BCIS 3610 EXAM 2 (USING MIS 7-12, ACCESS 5-8) All
Cross selling
"If somone buys X, sell them Y. If someone buys Y, sell them X."
Which is true regarding workgroup info systems?
-10 to 100 users -solve probs within a group -diff to change -support one or more workgroup processes
The Software component of BI System is called____
-BI application
____is defined as information containing patterns, relationships, and trends of various forms of data.
-Business intelligence
Remarkable characteristic of OLAP reports is that they are ____, as they are online and viewer of report can change their format
-Dynamic
Data acquisition is the process of creating BI
-FALSE
Data warehouses do not include data that are purchased from outside sources
-FALSE
It is better to have data with too coarse a granularity, than data with too fine a granularity.
-FALSE
Placing BI apps on operational servers can dramatically increase system performance
-FALSE
TotalSales, avg sales, and avg costs are examples of dimensions used in olap report
-FALSE
RFM analysis considers how recently (R) a customer ordered, how frequently (F) they ordered, and how much margin (M) the comp made on order
-FALSE, m=money
A data mart is a lot larger than data warehouse
-FALSe
Drawback associated with OLAP reports is their inability to let users drill down in data
-FALSe
In market basket term, a conditional prob estimate is called lift
-FALse
A data ____ is data collection, smaller than data warehouse that addresses a particular department or functional area of the business
-MART
The ____ is most popular BI server today.
-Microsoft SQL server report manager
Which of following observations about RFM and OLAP reports is true
-OLAP reports are more dynamic than RFM reports
Components of BI System
-Operational DBs -Social Data -Purchased Data -Employee Knowledge -BI applications -Knowledge workers
____requires user to request BI results
-Pull Publishing
___ analysis is way of analyzing and ranking customers according to purchasing patterns
-RFM
Cloud vendor who provides hosted comps and handles all aspects of application programs is offering following services?
-SAAS
SAMCROW, one customer of US steel corp holds an RFM score of 111. Which of following characteristics relates SAMCROW w/RFM score?
-SAMCROW has ordered recently, frequently, and orders the most expensive goods
An OLAP cube and an OLAP report are same thing
-TRUE
Cluster analysis is used to ID groups of entities that have similar characteristics.
-TRUE
Granularity is a term that refers to level of detail represented by data
-TRUE
In an OLAp report, a measure is the data item of interest
-TRUE
The 5 basic reporting operations that produce BI call all be accomplished using SQL and basic HTML or simple writing tool
-TRUE
____provides secure communication even tho transmitted thru internet
-VPN
Focused differentiation occurs when ____
-a better product is provided within an industry segment
Kevin is business student specializing in exports of equip to other countries. Can't create representative chart depicting relation between processes. Lacks_____ skills
-abstract reasoning...a non cognitive skill
Data___ is process of obtaining, cleaning, organizing, relating, and cataloging source data.
-acquisition
Which of the following is true of unsupervised data mining?
-analysts don't create model or hypothesis before running the analysis
Which of following is ex of a measure in OLAP report?
-avg cost
Which of following is true about KM?
-boosts revenues by getting products and services to market faster
Which of following is a basic operation used by reporting tools to produce info from data?
-calcualating
Which of following is true about data marts?
-data marts address only a particular component or functional area of a business
Which is fundamental category of BI analysis?
-data mining
A ____ takes data fro data manufacturers, cleans and processes the data, and then stores it
-data warehouse
Because of various problems w/operational data, large organizations choose to extract operational data and store them into a____
-data warehouse
Problematic operational data are termed
-dirty data
Which of following is benefit of in house hosting?
-disaster prep/in depth visibility
A sales report that is current as of the time the user accesed it on a web server, is example of a___
-dynamic report
KM benefits orgs bc It___
-enables emps and partners to work smarter
Major benefit of enterprise application integration is____
-enables org to se existing application
In data model a ___is something a user wants to track
-entity
_____attempt to directly capture employee expertise.
-expert systems
Data mart is another term used for a data warehouse
-false
_____is major challenging task when implementing enterprise systems.
-gap identification
____is term that refers to level of detail represented by the data.
-granularity
which of following decisions is least likely to involve collaboration?
-how much of product to order from vendor b...
An automobile comp decides to improve quality of all its products and bring more variety into its product line. Comp decided to adopt____
-industry wide differentiation
Business process crossing into mult companies
-inter enterprise BP
Which of following is example of vertical market software?
-inventory tracking software for auto manufacturer
Which of following is accurately defines a dimension in OLAP report?
-it is a characteristic of a measure
Which of following is true of source data for BI system?
-it refers to data that the org purchases from data vendors
Which of following shows the products that customers tend to buy together?
-market basket analysis
____records the source, format, assumptions and constraints, and other facts about the data
-metadata
The viewer of an OLAP report can change its format. Which term implies this capability?
-online
Which is a nonvolatile memory device?
-optical memory device
Which of following components of 5 component model of IS is considered an actor?
-people and hardware
When you midf or delete data in database, you are ____
-processing database
A ___is set of rules that programs on 2 communicating devices follow.
-protocol
Which of following statements is true about operational dta?
-purchased operational data often contains missing elements
An org implements an IS to optimize its SC. The system helps the org reduce wastages and inventory charges. Provides competitive advantage to org. Helped org achieve competititve advantage thru___
-reduced costs
An olap report has measures and dimensions. Which of following is ex of dimension?
-sales region
Which of following is a support activity in value chain?
-setting up contractual arrangements for procurement
How should sales team respond to customer with RFM of 545?
-should let the customer go, loss will be minimal
With ___, data miners develop a model prior to analysis and apply stat techniques to data to estimate parameters of the model
-supervised data mining
Which of following is an effective technique to overcome emp resistance when implanting new enterprise systems?
-training emp on successful use of new system
A data mart is a data collection that addresses a particular functional area of the business
-true
A reporting app is a BI application that inputs data from one or more sources and applies reporting operations to that data to produce business intelligence
-true
A value of 999-999-9999 for US ohone number is ex of dirty data for BI purpose
-true
Hadoop is an open source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers
-true
It is possible to capture the customer's clicking behavior using clickstream data.
-true
KM fosters innovation by encouraging the free flow of ideas
-true
Knowledge discovery in databases (KDD) is used as synonym for data mining
-true
OLAP provides the ability to sum, count, avg, and perform other simple arithmetic operations on groups of data
-true
Operational data is structured for fast and reliable transaction processing
-true
Problematic data are termed dirty data
-true
Regression analysis measures effect of a set of variables on another
-true
Report servers are specialized web servers
-true
The 3 primary activities in the BI process are to acquire data, perform analysis, and publish results
-true
the remarkable characteristic of OLAP reports is that they are dynamic
-true
which of following statements is true about reporting apps?
-two inporant reporting apps are RFM analysis and OLAP
3 major disadvantages of Expert Systems
1. Expensive 2. Unpredictable to Maintain 3. Overhyped
Primary bennefits of KM
1. fosters innovation by encouraging free flow of ideas 2. provides customer service by streamlining response time 3.boosts revenue by getting products to market faster 4. enhances employee retention by recognizing and rewarding them 5.streamlines operations & reduces costs by eliminating uneccesary processes
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________. 311 545 555 113
113
A sales team should attempt to up-sell more expensive products to customers with RFM score of ___
113
The DatePart function has ________ required parameters. 1 2 3 4
2
Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________. 511 555 151 155
511
Ajax has not ordered linen in some time,when it did in past ordered frequently, and its orders were of highest money value. Under given circumstances, their RFM score is most likely
511
21) What type of knowledge management system did Procter & Gamble implement in order to increase the efficiency of their research and development organization? A. content management system B. digital asset management system C. learning management system D. knowledge network system
A
30) What is meant by the statement "knowledge is sticky"? A. Knowledge is hard to move. B. Knowledge is universally applicable. C. Knowledge works only in certain situations. D. Knowledge is intangible.
A
33) Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called communities of A. practice. B. professionals. C. interest. D. knowledge.
A
35) Specialized systems built for engineers, scientists, and other knowledge workers charged with discovering and creating new knowledge for a company are called A. KWS. B. LMS. C. wikis. D. CAD systems.
A
38) Which of the following would NOT considered semistructured knowledge? A. request for proposals B. voice-mail C. videos D. e-mail
A
40) Once a knowledge taxonomy is developed, documents are all ________ with the proper classification. A. tagged B. linked C. tupled D. referenced
A
45) Most knowledge workers require specialized knowledge work systems, but they also rely on A. office systems. B. schools and universities. C. imaging systems. D. data transferring systems.
A
48) CAD workstations A. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management.
A
57) Forward chaining is A. a strategy searching for the rule base in an expert system that begins with information entered by the user. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy for searching the rule base in an expert system that begins with a hypothesis.
A
63) In this technique, descriptions of past experiences of human specialists are stored in a database for later retrieval when the user encounters a situation with similar characteristics. A. CBR B. fuzzy logic C. data mining D. LMS
A
65) Hardware and software that attempts to emulate the processing patterns of the biological brain best describes A. a neural network. B. an expert system. C. case-based reasoning. D. fuzzy logic.
A
66) Genetic algorithms A. develop solutions to particular problems using fitness, crossover, and mutation. B. represent knowledge as groups of characteristics. C. do not work for most problems. D. are based on logic.
A
68) Software programs that work in the background without direct human intervention to carry out specific, repetitive, and predictable tasks for individual users, business processes, or software applications, are called A. intelligent agents. B. intelligent techniques. C. business intelligence. D. AI hybrid systems.
A
In a business process, a role refers to ________.
A collection of activities
Before exporting a table to another database, what must be done first?
A database must be created.
What happens when you double-click an attachment field in a table?
A dialog box opens with options
What happens when you double-click an attachment field in a table? The attachment is saved to a file. The attachment is removed. The attachment opens. A dialog box opens with options.
A dialog box opens with options.
Which fields in a table are required fields by definition?
A field with a primary key
What happens each time you open an attachment file in Access?
Access creates a temporary file on your computer's hard drive.
What happens each time you open an attachment file in Access? The attachment opens in Design view. The attachment opens in a form or report. Access creates a temporary file on your computer's hard drive. The attachment opens as a hyperlink.
Access creates a temporary file on your computer's hard drive.
What happens when you click a hyperlink field value while in Datasheet view?
Access launches the program required to display the file or Web page
________ is a form of outsourcing. Customizing information systems Buying off-the-shelf software Acquiring licensed software Updating data standards
Acquiring licensed software
________ is a form of outsourcing. Updating data standards Customizing information systems Acquiring licensed software Buying off-the-shelf software
Acquiring licensed software
Why should you backup your database before running an action query?
Action queries are irreversible.
Why should you backup your database before testing an action query?
Action queries change data in your database that cannot be reversed.
Which of the following is an alternative to a combo box?
Add a data validation rule
To avoid a mistake when using an update query that includes making calculations on a field, what is one thing you can do to prevent losing the original information?
Add an additional field with the original figures.
________ is similar to spyware but it watches user activity and produces pop-ups. A cookie Shareware Adware A payload
Adware
A(n) ________ performs calculations on an entire column of data and returns a single value.
Aggregate function
Sum, Min, Max, and Average are examples of which kind of functions?
Aggregate functions
Where do the row headings display in a crosstab query?
Along the left side of a crosstab query
Where do the row headings display in a crosstab query? Along the bottom of a crosstab query Along the top of a crosstab query Along the right side of a crosstab query Along the left side of a crosstab query
Along the left side of a crosstab query
Where do the column headings display in a crosstab query?
Along the top of a crosstab query
Which of the following is true of unsupervised data mining? Unsupervised data mining requires tools such as regression analysis. Neural networks are a popular unsupervised data mining application. Unsupervised data mining requires analysts to fit data to suggested hypotheses. Analysts do not create a model or hypothesis before running the analysis.
Analysts do not create a model or hypothesis before running the analysis.
What can you do if a comparable table already exists when you import a spreadsheet?
Append a copy of the Excel records to the table
What can you do if a comparable table already exists when you import a spreadsheet? Append a copy of the Excel records to the table Link the table to the Access table Export the table to Excel Copy the table to Access
Append a copy of the Excel records to the table
Moving records from one table to another can be accomplished with the combination of what two types of queries?
Append and delete
The process of creating a make table query is very similar to which other type of query?
Append query
With ________, the sender and receiver transmit a message using different keys.
Asymmetric encryption
Where is a Group Header located?
At the start of each new group
In Access, what is a reference to an external file called?
Attachment
In Access, what is a reference to an external file called? Field Attachment OLE object Paperclip
Attachment
In Access, what is a reference to an external file called? OLE object Attachment Paperclip Field
Attachment
Which of the following fields enables you to add multiple files of different types to a table?
Attachment
Which of the following fields enables you to add multiple files of different types to a table? Text OLE Attachment Caption
Attachment
Which of the following allows you to manage attached files in forms and reports?
Attachment control
Which of the following is an example of a measure in an OLAP report?
Average Cost
24) The flow of events or transactions captured by an organization's system describes A. information. B. data. C. wisdom. D. knowledge.
B
29) Which of the following statements is NOT an accurate description of the importance of knowledge to a firm? A. Knowledge-based core competencies are key organizational assets. B. Knowledge should be seen as similar to any other key asset, such as a financial asset or a production facility. C. Knowledge enables firms to become more efficient in their use of scarce resources. D. Knowledge is not subject to the law of diminishing returns as are physical assets.
B
32) In order, which are the value-adding steps in the knowledge business value chain? A. acquire, store, disseminate, apply, feedback B. data and information acquisition, acquire, store, disseminate, apply C. acquire, disseminate, apply, feedback, management and organizational activities D. data and information acquisition, store, disseminate, feedback, apply
B
37) Which of the following is NOT a typical component or capability of an enterprise-wide knowledge management system? A. collaboration tools B. KWS C. document management D. LMS
B
39) You are advising a multimedia company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs? A. enterprise content management system B. digital asset management system C. knowledge network system D. VRML system
B
41) Which of the following is NOT a Web 2.0 tool firms are using to foster collaboration? A. blogs B. intranets C. wikis D. social bookmarking
B
47) ________ often are designed and optimized for the specific tasks to be performed. A. Graphics programs B. Knowledge workstations C. Virtual simulators D. CAD stations
B
53) Which of the following is a type of intelligent technique? A. knowledge networks B. case based reasoning C. computer-aided design D. VRML
B
61) Virtually all expert systems deal with problems of A. policy development. B. classification. C. logic and control. D. high complexity.
B
69) What type of intelligent technique helped Procter & Gamble determine the most efficient methods for their trucks to deliver goods? A. fuzzy logic B. intelligent agents C. genetic algorithms D. none of the above
B
Which of the following is not a basic role of managers? a) interpersonal b) processor c) informational d) decisional
B) Processor
Static Reports
BI Documents that are fixed at the time of creation and do not change
Dynamic Reports
BI Documents that are updated at the time they are requested
Which of the following statements is true about BI publishing alternatives?
BI servers extend alert/RSS functionality to support user subscriptions
ERP vendor Infor acquired which of the following ERP products? A. Epicore 9 B. Solomon C. GP D. Baan
Baan
What should be the first step taken before creating an update query?
Back up the database
After becoming familiar with the data in a database, what should be the first step when creating an action query?
Backup the database
What differentiates a hyperlink from text?
Blue underline
When creating a parameter query, the text phrase should be enclosed in which of the following?
Brackets [ ]
________ is a standard set of terms and graphical notations for documenting business processes.
Business Process Execution Language
During the requirements definition stage of developing an information system, the project team will consist mostly of ________.
Business and systems analysts
22) The percentage of gross domestic product of the United States that is produced by the knowledge and information sectors is estimated to be about ________ percent. A. 20 B. 40 C. 60 D. 80
C
23) Which of the following statements best describes the relationship between collaboration and knowledge management? A. Without knowledge, collaboration is difficult. B. Knowledge doesn't exist without collaboration. C. Knowledge is useful only when shared with others. D. As knowledge increases, so does collaboration.
C
27) The set of business processes, culture, and behavior required to obtain value from investments in information systems is one type of A. knowledge culture. B. knowledge discovery. C. organizational and management capital. D. organizational routine.
C
28) Which of the following systems digitizes, indexes, and tags documents according to a coherent framework? A. wikis B. CAD C. document management D. LMS
C
31) Which of the following is NOT one of the main four dimensions of knowledge described in the chapter? A. Knowledge is a firm asset. B. Knowledge has different forms. C. Knowledge has no locations. D. Knowledge is situational.
C
36) Fuzzy logic is a type of A. data mining. B. neural network. C. intelligent technique. D. business intelligence.
C
42) Which of the following statements about the use of wikis by firms is NOT true? A. They are inexpensive and easy to implement. B. Users are able to modify wiki content contributed by others. C. They are most appropriate for information that must be revised but does not need to be available 24/7. D. They can be used as a central repository for all types of corporate data such as spreadsheets and e-mail.
C
55) Technology that consists of computer-based systems that attempt to emulate human behavior is called A. fuzzy logic. B. neural networks. C. AI technology. D. genetic algorithms.
C
59) Expert systems A. solve problems too difficult for human experts. B. are based on DO WHILE rules. C. work in very limited domains. D. share characteristics with mainframe computing.
C
60) It is unlikely you could represent the knowledge in the Encyclopedia Britannica with an expert system because: A. there is no one expert who understands all the material contained within the encyclopedia. B. the knowledge changes radically over a short time. C. not all the knowledge in the encyclopedia can be represented in the form of IF-THEN rules. D. the knowledge is too general.
C
62) Expert systems are expensive and time-consuming to maintain because A. their rule base is so complex. B. they rely on equipment that becomes outdated. C. their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules. D. only the person who created the system knows exactly how it works, and may not be available when changes are needed.
C
64) You are an automotive engineer working on an application that will automatically parallel park a car. The intelligent technique you may find most useful is: A. case-based reasoning. B. artificial intelligence. C. fuzzy logic. D. expert system.
C
67) Which of the following describes a difference between neural networks and genetic algorithms? A. Genetic algorithms are designed to process large amounts of information. B. Genetic algorithms are a type of knowledge discovery, while neural networks are an intelligent technique. C. Neural networks are programmed to "learn." D. All of the above
C
________ uses a comma to separate one column from the next, enabling the receiving software to distinguish one set of field values from the next.
CSV text files
Which of the following fields is an example of a field that would not require a tab stop?
Calculated field
Packet-filtering firewalls ________.
Can filter both inbound and outbound traffic
Which of the following is NOT used when laying out forms and reports?
Changing the Allow Edits property to No
The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives.
Chief Information Officer
The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.
Chief Technology Officer
How do you hide details in a report?
Click Hide details in the Grouping & Totals group on the Design tab
How do you hide details in a report? Click Hide details in the Grouping & Totals group on the Design tab Click Hide details in Page Options Click Hide details in the Header/Footer Options Close the detail section in Design view
Click Hide details in the Grouping & Totals group on the Design tab
How do you insert blank lines above a table after exporting it from Access into Word?
Click immediately before the first value in the first cell of the table and press Enter to add an additional line.
To move a text box label, what action must you take?
Click the Tabular Layout in the Table group of the Arrange tab while both the label and text box controls are selected.
On a form, what type of control provides a drop-down menu displaying a list of options from which the user can choose a single value?
Combo box
Which type of control does a lookup field become in a form?
Combo box control
Which type of control does a lookup field become in a form? Calculated control Combo box control Unbound control Bound control
Combo box control
Which type of control does a lookup field become in a form? Unbound control Combo box control Bound control Calculated control
Combo box control
________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. Data Transfer Protocols (DTP) Decision Support Systems (DSS) Content Management Systems (CMS) Online Analytical Processing (OLAP) applications
Content Management Systems (CMS)
________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.
Conversion rate
Which of the following is NOT a correct way to Add a calculated control to a form or report?
Create a formula in a bound control
What should be done before converting a text box to a combo box?
Create a new table and enter the values for the option list
What should be done before converting a text box to a combo box? Create a new table and enter the values for the option list Switch to Form view and attempt to change the data in the first record Set a default value to appear on the form Check the tab order of the form
Create a new table and enter the values for the option list
What should be done before converting a text box to a combo box? Set a default value to appear on the form Check the tab order of the form Switch to Form view and attempt to change the data in the first record Create a new table and enter the values for the option list
Create a new table and enter the values for the option list
What is the first step in creating an append query?
Create a select query
What does Access do when you link a table to another Access database?
Creates a new table called a linked table
What summarizes a data source into a grid of rows and columns?
Crosstab query
Which type of query calculates data using a sum, average, or other function and groups the results by two sets of values?
Crosstab query
________ is the dynamic social media process of employing users to participate in product design or product redesign. Homesourcing Crowdsourcing Farmshoring Outsourcing
Crowdsourcing
25) Expertise and experience of organizational members that has not been formally documented best describes A. wisdom. B. information. C. data. D. tacit knowledge.
D
26) Changing organizational behavior by sensing and responding to new experience and knowledge is called A. change management. B. knowledge networking. C. the knowledge value chain. D. organizational learning.
D
34) Which of the following are the three major types of knowledge management systems? A. management information systems, decision support systems, and transaction processing systems B. enterprise systems, customer support systems, and supply chain management systems C. database management systems, expert systems, and knowledge work systems D. enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques
D
43) Which of the following is a collaboration tool used to support knowledge management systems? A. blogs B. wikis C. social bookmarking D. all of the above
D
44) Tools for the management, delivery, tracking, and assessment of various types of employee learning best describes a(n) A. investment workstation. B. organizational learning system. C. employee enrichment system. D. learning management system.
D
46) A ________ is very important to a knowledge worker's system. A. careful filing system B. financial analysis system C. CAD capability D. user-friendly interface
D
49) Which of the following would NOT be classified as a knowledge work system? A. computer-aided design system B. 3D visualization system C. investment workstations D. expert system
D
50) Virtual reality systems A. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. provide architects, engineers, and medical workers with precise, photorealistic simulations of objects.
D
51) Investment workstations A. provide engineers, designers, and factory managers with precise control over industrial design and manufacturing. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. are used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management.
D
52) Which of the following systems is NOT used to capture tacit knowledge? A. expert system B. case-based reasoning C. fuzzy logic D. neural network
D
54) Which of the following techniques is used for knowledge discovery? A. expert system B. transaction processing systems C. case-based reasoning D. data mining
D
56) An inference engine is A. a strategy for searching the rule base in case-based reasoning. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy used to search through the rule base in an expert system by forward chaining or backward chaining.
D
58) Backward chaining is A. a strategy for searching the rule base in an expert system that begins with information entered by the user. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy for searching the rule base in an expert system that begins with a hypothesis.
D
70) To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use A. CAD systems. B. virtual reality systems. C. fuzzy logic systems. D. intelligent agents.
D
What are the three primary activities in the BI process?
Data Aquisition, BI Analysis, Publishing results
When an organization has inconsistent duplicated data, it is said to have a problem of ________.
Data Integrity
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Data encryption Data acquisition Data mining Data entry
Data acquisition
Which of the following is NOT a rule for appending queries?
Data field types do not have to be the same.
Which of the following is NOT a rule for appending queries? A field from the source table does not exist in the destination table. Data field types do not have to be the same. The destination table should not contain an AutoNumber field. All the normal rules for adding a new record to the destination table apply.
Data field types do not have to be the same.
Which data validation method enables you to execute programming tasks whenever data in a table is changed?
Data macro
________ is similar to a validation rule except the logic is more complex and the actions taken are more powerful when table data is changed.
Data macro
________ is similar to a validation rule except the logic is more complex and the actions taken are more powerful when table data is changed. Input mask Required text Data macro Validation text
Data macro
Which of the following statements is true about data marts?
Data marts address the needs of a particular department or functional area of a business.
Which of the following statements is true about data marts? A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. Data mart users possess the data management expertise that data warehouse employees have. Data marts address the needs of a particular department or functional area of a business. Data marts are larger than data warehouses.
Data marts address the needs of a particular department or functional area of a business.
Which of the following statements is true about data marts? Data marts are larger than data warehouses. Data marts address the needs of a particular department or functional area of a business. A data mart is like a distributor in a supply chain, while a data warehouse can be compared to a retail store. Data mart users possess the data management expertise that data warehouse employees have.
Data marts address the needs of a particular department or functional area of a business.
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Data mining Database normalization Data optimization Data warehousing
Data mining
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Data warehousing Data mining Database normalization Data optimization
Data mining
________ protect databases and other organizational data. Data safeguards Payloads Data strings Cookies
Data safeguards
________ protect databases and other organizational data. Payloads Data strings Data safeguards Cookies
Data safeguards
A(n) ________ is a set of constraints or rules that help control how data is entered into a field.
Data validation
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.
Data warehouse
An Access function that examines a date and returns a portion of the date is:
DatePart function.
An Access function that examines a date and returns a portion of the date is: <<interval>>. Date formatting. DatePart function. <<firstweekofyear>>.
DatePart function.
Assuming a hire date of 7/31/2016, which of the following would be the correct DatePart Function for the correct day of the week?
DatePart("w",[HireDate])
Assuming a hire date of February 15, 2017, which of the following date part functions would return the number of days since the beginning of the current year?
DatePart("yyyy",[HireDate])
Which data validation property specifies a value that is automatically entered into a field?
Default value
Which data validation property specifies a value that is automatically entered into a field? Input mask Default value Required Validation rule
Default value
Which data validation property specifies a value that is automatically entered into a field? Validation rule Default value Required Input mask
Default value
What do you do if you make a mistake when running a Find Unmatched query?
Delete the query and start over, then reverse the order of the tables.
In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.
Deliverables
Which view do you use to modify lines or rectangles?
Design view
Which view do you use to modify lines or rectangles? Design view Datasheet view Layout view Form or Report view
Design view
Which view gives a designer a higher level of control when creating forms and/or reports?
Design view
Which view gives a designer a higher level of control when creating forms and/or reports? Datasheet view Design view Form or Report view Layout view
Design view
Where would you go to change tab order in a form?
Design view - Tab order in Tools group
Which sections display on forms and reports by default?
Detail and form/report header and footer
Which of the following statements is true with regard to human safeguards? Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk. System administrators should retain user accounts after an employee has been terminated. Holding public users of Web sites accountable for security violations is quite easy and inexpensive. All employees must be provided with uniform, general training on security, regardless of their position's sensitivity.
Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.
To find the same values in a table, you would use the Find ________ Query Wizard. Matching Repeated Duplicates Alike
Duplicates
_____ is the process by which organizational goals are achieved through the use of organizational resources. a) Organizational decision making b) Operations c) Organizational strategy d) Organizational productivity e) Management
E) Management
Which of the following statements is true of social CRM?
Each customer crafts his or her own relationship with the company
Which of the following statements is true of social CRM? Customers likely to generate the most business get the most attention from the organization. Though relationships emerge from joint activity, companies control the customers. All the customer relationship processes in social CRM are structured and controlled. Each customer crafts his or her own relationship with the company.
Each customer crafts his or her own relationship with the company.
Refer to the Opening Case - EarthRisk Technologies: Which of the following is true about the startup company EarthRisk? a) It makes decisions for its users.. b) EarthRisk uses the same models used by current meteorologists. c) EarthRisk uses data mining against decades of weather data. d) EarthRisk focuses on weather less than two weeks away. e) EarthRisk results can only be used by meteorologists.
EarthRisk uses data mining against decades of weather data.
Knowledge management (KM) benefits organizations because it ________.
Enables employees and partners to work smarter
________ processes span an organization and support activities in multiple departments.
Enterprise
_______ is the application of social media to facilitate the cooperative work of people inside organizations.
Enterprise 2.0
________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. Customer relationship management Enterprise resource planning Enterprise application integration Business process reengineering
Enterprise resource planning
Which of the following statements is true of information systems?
Every information system has at least one application.
Which of the following enables you to create mathematical functions in Access?
Expression builder
Which of the following enables you to create mathematical functions in Access? Expression builder Macro builder Precision builder Excel builder
Expression builder
1) Knowledge residing in the minds of employees that has not been documented is called explicit knowledge.
F
10) Expert systems are the primary tools used for knowledge discovery.
F
11) Intelligent agents can discover underlying patterns, categories, and behaviors in large data sets.
F
13) Given their limitations, expert systems are seldom used for making discrete, highly structured decision-making situations.
F
14) Expert systems work by applying a set of AND/OR rules against a knowledge base, both of which are extracted from human experts.
F
15) Case-based reasoning is not well-suited for diagnostic systems in medicine.
F
17) Fuzzy logic systems "learn" patterns from large quantities of data by sifting through data, searching for relationships, building models, and correcting over and over again the model's own mistakes.
F
18) Because neural network applications cannot always explain why they arrive at a particular solution, they are not well suited for use in the medical profession.
F
3) Knowledge is universally applicable and easily moved.
F
5) COPs are formalized groups of professionals and employees within and outside the firm who have similar work-related activities and interests.
F
6) Structured knowledge is explicit knowledge that exists in informal documents.
F
7) Semistructured information is all the knowledge in a firm that resides in the heads of experienced employees.
F
8) Knowledge workers are primarily clerical and data workers who usually do not possess high levels of education.
F
9) VRML requires the use of a powerful server as well as large amounts of bandwidth.
F
A sales report that is current as of the time the user accessed it on a Web server is a static report.
FALSE
Content data differentiates SMIS from Web site applications.0/1 pts
FALSE
Expert systems are rule-based systems that use "If . . . then" rules unlike those created by decision tree analysis.
FALSE
Knowledge management was done only after the advent of social media.
FALSE
Neural networks are a popular unsupervised data mining technique used to predict values and make classifications.
FALSE
A computer crime is committed if an employee inadvertently installs an old database on top of the current one
False
A decision tree analysis is a supervised data mining technique.
False
A manager's primary function is strategic planning. T or F?
False
A sales report that is current at the time the user accessed it on a Web server is a static report
False
All business processes must include one or more information systems
False
An information system need not relate to any business process, but a business process should relate to at least one information system.
False
As IS development projects are difficult to budget and schedule, technical and organizational feasibilities are only approximate analyses.
False
Business requirements do not necessitate opening information systems to non employee personnel, such as temporary personnel, vendors, or partner personnel.
False
Changing the structure of a process always involves a change in resources as well, even if it is only a simple reordering of tasks.
False
Control Objectives for Information and related Technology (COBIT) practices were created by Object Management Group (OMG) for documenting business processes.
False
Converting to an ERP system is not nearly as disruptive as converting to an EAI system
False
Corporate performance management (CPM) is involved with monitoring and managing an organization's performance according to its budget. T or F?
False
Data safeguards are measures used to protect computer hardware from external threat
False
Decision-support systems support only lower- and middle-level managers. T or F?
False
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
False
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
False
Digital dashboards provide support primarily to analytical, quantitative types of decisions. T or F?
False
Homesourcing is the dynamic social media process of employing users to participate in product design or product redesign.
False
If a reasoned, non defensive response generates continued and unreasonable UGC from the same source, it is best to respond to or delete the problematic content.
False
In Business Process Modeling Notation (BPMN), dotted arrows depict the flow or sequence of the activities in a process.
False
In all companies, the chief information officer reports directly to the chief financial officer
False
In the choice phase of the decision-making process, managers construct a model that simplifies the problem. T or F?
False
In the implementation phase of the decision-making process, managers set criteria for the evaluation of alternative potential solutions. T or F?
False
In the system implementation phase of the SDLC, with pilot installation, the new system/business processes are installed in phases across an entire organization.
False
In the system implementation phase of the SDLC, with plunge installation, existing systems are used by the organization until the new one is fully operational.
False
It is the chief information officer's responsibility to establish and communicate IS priorities to the executive group, while the responsibility for enforcement rests with the chief executive officer
False
KPI stands for key process information. T or F?
False
Knowledge management was done only after the advent of social media.
False
Refer to IT's About Business 5.1 - Analytics in the National Basketball Association: Key to the success of Stats is its ability to identify dribbles and passes based on the movement of the players. T or F?
False
Sniffing occurs when an intruder uses another site's IP address to masquerade as that other site.
False
Social networking procedures are more informal for SM sponsors than they are for social networking users.
False
Targeted marketing is a good example of the discovery of previously unknown or hidden patterns. T or F?
False
The structure of the IS department remains constant across organizations.
False
The use of BI is limited to large corporations. T or F?
False
Total sales, average sales, and average cost are examples of dimensions used in an OLAP report.
False
True of False: Web 2.0 does not allow mashups, which occur when the output from two or more Web sites is combined into a single user experience.
False
True or False: A trigger is a computer program stored in a database that is used to enforce business results.
False
True or False: According to Gossieaux and Moran's model of hyper-social organization, channels transmit knowledge, whereas networks transmit data.
False
True or False: An ERP solution consists of application programs, databases, and business process procedures, but does not contain training and consulting.
False
True or False: Both structured processes and dynamic processes are formally defined processes.
False
True or False: Business process re-engineering is a quick process, but it is exceedingly expensive.
False
True or False: CRM is an example of a structured inter-enterprise information system.
False
True or False: CRM systems incorporate accounting, manufacturing, inventory, and human resources applications.
False
True or False: Changing the structure of a process always involves a change in resources as well, even if it it only a simple reordering of tasks.
False
True or False: Content data differentiates SMIS from Web site applications.
False
True or False: Converting to an ERP system is not nearly as disruptive as converting to an EAI system.
False
True or False: Defenders of belief communities are highly effective for activities that involve innovation or problem solving.
False
True or False: Defenders of belief communities provide better and faster problem solutions to complex supply chain problems.
False
True or False: Deleting content on user-generated content site should be reserved for contributions that criticize a firm's products or services.
False
True or False: Dynamic processes are more specific.
False
True or False: Dynamic processes support operational activities.
False
True or False: Enterprise application integration is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
False
True or False: Epicor and Microsoft Dynamics are the highest ranked ERP vendors in the market.
False
True or False: Human capital is the investment in social relations with the expectation of returns in the marketplace.
False
True or False: If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.
False
True or False: In enterprise systems, a single department manager is in charge.
False
True or False: In inter-enterprise information systems, procedures are simple and generally not documented on formalized in any way.
False
True or False: In the context of CRM, hyper-social means that the vendor gains control of the customer relationship.
False
True or False: In the customer acquisition phase of the customer life cycle, an organization categorizes its customers according to value and attempts to win back high-value customers.
False
True or False: Industry-specific solutions contain program and database configuration files, but not the process blueprints that apply to ERP implementations in specific industries.
False
True or False: Key users submit ideas and responses to nonkey users for publication in communities.
False
True or False: Only social networking sites present user and responder content, but both Web sites and social networking applications store and processes connection data.
False
True or False: Order and account tracking are business processes concerning the operations department
False
True or False: Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
False
True or False: Seekers of the truth communities facilitate activities like sales and marketing.
False
True or False: Service-oriented architecture is a software design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using process-oriented architecture standards.
False
True or False: Social capital does not depreciate.
False
True or False: Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
False
True or False: Social media sponsors are the companies that operate the SM sites.
False
True or False: Structured processes are adaptive processes that change structure rapidly and readily.
False
True or False: The number of ERP solutions moving to the cloud is expected to increase because of its low cost.
False
True or False: The problems of duplicated data, disjointed systems, limited information, and inefficiencies are solved by spreading the data across multiple databases.
False
True or False: The solutions to problems in an enterprise system usually involve a single department of the organization.
False
True or False: The structure of a process has no bearing on its efficiency.
False
True or False: The term use increases value means that the value of a web site is indirectly proportional to the number of people using it.
False
True or False: Triggers and stored procedures are not components of an ERP solution.
False
True or False: Unlike humans, organizations do not have social capital.
False
True or False: Web 2.0 applications are characterized y frequent releases of thick-client applications.
False
True or False: Web 2.0 includes Web-delivered services and content that are paid for by users.
False
Unlike business analysts, systems analysts work more with managers and executives
False
Unstructured decisions require a combination of standard solution procedures and individual judgment. T or F?
False
Validation rules are entered in the ________ pane. Field Properties Data macro Validation Rules
Field Properties
What do you do if you only want to export part of a table to Excel?
Filter the table first
Which query identifies multiple instances of the same information in a table?
Find duplicates
________ allocate a certain number of characters for each field.
Fixed-length text files
________ allocate a certain number of characters for each field. Linked files Excel tables CSV text files Fixed-length text files
Fixed-length text files
Which of the following is generally a responsibility of users of information systems?
Following security and backup procedures
What appears below the Page Footer section in a report or form?
Form Footer or Report Footer
Which of the following appears at the bottom or each form or report?
Form or Report Footer
Which of the following appears at the top of each form or report?
Form or Report Header
Which of the following appears once at the bottom of each page in a form or report?
Form or Report Page Footer
Which of the following appears once at the bottom of each page in a form or report? Form or Report Header Form or Report Footer Form or Report Page Footer Form or Report Page Header
Form or Report Page Footer
Which of the following appears once at the bottom of each page in a form or report? Form or Report Page Footer Form or Report Footer Form or Report Header Form or Report Page Header
Form or Report Page Footer
Which of the following appears once at the top of each page in a form or report?
Form or Report Page Header
Which of the following appears once at the top of each page in a form or report? Form or Report Page Header Form or Report Page Footer Form or Report Footer Form or Report Header
Form or Report Page Header
________ affects the display of the date without affecting the underlying value.
Formatting
To test an update query before running the query, what should you do first?
From Design view, click View in the Results group and click Datasheet view.
Refer to IT's About Business 5.3 - SecureAlert: SecureAlert uses an integration of which two technologies? a) data warehouse and DSS b) DSS and data mining c) GIS and GPS d) data mining and clustering
GIS and GPS
A ________ shows the tasks, dates, and dependencies for the tasks of a project.
Gantt Chart
________ is a term that refers to the level of detail represented by the data. Elaboration Intricacy Granularity Complexity
Granularity
________ is a term that refers to the level of detail represented by the data. Intricacy Complexity Elaboration Granularity
Granularity
How would you add grouping to a report?
Group & Sort button
How would you add grouping to a report? Form header Group & Sort button Form footer Page footer
Group & Sort button
How would you add grouping to a report? Page footer Form footer Group & Sort button Form header
Group & Sort button
The ________ appears after adding a grouping to a form or report.
Group Header
After adding grouping, a ________ appears just above the Detail section in Design view, along with the name of the field by which you are grouping.
Group header
After adding grouping, a ________ appears just above the Detail section in Design view, along with the name of the field by which you are grouping. Group footer Group header Form header Page header
Group header
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?
HTTPS
________ a Web site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system. Pretexting Spoofing Phishing Hardening
Hardening
________ is the application of social media and related applications for the management and delivery of organizational knowledge resources.
Hyper social knowledge mgmt
The ________ function evaluates an expression and displays one value when the expression is true and another when the expression is false.
IIF
Which of the following is a form of outsourcing hardware infrastructure exclusively? PaaS IaaS cloud hosting SaaS acquiring licensed products
IaaS cloud hosting
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
Information systems
Which data validation method forces users to conform to a specific data-entry format for a given field?
Input mask
Which data validation method forces users to conform to a specific data-entry format for a given field? Default value Input mask Data macro Validation text
Input mask
Which of the following forces you to enter the phone number in a consistent manner in the database table?
Input mask
Which of the following forces you to enter the phone number in a consistent manner in the database table? Validation rule Input mask Lookup list Default value
Input mask
Which of the following function checks to see if a field has no value?
IsNull
Which of the following function checks to see if a field has no value? IsNotNull Sum Average IsNull
IsNull
________ function checks to see if a field does not contain a value.
IsNull
Which of the following statements is true of enterprise application integration? It connects system "islands" via a new layer of software. It leads to data duplication because each application has its own database. It prevents existing applications from communicating and sharing data. It leverages existing systems and enhances the capabilities of functional applications.
It connects system "islands" via a new layer of software.
Which of the following statements is true of enterprise application integration? A. It leverages existing systems, and enhances the capabilities of functional applications. B. It prevents existing applications from communicating and sharing data. C. It connects system "islands" via a new layer of software. D. It leads to data duplication because each application has its own database.
It connects system "islands" via a new layer of software.
What is the purpose of a ScreenTip?
It displays when you point your mouse over the hyperlink text
What is the purpose of a ScreenTip? It displays when you point your mouse over the hyperlink text. It modifies what the user sees in Datasheet view. It launches the hyperlink. It edits the hyperlink.
It displays when you point your mouse over the hyperlink text.
Which of the following statements is true of the swim-lane layout used for modeling the business processes? It complicates the process diagrams. All activities for a given role are repeated in all the swim lanes. It draws attention to the interactions among components of the diagram. Each role in the business process has to share the swim lane with other roles.
It draws attention to the interactions among components of the diagram.
Which of the following statements is true about data administration?
It establishes standards to protect information assets.
Which of the following is true of SOA? A. It enables the requesting and releasing of cloud resources. B. It allows cloud based applications to follow their own standard and structure. C. It has access to cloud storage, but it cannot enable the releasing of cloud resources. D. It has no access to cloud storage
It has access to cloud storage, but it cannot enable the releasing of cloud resources.
Which of the following statements is true about the "maintenance" of information systems? It is overseen by the chief technology officer. It involves adapting existing systems to support new features. It is undertaken by the business analysts. It comprises developing test plans and designing automated test scripts.
It involves adapting existing systems to support new features.
Which of the following is a risk of outsourcing IS/IT functions?
It involves the potential loss of intellectual capital
Which of the following accurately defines a dimension in an OLAP report?
It is a characteristic of a measure.
According to Gossieaux and Moran, which of the following observations is true about a hyper-social organization? It is characterized by a transformation of thinking from market segments to tribes. It creates relationships in which only one of the parties perceives and gains value. It uses social media in an organization-centric manner. It is an organization that transitions from a dynamic process to a structured one.
It is characterized by a transformation of thinking from market segments to tribes.
Which of the following statements is true of the operations group in an organization's IS department?
It monitors the user experience and responds to their problems
Which of the following is true of source data for a BI system? It refers to data that the organization purchases from data vendors. It refers to the organization's metadata. It refers to the level of detail represented by the data. It refers to the hierarchical arrangement of criteria that predict a classification or a value.
It refers to data that the organization purchases from data vendors.
Which of the following statements about a structured inter-enterprise information system is true?
Its problem solutions affect multiple organization
Which of the following statements about a structured inter-enterprise information system is true? A. It is flexible and easily adaptable to organizational changes. B. Its procedures are formalized and the problem solutions affect multiple organizations. C. It does not require users to have any formal training. D. It increases data duplication among departments.
Its procedures are formalized and the problem solutions affect multiple organizations.
Which of the following file types increases the database size byte for byte when attached in Access?
JPEG and other photo formats
Which of the following file types increases the database size byte for byte when attached in Access? Word and JPEG files Excel and JPEG files JPEG and other photo formats Word and Excel files
JPEG and other photo formats
Joseph wishes to increase the operational efficiency of his new startup. What should Joseph do? If Joseph plans to include less specific and fluid activities in his firm, he should use a structured planning system over a dynamic planning system. If Joseph plans to support formally defined and documented activities in his firm, he should use a dynamic planning system over a structured planning system. Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities. Joseph should avoid analyzing his firm's distribution systems as they do not play a role in its daily activities.
Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.
Joseph wishes to increase the operational efficiency of his new startup. What should Joseph do? If Joseph plans to support formally defined and documented activities in his firm, he should use a dynamic planning system over a structured planning system. Joseph should avoid analyzing his firm's distribution systems as they do not play a role in its daily activities. If Joseph plans to include less specific and fluid activities in his firm, he should use a structured planning system over a dynamic planning system. Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.
Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.
Joseph wishes to increase the operational efficiency of his new startup. What should Joseph do? Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities. If Joseph plans to include less specific and fluid activities in his firm, he should use a structured planning system over a dynamic planning system. If Joseph plans to support formally defined and documented activities in his firm, he should use a dynamic planning system over a structured planning system. Joseph should avoid analyzing his firm's distribution systems as they do not play a role in its daily activities.
Joseph should use integrated data stored in his firm's central database to analyze its day-to-day activities.
Where does a Group Footer appear?
Just below the Detail section
Where does a Group Footer appear? Just above the Page Header Just below the Detail section Just below the Form Footer Just below the Page Footer
Just below the Detail section
________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it
Knowledge management
________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it
Knowledge mgmt
A ________ describes the data associated with a text box.
Label control
A ________ describes the data associated with a text box. Form control Design control Text control Label control
Label control
A ________ describes the data associated with a text box. Form control Text control Label control Design control
Label control
Which of the following displays when you insert a text box?
Label control
Which of the following displays when you insert a text box? Text box control Design view control Label control Section control
Label control
Which of the following displays when you insert a text box? Text box control Section control Design view control Label control
Label control
Which two views make it easy to edit the design of a form?
Layout view and Design view
When you use the ________ operator, each criterion must be true for the compound criterion to be true.
Like
Which of the following controls can you use to add emphasis to your form or report?
Line control and rectangle control
What are two options for adding emphasis to your form or report?
Line or rectangle control
Which of the following is an SM application provider? SAP McAfee LinkedIn Oracle
________ allows you connect to a table without having to import the table data into your database.
Linking
________ allows you connect to a table without having to import the table data into your database. Copying Pasting Linking Moving
Linking
________ allows you connect to a table without having to import the table data into your database. Pasting Copying Moving Linking
Linking
The ________ creates a menu of finite values by asking you questions and using your answers to create the options list.
Lookup Wizard
The ________ creates a menu of finite values by asking you questions and using your answers to create the options list. Input Mask Wizard Lookup Wizard validation rule default value
Lookup Wizard
A field with a number of repeated values may be better suited as what kind of field?
Lookup field
A field with a number of repeated values may be better suited as what kind of field? Input mask Lookup field Data macro Validation text field
Lookup field
An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated
Loss of control
The final phase of the systems development life cycle (SDLC) is ________.
Maintaining the System
Which type of query automatically creates a new table from data that already exists in a database?
Make Table
________ is the term used to denote viruses, worms, and Trojan horses. Spam Malware Cookie Firewall
Malware
2 Main Functions of a BI Server
Management & Delievery
________ is a technique for harnessing the power of thousands of computers working in parallel.
MapReduce
________ records the source, format, assumptions and constraints, and other facts about the data. Dimensional data Outsourced data Metadata Clickstream data
Metadata
AX, Nav, GP, and Solomon are the four major ERP products of ________. Epicor SAP Microsoft Dynamics Oracle
Microsoft Dynamics
AX, Nav, GP, and Solomon are the four major ERP products of ________. Epicor SAP Oracle Microsoft Dynamics
Microsoft Dynamics
AX, Nav, GP, and Solomon are the four major ERP products of ________. SAP Epicor Microsoft Dynamics Oracle
Microsoft Dynamics
The four major ERP products of _____ are AX, Nav, GP, and Solomon.
Microsoft Dynamics
What is the default software application associated with a CSV file?
Microsoft Excel
The ________ is the most popular BI server today. Microsoft Windows Vista Microsoft SQL Server Report manager Pentaho BI Server Oracle BI Server
Microsoft SQL Server Report manager
The ________ is the most popular BI server today. Oracle BI Server Pentaho BI Server Microsoft SQL Server Report manager Microsoft Windows Vista
Microsoft SQL Server Report manager
Indexing
Most important content function in Knowledge Management, keyword search that provides quick response at high document relevancy
Which of the following statements is true about the changes and developments foreseen by the year 2024
Most organizations will move their internal hardware infrastructure into the cloud
Which of the following statements is true about the changes and developments foreseen by the year 2024? Licensed, off-the-shelf software will become less configurable, less adaptable, and less flexible. Most organizations will move their internal hardware infrastructure into the cloud. Small computing devices will lose their popularity and become more expensive. SDLC will be typically used for systems development.
Most organizations will move their internal hardware infrastructure into the cloud.
Google's ________ is an excellent mashup example. Jetpack MyMaps Ubiquity Archy
MyMaps
When two functions are not sufficient to evaluate an expression, you may need to use a(n):
Nested function.
When two functions are not sufficient to evaluate an expression, you may need to use a(n): Parameter query. IsNull function. Round function. Nested function.
Nested function.
________ functions refers to using one formula within another one.
Nesting
Which of the following is an example of a dynamic process? A. Nike uses Facebook and Twitter to generate buzz about its new line of running shoes. B. Amazon.com hires customer service representatives to help customers with their online order. C. Samsung accepts a return of a defective television from its dealer. D. Starbucks places an order from coffee beans from its local supplier.
Nike uses Facebook and Twitter to generate a buzz about its new line of running shoes.
Which of the following best represents the value of social capital? (Number of Relationships × Relationship Strength) / Entity Resources Number of Relationships - Relationship Strength - Entity Resources Entity Resources - (Number of Relationships + Relationship Strength) Number of Relationships × Relationship Strength × Entity Resources
Number of Relationships × Relationship Strength × Entity Resources
Which of the following best represents the value of social capital? Number of Relationships - Relationship Strength - Entity Resources (Number of Relationships × Relationship Strength) / Entity Resources Number of Relationships × Relationship Strength × Entity Resources Entity Resources - (Number of Relationships + Relationship Strength)
Number of Relationships × Relationship Strength × Entity Resources
_____ is one of the SOA protocols.
OData
How often does a Form/Report Header appear? Once Once per page Once per record in the record source At the start of each group
Once
Once per record in the record source
Once
OLAP stands for___
Online Analytical Processing
The expression IIf(IsNull([ClosedDate]),"Open","Closed") displays ________. Closed when the ClosedDate field has no value and Open otherwise Closed when the ClosedDate field has no value and nothing otherwise Open when the ClosedDate field has no value and Closed otherwise Open when the ClosedDate field has no value and nothing otherwise
Open when the ClosedDate field has no value and Closed otherwise
The expression IIf(IsNull([ClosedDate]),"Open","Closed") displays ________. Open when the ClosedDate field has no value and nothing otherwise Closed when the ClosedDate field has no value and nothing otherwise Closed when the ClosedDate field has no value and Open otherwise Open when the ClosedDate field has no value and Closed otherwise
Open when the ClosedDate field has no value and Closed otherwise
In an IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
Operations
Which ERP vendor acquired PeopleSoft and Siebel?
Oracle
The top two ranked ERP vendors are _____.
Oracle and SAP
In information security, which of the following is true of managing risk?
Organizations should implement safeguards that balance the trade-off between risk and cost
________ is the process of hiring another organization to perform a service.
Outsourcing
If you want to share an Access report with someone who does not have Microsoft Office, you can export the report as a(n) ________ file. PDF DOC DOCX XLXS
The ________ file format does not allow you to edit the exported documents.
The ________ file format does not allow you to edit the exported documents. Word RTF Excel PDF
The ________ file format was created by Adobe Systems for document exchange independent of software application and operating system environment.
________ documents cannot be edited after being exported.
PDF or XPS
_____ is an example of an inter-enterprise information system?
PRIDE
What type of break is used to cause each group to print on a separate page?
Page
How is an attachment field identified in a table?
Paperclip
________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access. Private keys Passwords User names Personal identification numbers
Passwords
Its problem solutions affect multiple organization
Plunge
According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ____.
Points
Before running a delete query, what should you do?
Preview the datasheet to verify that the records are those that you intend to delete.
Before running a delete query, what should you do? View the results in Design view. Create the table, you can always delete it if the information is wrong. Manually go through the table and delete the information, then use the delete query to verify all information is removed. Preview the datasheet to verify that the records are those that you intend to delete.
Preview the datasheet to verify that the records are those that you intend to delete.
Before running a make table query, what should you do?
Preview the datasheet to verify that the records are those that you intend to insert into the table.
Before running a make table query, what should you do? Create a delete query at the same time. Preview the datasheet to verify that the records are those that you intend to insert into the table. View the results in Design view. Create the table, you can always delete it if the information is wrong.
Preview the datasheet to verify that the records are those that you intend to insert into the table.
________ is a measure of the ratio of process outputs to inputs.
Process efficiency
________ is a measure of the ratio of process outputs to inputs. Process effectiveness Process efficiency Process conformance Process reliability
Process efficiency
BI Systems are used for all four Collaborative tasks, name these 4 tasks:
Project mgmt, problem solving, deciding, informing
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
Provide physical security
________ requires the user to request BI results. Push publishing Desktop publishing Pull publishing Accessible publishing
Pull publishing
Which of the following statements is true about operational data?
Purchased operational data often contains missing elements
Which of the following statements is true about operational data? Purchased operational data often contains missing elements. It is always better to have data with too coarse a granularity than with too fine a granularity. If the data granularity is too coarse, the data can be made finer by summing and combining. Problematic operational data are termed rough data.
Purchased operational data often contains missing elements.
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
RFM
What type of file does Access create when exporting to Word?
RTF
________ is a useful format for basic formatted text documents such as instruction manuals, resumes, letters, and other documents.
RTF
________ is a useful format for basic formatted text documents such as instruction manuals, resumes, letters, and other documents. RTF HTML DOCX JPEG
RTF
Which of the following displays one time at the bottom of a report?
Report footer
Which data validation method forces data entry in a field?
Required
How do you switch on or off sections of a report or form?
Right-click a blank area
How do you switch on or off sections of a report or form? Grey out a section Hide the detail section Right-click a blank area Go to the property sheet
Right-click a blank area
________ is the correct syntax for the Round function.
Round(expression, precision)
________ is the correct syntax for the Round function. Round(expression, interval) Round(expression) Round(expression, truepart, falsepart) Round(expression, precision)
Round(expression, precision)
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods. SAMCROW has ordered recently and orders frequently, but it orders the least expensive goods. SAMCROW has not ordered for some time and it did not order frequently, but when it did order, it bought the least-expensive items. SAMCROW has not ordered in some time but when it did order in the past, it ordered frequently, and its orders were of the highest monetary value.
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
________ are the companies that operate SM sites.
SM application providers
________ are the companies that operate SM sites. Defenders of belief SM application providers SM sponsors Seekers of the truth
SM application providers
____are the companies that operate SM sites
SM application providers
____the IS the supports the sharing if content amoung networks of users
SMIS
Which of the following marks the top boundary of a section in a form or report?
Section bar
________ is the first method for controlling data input in a field of a table.
Selecting an appropriate data type
What must you do once a text box has been converted to a combo box?
Set a source for the combo box
A(n) ________ has a microchip in it to hold data.
Smart Card
________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks. Phishing Spoofing Sniffing Pretexting
Sniffing
________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks. Sniffing Spoofing Pretexting Phishing
Sniffing
Which of the following observations regarding the value of social capital is true? People should ideally ignore entity assets and try to connect to more people with stronger relationships. Social capital depreciates and such depreciation can be ameliorated by adding something of value to interactions. A huge network of relationships to people who have few resources is of greater value than that of a smaller network with people with substantial resources. The value of social capital is best expressed as the summation of the number of relationships in a social network and the resources controlled by those related.
Social capital depreciates and such depreciation can be ameliorated by adding something of value to interactions.
Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased? virtualization Software as a Service (SaaS) Infrastructure as a Service (IaaS) cloud hosting licensed software
Software as a Service (SaaS)
Which of the following statements is true about losses due to computer security threats? Losses due to human error are insignificant. Some organizations don't report all their computer crime losses, and some won't report such losses at all. Surveys on computer crimes provide accurate results since they use standard parameters to measure and tally computer crime costs. Losses due to natural disasters can be measured accurately.
Some organizations don't report all their computer crime losses, and some won't report such losses at all.
Real Simple Syndication (RSS)
Standard for subscribing to content sources
6 Data Mining Origins
Statistics/mathmatics, artificial intelligence machine learning, huge database, cheap computer processing and storage, sophisticated marketing, finance and other professionals, data mgmt technology.
12) Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization.
T
16) Fuzzy logic can describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules.
T
19) Intelligent agents are used primarily for specific, repetitive and predictable tasks.
T
2) Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.
T
20) Shopping bots are a form of intelligent agent.
T
4) The chief knowledge officer is the organizational role responsible for the firm's knowledge management program.
T
The objects you select to export from Access to Word should have which of the following types of layout?
Tabular
The objects you select to export from Access to Word should have which of the following types of layout? Tabular Block Outline Stepped
Tabular
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
Technical Writer
________ are common methods of exchanging information between two computer systems.
Text files
________ are common methods of exchanging information between two computer systems. Access tables Text files Access forms Excel spreadsheets
Text files
________ are common methods of exchanging information between two computer systems. Excel spreadsheets Access forms Access tables Text files
Text files
Which of the following statements is true about IS planning functions?
The CEO and other executive staff decide the membership of the steering committee
Data Mining
The application of statistical techniques to find patterns and relationships amaong data for classifications and prediction.
What happens when you export a form with a subform to Excel?
The form exports but the subform does not
What happens when you export a form with a subform to Excel? The subform exports but the form does not. The original form is deleted when the export is completed. The form exports but the subform does not. The results can be unpredictable.
The form exports but the subform does not.
When exporting to a PDF, what should you check for when the objects are exported?
The number of pages
Which of the following statements is true of an IS department? Programs used in all information systems are developed in-house by the development group. If the IS primarily supports accounting and finance activities, the CFO is appointed as the CIO. The operations group monitors user experience and responds to user problems. Data administration is performed exclusively by the outsourcing relations group.
The operations group monitors user experience and responds to user problems.
Which of the following statements is true of an IS department? The operations group monitors user experience and responds to user problems. Programs used in all information systems are developed in-house by the development group. Data administration is performed exclusively by the outsourcing relations group. If the IS primarily supports accounting and finance activities, the CFO is appointed as the CIO.
The operations group monitors user experience and responds to user problems.
Support
The porbability that two items will be purchased together
Knowledge Management (KM) Systems
The process of creating value from intellectual capital and sharing that knowledge with others who need it
When running an append query, what happens if a record violates the primary key rule for the destination table?
The record is rejected.
What happens to the size of an Access database when a table is linked to an Excel spreadsheet?
The size of the database remains the same.
BI Application
The software component of a BI system
Which of the following statements is true about the steering committee of an IS department?
The steering committee's meetings are conducted by the IS department
If you run a make table query again at a later time, what happens?
The table is replaced with the new up-to-date table.
Which of the following observations concerning expert systems is true?
These systems encode human knowledge in the form of "If...Then" rules.
Which of the following observations concerning expert systems is true?
These systems encode human knowledge in the form of "If/Then" rules
Which of the following statements is true regarding workgroup information systems?
They Support 10 to 100 users
Which of the following is a characteristic of dynamic processes? They are usually formally defined and documented. They support operational and managerial decisions and activities. They are adaptive processes that change structure rapidly and readily. They are standardized processes.
They are adaptive processes that change structure rapidly and readily.
Which of the following is a characteristic of dynamic processes? They support operational and managerial decisions and activities. They are adaptive processes that change structure rapidly and readily. They are standardized processes. They are usually formally defined and documented.
They are adaptive processes that change structure rapidly and readily.
Which of the following is a characteristic of dynamic processes? A. They support operational and managerial decisions and activities. B. They are adaptive processes that change structure rapidly and readily. C. They are standardized processes. D. They are usually formally defined and documented.
They are adaptive processes that change structure rapidly and readily.
Which of the following statements about enterprise information systems is true?
They are very difficult to change
Which of the following statements about enterprise information systems is true? A. They are very difficult to change. B. They do not require formal training. C. They support 10 to 100 users. D. The procedures are not documents, but are understood within the group.
They are very difficult to change.
According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities? They are very effective for activities that involve innovation or problem solving. They seek conformity and want to convince others of the wisdom of their beliefs. They are open to changing their beliefs when confronted with contrary evidence. They make ineffective sales and marketing professionals.
They seek conformity and want to convince others of the wisdom of their beliefs.
Which of the following statements is true about users of information systems? They should learn to install hardware and software on their own. They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. They should ensure the availability of reliable and secure Internet connections. They should learn standard techniques and procedures for the applications they use.
They should learn standard techniques and procedures for the applications they use.
Which of the following statements is true regarding workgroup information systems? They are easy to change. They can be operated without training. They support 10 to 100 users. They minimize data duplication among departments.
They support 10 to 100 users.
Which of the following statements is true regarding workgroup information systems? A. They support 10 to 100 users. B. They are easy to change. C. They can be operated without training. D. They minimize data duplication amoung departments
They support 10 to 100 users.
What is the purpose of a find unmatched query?
To compare records in two related tables and display the records found in one table and not the other.
Where is the Page Header located?
Top of each page
Where is the Page Header located? Top of form/report Bottom of each page At the end of each group Top of each page
Top of each page
What is the group footer used for?
Totaling the data at the end of each group
A ________ involves balancing three critical factors: requirements, cost, and time
Trade-off
________ are viruses that masquerade as useful programs or files. Adware programs Spyware programs Worms Trojan horses
Trojan horses
A BI server extends alert/RSS functionality to support user subscriptions.
True
A characteristic of Web 2.0 is that the value of a site increases with an increase in users and use
True
A digital dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors. T or F?
True
A project plan is a list of work breakdown structure (WBS) tasks, arranged to account for task dependencies, with durations and resources applied.
True
A project team that develops an IS will comprise business and systems analysts during the requirements definition phase
True
A value of 999—999—9999 for a U.S. phone number is an example of dirty data for BI purpose.
True
Adding process resources increases process effectiveness, but it adds costs.
True
Agile development methodologies welcome changes in requirements
True
All management data needed by any of the BI servers is stored in metadata.
True
An OLAP cube and an OLAP report are the same thing.
True
An intrusion detection system (IDS) is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
True
By outsourcing IS, organizations reduce risks associated with implementation.
True
Cookies enable an individual to access Web sites without having to sign in every time
True
Dynamic reports are BI documents that are updated at the time they are requested.
True
Gap identification is a major task when implementing enterprise systems.
True
Goal-seeking analysis attempts to find the value of the inputs necessary to achieve a desired level of output. T or F?
True
Hadoop is an open-source program supported by the Apache Foundation4 that implements MapReduce on potentially thousands of computers
True
Human intuition often plays a role in making unstructured decisions. T or F?
True
If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.
True
Implementing the new or changed process is the third activity in business process management.
True
In Business Process Modeling Notation (BPMN), diamonds represent decisions and usually contain a question that is answered with yes or no.
True
In expert systems, the programs that process a set of rules are called expert systems shells.
True
In marketing transactions, the fact that customers who buy product X also buy product Y creates a cross-selling opportunity.
True
In the system definition phase of the SDLC, schedule feasibility is difficult to determine because it is hard to estimate the time it will take to build the system.
True
In the system definition phase of the SDLC, technical feasibility refers to whether existing information technology is likely to be able to meet the needs of a new system.
True
Information systems improve process quality by augmenting the actions of the human who is performing that activity.
True
Inter-enterprise information systems support one or more inter-enterprise processes.
True
It is possible to capture the customers' clicking behavior using clickstream data
True
Management control is the acquisition and efficient use of resources in accomplishing organizational tasks. T or F?
True
Modern information systems support all three managerial roles. T or F?
True
Not just financial concerns, even time and events could force a company to decide to outsource
True
One of the major sources of UGC problems is inappropriate content.
True
SQL injection attack occurs when users enter an SQL statement into a form in which they are supposed to enter a name or other data.
True
Secure Socket Layer (SSL) is a protocol that is restricted to asymmetric encryption
True
Social media sponsors may or may not pay a fee, depending on the application and on what they do with it.
True
Static reports are BI documents that are fixed at the time of creation and do not change.
True
Structured decisions address routine, repetitive problems for which standard solutions exist. T or F?
True
Structured processes are standardized processes that involve day-to-day operations
True
The actors or participants in a business process are the users of information systems.
True
The most obvious reason for changing a process is that it has efficiency or effectiveness problems
True
The most obvious reason for changing a process is that it has efficiency or effectiveness problems.
True
The number of alternatives to be considered in decisions today is increasing. T or F?
True
The ratio between organizational inputs and outputs is an indication of the organization's productivity. T or F?
True
The swim-lane layout for modeling business processes is used to draw attention to interactions among components of the diagram.
True
True or False: A characteristic of Web 2.0 is that the value of a site increases with users and use.
True
True or False: A folksonomy is content structure that has emerged from the processing of many user tags.
True
True or False: A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
True
True or False: A service provider creates a service description and publishes it using a standardized language called HyperText Markup Language (HTML).
True
True or False: A viral hook is something that induces people to share a message with others.
True
True or False: A workgroup information system is an organizational structure where a separate department is established by the organization to support and manage its information.
True
True or False: A workgroup processes exists to enable workgroups to fulfill the charter, purpose, and goals of a particular group or department.
True
True or False: According to Hank Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
True
True or False: Adding process resources increases process effectiveness, but it adds cost.
True
True or False: An ERP solution includes a database design as well as initial configuration data.
True
True or False: An active lurker is someone who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
True
True or False: An information silo is a condition that exists when data are isolated in separated information systems.
True
True or False: An organization has a strong relationship with you if you buy its products and write positive reviews about it.
True
True or False: Before initiating a social networking presence, organizations must develop procedures for creating content managing user responses, removing obsolete or objectionable content, and extracting value from content.
True
True or False: Both community users and employees of SM sponsors process SM sites using communications devices.
True
True or False: Business process re-engineering is the the activity of altering and designing business processes to take advantage of new information systems.
True
True or False: Choosing an ERP solution that has applications that function close to the organization's requirements is critical to its successful implementation.
True
True or False: Content data is data and responses to data that are contributed by users and SM sponsors.
True
True or False: Defenders of belief are communities that share a common belief and form their hive around that belief.
True
True or False: ERP vendors sometimes train an organization's employees to become in-house trainers in training sessions called train the trainer.
True
True or False: Emergence in the context of management means loss of control of employees.
True
True or False: Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
True
True or False: Enterprise processes span an organization and support activities in multiple departments.
True
True or False: Facebook, Twitter, LinkedIn, and Google are all SM application providers.
True
True or False: Gap identification is a major task when implementing enterprise systems.
True
True or False: Google publishes Google Maps and provides tools for users to make custom modifications to those maps, which is an example of mashup.
True
True or False: Information systems improve process quality by augmenting the actions of the human who performs that activity.
True
True or False: Inter-enterprise information systems support one or more inter-enterprise processes.
True
True or False: One of the major sources of UGC problems is inappropriate content.
True
True or False: Placing an order is an example of a structured process.
True
True or False: Process efficiency is a measure of the ratio of process outputs to inputs.
True
True or False: Relationship management processes increase the value of existing customers by selling them more product.
True
True or False: SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
True
True or False: SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.
True
True or False: Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours.
True
True or False: Social CRM is a dynamic, SM-based CRM process.
True
True or False: Social CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most effect on the organization.
True
True or False: Social media is the use of information technology to support the sharing of content among networks of users.
True
True or False: Social networking procedures are more informal for SM sponsors than they are for social networking users.
True
True or False: Someone who sees and interesting feature in an SM presence and sends a link to that feature to friends can be called an active lurker.
True
True or False: Standards such as http, https, CSS3, JavaScript, and others enable programs to receive data form, and display data to, a variety of mobile and desktop devices.
True
True or False: Structured processes are standardized processes that involve day-to-day operations.
True
True or False: The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.
True
True or False: The inherent processes that are defined in an ERP solution are known as process blueprints.
True
True or False: The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
True
True or False: The primary purpose of an ERP system is integration.
True
True or False: The primary risk of peer-to-peer support is loss of control.
True
True or False: The procedures for using workgroup information systems need to be understood only by the It department of an organization.
True
True or False: Transitioning to a new enterprise system requires careful planning and substantial training.
True
True or False: User-generated content (UGC) is the essence of SM relationships.
True
True or False: Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.
True
True or False: Using social networking sites to generate a buzz about a company's new product line is an example of a dynamic process.
True
True or False: When a business participates in a social network or opens its site to UGC, it protects itself fro misguided people who post junk unrelated to the site's purpose.
True
True or False: When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your social capital.
True
True or False: Workgroup information systems typically support 10 to 100 users.
True
True or False: Workgroups can develop information systems for their own needs, but over time, they would result in information silos.
True
True or False; Lead generation and lead tracking are processes concerning the sales and marketing department.
True
User-generated content (UGC) is the essence of SM relationships
True
Web 2.0 used free content and free software as the principal means to attract viewers.
True
When considering a merger, it is important that the company consider integration of information systems in the merged entities
True
Workgroup information systems typically support 10 to 100 users
True
in marketing transactions, the fact that customers who buy product X also buy product Y creates a cross-selling opportunity.
True
What must be present for a find unmatched query to work?
Two tables share a common field.
What must be present for a find unmatched query to work? Two tables have no relationship. All fields in the tables should be the same. There is nothing necessary for the query to work properly. Two tables share a common field.
Two tables share a common field.
Which of the following is true of paired programming?
Two team members share the same computer to write a computer program together
A(n) ________ is the location of a Web site or Web page on the Internet.
URL
________ is the essence of SM relationships.0/1 pts
USG
Which of the following controls contains to decorative elements, such as the title of the report?
Unbound
Which of the following controls contains to decorative elements, such as the title of the report? Unbound Calculated Bound Rectangle and line
Unbound
Which of the following generally refers to decorative elements such as the title of a report?
Unbound control
Once records with missing data are found, what type of query can you use to add the needed information?
Update
Once records with missing data are found, what type of query can you use to add the needed information? Delete Update Find duplicates Make table
Update
________, which refers to the matter in an SM site that is contributed by nonemployee site visitors, is the essence of SM relationships.
User-generated content
What is the reason for making a form read-only?
Users can lookup information but not modify the data
What data validation method is designed to restrict the data values entered into a field?
Validation rule
Which data validation method provides an error message when a validation rule has been broken?
Validation text
BI Server
Web aplication that is purpose built for the publishing of business intelligence (Example: Microsoft SQL Server report Manager)
When would a calculated field need to be added to a form or report?
When a formula is needed in the form or report
When would a calculated field need to be added to a form or report? When you want to add some explanatory text to the form or report When a formula is needed in the form or report When using an unbound control in the form or report When using a bound control in the form or report
When a formula is needed in the form or report
When are subforms created?
When the main form displays records from a related table
What does the type of data displayed in a crosstab query depend on?
Which aggregate function used when the query was created
When you double-click on a document with a RTF file extension, which of the following programs does Windows open by default?
Word
What type of files are compressed by Access when you attach them?
Word and Excel files
What type of files are compressed by Access when you attach them? JPEG and other photo formats Word and Excel files Excel and JPEG files Word and JPEG files
Word and Excel files
What type of files are compressed by Access when you attach them? Word and JPEG files Excel and JPEG files JPEG and other photo formats Word and Excel files
Word and Excel files
Project teams create a ________, which is a hierarchy of the tasks required to complete a project
Work breakdown structure
The ________ file format is considered an alternative to PDF.
XPS
The ________ file format is considered an alternative to PDF. DOCX XPS XLS RTF
XPS
The ________ file format is considered an alternative to PDF. XPS XLS RTF DOCX
XPS
What is the main reason for exporting data to Excel instead of Word?
You are not able to analyze the data as you can in Excel.
How is a crosstab query different from other queries?
You can only reference one object (table or query) as the data source
How is a crosstab query different from other queries? You can only reference one object (table or query) as the data source. You can select a data source with several grouping fields. You can use records from several objects in a crosstab query. You can preview the data before finalizing the query.
You can only reference one object (table or query) as the data source.
What is one reason to import an Excel worksheet into Access instead of linking it?
You have more control over the imported data
Which application allows you to view XPS documents if the XPS viewer has not been installed?
Your browser
Which application allows you to view XPS documents if the XPS viewer has not been installed? Adobe Acrobat Reader Microsoft Word Microsoft Excel Your browser
Your browser
Which application allows you to view XPS documents if the XPS viewer has not been installed? Microsoft Excel Your browser Microsoft Word Adobe Acrobat Reader
Your browser
reporting application
a BI tool that inputs data from one or more sources and applies reporting operations to that data to produce Business Intelligence
An ERP solution does not include _____.
a company's operational data
Which of the following usually happens in a malicious denial-of-service attack? a phisher pretends to be a legitimate company and requests confidential data an intruder uses another site's IP address to masquerade as that other site a hacker monitors and intercepts wireless traffic at will a hacker floods a Web server with millions of bogus service requests
a hacker floods a Web server with millions of bogus service requests
Enterprise application integration is _____.
a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
Credit card companies would most likely use which of the following to check for fraudulent credit card use? a) Data mining b) Expert systems c) Neural networks d) Multidimensional data analysis e) Structured query language
a) data mining
Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. She has developed a few alternatives. Elena built a model in Excel so she could test her assumptions. This is an example of a) decision support system b) digital dashboard c) functional area information system d) group decision support system e) expert system
a) decision support system
82) Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. Which of the following statements is true? a) If Shawn changes one of his assumptions, Excel will automatically recalculate the budget numbers. b) Shawn would use sensitivity analysis to check the impact of changing his price. c) Shawn would use roll-up to review his summary numbers. d) Shawn would use what-if analysis to check the impact of changing his price and the commission he pays his sales people. e) Shawn would use goal-seeking analysis to examine the impact of changing his forecast of units sold. Answer: a
a) if shawn changes one of his assumptions, excel will automatically recalculate the budget numbers
Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases. a) implementation b) choice c) design d) intelligence e) consideration
a) implementation
Geocoding involves: a) integrating maps with spatially oriented databases and other databases b) encrypting spatial information c) accessing geographical information d) integrating organizational transactions with spatially oriented databases e) programming spatially oriented databases
a) integrating maps with spatially oriented databases and other databases
Being a figurehead and leader is part of the _____ managerial role. a) interpersonal b) processor c) informational d) decisional e) confrontational
a) interpersonal
_____ is the efficient and effective execution of specific tasks. a) Operational control b) Management control c) Strategic planning d) Expertise e) Wisdom
a) operational control
Calculating gross pay for hourly workers is an example of ________ decision making. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural
a) structured
Rank-and-file employees tend to make more _________ decisions. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural
a) structured
The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a) structured b) unstructured c) undocumented d) semistructured e) procedural
a) structured
________ decisions are more common at lower organizational levels. a) Structured b) Unstructured c) Undocumented d) Semistructured e) Procedural
a) structured
Which of the following is not a reason why managers need IT support? a) The number of alternatives is decreasing. b) Decisions must typically be made under time pressure. c) Decisions are becoming more complex. d) There is a growing need to access remote information sources. e) Decision makers are often based in different locations.
a) the number of alternatives is decreasing
Which of the following is not a characteristic of decision support systems? a) They support only lower- and middle-level managers. b) They are easy to use and construct. c) They can adapt to changing conditions. d) They usually utilize quantitative models. e) They support all phases of the decision-making process.
a) they support only lower and middle level managers
Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. One of her recent projects was to build a model of revenue that would allow her boss to test a variety of price points against forecasts of units sold for each product in a product line. Sally will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation.
a) what-if
Push publishing delivers BI____
according to a schedule or as a result of an event or particular data condition
Which of the following workgroup processes is related to customer service? A. account tracking B. accounts payable C. assessment D. sales forecasting
account tracking
A person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium is called a(n) ________. key user active lurker nonkey user SM sponsor
active lurker
In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.
activities
most SM apps earn revune thru___
ad models
Web 2.0 refers to Web-delivered services and content paid for by ________.
advertisers
Web 2.0 relies on ________ for revenue. advertising controlled, fixed interfaces venture capital software license fees
advertising
Rapid application development, the unified process, extreme programming, and scrum have led to ________.
agile development
In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that ________. an activity is considered to be a subprocess of a process a question can be answered with no a question can be answered with yes it is the end of the process
an activity is considered to be a subprocess of a process
Which of the following is most likely to be a result of hacking?
an unauthorized transaction from a user's credit card
unsupervised data mining
analysts do not create a model or a hypothesis before running the analysis
Access is not able to ________ an attachment.
analyze the data within
A(n) ________ query can be used for adding records to an existing table.
append
A(n) ________ query is used to copy new employee records from one table and add them to an existing table. make table select append dispose
append
A(n) ________ appears next to a linked table name in the Navigation Pane.
arrow
A(n) ________ appears next to a linked table name in the Navigation Pane. arrow ampersand star pound sign
arrow
Web 2.0 encourages companies to provide software ________.
as a free service
Which of the following can be represented using the Business Process Modeling Notation? PERT charts showing the critical path Gantt charts as-is models scatter plots
as-is models
Once the project's goals and scope have been defined, the next immediate step in the system definition phase of the SDLC is to ________. form a project team assess feasibility plan the project determine system requirements
assess feasibility
Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle.
assessment
Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle. process modeling component creation assessment implementation
assessment
Which of the following workgroup processes is related to human resources? assessment lead tracking order management customer support
assessment
Which of the following workgroup processes is related to human resources? A. assessment B. customer support C. order management D. lead tracking
assessment
Expert Systems
attempt to capture human expertise and put it in to a system that can be used by non experts, uses rule based "if/then" statements but unlike desision trees, expert systems can have hundreds of thousands of rules (expensive and hard to maintain)
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.1/1 pts
authoring
In McAfee's SLATES Enterprise 2.0 model, "A" stands for ________. alerts auditing announcements authoring
authoring
_____ is the acquisition and efficient use of resources in accomplishing organizational goals. a) Operational control b) Management control c) Strategic planning d) Expertise e) Wisdom
b) Management Control
Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. She has developed a few alternatives. Elena is in the ______________ phase of the decision-making process a) implementation b) choice. c) design d) intelligence e) consideration
b) choice
In the _____ phase of the decision-making process, managers test potential solutions "on paper." a) implementation b) choice c) design d) intelligence e) consideration
b) choice
You've started an internship at the major hospital in your city. Your boss gave you ten minutes of training on the data warehouse that you have access to. She then asked you to see if there is any correlation between treatments and day of the week. To do this, you will be doing: a) Transaction processing. b) Data mining c) What-if analysis. d) Goal-seeking e) Exception reporting
b) data mining
Refer to the Closing Case #1 - Procter & Gamble Uses Analytics: When executives are changing the screen in the Business Sphere room to change the image from a view of the world map to a graph of toothpate prices in India, they are a) doing what-if analysis. b) drilling down. c) looking at key performance indicators. d) doing sensitivity analysis. e) looking at an expert system.
b) drilling down
A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision? a) structured b) semistructured c) unstructured d) informational e) wisdom
b) semi-structured
Which type of decision requires a combination of standard solution procedures and individual judgment? a) structured b) semistructured c) unstructured d) informational e) wisdom
b) semi-structured
Computer support is least for which of the following problems? a) semistructured and strategic planning b) unstructured and strategic planning c) semistructured and management control d) unstructured and operational control e) structured and strategic planning
b) unstructured and strategic planning
The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS. benchmark test standard baseline
baseline
The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS. standard test baseline benchmark
baseline
A(n) ________ is a control that is connected to a field in a table or query.
bound control
A(n) ________ is a control that is connected to a field in a table or query. combo box control unbound control bound control calculated control
bound control
A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies. business supervisor business analyst business application programmer business administrator
business analyst
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function
business process
_____ is the activity of altering and designing business processes to take advantage of new information systems.
business process re-engineering
Searching for valuable business information in a database, data warehouse, or data mart is referred to as _____. a) structured queries b) database queries c) data mining d) query by example e) expert system queries
c) data mining
Amanda is working for the CEO of a small company. He asks her to develop a dashboard. Amanda starts thinking about the questions she needs to ask. Which of the following questions would not on Amanda's list? a) How many levels do you wish to drill down? b) What are your key performance indicators? c) Do you need real-time data? d) Do you want graphs and charts or text? e) Should it run on your iPhone?
c) do you need real-time data?
In the _____ phase of the decision-making process, managers construct a model that simplifies the problem. a) implementation b) choice c) design d) intelligence e) consideration
c) intelligence
A company's annual employee evaluation best fits which type of decision? a) unstructured b) structured c) semistructured d) confrontational e) wisdom
c) semi-structured
Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. He would like to check the impact of changing his price and the commission he pays his sales people. Shawn will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation.
c) sensitivity analysis
Which of the following is not a characteristic of unstructured decisions? a) They are complex. b) They typically are fuzzy and unclear. c) Standard solutions exist. d) Human intuition is involved. e) The first three phases of the decision-making process occur in no particular sequence.
c) standard solutions exist
Which capability of digital dashboards enables users to obtain the latest data available on key performance indicators or some other metric, ideally in real time? a) Drill-down b) Key performance indicators c) Status access d) Trend analysis e) Exception reporting
c) status access
Computer support is greatest for which of the following problems? a) semistructured and strategic planning b) unstructured and operational control c) structured and operational control d) semistructured and management control e) structured and management control
c) structured and operational control
When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a) undocumented b) structured c) unstructured d) semistructured e) documented
c) unstructured
A(n) ________ contains an expression that generates a calculated result.
calculated control
Which of the following is a basic operation used by reporting applications to produce business intelligence?
calculating
One of the reasons outsourcing is undertaken is to ________. diversify the business portfolio increase costs for the outsourcing vendor enhance management's focus on nonessential functions cap an organization's financial exposure
cap an organization's financial exposure
which of following would be most disruptive to an org while implementing an IS?
changing reporting relationships
Dimension
characteristic of a measure
The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. chief operating officer chief technology officer chief executive officer chief information officer
chief information officer
The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives. chief technology officer chief executive officer chief information officer chief operating officer
chief information officer
The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies. system analyst chief technology officer chief financial officer technical writer
chief technology officer
With ________, statistical techniques can identify groups of entities that have similar characteristics.
cluster analysis
The storage of ________ differentiates SMIS from Web site applications
connection data
The storage of ________ differentiates SMIS from Web site applications. secondary data connection data continuous data content data
connection data
________ differentiates SMIS from Web site applications.0/1 pts
connection data
________ is data and responses to data that are contributed by users and SM sponsors.1/1 pts
content data
Information systems improve process quality by _____.
controlling process flow
Information systems improve process quality by ________.
controlling process flow
An append query is a query that:
copies records from one table to another.
An append query is a query that: removes records from a table based on criteria. changes the data values in one or more fields that meet specific criteria. copies records from one table to another. automatically creates a new table from data that already exists.
copies records from one table to another.
Which of the following are the four dimensions of feasibility?
cost, schedule, technical, and organizational feasibility
According to Brooks' Law, adding more people to a late project will ________. guarantee efficiencies reduce the need for coordination create diseconomies of scale speed up the project
create diseconomies of scale
According to Brooks' Law, adding more people to a late project will ________.
create diseconomies of scale extent the time needed to complete
Which of the following systems procedures is specifically the responsibility of operations personnel? using systems to perform job tasks knowing whom to contact when a security breach occurs writing software program codes creating back up of system databases
creating back up of system databases
A ________ is a sequence of activities that determine the earliest date by which a project can be completed.
critical path
A ________ is a sequence of activities that determine the earliest date by which a project can be completed. critical path Pareto chart Venn diagram scatter plot
critical path
In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."
cross selling opportunity
________ is the dynamic social media process of employing users to participate in product design or product redesign.1/1 pts
crowdsourcing
Due to a phenomenon called the ___, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor
curse of dimensionality
Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.
curse of dimensionality
_____ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.
customer relationship management (CRM)
Which of the following is not a characteristic of a structured decision? a) It is routine. b) It is repetitive. c) Human intuition is not involved. d) The first three phases of the decision-making process need not occur in any particular sequence e) Standard solutionsexist.
d) The first three phases of the decision-making process need not occur in any particular sequence
Refer to the Closing Case #2 - Predictive Policing: The software that Santa Cruz Police Department is using is an example of a) doing what-if analysis. b) doing sensitivity analysis c) looking at key performance indicators. d) data mining, e) an expert system.
d) data mining
Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role. a) interpersonal b) processor c) informational d) decisional e) confrontational
d) decisional
Shawn is doing some budgeting for his new start-up business. He has developed a budget in Excel using formulas, as he was taught to do in college. He is fairly confident about his estimated expenses. He is also sure that his current price is the best price he can get for his product. He would like to know how many units he needs to sell at that price (and his cost per product from his supplier) to cover his expenses. Shawn will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation. Answer: d
d) goal seeking
At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis? a) What-if b) Qualitative c) Sensitivity d) Goal-seeking e) Simulation
d) goal-seeking
Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. One of her recent projects was to use the insights from the data mining to determine the sales level that will cover expected expenses for the upcoming year for one product line. Sally will be doing: a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) A simulation.
d) goal-seeking
_____ attempts to find the value of the inputs necessary to achieve a desired level of output. a) What-if analysis b) Qualitative analysis c) Sensitivity analysis d) Goal-seeking analysis e) Simulation
d) goal-seeking
In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. a) implementation b) choice c) design d) intelligence e) consideration
d) intelligence
Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment. a) less, decreased b) more, decreased c) less, increased d) more, increased e) neither more nor less, decreased
d) more, increased
You've started an internship at the major hospital in your city. Your boss gave you ten minutes of training on the data warehouse that you have access to. The last thing she told you was to do some analysis on the Visit cube. Which of the following statements is false? a) One dimension of the cube is (probably) day. b) One dimension of the cube is (probably) treatment. c) One dimension of the cube is (probably) doctor. d) One dimension of the cube is (probably) month. e) One dimension of the cube is (probably) patient.
d) one dimension of the cube is probably month
The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies. data communication data warehousing data administration data mining
data administration
When an organization has inconsistent duplicated data, it is said to have a problem of _____.
data integrity
When an organization has inconsistent duplicated data, it is said to have a problem of ________. data integrity error of omission data segregation information silo
data integrity
Measure
data item of interest
Supervised data mining
data miners develop a model prior to the analysis and estimate parameters for the model
________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.
data mining
A(n) _____ provides rapid access to timely information and direct access to management reports. a) decision support system b) expert system c) neural network d) digital dashboard e) data warehouse
data warehouse
ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category? A. obtaining top-level management support B. steps for using applications to accomplish the activities in processes C. preparing the organization for change D. dealing with employees resistance to the new system
dealing with employees resistance to the new system
Refer to IT's About Business 5.2 - Using Analytics to Save the Grevy's Zebra: The work done to understand what was happening to the Grevy's zebra and the communities they exist in was done using a) decision support system b) expert system c) digital dashboard d) functional area information system e) group decision support system
decision support system
________ is a hierarchical arrangement of criteria that predict a classification or a value.
decision tree
When most people in a database reside in New York, you should make NY the ________ value for the State field. default input mask data validation rule lookup field
default
When most people in a database reside in New York, you should make NY the ________ value for the State field. input mask default lookup field data validation rule
default
A(n) ________ helps to reduce editing time when there is a common value in a field.
default value
A(n) ________ helps to reduce editing time when there is a common value in a field. default value data macro validation rule input mask
default value
A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario?
defenders of belief
A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario? defenders of belief
defenders of belief
The first phase of the systems development life cycle (SDLC) is ________. defining the system determining the requirements maintaining the system implementing the system
defining the system
A(n) ________ query removes records from a table based on criteria that you specify.
delete
Push Publishing
delivers BI without reguest from user
Amanda is working for the CEO of a small company. He is trying to make a strategic decision about a new product. He has asked Amanda to build a model the represents and simplifies the problem. Amanada's boss is in the ______________ phase of the decision-making process a) implementation b) choice. c) design d) intelligence e) consideration
design
The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.
determine the goals and scope
When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is to ________. communicate the need for change to the employees establish clear and absolute contractual guidelines develop committees and steering groups reinforce employees' sense of self-efficacy
develop committees and steering groups
When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is to ________. establish clear and absolute contractual guidelines develop committees and steering groups communicate the need for change to the employees reinforce employees' sense of self-efficacy
develop committees and steering groups
In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. operations outsourcing relations development technology
development
In a Business Process Modeling Notation (BPMN) diagram, ________ represent decisions and usually contain a question that is answered with yes or no. circles rectangles squares diamonds
diamonds
In a Business Process Modeling Notation (BPMN) diagram, ________ represent decisions and usually contain a question that is answered with yes or no. rectangles circles squares diamonds
diamonds
The Management Cockpit best exemplifies which type of system? a) decision support system b) expert system c) digital dashboard d) functional area information system e) group decision support system
digital dashboard
Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down? a) decision support systems b) digital dashboards c) functional area information systems d) group decision support systems e) expert systems
digital dashboards
Problematic operational data are termed ________. rough data granular data metadata dirty data
dirty data
Problems with operational data (6)
dirty data, missing values, inconsistent data, data not integrated, wrong granularity, too much data
The situation where addition of resources creates inefficiencies is known as ________. marginal utility break-even diseconomies of scale marginal returns
diseconomies of scale
Tony requests for a credit approval of $25,000 and instead gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? disjointed processes isolated decisions data duplication limited information
disjointed processes
Tony requests for a credit approval of $25,000 and instead gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? limited information data duplication isolated decisions disjointed processes
disjointed processes
Tony requests for a credit approval of $25,000 and instead gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? limited information disjointed processes isolated decisions data duplication
disjointed processes
kate has to organize asynch meeting which tool should she use?
disscusion forum
In business process management (BPM), an as-is model ________.
documents the existing business process
In business process management (BPM), an as-is model ________. represents the desired state of a business process represents the ideal state of a business process contrasts the former and current states of a business process documents the existing business process
documents the existing business process
In business process management (BPM), an as-is model ________. represents the ideal state of a business process contrasts the former and current states of a business process documents the existing business process represents the desired state of a business process
documents the existing business process
To open the Attachments dialog box, you ________. point to the paperclip icon and press F2 double-click the paperclip icon right-click the paperclip icon click the paperclip icon
double-click the paperclip icon
To open the Attachments dialog box, you ________. right-click the paperclip icon click the paperclip icon point to the paperclip icon and press F2 double-click the paperclip icon
double-click the paperclip icon
The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format.
dynamic
The remarkable characteristic of OLAP reports is that they are ________, as they are online and the viewer of the report can change their format. extensible dynamic specific informal
dynamic
_____ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial and activities.
dynamic processes
A company wants to use data from past promotional mailings to identify people who would likely respond favorably to future mailings. This company would most likely use: a) Structured Query Language b) multidimensional data analysis c) neural networks d) expert systems e) data mining
e) data mining
Sally is working for her uncle for the summer in the marketing department of Proctor & Gamble. She tells you she does data mining all day long. Which of the following statements is false? a) Data mining can be used to prove assumptions. b) Data mining is used to identify unknown patterns. c) Data mining can explain why things happened. d) Data mining can predict what will happen. e) Data mining can be used to identify customers.
e) data mining
Refer to IT's About Business 5.4 - Catalina Marketing: Catalina Marketing systems use which two technologies? a) data warehouse and DSS b) DSS and data mining c) GIS and GPS d) data mining and clustering e) data warehouse and data mining
e) data warehouse and data mining
_____ provides users with a view of what is happening, whereas _____ addresses why it is happening. a) Multidimensional data analysis, Structured Query Language b) Data mining, multidimensional data analysis c) Data mining, expert system d) Multidimensional data analysis, neural networks e) Multidimensional data analysis, data mining
e) multi-dimensional data analysis, data mining
Process _____ is a measure of how well a process achieves organizational strategy.
effectiveness
The two dimensions of process quality are _____.
efficiency and effectiveness
Elena is trying to decide whether she should expand her ice cream shop to a bigger space. She decides to be very methodical about it and follow the phases of the decision-making process she learned in college. Which of the following statements is true? a) During the intelligence phrase, Elena will build a model using assumptions about the business. b) During the design phrase, Elena will define the opportunity. c) During the choice phase, Elena will lay out her options. d) During the implementation phase, Elena will implement two of her solutions. e) Elena will use test data to validate her model.
elena will use test data to validate her model
The major benefit of enterprise application integration is that it _____.
enables organizations to use existing applications.
Duplicate values in a table can prevent you from:
enforcing referential integrity.
_____ processes span an organization and support activities in multiple departments.
enterprise
________ is the application of social media to facilitate the cooperative work of people inside organizations.1/1 pts
enterprise 2.0
_____ is a suite of applications called modules, a database, an a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
enterprise resource planning
Calculated controls begin with a(n):
equal sign (=).
Calculated controls begin with a(n): bracket ([ ]). equal sign (=). pound sign (#). plus sign (+).
equal sign (=).
Which of the following is a critical security function that the senior management should address in an organization?
establishing the security policy
The primary distinguishing characteristic of geographical information systems is: a) every record or digital object has a unique identifier b) every record or digital object is visible to the user c) every record or digital object must be accessed by programmers d) every record or digital object has an identified geographical location e) every record or digital object is encrypted
every record or digital object has an identified geographical location
In expert systems, the programs that process a set of rules are called____
expert system shells
In the context of KM systems, ________ attempted to directly capture employee expertise. expert analyses expert networks expert systems expert decisions
expert systems
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
extension
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.0/1 pts
extensions
Data Warehouse
facility for managing an organizations BI data (larger than data mart)
A delete query automatically creates a new table from data that already exists in a database.
false
A find duplicates query compares records in two related tables and displays the values found in one table but not the other.
false
A find unmatched query compares records in two related tables and displays the records found in both tables.
false
A hyperlink field enables you to attach multiple files of different types.
false
A linked table is marked with an asterisk in the Navigation Pane.
false
A lookup list accepts multiple values in a single field.
false
A page footer appears at the bottom of the last page of a form or report.
false
A parameter query prompt is enclosed in parentheses.
false
A required field can be left blank when entering a record.
false
Access does not have a way to identify duplicate values.
false
After you export an Access table to an RTF file, the file cannot be edited in Word.
false
An append query changes the data values in one or more fields for all records that meet specific criteria.
false
An append query deletes records from one or more tables and adds them to an existing table.
false
An append query is used to update or change data automatically based on criteria that you specify.
false
An append query selects records from one or more tables and uses then to create a new table.
false
An imported Excel spreadsheet displays in the Navigation Pane as a linked table.
false
An input mask can be used when there is a common value in many records.
false
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services. 1/1 pts
false
Duplicate values should always be deleted from a database table.
false
Exporting data from Access to Excel is generally very complicated because the format of Access is different than Excel.
false
Find unmatched queries provide a subset of the data that answers most questions that users ask about the data in their databases.
false
If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.0/1 pts
false
If the destination table exists and you run the make table query, Access automatically deletes the source table.
false
In the criteria of a query, Access encloses date fields with & symbols.
false
It is impossible to cap financial risk by outsourcing
false
It is not recommended to preview the datasheet prior to running a make table query.
false
Linking and importing produce the same result in Access.
false
Once a hyperlink has been added to a table, it cannot be edited.
false
Once an attachment is added, the only way to delete the attachment is to delete the record.
false
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.1/1 pts
false
Outsourcing neither saves time for direct management nor for indirect management.
false
PDF is a file format created by Microsoft.
false
Social networking procedures are more informal for SM sponsors than they are for social networking users.0/1 pts
false
Subforms have to be created using the Form Wizard.
false
Tab order cannot be changed in a form once it has been created.
false
The Tab order of a form cannot be changed.
false
The default Required setting for all fields except the primary key field is Yes.
false
The file extension for a Rich Text Format file is slx.
false
The terms "information systems" and "information technology" can be used interchangeably.
false
The user provides the criterion at run time when using a lookup list.
false
There is no way to verify that the correct records will be updated when using an update query.
false
Unbound controls are controls that are tied to specific fields.
false
Validation text restricts the data value that can be entered into a field.
false
When a business participates in a social network or opens its site to UGC, it protects itself from misguided people who post junk unrelated to the site's purpose.0/1 pts
false
When running an append query, the data types of the source fields do not have to match the data types of the destination fields.
false
When using an input mask, data is still not necessarily consistent.
false
When using an input mask, parentheses and hyphens are automatically stored with the data.
false
When you export a table from Access, the table must be closed for the export to complete.
false
When you violate a validation rule, Access allows you to continue entering the record.
false
You can use Undo when running an update or delete query.
false
Which of the following workgroup processes is related to operations? A. account tracking B. treasury management C. finished-goods inventory management D. Sales forecasting
finished-goods inventory management
Which of the following workgroup processes is related to operations? A. sales forecasting B. finished-goods inventory management C. treasury management D. account tracking
finished-goods inventory management
Which of the following is classified as a technical safeguard? cookies passwords firewalls key escrow
firewalls
A ________ is content structure that has emerged from the processing of many user tags in social media. folksonomy viral hook mashup taxonomy
folksonomy
A ________ is content structure that has emerged from the processing of many user tags.1/1 pts
folksonomy
If a defined project is determined to be feasible in the SDLC, the next immediate step is to ________. assess process results maintain the system create and test components form the project team
form the project team
If a defined project is determined to be feasible in the SDLC, the next immediate step is to ________. form the project team maintain the system create and test components assess process results
form the project team
Which of the following is one of the principal means that companies implementing Web 2.0 are most likely to use to attract viewers? controlled releases fixed product value free content fixed interface
free content
Since the features and functions of complex products like CRM or ERP are not easy to identify, ________ is a major task when implementing enterprise systems. gap identification data duplication encapsulation virtualization
gap identification
_____ is a major task when implementing enterprise systems.
gap identification
Which of the following usually happens in a malicious denial-of-service attack?
hacker floods a Web server with millions of bogus service requests
Which of the following is considered a computer crime? poorly written programs resulting in data losses deletion of records by an employee who is unaware of operating procedures loss of data as a result of flooding hacking of information systems
hacking of information systems
Responding to problematic content on social networking sites is best reserved for when the problematic content ________. has caused the organization to do something positive as a result is obscene and inappropriate does not affect the site where the content has been posted represents reasonable criticism of the organization's products or services
has caused the organization to do something positive as a result
Responding to problematic content on social networking sites is best reserved for when the problematic content ________.
has caused the organizations to do something positive as a result
Descision Tree
hierarcheal arrangement of criteria that predict a classification or a value, creates groups that are as "pure" as possible using "if/then" statements to create rules
Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol? ftp https www .com
https
A student invests money and time in a business administration course. In this example, the student invests in ________. human capital social capital process capital structural capital
human capital
According to Gossieaux and Moran, a(n) ________ is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
hyper-social organization
A ________ enables you to quickly link to any file on your computer or to any Web page on the Internet.
hyperlink
A characteristic of Web 2.0 is that the value of a Web site increases as the number of users ________. fluctuates over time increases over time remains constant over time decreases over time
increases over time
A characteristic of Web 2.0 is that the value of a Web site increases as the number of users ________. remains constant over time increases over time fluctuates over time decreases over time
increases over time
Albert creates rational database to store emp performance stats. He stores each employees data in independent rows and creates columns called "emp #" to give unique # to each employee. This column is called ____
indicator
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide _____.
industry-specific solutions
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
industry-specific solutions
According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________.
influence
Which of the following conditions exist when data are isolated in separated information systems? A. information overload B. data segregation C. information silo D. encapsulation
information silos
_____ are pre-designed procedures for using software products.
inherent processes
A(n) ________ forces users to conform to a specific data entry format for a given field.
input mask
When data is entered, a(n) ________ is used to have a consistent format. field property data macro input mask data validation rule
input mask
The responsibilities of a computer technician include ________.
installing software and repairing networks
The responsibilities of a computer technician include ________. advising the CIO on emerging technologies managing and protecting databases installing software and repairing networks writing program documentation
installing software and repairing networks
The responsibilities of a computer technician include ________. managing and protecting databases advising the CIO on emerging technologies writing program documentation installing software and repairing networks
installing software and repairing networks
The primary purpose of an ERP system is _____.
integration
The primary purpose of an ERP system is ________. integration customer acquisition duplication customization
integration
The information system that a restaurant uses to order supplies and ingredients form its suppliers is an example of a(n) _____.
inter-enterprise information system
Which of the following is a function of the technology office in an organization's IS department?
investigating new information systems
Amanda is working for the CEO of a small company. He asks her to develop a dashboard. Amanda starts thinking about the questions she needs to ask. She asks her boss for his critical success factors and how he will measure them. The measures of CSF's are called a) clustering b) classification. c) real-time data d) key performance indicators e) status access
key performance indicators
A(n) ________ is text not tied to a specific field.
label
Which of the following workgroup processes is related to sales and marketing? A. order management B. customer support C. lead tracking D. accounts receivable
lead tracking
Users should not bother IS personnel for trivial issues, instead they should fulfill their responsibilities by ________.
learning basic computer skills
If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________. 1/1 pts
leave it
When you buy an Operating System for your personal comp, you are buying a software____
license
In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________.
lift
When you ________ an external table, you connect to the table without actually importing the table's data. associate embed join link
link
When you ________ an external table, you connect to the table without actually importing the table's data. associate join embed link
link
When you ________ an external table, you connect to the table without actually importing the table's data. join link associate embed
link
which is SM app provider?
In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.0/1 pts
links
A(n) ________ allows the user to select a field value from a list of options. field property data macro input mask lookup field
lookup field
The data validation method that causes fields to be limited to predefined list of values is a:
lookup list.
An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated? de facto sole source loss of control diseconomies of scale superfluous CIO
loss of control
The primary risk of peer-to-peer support in the context of social media and customer service is ________. loss of control loss of credibility increase in expenses lack of privacy
loss of control
In 2024, emergence in the context of management would most likely mean a(n) ________.
loss of control over employees
In 2024, emergence in the context of management would most likely mean a(n) ________. increase in the control over culturally-diverse customers loss of control over employees loss of loyal customers increase in the use of social media for managing employees
loss of control over employees
Which phase of the customer life cycle categorizes customers according to value and attempt to win back high-value customers?
loss/churn
Fixing a system so that it works correctly, or adapting it to changes in requirements, occurs during the ________ phase of the SDLC. component design maintenance implementation requirements analysis
maintenance
Before linking to a spreadsheet, you must first:
make sure the data is organized.
A(n) ________ query can be used to archive older records that need to be stored outside of the current table.
make table
A(n) ________ query can be used to archive older records that need to be stored outside of the current table. make table append update delete
make table
You use a ________ query to select records of former employees from a table and use them to create a new table. merge tables combine tables make table create table
make table
Which of the following shows the products that customers tend to buy together? neural networks regression analysis market-basket analysis cluster analysis
market-basket analysis
Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects?
marketing
Which phase of the customer life cycle focuses on sending messages to the target market to attract customer prospects? loss/churn customer acquisition relationship management marketing
marketing
A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.
mart
A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. cube model mart mine
mart
Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience. fixed interfaces mashups viral hooks web beacons
mashups
Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience. mashups fixed interfaces viral hooks web beacons
mashups
In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process.
messages and data
In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process. messages and data tasks and activities resources control
messages and data
BI servers use ________ to determine what results to send to which users and on which schedule.
metadata
Which of the following are the steps in the business process management (BPM) cycle? model processes; implement processes; assess results; create components implement processes; create components; model processes; assess results model processes; create components; implement processes; assess results create components; model processes; implement processes; assess results
model processes; create components; implement processes; assess results
The more technical an organization, the ________ the social policies. less important more stringent more lenient less open
more lenient
A(n) ________ accepts two or more options in a lookup field.
multiple-value field
four functions of a Data warehouse
obtain, clense, organize, catalog
OLAP stands for ________. online analytical processing object-based lead analysis procedure object-oriented analytical protocol organizational lead analysis process
online analytical processing
A small and midsized org w/limited budget may consider ___ vs microsoft
open office
According to Gossieaux and Moran, which of the following activities are seekers of the truth most likely to facilitate? marketing sales operations human resources
operations
A ________ examines each part of a message and determines whether to let that part pass.
packet-filtering firewall
In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational
parallel
In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. pilot parallel phased plunge
parallel
In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. pilot parallel plunge phased
parallel
Business Intelligence
patterns, relationships, trends, and predictions
Which of the following revenue models is most likely followed by companies providing Web 2.0 services? traditional marketing pay-per-click user participation venture capital
pay-per-click
A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.
payload
In the system implementation phase of the SDLC, with the ________ installation, the organization installs the next piece of the system only after the previous piece works
phase
Email spoofing is a synonym for ________.
phishing
In the system implementation phase of the SDLC, with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business
pilot
In the system implementation phase of the SDLC, with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business. parallel pilot phased plunge
pilot
In the system definition phase of the SDLC, the first major task for an assembled project team is to ________. plan the project
plan the project
Which of the following workgroup processes is related to manufacturing?
planning and scheduling
Which of the following workgroup processes is related to manufacturing? product and brand management order entry and tracking planning and scheduling finished goods inventory management
planning and scheduling
Which of the following workgroup processes is related to manufacturing? A. order entry and tracking B. planning and scheduling C. product and brand management D. finished-goods inventory management
planning and scheduling
In the context of system implementation phase of the SDLC, a ________ installation is the riskiest because the old system is shut down and the new system is introduced. pilot phased parallel plunge
plunge
Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?1/1 pts
possibility of error
Confidence
probability estimate of buying and item
Lift
probability of buying X without Y
it is generally more difficult to make changes to ______of an IS than to database itself
procedures
The inherent processes defined in an ERP solution are known as _____.
process blueprints
The inherent processes defined in an ERP solution are known, by some ERP vendors, as ________.
process blueprints
The inherent processes defined in an ERP solution are known, by some ERP vendors, as ________. stored procedures process blueprints transaction logs database transactions
process blueprints
The inherent processes defined in an ERP solution are known, by some ERP vendors, as ________. transaction logs stored procedures process blueprints database transactions
process blueprints
_____ is a measure of the ratio of process outputs to inputs.
process efficiency
BI Analysis
process of creating business intelligence through reporting, data mining, and knowledge mgmt
Data Aquisition
process of obtaining, cleaning, organizing, relating, and cataloging source data
A stored procedure is a _____.
program stored in a database that keeps the database consistent when certain conditions arise.
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________. stop SQL injection attacks prevent brute force attacks provide physical security protect against email spoofing
provide physical security
Which of the following is an example of a structured process? A. using social media to create buzz about a new product B. solving the problem of excessive product returns C. purchasing raw materials D. deciding on the location of a new store
purchasing raw materials
If you want users to view a form but not make any changes to its data, you would use a ________ form. locked secure read-only protected
read-only
A ________ is a form that enables users to view but not change data.
read-only form
granularity
refers to the level of detail represented by the data
Which of the following is an example of a supervised data mining technique? click streaming market-basket analysis cluster analysis regression analysis
regression analysis
Which of the following is an example of a supervised data-mining technique?
regression analysis
When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is _____.
reinforce employees' sense of self-efficiency
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling more product?
relationship management
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?
relationship management
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product? loss/churn marketing customer acquisition relationship management
relationship management
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product? marketing loss/churn relationship management customer acquisition
relationship management
RFM Analysis
reporting technique that considers how RECENTLY a customer has ordered, how FREQUENTLY they order, and how much MONEY the spent.
Online Analytical Processing (OLAP)
reporting technique that provides the ability to sum, count, average, and perform other simple arithmatic operations on a group of data, OLAP reports are dynamic, meaning viewers can change the format.
In a business process, an inventory or a database is an example of a ________.
repository
In a business process, an inventory or a database is an example of a ________. decision tree repository botnet cookie
repository
A(n) ________ sets the property of a field to force data entry.
required
A field that cannot be left blank when you create a new record is a:
required field.
Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced?
requirements analysis
Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced? component design system definition requirements analysis system implementation
requirements analysis
Pull Publishing
requires user to request BI
Defenders-of-belief communities facilitate activities like ________. inbound logistics customer service functions manufacturing and operations sales and marketing
sales and marketing
An OLAP report has measures and dimensions. Which of the following is an example of a dimension? average cost total sales average sales sales region
sales region
An OLAP report has measures and dimensions. Which of the following is an example of a dimension? average sales total sales average cost sales region
sales region
Info Silos arise as consequence of org's?
se workgroup IS
_____ refers to a person's belief that he or she can be successful at his or her job.
self-efficiency
According to the SEAMS dynamic process, which of the following activities is most likely to involve the identification of important communities, what they do, where they hang out, what they care about, and how organizations relate to them? activating sensing measuring engaging
sensing
Flexible communication among distributed applications is possible because of a set of standards that support a design philosophy known as _____.
service oriented architecture
Which of the following is a function of the steering committee for an IS department? imparting training writing program code adapting software setting IS priorities
setting IS priorities
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.
signals
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component. 1/1 pts
signals
SM communities differ from in past bc--
sm communities firmed on mutual interests
Data Mart
smaller than a data warehouse, and addressed the needs of a particular department or functional area of a business
A(n) ________ has a microchip in it to hold data. ATM card smart card cookie key escrow
smart card
A(n) ________ has a microchip in it to hold data. cookie key escrow ATM card smart card
smart card
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her ________. process capital social capital human capital structural capital
social capital
Being linked to a network of highly regarded contacts is a form of ________. viral marketing crowdsourcing human capital social credential
social credential
The first step that any hypersocial organization should take is to develop and publicize a(n) ________ policy.0/1 pts
social media
the use of IT to support the sharing of content among network of others____
social media
A ________ is an information system that supports the sharing of content among networks of users.
social media information system (SMIS)
A ________ is an information system that supports the sharing of content among networks of users. database management system (DBMS) social media information system (SMIS) human resource information system (HRIS) transaction processing system (TPS)
social media information system (SMIS)
A ________ is an information system that supports the sharing of content among networks of users. social media information system (SMIS) database management system (DBMS) transaction processing system (TPS) human resource information system (HRIS)
social media information system (SMIS)
In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process. dotted arrows solid arrows circles diamonds
solid arrows
5 basic reporting operations
sorting, filtering, grouping, calculating, formatting
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites
sponsors
A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives. discussion forum steering committee IS department board of directors
steering committee
To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization.
strength of a relationship
To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. coefficient of relationship customer lifetime value value of human capital strength of a relationship
strength of a relationship
To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. customer lifetime value strength of a relationship coefficient of relationship value of human capital
strength of a relationship
org uses formula to calc the ROP. example of a ______ decision process
structured
_____ are formally defined, standardized processes that involve day-to-day operations.
structured processes
By using a ________, you can create a form that displays records from two related tables. mini-form subform linked form subordinate form
subform
By using a ________, you can create a form that displays records from two related tables. subform mini-form subordinate form linked form
subform
By using a ________, you can create a form that displays records from two related tables. subform subordinate form linked form mini-form
subform
Enterprise application integration is a ________.
suite of software applications that consolidates existing systems by providing layers of software that connect applications together
Enterprise application integration is a ________. suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform strategy that uses business process management to radically enhance the customer service experience from any customer base suite of software applications that consolidates existing systems by providing layers of software that connect applications together
suite of software applications that consolidates existing systems by providing layers of software that connect applications together
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. click streaming cluster analysis unsupervised data mining supervised data mining
supervised data mining
With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. unsupervised data mining click streaming supervised data mining cluster analysis
supervised data mining
In market-basket terminology, ________ describes the probability that two items will be purchased together.
support
To test an update query before running it, you can:
switch to Datasheet view.
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans. user support representative business analyst systems auditor system analyst
system analyst
During the system implementation phase of the SDLC, once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?
system conversion
BI Systems
systems that process operational and other data to identifie patterns, relationships, and trends for use among other workers and business professionals
The ________ is the sequential advancing in a form from one field to the next.
tab order
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials. system analyst programmer technical writer consultant
technical writer
A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials. technical writer consultant system analyst programmer
technical writer
A social media policy is a statement ________.0/1 pts
that declines emps rights and responsibilities
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? the Privacy Act of 1974 the Sarbanes-Oxley Act the Gramm-Leach-Bliley Act the HIPAA of 1996
the HIPAA of 1996
Deleting problematic content on social networking sites is best reserved for when ________.1/1 pts
the content is obscene and inappropriate
Responding to problematic content on social networking sites is best reserved for when ________.1/1 pts
the problematic content has caused the organization to do something positive as a result
Organizations like Oracle and SAP find it difficult to move toward low-cost cloud solutions as _____.
they cannot walk away from the revenue of lucrative support contracts that they entail.
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. threat key escrow target vulnerability
threat
Drill Down the Data
to further divide the data into more detail
as ceo you ask for sales figures of prev qtr. mgmr sends you detailed invoices this info no good bc ____
too much info
Which of following IS requirements falls into content sharing category?
tracking versions of many docs
A ________ involves balancing three critical factors: requirements, cost, and time. critical path test plan trade-off WBS
trade-off
A ________ involves balancing three critical factors: requirements, cost, and time. trade-off critical path test plan WBS
trade-off
ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called _____.
train the trainer
ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________. employ the employer train the trainer on-the-job training top-down training
train the trainer
ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers in training sessions called ________. on-the-job training train the trainer employ the employer top-down training
train the trainer
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems? A. coercing employees to learn the new system B. paying employees straight-out for transitioning to the new system C. training employees on the successful use of the new system D. giving employees ultimatums and deadlines
training employees on the successful use of the new system
Digital dashboards provide all of the following capabilities except: a) drill-down b) transaction processing c) status access d) key performance indicators e) exception reporting
transaction processing
A(n) _____ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.
trigger
A Multivalued Lookup field accepts numerous options instead of just one field choice.
true
A calculated control contains an expression that generates a calculated result.
true
A common business application of decision trees is to classify loans by likelihood of default.
true
A crosstab query works best when the data source has at least two grouping fields.
true
A folksonomy is content structure that has emerged from the processing of many user tags.0/1 pts
true
A form or report header appears one time at the top of each form or report.
true
A linked file opens in Access even though the data resides in an external Excel file.
true
A lookup field can be used when there is repetitive data in a field.
true
A parameter query is similar to creating most other query types.
true
A read-only form is a form that enables users to view but not change data.
true
A required field indicates that a value for the field must be entered.
true
A required field is one that cannot be left blank when you create a new record.
true
Access creates a temporary file on your computer each time you open an attachment file.
true
Action queries display different icons than select queries in the Navigation Pane.
true
Action queries include update, append, make table, and delete.
true
After exporting a file, if the document is too wide to display all the text, it will display on two pages.
true
After inserting a line into a form or report, you can modify the color, thickness and line type.
true
An action query can be used to add, edit, or delete data in a database.
true
An append query is used to add records to an existing table.
true
An attachment appears as a paperclip in a table.
true
An explanatory note added to a form or report is considered a label because it is not tied to a specific field.
true
An input mask forces users to conform to a specific data-entry format for a given field.
true
Backing up the database prior to running an update query is the best precaution.
true
Before exporting a table to another database, the new database has to be created.
true
Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content.1/1 pts
true
Both community users and employees of SM sponsors process SM sites using communications devices. 0/1 pts
true
Both forms and reports have a text box control, which displays the data found in the record source.
true
Both label controls and text box controls are known as bound controls.
true
Bound, unbound, and calculated controls are not found on the Controls group on the Design tab.
true
By creating an input mask you can further restrict the data being input into a field by specifying the exact format of the data entry.
true
Changes to a subform are easier to make in Layout view.
true
Choosing the wrong matched field in an unmatched query will cause you to query incorrect information.
true
Columnar forms and reports do not export to Word properly.
true
Content data is data and responses to data that are contributed by users and SM sponsors.0/1 pts
true
Dynamic reports are BI documents that are updated at the time they are requested.
true
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.1/1 pts
true
Exporting tables and queries to Excel is usually predictable and consistent because of the similarity between an Access datasheet and an Excel spreadsheet.
true
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
true
For an import to be successful, column headings and data formats should be an exact match, and in the same order, to those in your database.
true
For phone numbers, the input mask helps ensure consistency in data entry.
true
Forms and reports based on a query can display calculated fields like any other field.
true
If no caption has been set for a field, the label will default to the field name.
true
If you add a validation rule to a table with existing records, some data in those records may violate the rule.
true
If you create a form based on a table with a lookup field, the lookup field becomes a combo box control on the new form.
true
If you want to export specific records in a table to Excel, you can either filter the table or create a query for the needed records.
true
If you want to see records with a field within a certain date range, you could use the Between operator.
true
In a report, click the next and previous arrows on the Attachment toolbar to advance from one attachment to the next.
true
Instead of modifying the query grid each time a new criteria is needed, a parameter query can be created to enter the criteria.
true
It is important to ensure that when you delete duplicate records, you do not delete associated records in a related table.
true
It is recommended to preview results before running a delete query.
true
It is usually better to enter the value of zero rather than have a null value in a field.
true
JPEG and other photo formats increase the database size byte for byte.
true
Like any other field, a calculated field using DatePart can have criteria applied to it.
true
Moving records from one table to another can be accomplished with the combination of an append query and a delete query.
true
Once an attachment is added to a database table the file is saved as long as you have clicked the record below the current record.
true
Once you run an action query, you are committing yourself to an irreversible change.
true
One of the main reasons for importing a spreadsheet into Access is that you have more control over the imported data.
true
One of the major sources of UGC problems is inappropriate content.0/1 pts
true
One reason an append query can fail is because of duplicate primary keys in the source and destination tables.
true
PDF documents are the preferred format when exporting from Access.
true
PDF or XPS documents can be opened by their respective document readers, which are free downloads.
true
Page breaks can be added at specific locations in forms or reports.
true
Prior to updating data in a table, you must first locate the records that need to be modified.
true
Reports can be created based on the results of a parameter query.
true
Rich Text Format (RTF) is a format that enables documents created in one software application to be opened with a different software application.
true
SM communities formed on mutual interests and transend family and geographic boundaries
true
SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.1/1 pts
true
Saving the export steps is the last step in the export process.
true
Simple forms created with a Form tool will handle most basic database solution needs.
true
Tables, queries, forms and reports can all be exported to a PDF or XPS document.
true
The Date function calculates the current date.
true
The Date function is commonly used as a default value for a date field.
true
The delete query saves you the chore of having to locate and delete records manually.
true
The detail section of a form or report displays in between the headers and footers sections.
true
The find unmatched query only works if two tables share a common field.
true
The find unmatched query requires two tables with a common field where one of the tables is missing information.
true
The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.1/1 pts
true
The grouping in a crosstab query comes from the definitions of row and column headings.
true
The options for a lookup field can be stored in a separate table.
true
The skill used to create a form can be used to create a report as well.
true
The three views in Access are Form or Report view, Layout view, and Design view.
true
The type of data displayed in a crosstab query depends on which aggregate function you choose when creating the query.
true
To add emphasis to a form or report, use the Line control or the Rectangle control.
true
To ensure the integrity of records in a table, you should set the required property to Yes for critical fields.
true
To remove a tab stop, click the Other tab in the Property sheet and change the Tab Stop setting to No.
true
Unbound controls do not require data entry so a tab stop can be removed.
true
User-generated content (UGC) is the essence of SM relationships.1/1 pts
true
Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.1/1 pts
true
Validation rules limit the type or range of data a user can enter into a field.
true
Validation rules prevent invalid data from being entered into a field.
true
When a form has been created as read-only, it should be renamed to indicate it is read-only.
true
When a report has been created and used in Access, it can be formatted and laid out differently than the original design.
true
When adding a file to an attachment field, the file is actually copied into the database itself.
true
When choosing fields from two different tables using the Form Wizard, Access automatically assumes you want a form with a subform.
true
When creating a form or report, you can insert an image file containing the company logo.
true
When creating a lookup field, it is important to only allow options from the lookup table.
true
When creating a subform, Access automatically names the subform for you or you can create your own name.
true
When exporting a table to Excel, all records in the table are exported, even if they are not needed.
true
When exporting from Access to Word, you are not able to analyze the data in Word.
true
When running a delete query, you are prompted with a warning message.
true
When running an append query, an append query warning message appears specifying the number of rows to be appended.
true
When there is more than one parameter in a query, Access asks for the information starting from the left and moving to the right.
true
When updating records, convert the select query to an update query and insert the missing information.
true
When using the Lookup Wizard to create a lookup field, Access creates a hidden relationship between two tables-the table that contains the lookup field and the table that holds the options.
true
When you export a table structure from one Access database to another, the new database has to be created.
true
When you export a table to Excel, the field names become the column headings and the records become the rows in the Excel spreadsheet.
true
When you export an object from Access to Word, Access creates a file in the PDF format.
true
When you save an RTF file, you might want to change the file type to a Word document in order to make formatting and editing easier.
true
Word and Excel files are compressed by Access when you attach them.
true
XPS is a file format that displays a printed page onscreen identically on any computer platform.
true
You can use Date() in the default value property to insert the current date when a new record is added.
true
You can use a make table query to copy some or all records from a source table to a destination table even if the destination table does not exist.
true
You should NOT rerun an action query.
true
[Enter city] on the criteria line of a query is an example of the criteria in a parameter query.
true
Which of the following is true of paired programming? two processors are required to run one program two team members write the same program by coordinating from different locations two team members share the same computer to write a computer program together two programs are run simultaneously on one device
two team members share the same computer to write a computer program together
Which of the following is true of paired programming? two team members write the same program by coordinating from different locations two team members share the same computer to write a computer program together two programs are run simultaneously on one device two processors are required to run one program
two team members share the same computer to write a computer program together
regressional analysis
type of supervised data mining, measures the impact of one set of variables on another
Neutral networks
type of supervised data mining, predicts values and makes classifications such as "good prospect" and "poor prospect"
Cluster analysis
type of unsupervised data mining, identifies groups of entities that have similar characteristics
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. faulty services incorrect data modification unauthorized data disclosure loss of infrastructure
unauthorized data disclosure
Market Basket Analysis
unsupervised data mining technique for determing sales patterns, shows the products that customers tend to buy together
A(n) ________ query is used to update or change data automatically based on criteria that you specify.
update
A(n) ________ query is used to update or change data automatically based on criteria that you specify. make table update delete append
update
A(n) ________ can be used when records with missing data have been found.
update query
A(n) ________ would be used to replace null values with zeros?
update query
A(n) ________ would be used to replace null values with zeros? delete query make table query append query update query
update query
Information silos are not a problem until they begin to _____.
use and store data inconsistently across separate databases
Subscriptions
user requests for a particular BI result on a particular schedule or in response to an event
A ________ rule limits the type of data a user can enter into a field.
validation
A ________ rule limits the type of data a user can enter into a field. lookup macro validation default
validation
a _____ is inducement for passing message thru tiers
viral hook
The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ________. swim-lane method agile development method waterfall method scrum process
waterfall method
Which of the following information system minimizes data duplication among departments? A. personal information systems B. workgroup information systems C. departmental information systems D. enterprise information systems
workgroup information systems
A ________ is a type of virus that propagates using the Internet or other computer networks. sniffer Trojan horse worm phisher
worm