BMIS 311 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How do information systems improve business processes?

. Information systems improve the efficiency and/or effectiveness of business processes.

In 2017, American business spent ________ on information systems hardware, software, and telecommunications equipment.

1 trillion

Unfortunately, enterprise applications fail to meet expectations ________ percent of the time.

44

Studies of actual managerial performance indicate that managers perform work at a pace of _______ different activities each day.

600

In 2018, mobile marketing constitutes ________ percent of all online marketing.

70

According to Panorama Consulting Solutions, in 2018, the average time to implement an ERP project is approximately ________.

A. 17.4 months

________ is used to ensure the person is who he/she claims to be.

A. Authentication

Which of the following is NOT part of the analysis of a situation that presents an ethical issue?

A. Avoid actions with extremely low failure costs.

________ help(s) ensure that important network traffic receives high priority, and less-critical network traffic receives lower priority.

A. Deep packet inspection (DPI)

________ are data files used to identify and protect online transactions using a trusted third party.

A. Digital certificates

________ avoid the problem of having databases in areas such as finance, human resources, sales and marketing, and manufacturing that are not capable of sharing information.

A. Enterprise resource planning (ERP) systems

What type of systems contain redundant hardware, software, and power supply components to create an environment that provides continuous, uninterrupted service?

A. Fault-tolerant computer systems

________ percent of online retailers have m-commerce Web sites.

A. Fifty-five

What revenue model offers basic services or content for free, while charging a premium for advanced or special features?

A. Free/freemium revenue model

________ consists of processes and tools to identify the valid users of a system.

A. Identity management

________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.

A. In-memory computing

E-commerce refers to the use of the ________ and ________ to transact business.

A. Internet; Web

How is a knowledge asset different from a physical one?

A. Knowledge is not subject to the law of diminishing returns as physical assets are.

________ is the study of how computers can potentially improve without human programming.

A. Machine learning

________ includes computer viruses, worms, and Trojan horses.

A. Malware

Chapter 3 Video_Porters Competitive Forces_3.03 mins3 Firms that have computer-based, efficient supply chains can manage their suppliers' pricing behavior. This is an example of managing which of Porter's competitive forces?

A. Power of suppliers

In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.

A. Sarbanes-Oxley

A ________ is a software program that mimics another program and often causes damage.

A. Trojan horse

The most commonly used authentication technique used for end users is ________.

A. a password

Regarding moral dimensions of the information age, ________ include(s) the issue of who can and will be held liable for harm done to property rights.

A. accountability and control

The doubling of computing power every 18 months has raised questions about the ________.

A. accuracy and reliability of information systems

Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.

A. administrative

To describe datasets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze, the term __________ is used.

A. big data

Some ERP vendors include in-memory-computing technology that provides ________ tools for ad hoc analysis, what-if scenario analysis, and machine learning that analyzes very large data sets.

A. business intelligence

A strong foundation in database technology is required for ________.

A. business intelligence and analytics

A(n) ________ is an Internet business model in which information content is sold and distributed.

A. content provider

Companies that establish a competitive advantage by having the lowest prices in an industry are using a ________ approach.

A. cost-leadership

Customer relationship management includes ________.

A. customer support applications

What type of attack consists of malware that comes with a downloaded file that a user intentionally requests, such as a free game or coupon?

A. drive-by download

If a Web site changes its prices based on the demand characteristics (e.g., concert tickets), this would be an example of ________.

A. dynamic pricing

The acronym EDI stands for ________

A. electronic data interchange

A(n) ________ is a major type of KM that collects, stores, and disseminates digital content and knowledge.

A. enterprise-wide KMS

A record describes a(n) ________ which is a person, place, thing, or event on which we store and maintain information. Each characteristic or quality describing a particular ________ is called a(n) ________

A. entity; entity; attribute

In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to ________.

A. human resources

A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.

A. information policy

The ________ strategy focuses on having components arriving exactly at the time they are needed.

A. just-in-time

Expert systems model human knowledge in a structure known as a(n) ________.

A. knowledge base

According to your reading, Coca-Cola implemented an SAP enterprise system to overcome a ________.

A. lack of standard, companywide business processes

A comprehensive CRM package contains modules for ________ and _______ relationship management.

A. partner; employee

Although "Big Data" doesn't refer to a specific amount of data, it usually does involve ________.

A. petabytes

The primary benefit of disintermediation to the consumer is ________.

A. removing layers and reducing costs

The ________ of the web makes it possible to deliver messages with text, audio, and video simultaneously to large numbers of people.

A. richness

In an enterprise system, the integrated software modules that focus on return requests are related to ________.

A. sales and marketing

According to the e-commerce presence map, activities including conversation are a(n) ________ type or presence.

A. social media

Enterprise applications include high ________, making it difficult to change vendors.

A. switching costs

Regarding moral dimensions of the information age, ________ include(s) the issue of what standards should we demand to protect the safety of society.

A. system quality

The accessibility, storage, and distribution of information and knowledge is increased dramatically by ________.

A. the Internet

Which of the knowledge management systems' IS activities involve data mining?

Acquire

What is a disaster recovery plan?

B. A plan to restore disrupted computing and communications services

________ feature(s) monitor the network at its most vulnerable points.

B. Intrusion detection systems

________ deals with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by managers and employees

B. Management information systems (MIS)

Select the answer that lists all of the business benefits of collaboration and social business.

B. Productivity, quality, innovation, customer service, and financial performance

Regarding business intelligence and analytics capabilities, a(n) ________ allows users to generate their own reports based on searches.

B. ad hoc query

Enterprise systems include ________ tools for analyzing overall organizational performance.

B. analytical

When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________.

B. bullwhip effect

A collection of routines for producing goods and services is called a(n) ________.

B. business process

When a strategic system is adopted, managers will need to devise new ________ for coordinating their firm's activities with customers, suppliers, and other organizations.

B. business processes

Technical standards for conducting e-commerce have been adopted ________.

B. by all nations around the world

An example of ________ includes someone taking out a loan and then being sold a checking account as well.

B. cross-selling

Businesses that collaborate and use social business often see benefits in productivity, quality, innovation, sales growth, and ________.

B. customer service

Data cleansing, working to identify and fix incorrect data, is also called ________.

B. data scrubbing

A(n) ________ enables an organization to centrally manage and organize data.

B. database management system

A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.

B. denial of service

A display which presents graphs and charts of key performance indicators on a single screen for managing a company is called a ________.

B. digital dashboard

MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted.

B. disaster recovery planning

Substitute products that perform as well as or better than anything currently produced are called ________.

B. disruptive technologies

A set of principles governing the collection and use of information about users is called ________.

B. fair information practices

A ________ provides the link from one table to another table's primary key.

B. foreign key

Mapping areas of the country with higher RSV rates is an example of a ________.

B. geographic information systems (GIS)

In Europe, before data is gathered, ________ must be given by customers with knowledge of all the facts needed to make a rational decision.

B. informed consent

Canvas and Blackboard are examples of ________.

B. learning management systems

The competitive rivalry force of the Internet is strong because it has ________.

B. made it easier for companies to compete on price alone

If your firm is locked into older information systems that are expensive to maintain, this makes your firm vulnerable to _________.

B. new market entrants with the latest technology

According to the value chain model, operations are considered a ________ of the firm.

B. primary activity

Nike sells customized sneakers through NIKEiD to establish ________.

B. product differentiation

Regarding business intelligence and analytics capabilities, a(n) ________ could include submitting financial documents to the SEC using XBRL (industry-specific requirements).

B. production report

Regarding moral dimensions of the information age, ________ is the standard by which cultural values are evaluated and supported in a digital society.

B. quality of life

Examining college admission scores in addition to interviewing the applicant is an example of a(n) ________ decision.

B. semi-structured

Related to social e-commerce, small world theory suggests you are only ________ link(s) from every other person on earth.

B. six

The knowledge an employee has in his mind that has not been documented is called ________.

B. tacit knowledge

Ethical issues in information systems have been given new urgency by ________.

B. the rise of the Internet and electronic commerce

A(n) ________ is an Internet business model where users save time and money by processing online sales transactions and generating a fee for each transaction.

B. transaction broker

________ targeting techniques increase the effectiveness of banners, rich media, and video ads.

Behavioral

________ of an organization's profits can be attributed to the alignment of IT with the business.

C. About 50 percent

What would describe proper use of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet?

C. Acceptable use policy

Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a peer-to-peer network nearly instantaneously without a central authority?

C. Blockchain

Which of the knowledge management systems' IS activities involve search engines?

C. Disseminate

Which of the following is NOT a challenge to the implementation of an ERP?

C. Dramatic reductions in inventory costs and order to delivery time

What is structured knowledge?

C. Explicit knowledge that exists in formal documents, as well as in formal rules.

________ include(s) the strategy and policies for using information technology within an organization.

C. IT governance

________ represents an organization's business processes that are designed to create, store, transfer, and apply knowledge.

C. Knowledge management

All of the following are types of information obtained from data mining EXCEPT ________.

C. Web beacons

________ is the collective and individual experience applied to solving problems.

C. Wisdom

Data mining and big data analytics are examples of ________.

C. a business analytics toolset

From an information technology perspective, ________ includes the infrastructure for warehousing, integrating, reporting, and analyzing data from the business environment.

C. business intelligence (BI)

Viruses differ from worms because worms ________.

C. can operate on their own without attaching to other computer program files

Storing past experiences in the form of cases is a KM method called ________.

C. case-based reasoning (CBR)

Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called ________.

C. customer lifetime value

A(n) ________ is a database that stores historic and current data for the use of decision makers in the organization.

C. data warehouse

The two most important management challenges when building an e-commerce site include knowing how to choose the right technology and ________.

C. developing a clear understanding of your business objectives

Regarding business intelligence and analytics capabilities, a(n) ________ allows moving from a high-level summary to a micro-level view.

C. drill down

The fastest growing form of retail trade in the United States, Europe, and Asia is ________.

C. e-commerce

Newsletters, updates, and sales are activities related to the ________ e-commerce presence map.

C. e-mail

The principles of right and wrong that guide an individual are called ________.

C. ethics

In an enterprise system, the integrated software modules that focus on cash management and forecasting are related to ________.

C. finance and accounting

Information technology today can change the ________, making it possible for people to share information.

C. flow of information

Knowledge management ________ the ability of the organization to learn from its environment.

C. increases

Knowledge workers usually have ________ as a routine aspect of their work.

C. independent judgment

Advances in data storage techniques and the rapidly declining costs of data storage threaten ________.

C. individual privacy

A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.

C. information policy

Neural networks are used for ________.

C. knowledge discovery

Vail Ski Resort implemented a decision support system (DSS) in order to ________.

C. make better decisions about how to target their marketing programs

The most common type of computer security incident is ________.

C. malware infection

Business strategy is considered part of the ________.

C. managerial users and methods

The fact that universal technical standards for the Internet and electronic commerce exist lowers ________ costs, making it cheaper for merchants to sell their goods.

C. market entry

Information systems can be used to create products and services that are personalized to meet a specific customer's requirements, termed __________.

C. mass customization

Management information systems (MIS) provide ________.

C. middle managers with reports on the organization's current performance

The formal process to remove data problems such as repeating groups is called ________.

C. normalization

Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital society.

C. property rights and obligations

A supply chain management system using a(n) ________ model bases production schedules on forecasts.

C. push-based

A collaborative business culture is characterized by:

C. reliance on teams of employees to achieve and implement the results.

E-commerce has become more ________.

C. social, mobile, and local

In order to align IT with business as well as use information systems correctly managers need to perform a(n) ________.

C. strategic systems analysis

Functional information systems that operate independently of one another are becoming a thing of the past because ________.

C. they make sharing information across functional systems difficult

A decision about whether or not to enter a new market would be characterized as ________ and is the responsibility of _______ management.

C. unstructured; senior

According to your readings, ________ was able to link external suppliers, which allowed it to obtain more than 70 percent of parts from outside the organization.

Chrysler

The study of information systems is a multidisciplinary field. Which of the following lists accurately includes all of the disciplines?

Computer Science, Operations Research, Sociology, Management Science, Economics, Psychology

________ are small text files loaded on a computer when a user visits Web sites.

Cookies

What is a touch point?

D. A method of interaction with a customer

________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law

D. Computer forensics

________ businesses gather and sell personal information to government agencies.

D. Data broker

________ are currently the most successful (revenue) online marketing and advertising format.

D. Display ads

________ use a more flexible data model and are designed for big data.

D. Non-relational database management systems

________ encompasses a set of assumptions about what an organization should produce, how it is produced, and for whom.

D. Organizational culture

What is a Web beacon?

D. Small software programs that keep a record of users' online clickstream

All of the following are methods of authentication EXCEPT ________.

D. TCP/IP

Which of the following is NOT an example of a company's transaction processing system?

D. Walmart's internal email system

An extranet is a system that shares data ________.

D. across multiple organizations

Enterprise applications have drawbacks mainly because they ________.

D. are very expensive to purchase and implement

The use of computers (hardware and software) to emulate human behavior is called ________.

D. artificial intelligence (AI)

Based on your reading, information systems help businesses compete ________.

D. but sustaining a competitive advantage is challenging

The sales, manufacturing, and inventory systems at a bicycle manufacturer use different codes to represent bicycle frame sizes. For example, in the sales system, a large bike frame is coded with "L", while the inventory system codes a large bike frame with "LG". This situation illustrates ________.

D. data inconsistency

A(n) ________ is a collection of data organized to serve many applications efficiently.

D. database

One downside to complex enterprise software occurs when it ________.

D. degrades system performance

The Internet has made intellectual property ________.

D. difficult to protect

All of the following are technology trends that raise ethical issues EXCEPT ________.

D. disruptive technologies

An innovation that dramatically changes the business environment is called a(n) ________.

D. disruptive technology

The ________ role is NOT one of the activities that managers are expected to perform in an organization.

D. high velocity

The iPhone voice Siri is a type of ________.

D. intelligent agent

If someone loads a program that tracks everything you type, the specific spyware is a(n) ________.

D. key logger

Behavioral models of managerial behavior state that managers exhibit all of the following behaviors EXCEPT being ________.

D. less informal

In an enterprise system, the integrated software modules that focus on production capacity are related to ________.

D. manufacturing and production

Behavioral models suggest that the actual actions of managers are ________ than previously believed.

D. more informal

FedEx has been using ________ to develop models of how customers will respond to price changes and new services.

D. predictive analytics

The knowledge management value chain begins with the ________.

D. procurement of knowledge

A supply chain management system using a(n) ________ model bases production schedules on actual customer orders.

D. pull-based

Managers often maintain a(n) ________ as a buffer during unforeseen events.

D. safety stock

If a cookie company uses Facebook to help sell a product, they are embracing ________.

D. social business

Chapter 3 Video_Porters Competitive Forces_3.03 mins1 Porter's competitive forces are useful to analyze a firm's information systems and identify its _____.

D. strategic position within its industry

The strategy used by an expert system to search the rule base to arrive at a conclusion is called ________.

D. the inference engine

A raw fact would be considered ________.

Data

How do information systems support the activities in a supply chain?

E. By reducing inventory levels

The law that requires financial institutions to ensure confidentiality of customer data is called the ________.

E. Gramm-Leach-Bliley Act

Which of the following statements about information systems and business processes is correct?

E. Information systems may make it possible to completely change a business process.

Which of the following options is NOT a unique feature of e-commerce technology?

E. Our geographic boundaries now determine our network experience.

What are knowledge work systems?

E. Specialized systems for discovering and creating new knowledge.

SQL stands for ________.

E. Structured Query Language

The introduction of new information technology has a ripple effect which raises many issues. These issues have the following moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and ________.

E. accountability and control

Analytical CRM includes applications that ________.

E. analyze customer data for improving business performance

According to your text, Elemica's Web site for buying and selling chemicals is an example of ________ electronic commerce.

E. business-to-business (B2B)

BarnesandNoble.com is an example of ________ electronic commerce.

E. business-to-consumer (B2C)

In many companies, the information systems department is headed by a(n) ________.

E. chief information officer (CIO)

The person responsible for information security in most organizations is the ________.

E. chief security officer

The ________ model of management describes the five traditional functions of managers as planning, organizing, coordinating, deciding, and controlling.

E. classical

The most widely used model for understanding competitive advantage is Michael Porter's ________.

E. competitive forces model

The most common source of business system failure is (are) ________.

E. data quality

The corporate function that is responsible for defining and organizing the content of the database as well as database maintenance is ________.

E. database administration

U.S. schools are experiencing a(n) ________, which means that students in poorer schools have less access to technology.

E. digital divide

About 80 percent of online B2B e-commerce is still based on proprietary systems for ____________.

E. electronic data interchange (EDI)

A(n) ________ makes values from a central database available for applications that support all of an organization's internal business activities.

E. enterprise resource planning (ERP) system

A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________.

E. firewall

Business processes that cross many different functional areas and require coordination across departments are supported by ________ among the participants.

E. flows of material, information, and knowledge

Regarding moral dimensions of the information age, ________ include(s) the issue of determining the data that individuals and organizations can protect.

E. information rights and obligations

A(n) ________ system helps capture, manage, and apply the experience of the organization.

E. knowledge management (KM)

One of the reasons that information technology flattens an organization is ________.

E. managers receive much more timely and accurate information, thus requiring fewer managers

The multidimensional analysis tool in spreadsheets is called a ________.

E. pivot table

The field that uniquely identifies a row in a relational database table is called a ________.

E. primary key

Asking what happens to mining profits if the price of silver drops by 5 percent is an example of ________.

E. sensitivity analysis

Facebook, Twitter, and blogs represent the typical platforms for the ________ e-commerce presence map.

E. social media

In information systems, SaaS stands for ________.

E. software as a service

In the United States, the claim to privacy is protected primarily by ________.

E. the First Amendment

Ethical issues in information systems have become more of an urgent topic because of the rise of ________.

E. the Internet and e-commercec

The most popular type of database today for PCs as well as for larger computers and mainframes is ___________ database.

E. the relational

________ enables the computer-to-computer exchange between two organizations of standard transactions such as invoices, shipment schedules, or purchase orders.

EDI

Which below is the correct definition of "war driving"?

Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic

_________ help businesses become more efficient by integrating functional business processes into a single information system that spans all business areas.

Enterprise resource planning (ERP) systems

________ refers to the principles of right and wrong that individuals use to make choices.

Ethics

Which of the following statements is NOT accurate regarding how information systems are transforming business?

Fifty-five percent of the entire population now use desktop computers, and their sales are soaring.

________ algorithms were inspired by biological systems that examine optimal solutions for a given problem based on big data.

Genetic

The act that aims at protecting medical records is the ________.

HIPAA

________ is the most popular NoSQL DBMS.

Hadoop

Which answer contains the correct list of moral dimensions of the Information Age?

Information rights and obligations, property rights and obligations, accountability and control, system quality, quality of life

________ includes hardware and software an organization needs to compete in the marketplace.

Information technology (IT)

What makes a Blockchain system possible and attractive to business firms?

Its encryption and authentication processes make it highly secure for storing many kinds of data.

Identifying ________ is a way for managers to determine how to measure the effectiveness of an organization.

KPIs

Which statement below best describes an enterprise system?

Large scale software that encompasses a whole company across many departments and business functions

A massive online course available to the general public is called a ________ .

MOOC

The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.

Privacy Act of 1974

________ include two organizations sharing expertise.

Synergies

30. Which answer best describes what the information systems department is responsible for maintaining?

The information systems department is responsible for maintaining the hardware, software, data storage, and networks that comprise the firm's IT infrastructure.

Microsoft's DBMS that includes built-in report generation and reporting is called ________.

access

A scanner used to capture a product's code (i.e., SKU) is considered ________.

an input

Organizational learning is the result of knowledge ________.

application

A risk ________ determines the level of risk to an organization if an activity or process is not properly controlled.

assessment

An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats.

audit

The field of management information systems (MIS) deals with ________ issues as well as technical issues related to the development and use of information systems in an organization.

behavioral

Companies analyzing huge amounts of data, social media, and other data points represent an emerging area of ________.

big data

Using your handprint to access a safe deposit box is an example of ________ authentication.

biometric

The data and software tools for organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions are referred to as ________ systems.

business intelligence

How a company produces, delivers and sells its products and services in the marketplace is called a(n) ________.

business model

Every business can be seen as a collection of ________.

business processes

Working together as a team to align a competitive strategy with the company's goals is an example of ________.

collaboration

Which one of the following is NOT one of the major business functions or specialized tasks performed by business organizations and supported by information systems?

collective bargaining

Firms that do better than others are said to have a ________.

competitive advantage

When a manager is provided all the facts necessary to support a decision, the ______ dimension of information quality is satisfied.

completeness

The technical approach to information systems includes ________.

computer science and management science

Based on Sam's description of an information system, all of the following are components of an IS except _____.

culture

Chapter 1 Video_The Importance of MIS_4.35 mins2 As explained in this video, the _____ component of an information system is considered a bridge that connects the computer side and the human side of the system.

data

The millions of product bar codes scanned at supermarket checkout counters everyday are examples of ________.

data

A(n) ________, such as a clerk, uses data for things such as scheduling.

data worker

When technology must be changed and designed to fit the needs of the organization and individuals, it may need to be ________ to adjust the fit between the organizational needs and the technology.

de-optimized

Which of the following systems would BEST support managers who focus on unique problems for which the procedure to arrive at a solution may not be fully predefined in advance?

decision-support

A manager's ________ role includes handling disputes.

decisional

DBMS have a data________ capability that is used to specify the structure of the content of the database.

definition

If almost all an organization's significant business relationships are digitally enabled, it would be called a(n) ________.

digit firm

A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the globe, with special time-keeping tools to synchronize the data and ensure the data are always consistent.

distributed

When the data in a message is converted from plain text to cipher text, a process called _________ is used.

encryption

A person, place, or thing which is stored in a database is called a(n) ________.

entity

A(n) ________ is used by senior managers to make decisions.

executive support system

A(n) ________ system is a decision-making tool that follows a series of IF-THEN-ELSE rules.

expert

A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A.

field

A ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.

file

Information systems can ________ the organization by empowering lower-level employees.

flatten

IS security firewalls are an example of a ________.

gatekeeper

The term data ________ is used to describe the policies and processes for managing the availability, usability, integrity, and security of the data employed in an enterprise.

governance

The power of the customer ________ if they have an easy time switching from one company (e.g., not having to pay an exit fee) to another.

grows

A business model describes ________.

how a company produces, delivers, and sells a product or service to create wealth

Data is considered to be ________ when the same attribute has different values.

inconsistent

A manager's ________ role includes obtaining the most up-to-date information.

informational

All of the following are general controls EXCEPT ________ controls.

input

Which of the following options has drastically reduced the costs of operating and transacting on a global scale?

internet

A supply chain management system is considered a type of ________ system because it shares data across multiple organizations.

interorganizational

When managers act as leaders, motivating, counseling, and supporting their subordinates, they are performing the ___________ role.

interpersonal

Using Internet technology to create an internal system is called a(n) ________.

intranet

To transform information into ________, a firm must expend additional resources to discover patterns, rules, and contexts.

knowledge

To transform information into _________, resources are used to discover patterns, rules, and context.

knowledge

A supply chain ________.

links suppliers, manufacturing plants, distribution centers, retail outlets, and customers

The global positioning system (GPS) enables ________ -based services for consumers via their smartphones.

location

The functional area which includes the business process to check quality is called ________.

manufacturing and production

A broad term to describe extending a marketplace beyond traditional boundaries is called ________.

marketspace

The fastest growing type of B2C e-commerce is ________.

mobile

A virtual company uses ________ to link people, assets, and ideas.

networks

A(n) ________ network learns from identifying patterns in large datasets.

neural

The most common reason for failure of large projects to succeed is ________.

organizational resistance to change

Because Walmart has an efficient inventory replenishing system, they are able to reduce ________ costs.

overhead

The Children's Online Privacy Protection Act (COPPA) focuses on ________.

parental permissions

A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years.

patent

Transaction processing systems (TPS) are information systems that ________.

perform and record sales, receipts, cash deposits, payroll, and credit decisions in a factory

All of the following disciplines contribute to the contemporary approaches to information systems EXCEPT ________.

philosophy

According to the value chain model, sales and marketing is considered a ________ activity of the firm.

primary

Combining data from multiple sources to create digital dossiers of detailed information on individuals is called ________.

profiling

The behavioral approach to information systems includes ________.

psychology and sociology

All of the following are interrelated changes in the technology area that impact businesses EXCEPT ________.

quantum computing

A decision where only part of the problem has an obvious answer is an example of a(n) ________ decision.

semistructured

All of the following are examples of functional business processes EXCEPT ________.

shipping a product

The ________ view jointly optimizes the social and technical systems used in production.

sociotechnical

The information systems approach to this textbook is the ________.

sociotechnical approach

Examining college admission scores as the sole criteria for admission is an example of a(n) ________ decision.

structured

Last quarter's sales figures are considered ________ knowledge.

structured

Not allowing credit if an individual's credit score is below 600 is an example of a(n) ________ decision.

structured

A ________ chain is a network of organizations for obtaining raw materials.

supply

According to the value chain model, employee recruiting, hiring, and training are considered a ________ activity of the firm.

support

According to the value chain model, technology is considered a ________ of the firm.

support activity

When Sam describes modeling the inputs and outputs of an IS and understanding how they relate to other systems she is describing _____.

systems thinking

A lead chef quitting at a restaurant and taking his secret recipes with him or her is considered ________ knowledge.

tacit

Information in folders, messages, memos, proposals, emails, graphics, electronic slide presentations, and even videos created in different formats and stored in many locations is considered ________ knowledge.

unstructured

Senior executives determining five-year goals is an example of a(n) ________ decision.

unstructured

A report showing an employee's age as a negative number is useless because it lacks ________.

validity


Ensembles d'études connexes

Chapter 8 Intermediate Financial 1

View Set

Pharmacology ATI study questions part 25

View Set