be met for the project to be considered a success.

What is the legal protection afforded to an expression of an idea, such as a song, book, or video game?

Copyright

What is an artificially created legal entity that exists separate and apart from those individuals who created it and carry on its operations?

Corporation

____________ maintenance makes system changes to repair design flaws, coding errors, or implementation issues.

Corrective

Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?

Cost leadership

Managers and executives need information on business activities and may utilize dashboards to understand how the performance of specific elements. The essential elements to measure success of a business are called

Critical Success Factors

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

Cyberbullying

Data Information Business Intelligence Knowledge

Data matches Choice, I have one item. I have one item. Information matches Choice, The item I have is a product that has the most sales during the month of December. The item I have is a product that has the most sales during the month of December. Business Intelligence matches Choice, The month of December this year is going to see interest rates raise by 10 percent and snow storms are expected to cause numerous problems throughout the East coast. The month of December this year is going to see interest rates raise by 10 percent and snow storms are expected to cause numerous problems throughout the East coast. Knowledge matches Choice, Given the unexpected financial issues caused by the storms and the interest rate hike we will offer a discount on purchase in November and December to ensure sales levels increase by 10 percent. Given the unexpected financial issues caused by the storms and the interest rate hike we will offer a discount on purchase in November and December to ensure sales levels increase by 10 percent.

___________ occurs when various copies of the data agree

Data consistency

What compiles all of the metadata about the data elements in the data model?

Data dictionary

You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management

Data inconsistency

Select the four primary reasons low-quality information occurs in a system.

Data-entry personnel enter abbreviated information to save time. Online customers intentionally enter inaccurate information to protect their privacy. Third-party and external information contains inconsistencies and errors. Different systems have different information entry standards and formats. Completeness. The customer's first name is missing. Another issue with completeness. The street address contains only a number and not a street name. Consistency. There may be a duplication of information since there is a slight difference between the two customers in the spelling of the last name. Similar street addresses and phone numbers make this likely. Accuracy. This may be inaccurate information because the customer's phone and fax numbers are the same. Some customers might have the same number for phone and fax, but the fact that the customer also has this number in the email address field is suspicious. Another issue with accuracy. There is inaccurate information because a phone number is located in the email address field. Another issue with completeness. The information is incomplete because there is not a valid area code for the phone and fax numbers.

What type of systems model information using Online Analytical Processing (OLAP), which provides assistance in evaluating and choosing among different courses of action?

Decision Support Systems

Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?

Decision support system

Project management is comprised of the following major phases:

Define, Plan, Execute, Close-out

Select the four functions that a database management system can perform on data in a database.

Delete data Update data Read data Create data

What do we call malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines?

Destructive Agents

What is a tool that supports visualization. As well as tracks Key Performance Indicators (KPIs) and Critical Success Factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs?

Digital Dashboard

What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?

Digital dashboard

________ prototyping builds a small-scale representation or working model of the system to ensure it meets the user and business requirements.

Discovery

_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Drive

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

Drive-by hacking

Select the statement that accurately defines the relationship between entities and attributes in a relational database.

Each attribute of an entity occupies a separate column of a table.

Match the feasibility study on the left with its correct definition on the right.

Economic feasibility matches Choice, Measures the cost-effectiveness of a project Measures the cost-effectiveness of a project Operational feasibility matches Choice, Measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities Measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities Schedule feasibility matches Choice, Measures the project time frame to ensure it can be completed on time Measures the project time frame to ensure it can be completed on time Technical feasibility matches Choice, Measures the practicality of a technical solution and the availability of technical resources and expertise Measures the practicality of a technical solution and the availability of technical resources and expertise Political feasibility matches Choice, Measures how well the solution will be accepted in a given organization Measures how well the solution will be accepted in a given organization Legal feasibility matches Choice, Measures how well a solution can be implemented within existing legal and contractual obligations Measures how well a solution can be implemented within existing legal and contractual obligations

What is it that refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

Ediscovery (Electronic Discovery)

Match the hacker weapon on the left with its correct definition on the right.

Elevation of privilege matches Choice, A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. Hoaxes matches Choice, Attack computer systems by transmitting a virus hoax, with a real virus attached. Attack computer systems by transmitting a virus hoax, with a real virus attached. Malicious code matches Choice, Includes a variety of threats such as viruses, worms, and Trojan horses. Includes a variety of threats such as viruses, worms, and Trojan horses. Packet tampering matches Choice, Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. Sniffer matches Choice, A program or device that can monitor data traveling over a network. A program or device that can monitor data traveling over a network. Spoofing matches Choice, The forging of the return address on an email so that the message appears to come from someone other than the actual sender. The forging of the return address on an email so that the message appears to come from someone other than the actual sender. Splogs matches Choice, Fake blogs created solely to raise the search engine rank of affiliated websites. Fake blogs created solely to raise the search engine rank of affiliated websites. Spyware matches Choice, Software that comes hidden in free downloadable software and tracks online movements. Software that comes hidden in free downloadable software and tracks online movements.

All of the following are used to provide online market research except:

Emails

Transactional information

Encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks.

Select two unstructured decisions.

Entering a new market Entering a new industry

Select the four primary strategic initiatives for competitive advantages.

Enterprise resource planning Supply chain management Business process reengineering Customer relationship management

Select the term that refer to storing information about a person, place, thing, transaction, or event.

Entity

________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

Epolicies

Which of the following is not a role that information systems play in business processes?

Establish standards

What are the two fundamental blocks on which organizations base their businesses?

Ethics and Security

What does a business analyst do?

Evaluates the company's business needs and select systems to improve performance

Which of the following is not an electronic commerce application?

Evaluating an employee

What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight?

Executive information system

What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?

Expert systems

Comparing FAIS to ERP systems which of the following is true?

FAIS are developed internally while ERP are purchased

An organization with multiple business written (SBU's) each having different business models would most likely utilize a centralized organization structure?

False

BPR is a strategy for improving the efficiency of an organization's data collection.

False

Big Data is easy to define

False

Business-to-consumer applications comprise the majority of electronic commerce dollar volume.

False

Businesses do not use social commerce for new products.

False

Data not refers to the quality of the data itself

False

ERP systems cannot manage cross departmental processes.

False

Functional area information silos were particularly efficient when business processes crossed functional boundaries in an organization.

False

Internet advertising is impersonal, one-way mass communication.

False

It is important for applications and data to be dependent on each other

False

Risk management is used to manage projects and the techniques used are unique, risk management cannot be used to assist other business function?

False

The four deployment methods for cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds.

False

The internet increases traditional barriers to entry into a market.

False

True or false: Information in an organization exists only a few departments, such as sales and marketing.

False

Unstructured decisions require a combination of standard solution procedures and individual judgment.

False

Targeted marketing is a good example of the discovery of previously unknown or hidden patterns.

False/ but possibly *true*

___________ is the measure of the tangible and intangible benefits of an information system.

Feasibility

Which of the following is not an advantage of the buy option for acquiring IS applications?

Few types of off-the-shelf software are available, thus limiting confusion

Identify the costs of downtime on the right with the appropriate categories on the left. Instructions

Financial performance matches Choice, Revenue recognition, cash flow, credit rating, stock price Revenue recognition, cash flow, credit rating, stock price Damaged reputation matches Choice, Customers, suppliers, banks, business partners Customers, suppliers, banks, business partners Revenue matches Choice, Lost future revenue, billing losses, investment losses, lost productivity Lost future revenue, billing losses, investment losses, lost productivity Other expenses matches Choice, Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations

Identify the programing language on the left with the correct definition on the right.

First generation matches Choice, Machine language difficult for people to understand Machine language difficult for people to understand Second generation matches Choice, Assembly language difficult for people to understand Assembly language difficult for people to understand Third generation matches Choice, High-level programming languages, such as C+ and Java High-level programming languages, such as C+ and Java Fourth generation matches Choice, Programming languages that look similar to human languages Programming languages that look similar to human languages Fifth generation matches Choice, Programming languages for artificial intelligence and neural networks Programming languages for artificial intelligence and neural networks

Select the three generic business strategies Porter identified for entering a new market.

Focused strategy Broad cost leadership Broad differentiation

What are programming languages that look similar to human languages?

Fourth-generation languages

Select three examples of analytical information.

Future growth projections Market projections Sales trends

Which of the following is the greatest challenges implementing ERP systems?

Gaining employee support to change and adopt ERP system capabilities

What is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally?

Gantt chart

What finds the inputs necessary to achieve a goal such as a desired level of output?

Goal-seeking analysis

Direct payment of Social Security benefits is an example of ______ e-commerce.

Government-to-citizen

What refers to the level of detail in the model or the decision-making process?

Granularity

Rivalry among existing competitors

High because of the existence of websites such as Travelocity.com that force competition based solely on price

Supplier power

High because there are limited plane and engine manufacturers to choose from

What is it that occurs when attackers grant themselves the same access levels they already have but assume the identity of another user?

Horizontal Privilege Escalation

__________ management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

Identity

In which phase does the organization place the system into production so users can begin to perform actual business operations with it?

Implementation phase

Which of the following is an example of an intangible benefit?

Improved community service

Which two terms describe the use of professional expertise within an organization to develop and maintain its information technology systems?

In-sourcing In-house development

Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.

Increase its supplier power

Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.

Increase its supplier power Create entry barriers to reduce the threat of new entrants.

Competitive advantage for an organization manifests itself as all of the following except:

Increased time to market

What is the method or system of government for information management or control?

Information Governance

What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?

Information Silo

What are the two primary resources knowledge workers use to make decisions?

Information and intuition

What is a method or system of government for information management or control?

Information governance

What refers to the extent of detail within the information?

Information granularity

Which epolicy contains general principles regarding information privacy?

Information privacy policy

Select the four primary traits of the value of information.

Information type Information quality Information timeliness Information governance

The _____ area of Enterprise Architecture can be used to understand the computer hardware, networking and other physical devices.

Infrastructure/Technical

Match the items on the right with their correct categories on the left. Instructions

Input matches Choice, Land, Labor, Capital, Information Land, Labor, Capital, Information Transformation matches Choice, Conversion process Conversion process Output matches Choice, Goods, Services Goods, Services

_________ benefits are difficult to quantify or measure.

Intangible

________ allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.

Integrations

What are rules that help ensure the quality of information?

Integrity constraints

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

Operational CRM systems help a company ______ with customers while Analytical CRM systems help a company _______.

Interact with customers; business intelligence on customer behaviors and perceptions

What consists of a series of tiny projects. It has become the foundation of multiple agile methodologies?

Iterative development

What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?

Knowledge

_________ is a process that helps organization identity, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.

Knowledge management

Which phase does the organization perform changes, corrections, additions, and upgrades to ensure the system continues to meet business goals?

Maintenance phase

Select all the activities for which transactional information is created.

Making airline reservations Withdrawing cash from an ATM Purchasing stocks

____ decisions cover short- and medium-range plans, schedules, and budgets along with policies, procedures, and business objectives for a firm and also allocate resources and monitor the performance of organizational subunits.

Managerial

Which of the following concerns how an organization should achieve the goals and objectives set by its strategy and are usually the responsibility of mid-level management?

Managerial decisions

________ requirement planning systems use sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company.

Materials

The major components of the "digital economy" as discussed in class are?

Mobil, Social, and Cloud/big data

The function of ______ is to convert digital signals to analog signals and vise-versa.

Modems

Companies commonly apply the 80/20 rule when evaluating vendor applications software options. When using the 80/20 rule, companies should seriously consider _______.

Modifying their business processes if vendor applications meet 80% of their needs

Decisions today are becoming _____ complex, due to ______ uncertainty in the decision environment.

More; Increased

What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?

Mutation

What groups data and corresponding processes into objects?

Object-oriented languages

What supports general business processes and does not require any specific software customization to meet the organization's needs?

Off-the-shelf application software

Match the outsourcing form on the left with its correct definition on the right.

Onshore outsourcing matches Choice, Engaging another company within the same country for services. Engaging another company within the same country for services. Nearshore outsourcing matches Choice, Contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country. Contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country. Offshore outsourcing matches Choice, Using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away. Using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away.

_________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

Outsourcing

Place the phases in the systems development life cycle in the correct order, with the first phase at the top.

P A DES DEV TEST IMP/MAINT

Match the system implementation method on the left with its correct definition on the right.

Parallel Implementation matches Choice, Uses both the legacy system and new system until all users verify that the new system functions correctly Uses both the legacy system and new system until all users verify that the new system functions correctly Plunge Implementation matches Choice, Discards the legacy system and immediately migrates all users to the new system Discards the legacy system and immediately migrates all users to the new system Pilot Implementation matches Choice, Assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system Assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system Phased Implementation matches Choice, Installs the new system in phases (for example, by department) until it is verified that it works correctly Installs the new system in phases (for example, by department) until it is verified that it works correctl

What are similar to sole proprietorships, except that this legal structure allows for more than one owner.

Partnership

Match the focus areas on the right with the type on the left.

People matches Choice, Authentication and authorization Authentication and authorization Data matches Choice, Prevention and resistance Prevention and resistance Attacks matches Choice, Detection and response Detection and response

What is it that reroutes requests for legitimate websites to false websites?

Pharming

Match the key term on the left with its correct definition on the right.

Pie chart matches Choice, A type of graph in which a circle is divided into sectors that each represent a proportion of the whole. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole. Bar chart matches Choice, A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent. Histogram matches Choice, A graphical display of data using bars of different heights. A graphical display of data using bars of different heights. Sparkline matches Choice, A small embedded line graph that illustrates a single trend. A small embedded line graph that illustrates a single trend. Time-series chart matches Choice, A graphical representation showing change of a variable over time. A graphical representation showing change of a variable over time.

What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?

Porter's Five Forces Model

What are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service?

Porter's three generic strategies

What uses techniques that create models indicating the best decision to make or course of action to take?

Prescriptive analytics

What is a field that uniquely identifies a given record in a table?

Primary key

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

The alternatives for utilizing clod computing include which of the following:

Private Cloud, Public cloud and Hybrid Cloud

What is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications?

Privilege Escalation

Match the step in the decision-making process on the left with the correct definition on the right.

Problem identification matches Choice, Define the problem as clearly and precisely as possible. Define the problem as clearly and precisely as possible. Data collection matches Choice, Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem. Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem. Solution generation matches Choice, Detail every solution possible, including ideas that seem farfetched. Detail every solution possible, including ideas that seem farfetched. Solution test matches Choice, Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or a temporary fix?), and acceptability (can all participants form a consensus?). Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or a temporary fix?), and acceptability (can all participants form a consensus?).

Identify the key strategies and goals involved in business processes. (Check all that apply.)

Product realization Customer acquisition Order to delivery

Match the PMBOK term on the left with its definition on the right.

Project management office matches Choice, An internal department that oversees all organizational projects. An internal department that oversees all organizational projects. Project milestone matches Choice, Represents key dates when a certain group of activities must be performed. Represents key dates when a certain group of activities must be performed. Project requirements document matches Choice, Defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts. Defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts. Project scope statement matches Choice, Links the project to the organization's overall business goals Links the project to the organization's overall business goals Project stakeholder matches Choice, Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion. Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion. Responsibility matrix matches Choice, Defines all project roles and indicates what responsibilities are associated with each role. Defines all project roles and indicates what responsibilities are associated with each role. Status report matches Choice, Periodic reviews of actual performance versus expected performance Periodic reviews of actual performance versus expected performance

What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process?

RAD methodology

__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.

Relational

What is the process of managing changes to the business requirements throughout the project?

Requirements management

What is a programming method that provides for interactive modules to a website?

Scripting language

What uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal?

Scrum methodology

___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.

Semi

In you were to use Excel and build a model to help test the impact of changes to input variables on output variables is an example of a decision-support system performing which type of analysis?

Sensitivity Analysis

Match the SOA concept on the left with the correct definition on the right.

Service matches Choice, A business task. A business task. Loose coupling matches Choice, The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component. The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component. Interoperability matches Choice, The capability of two or more computer systems to share data and resources, even though they are made by different manufactures. The capability of two or more computer systems to share data and resources, even though they are made by different manufactures.

Select the organization on the left with its definition on the right.

Six sigma quality matches Choice, The goal is to detect potential problems to prevent their occurrence and achieve no more than 3.4 defects per million opportunities. That is important to companies like Bank of America, which makes 4 million transactions a day. The goal is to detect potential problems to prevent their occurrence and achieve no more than 3.4 defects per million opportunities. That is important to companies like Bank of America, which makes 4 million transactions a day. Malcolm Baldrige National Quality Award matches Choice, In 1987 in the United States, a standard was set for overall company quality with the introduction of the Malcolm Baldrige National Quality Awards, named in honor of the late U.S. secretary of commerce. Companies can apply for these awards in each of the following areas: manufacturing, services, small businesses, education, and health care. To qualify, an organization has to show quality in seven key areas: leadership, strategic planning, customer and market focus, information and analysis, human resources focus, process management, and business results. In 1987 in the United States, a standard was set for overall company quality with the introduction of the Malcolm Baldrige National Quality Awards, named in honor of the late U.S. secretary of commerce. Companies can apply for these awards in each of the following areas: manufacturing, services, small businesses, education, and health care. To qualify, an organization has to show quality in seven key areas: leadership, strategic planning, customer and market focus, information and analysis, human resources focus, process management, and business results. ISO 900 matches Choice, The common name given to quality management and assurance standards comes from the International Organization for Standardization (ISO), a nongovernmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services. ISO is a worldwide federation of national standards bodies from more than 140 countries. ISO 900 standards require a company to determine customer needs, including regulatory and legal requirements. The common name given to quality management and assurance standards comes from the International Organization for Standardization (ISO), a nongovernmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services. ISO is a worldwide federation of national standards bodies from more than 140 countries. ISO 900 standards require a company to determine customer needs, including regulatory and legal requirements. ISO 14000 matches Choice, This collection of the best practices for managing an organization's impact on the environment does not prescribe specific performance levels, but establishes environmental management systems. This collection of the best practices for managing an organization's impact on the environment does not prescribe specific performance levels, but establishes environmental management systems. CMMI matches Choice, Capability Maturity Model Integration is a framework of best practices. The current version, CMMI-DEV, describes best practices in managing, measuring, and monitoring software development processes. CMMI does not describe the processes themselves; it describes the characteristics of good processes, thus providing guidelines for companies developing or honing their own sets of processes. Capability Maturity Model Integration is a framework of best practices. The current version, CMMI-DEV, describes best practices in managing, measuring, and monitoring software development processes. CMMI does not describe the processes themselves; it describes the characteristics of good processes, thus providing guidelines for companies developing or honing their own sets of processes.

What is a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission?

Spyware

What focuses on long-range planning such as plant size, location, and type of process to be used?

Strategic planning

_______ decisions are more common at lower organizational levels.

Structured

What type of data has a defined length, type, and format and includes numbers, dates, or strings such as customer address? Also stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.

Structured Data

Computer support is greatest for which of the following problems?

Structured and operational control

A standardized language used to manipulate data is ________.

Structured query language

What is the tool that consists of lines of code (in contrast to a graphical design) for answering questions against a database?

Structured query language

The name of the company that delivered the demo in class showing data visualization and dashboards was

Tableau

________ planning focuses on producing goods and services as efficiently as possible within the strategic plan.

Tactical

What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another?

The Ambient Digital Experience

When a company evaluates options for acquiring information systems, which of the following is fundamental factor in the decision-making process?

The amount of code the company wants to write.

What includes the four phases a product progresses through during its life cycle including introduction, growth, maturity, and decline?

The product life cycle

An organization that has good Business and IT alignment is best described as which of the following?

Tight integration of the IT function with the organization's strategy, mission, and goals

What type of processing system is the basic business system that serves the operational level (analysts) and assists in making structured decisions?

Transaction Processing System (TPS)

__________ describe the activities of the business, whereas __________ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities

Transacton data, master data

___________ planning systems track and analyze the movement of materials and products to ensure the delivery of materials and finished goods at the right time, the right place, and the lowest cost.

Transportation

What examines a trend to identify its nature, causes, speed of development, and potential impacts?

Trend Analysis

What are trends that are viewed as particularly important in a specific community, industry, or sector that are carefully monitored, watched, and reported to key decision makers?

Trend Monitoring

What occurs when numerical data is available and a trend can be plotted to display changes through time and into the future?

Trend Projection

A major challenge in supply chain management is reducing uncertainty in demands and supply.

True

A university register who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be applying her knowledge in your application process.

True

According to the article from CIO, businesses are moving ERP systems from on-premise to cloud-based architectures

True

Aligning Business and IT strategies is important for organizations successful use of IT and has been a consistent theme throughout the semester?

True

An entity is a person, place, thing, or event about which information is maintained

True

An executive dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors.

True

Applications software cannot be run on computer hardware without operating systems software.

True

Based on the ERP demo, companies utilizing SaaS cloud computing have lower IT costs than firms not using SaaS computing

True

Business processes may be located within one functional area or may span multiple functional areas.

True

CRM is a customer-focused and customer-driven organizational strategy.

True

Channel conflict occurs when click-and-monitor companies have problems with their regular distributors when they sell directly to customers online.

True

Cross-functional business processes are horizontal, spanning multiple departments with each function (department) needing to complete an activity to complete the process.

True

Data from FAIS systems is used to create business intelligence systems and dashboards to help a management make decisions.

True

Digital dashboards are information systems that support all managers of the organization.

True

Ebusiness/Ecommerce has evolved into the digital economy which is comprised of mobile, social media, and big data.

True

Forward auctions are auctions that sellers use as a channel to many potential buyers.

True

Functional or information systems can be used to support the needs of the entire enterprise major portions of it.

True

Historically, the functional area information systems were often internally developed independently of one another.

True

Information technology refers to computer-based tools used to support the needs of an organization?

True

Measuring customer churn helps a company know the magnitude of the number of customers it loses?

True

One advantage of cloud computing is that it shifts IT from a capital expenses to an operating expense.

True

Organizations that use e-commerce and eBusiness utilize data gathered from interactions fir the purpose of analyzing the data with the objective of gaining insights into trends, patterns, and improve business outcomes.

True

Over the course of a project, there is an inverse relationship between the cost to correct a risk and likelihood a risk will occur.

True

Scope, Communications, Budget and Risk Management are all elements of project management.

True

Structured decisions address routine, repetitive problems for which standard solutions exist.

True

The ASP and SeaS alternative for acquiring IT applications both rely on vendors to provide the hardware needed for applications to operate.

True

The IT Steering committee is a critical component in developing and implementing the IT Strategic Plan.

True

The IT Strategic Plan must be aligned with the organization's strategic plan.

True

The IT function is an organization is a support function and the primary goal is cost minimization.

True

True or false: Decisions range from routine choices, such as how many items to order or how many people to hire, to unexpected ones such as what to do if a key employee suddenly quits or needed materials do not arrive. Today, with massive volumes of information available, managers are challenged to make highly complex decisions—some involving far more information than the human brain can comprehend—in increasingly shorter time frames.

True

True or false: Managers need to continuously monitor projects to measure their success. If a project is failing, the manager must cancel the project and save the company any further project costs. Canceling a project is not necessarily a failure as much as it is successful resource management as it frees resources that can be used on other projects that are more valuable to the firm.

True

True or false: The relationship among the triple constraint variables is such that if any one changes, at least one other is likely to be affected.

True

Understanding how IT systems improve efficiency and reduce cost of cross-functional business processes has been a consistent theme throughout the semester?

True

With the exception of the Business Architecture area, Enterprise architecture addressees the same elements as Computer Based Information Systems (CBIS)

True

An artiste is any characteristic or quality that describes a particular entity

Ture

What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice?

Unstructured

When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be:

Unstructured

What type of data does not follow a specific format and is typically free-form text such as emails, twitter tweets, and text messages? Also accounts for about 80 percent of the data that surrounds us.

Unstructured Data

You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size care of the same brand for you to drive. The salesperson is engaged in:

Up-selling

The comments of consumers in the blogosphere concerning a company's products are called ______.

User-generated content

Based on the CIO article on Business intelligence, they project the future capabilities will

Utilize advance technologies that calculate trends and future possibilities, predicting potential outcomes and making recommendations

Why does a database offer increased information security?

Various security features of databases ensure that individuals have only certain types of access to certain types of information.

What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?

Vertical Privilege Escalation

___ reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world.

Virtual

What is a phone scam that attempts to defraud people by asking them to call a bogus phone number to "confirm" their account information?

Vishing (Voice Phishing)

What are the three distinct characteristics that distinguish big data from traditional data?

Volume, velocity and variety

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

Website name stealing

Select the question that can be answered using only raw data.

What is the date, amount sold, and customer number for a sale transaction?

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?

White-hat hackers

Drag and drop the common types of hackers on the left against the corresponding definitions on the right.

White-hat hackers matches Choice, Work at the request of the system owners to find system vulnerabilities and plug the holes. Work at the request of the system owners to find system vulnerabilities and plug the holes. Script kiddies matches Choice, Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. Cyberterrorists matches Choice, Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. Crackers matches Choice, Have criminal intent when hacking. Have criminal intent when hacking.

What is held in a classroom environment and led by an instructor?

Workshop training

The advantages of electronic commerce for consumers include all of the following except:

You typically cannot access additional information, so you do not have information overload

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?

Zombie

What is a group of computers on which a hacker has planted zombie programs?

Zombie Farm

A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

acceptable

A(n) _________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.

business

Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

censorship

A value _____ analysis views a firm as a series of business processes that each add value to the product or service.

chain

A(n) ___________ agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.

change

Information _________ is the act of conforming, acquiescing, or yielding information.

compliance

In analyzing a business, the characteristics of an individual sale, such as the order date, are best referred to as ______.

data

Select a term that is a synonym for data element, the smallest or basic unit of information in a database.

data field or element

What illustrates the movement of information between external entities and the processes and data stores within the system?

data flow diagram

What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?

data stewardship

What includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data?

data validation

A(n) ________ maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

database

A requirements ___________ document prioritizes all of the business requirements by order of importance to the company.

definition

A(n) ___________ is a logical relationship that exists between the project tasks, or between a project task and a milestone.

dependency

A _____ report changes automatically during creation. It includes an update of daily stock market prices or the calculation of available inventory.

dynamic

Software __________ is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.

engineering

An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security.

ethical

The process of moving data from various sources into the data warehouse is called

extracting, transforming, and loading

A(n) _____ is the confirmation or validation of an event or object.

fact

There is no difference between master data and transaction data

false

A(n) __________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

foreign

Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.

governance

Rivalry among existing competitors is _____ when competition is fierce in a market and ______ when competitors are more complacent.

high; low

What is data that humans, in interaction with computers, generate?

human-generated data

human resources

includes the policies, plans, and procedures for the effective management of employees.

Information ___________ occurs when the same data element has different values.

inconsistency

What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?

information silo

Information _________ is a measure of the quality of information.

integrity

A(n) ______ agent is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.

intelligent

What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?

liability corporation

Select the three things a supplier can do to influence an industry if it has high supplier power.

limiting quality or services charging higher prices shifting costs to industry participants

What is the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components?

loose coupling

Which type of data is created by a machine without human intervention?

machine-generated data

Production _________ describes all the activities managers do to help companies create goods.

management

Project ___________ is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

management

Extensible ________ Language (XML), a markup language for documents, containing structured information.

markup

A(n) ____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.

methodology

Return on investment

ndicates the earning power of a project and is measured by dividing the benefits of a project by the investment.

Sign-_________ is the users' actual signatures indicating they approve all of the business requirements.

off

One primary goal of a database is to eliminate information redundancy by recording each piece of information in _______ place(s) in the database.

only one

At the ___________ level, employees develop, control, and maintain core business activities required to run the day-to-day operations.

operational

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

patent

The project __________ is a formal, approved document that manages and controls the entire project.

plan

The __________ phase establishes a high-level plan of the intended project and determines project goals.

planning

What extracts information from data and uses it to predict future trends and identify behavioral patterns?

predictive analytics

Business __________ are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.

requirements

Human _______ includes the policies, plans, and procedures for the effective management of employees.

resources or resource

Market

segmentation is the division of a market into similar groups of customers.

A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision?

semistructured - how ever it may be unstructured

Which of the following are types of machine-generated structured data?

sensor data point-of-sale data web log data

Web ________ are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services.

services

Operational decisions are considered __________ decisions, which arise in situations where established processes offer potential solutions.

structured

What is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.

structured data

The _________ development life cycle is the overall process for developing information systems, from planning and analysis through implementation and maintenance.

system

Competitive advantages are typically ___________.

temporary

A variable is a data characteristic that stands for a value that changes or varies over __________.

time

Strategic decisions are highly ____________ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice.

unstructured

What are intelligent systems?

various commercial applications of artificial intelligence. They include sensors, software, and devices that emulate and enhance human capabilities, learn or understand from experience, make sense of ambiguous or contradictory information, and even use reasoning to solve problems and make decisions effectively.


Kaugnay na mga set ng pag-aaral

Privity of Contract & Estate, Subleases & Assignments, Landlord Rights in Tenants, Self-Help & Tenant Default, Surrender & Abandonment

View Set

1 Light & Electron Configuration

View Set

Chapter 6-7 Cell & Membrane Structure Function

View Set

Evolution - Gradualism and Punctuated Equilibrium, Evolution Definition

View Set

U.S. History II/ Unit 2 Milestone Retake Test, U.S. History II/ Unit 2 Challenge 1, U.S. History II/ Unit 2 Challenge 2, U.S. History II/ Unit 1 Milestone, U.S. History II/ Unit 2 Milestone, Practice 2 Milestone U.S. History II, Unit 3 Practice Miles...

View Set