BMIS 311 : Final (Rats 1-12)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the four layers of the TCP/IP reference model?

Application, Transport, Internet, and Network Interface

Which of the following is the last step in the knowledge management value chain?

Apply

Which of the following statements about enterprise applications is not true?

Enterprise applications are best implemented when few changes in business processes are required.

Which of the following is not true about enterprise systems?

Enterprise software is expressly built to allow companies to mimic their unique business practices

Which of the following statements about genetic algorithms is not true?

Genetic algorithms discover knowledge by using hardware and software that parallel the processing patterns of the biological or human brain.

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

Information rights and obligations

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?

Lack of flexibility

Which of the following is not one of the five classical functions of managers?

Leading

________ attempts to leverage the fact that there is always some demand, however small, for a product

Long tail marketing

An ESS supports which of the following?

Long-range planning activities of senior management

Which of the following is an example of a social complementary asset

Technology and service firms in adjacent markets

Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers?

Telecommunications

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships

Text mining

Which of the following is an example of an organizational complementary asset?

Using the appropriate business model

Which quality dimension of information is concerned that the data values of an information source fall within a defined range?

Validity

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?

Virtualization

Which of the following statements about Internet security is not true?

VoIP is more secure than the switched voice network.

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

War driving

Which of the following is a recent addition to the mobile digital platform?

Wearable computing devices

Which of the following is a milestone for the website development phase of building an e-commerce presence?

Website plan

Which of the following factors does not help explain why computing resources today are even more available than in previous decades?

Widespread rejection of technology standards

Which of the following is the foundation technology for web services?

XML

A characteristic or quality that describes a particular database entity is called a(n):

attribute.

All of the following are physical components of an RFID system except:

bar codes.

Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as:

behavioral targeting.

The most successful solutions or methods for achieving a business objective are called:

best practices

Enterprise software is built around thousands of predefined business processes that reflect:

best practices.

Evil twins are:

bogus wireless network access points that look legitimate to users

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

bps

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:

browser

Enterprise application vendors are now including ________ features, such as tools for data visualization, flexible reporting, and ad-hoc analysis, as part of the application.

business intelligence

The interaction between information technology and organizations is influenced:

by many factors, including structure, politics, culture, and environment.

Application controls:

can be classified as input controls, processing controls, and output controls.

Information systems enhance core competencies by:

encouraging the sharing of knowledge across business units

A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.

enterprise

A schematic of the entire database that describes the relationships in a database is called a(n):

entity-relationship diagram.

All of the following are considered to be knowledge workers except:

executives

All of the following are competitive forces in Porter's model except:

external environment

The concept of management ________ describes situations in which managers act on preconceived notions that reject information that does not conform to their prior conceptions.

filters

Data mining allows users to:

find hidden relationships in data.

In 2010, the FTC added all of the following recommendations to its privacy guidelines except:

firms should limit the length of time that any personal data is stored to six months or less.

MIS typically produce:

fixed, regularly scheduled reports based on data extracted from the organization's TPS

In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services.

free/freemium

Compared to traditional goods, digital goods have:

greater pricing flexibility.

Compared to digital markets, traditional markets have:

higher transaction costs.

The value chain model:

highlights specific activities in the business where competitive strategies can best be applied.

High velocity decision making systems are growing rapidly for decisions classed as:

highly structured.

A data warehouse is composed of

historic and current internal data

SaaS refers to:

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

Sociologists study information systems with an eye to understanding

how systems affect individuals, groups, and organizations

Psychologists study information systems with an eye to understanding

human decision makers perceive and use formal information

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

The Sarbanes-Oxley Act:

imposes responsibility on companies and management to safeguard the accuracy of financial information.

All of the following are issues with the traditional file environment except:

inability to develop specialized applications for functional areas.

GDSS capabilities have improved along with all of the following except:

increase in dedicated conference rooms

The business value of an effective supply chain management system includes all of the following except:

increased inventory levels

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n):

information policy

As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are:

information quality, organizational culture, and management filters.

All of the following are intangible assets of a firm except its:

information systems.

The three activities in an information system that produce the information organizations use to control operations are:

input, processing, and output.

The ________ phase of decision making finds or recognizes a problem, need, or opportunity

intelligence

Apple's Siri application is an example of

intelligent agents.

Components or parts of finished products are referred to as:

intermediate products.

Mintzberg outlined three categories of managerial roles:

interpersonal, informational, and decisional.

A VPN:

is an encrypted private network configured within a public network.

A Trojan horse:

is software that appears to be benign but does something other than expected

All of the following statements are true about information technology's impact on business firms except:

it helps firms expand in size.

If manufacturers had perfect information, they could implement a:

just-in-time strategy.

Along with capital, ________ is the primary production input that the organization uses to create products and services

labor

Expert systems:

lack the general intelligence of human beings.

A ________ is an example of pre-digital data storage that is comparable to a database

library card catalog

The four major competitive strategies are:

low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.

Order fulfillment involves all of the following business processes except:

making customers aware of the product.

The Internet increases the bargaining power of customers by

making information available to everyone.

Selling the same goods to different targeted groups at different prices is called:

price discrimination

A field identified in a table as holding the unique identifier of the table's records is called the:

primary key.

The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called:

procurement.

Manufacturing and production processes include all of the following except

product configuration.

Market creators:

provide a digital environment where buyers and sellers can establish prices for products.

VR systems:

provide architects, engineers, and medical workers with precise, photorealistic simulations of objects.

CAD workstations:

provide engineers, designers, and factory managers with precise control over industrial design and manufacturing.

Walmart's continuous replenishment system allows it to do all of the following except:

provide mass customization.

The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of

quantum computing

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

radiation.

RFID sensor-generated data on stored food items such as storage location is an example of

raw input

As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers

raw materials

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser

The bullwhip effect can be countered by:

reducing information uncertainty

The Gramm-Leach-Bliley Act:

requires financial institutions to ensure the security of customer data

Disciplines that contribute to the technical approach to information systems include

roles in a firm would be least affected by using mobile devices to access firm information systems?

In a table for customers, the information about a single customer resides in a single:

row.

Transaction brokers:

save users money and time by processing online sales transactions.

The decisions involved in creating and producing a corporate intranet can be classified as ________ decisions

semi structured

In a hierarchical organization, the upper level consists of:

senior management

The three principal levels within a business organization hierarchy are

senior management, middle management, and operational management

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:

social engineering.

In planning a robust e-commerce presence, you will want to consider the blog platform as part of your ________ presence

social media

Thomas Friedman's description of the world as "flat" refers to:

the flattening of economic and cultural advantages of developed countries

The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as:

the law of diminishing returns

According to ________, you should take the action that produces the least harm

the risk aversion principle

In a multi-tiered network

the work of the entire network is balanced over several levels of servers.

Information density refers to the:

total amount and quantity of information available to all market participants.

A ________ is a method of interaction with a customer, such as telephone or customer service desk

touch point

A well designed ESS will allow management to:

track the activities of competitors

All of the following are examples of business intelligence systems except a system that:

tracks the flows of materials in a factory

When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as

transaction costs

Output:

transfers processed information to the people who will use it or to the activities for which it will be used.

All of the following are unique features of e-commerce technology, except:

transparency

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n):

two-tiered client/server architecture

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

uniform resource locator

When there is no well-understood or agreed on procedure for making a decision, it is said to be:

unstructured.

OLAP enables

users to obtain online answers to ad-hoc questions in a rapid amount of time

A(n) ________ is software for locating and managing stored web pages

web server

A network that covers entire geographical regions is most commonly referred to as a(n):

wide area network.

The logical view of a database:

presents data as they would be perceived by end users

According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015?

$15 billion

According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately:

$15 million.

Which of the following may lead to competitive advantage? 1. New products, services, and business models; 2. Charging less for superior products; 3. Responding to customers in real time

. 1, 2, and 3

Which of the following is a computer-based system that attempts to emulate human behavior?

. AI technology

Geoadvertising sends ads to users based on their:

. GPS locations.

On which of the following protocols is the Internet based?

. TCP/IP

The 802.11 set of standards is known as:

. Wi-Fi

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect

. bullwhip

A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address

. router

GDSS such as Cisco Collaboration Meeting Rooms Hybrid can handle up to

500 participants.

About ________ percent of the United States GDP is produced by the knowledge and information sectors.

55

What percent of online retailers now have m-commerce websites?

55 percent

Which of the following statements about organizations is not true?

An informal group can be considered to be an organization.

________ is malware that logs and transmits everything a user types

A keylogger

Which of the following best describes the digital social graph?

A mapping of all online social relationships

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

Which of the following seeks to enhance human perception by combining a live direct view of the physical world with computer-generated images?

AR

All of the following are typical components or capabilities of an ECM system except:

AR tools.

How much did American businesses spend on information systems hardware, software, and telecommunications equipment in 2015?

About $1 trillion

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action

Accountability

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?

Airport code

Which of the following describes how the Simon framework of decision making works in high velocity decision environments?

All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow.

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

An AUP

Which signal types are represented by a continuous waveform?

Analog

Which of the following is not one of the Simon's four stages of decision making?

Analysis

Which of the following is not an example of the potential dark side of big data?

Analyzing data from sensors installed in local parks to monitor soil moisture.

Which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet?

B2C e-commerce

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry?

Benchmarking

________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.

Blade servers

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

The most appropriate wireless networking standard for creating PANs is:

Bluetooth.

Which of the following is not an example of a computer used as an instrument of crime?

Breaching the confidentiality of protected computerized data

Which of the following statements about business processes is not true?

Business processes are typically unaffected by changes in information systems

Which of the following dimensions of e-commerce technology has the potential to raise the quality of information?

Information density

A ________ is a senior manager who oversees the use of IT in the firm

CIO

Which of the following types of system would you use to manage relationships with your customers?

CRM

Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete?

Competitive forces model

Which of the following enables a company to tailor a particular aspect of enterprise software to the way a company does business?

Configuration tables

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

Controls

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

Which of the following is an example of a cross-functional business process?

Creating a new product

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company

Customer lifetime value

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack

DDoS

What service converts IP addresses into more recognizable alphanumeric names?

DNS

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which of the following types of information system?

DSS

Which of the following types of information systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance?

DSS

Which type of information system would you use to forecast the return on investment if your firm planned to switch to a new supplier that offered products at a lower cost?

DSS

________ are visual tools for presenting performance data in a BI system.

Dashboards and scorecards

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

Data dictionary

Which of the following occurs when the same attribute in related data files has different values?

Data inconsistency

Which of the following techniques is used for knowledge discovery?

Data mining

Which of the following is the most common reason that business systems fail?

Data quality

________ creates confusion that hampers the creation of information systems that integrate data from different sources.

Data redundancy

_______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage

Data security

The role of entrepreneur falls into which of Mintzberg's managerial classifications?

Decisional

Which supply chain planning function determines how much product is needed to satisfy all customer demands?

Demand planning

would not be used as an input for an information system

Digital Dashboard

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?

Digital divide

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly

Due process

Which of the following is the most common type of electronic evidence?

E-mail

Amazon.com is known primarily for its use of which of the following business models?

E-tailer

Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes?

ERP systems

An information system that combines data from internal TPS with information from financial systems and external sources to deliver reports such as profit loss statements and impact analyses, is an example of:

ESS

Which of the following systems would you expect to deliver integrated, personalized business content through a web-based interface?

ESS

Which of the following types of systems typically use a digital dashboard to display an array of charts and graphs of a business's key performance indicators?

ESS

Which of the following would you use to forecast trends in your supplier's industry that could affect your firm over the next five years?

ESS

What is the most important function of an enterprise application?

Enabling business functions and departments to share information

CRM systems help businesses achieve which of the following business objectives?

Enhanced customer intimacy

Which of the following is a firm's CPO responsible for?

Ensuring that the company complies with existing data privacy laws

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?

Ethernet

Which of the following would not be classified as a KWS?

Expert system

In 2015, American businesses spent $500 billion on business and management consulting and information technology services. (T/F)

False

Which of the following is a grouping of characters into a word, a group of words, or a complete number?

Field

Which of the following statements about disruptive technologies is not true?

Firms that invent disruptive technologies as first movers always become market leaders.

In data mining, which of the following involves using a series of existing values to determine what other future values will be?

Forecasting

From your reading of the LG Electronics case study, the company implemented JDA software solutions to solve what problems?

Inefficient logistics

Which of the following is a highly structured decision?

Granting credit to a customer

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?

Green computing

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Web browser software requests web pages from the Internet using which of the following protocols?

HTTP

Which of the following technologies would you use to analyze the social media data collected by a major online retailer?

Hadoop

Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case?

Higher customer satisfaction levels

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?

His action is acceptable, because the higher social value is the survival of the family

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers

ISP

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else

Identity theft

Which of the following best describes Immanuel Kant's categorical imperative?

If an action is not right for everyone to take, it is not right for anyone to take

Which of the following is not a business benefit of collaboration?

Improved compliance with government regulations

Which of the following statements best describes the business value of improved decision making?

Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values

Which of the following is not one of the current key technology trends that raises ethical issues?

Increase in data quality

Which of the following dimensions of e-commerce technology involves engaging consumers in a dialog that dynamically adjusts the experience to the individual?

Interactivity

The role of liaison falls into which of Mintzberg's managerial classifications?

Interpersonal

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following?

IoT application

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues

Why isn't overstocking warehouses an effective solution for a problem of low availability?

It increases inventory costs

Which of the following statements about 3-D printing is not true?

It is incompatible with the cloud

Which of the following statements about botnets is not true?

It is not possible to make a smartphone part of a botnet

Which of the following does not describe the dimensions of knowledge in a firm?

It is subject to the laws of diminishing returns.

Which of the following statements about the technical view of organizations is not true?

It sees the inputs and outputs, labor and capital, as being infinitely malleable.

Which of the following statements about Plan International's new human resources system, as described in the chapter case, is not true?

It took six months to implement a working system at Plan International's international headquarters

Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making

KMS

Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called:

KPIs.

What is meant by the statement "knowledge is sticky"?

Knowledge is hard to move

Which of the following is not one of the main four dimensions of knowledge described in the chapter?

Knowledge is timeless

Which of the following statements is not an accurate description of the importance of knowledge to a firm?

Knowledge is unconditional

Which of the following statements best describes the relationship between collaboration and knowledge management?

Knowledge is useful only when shared with others

Personnel who design new products or services for a firm belong to which level of a business hierarchy

Knowledge workers

Which of the following is a tool for the management, delivery, tracking, and assessment of various types of employee learning?

LMS

Which field of study focuses on both a behavioral and technical understanding of information systems

Management information systems

Which of the following deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm?

Management information systems

Verizon's use of a web-based digital dashboard to provide managers with precise real-time information enabled it to improve which of the following?

Managerial decision making

Which of the following is not one of the five observed ways in which managerial behavior differs from the classical description of managers?

Managers perform a low number of activities for a high percentage of time.

The total number of food items with storage temperatures problems is an example of which of the following?

Meaningful information

________ states that the value or power of a network grows exponentially as a function of the number of network members

Metcalfe's Law

Which of the following are most likely to rely primarily on the drill-down functionality of BI for their decision making needs?

Middle managers

_______ uses individual atoms and molecules to create computer chips and other devices

Nanotechnology

Which of the following marketplace forces would be of least concern to a manufacturer of deep-sea oil rigs?

New market entrants

Which of the following tools enables users to view the same data in different ways using multiple dimensions?

OLAP

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

On-demand

Walmart exemplifies the power of information systems coupled with state-of-the-art business practices and supportive management to achieve which of the following

Operational Efficiency

To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support

Operational excellence

In a business hierarchy, which of the following levels is responsible for monitoring the daily activities of the business?

Operational management

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?

Packet switching

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?

Peer-to-peer

Converting raw data into a more meaningful form is called

Processing

________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors.

Product differentiation

in a firm what role would be least affected by using mobile devices to access firm information systems

Production Workers

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

Quality of life

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read.

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Ransomware

Which of the following would not be considered semistructured knowledge?

Request for proposals

________ means that you accept the potential costs and obligations for the decisions you make.

Responsibility

Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience?

Richness

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

Risk assessment

From your reading of the chapter's opening case, Skullcandy chose enterprise resource planning software from which of the following ERP vendors?

SAP

Which of the following types of system enables management to make better decisions regarding organizing and scheduling sourcing, production, and distribution?

SCM

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n)

SLA.

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

Safety stock

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?

Select the functions of the system you wish to use.

Which level of the organization is an ESS specifically designed to serve?

Senior management

A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data?

Sentiment analysis software

Which of the following is not one of the techniques used in web mining?

Server mining

Which of the following is an example of a direct good in the automobile industry?

Sheet steel

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

Slippery-slope rule

Which of the following industries has the lowest barrier to entry?

Small retailer

Which type of decision is calculating gross pay for hourly workers?

Structured

________ knowledge exists in formal documents, as well as in formal rules that organizations derive by observing experts and their decision-making behaviors

Structured

Which of the following statements about collaboration is not true?

Successful collaboration can be achieved through technology regardless of the organization's culture or structure.

A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives?

Survival

Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination?

Switch

Which of the following job categories is expected to experience the most growth over the next eight years?

Systems analysts

To monitor the status of internal operations and the firm's relations with the external environment, managers need which of the following types of system?

TPS

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?

The Privacy Act

Which of the following best illustrates the relationship between entities and attributes?

The entity CUSTOMER with the attribute PURCHASE

________ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.

Unified communications

Which of the following is not true about the changes to EU data protection rules proposed in 2012?

The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data.

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

The opt-in model

All of the following are current hardware platform trends except:

Unix.

Which type of decision is deciding whether to introduce a new product line?

Unstructured

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws.

Which of the following is the greatest obstacle in enabling collaboration between employees at different, distant corporate locations?

Time zones

Which of the following statements about EDI is not true?

Today, EDI is only used for document automation.

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

Which of the following is an example of a legacy system?

Transaction processing system running on a mainframe

Which of the following is the single greatest cause of network security breaches?

User lack of knowledge

Running a Java program on a computer requires:

a Java Virtual Machine to be installed on that computer

To use the analog telephone system for sending digital data, you must also use:

a modem.

Backward chaining is:

a strategy for searching the rule base in an expert system that begins with a hypothesis.

Forward chaining is:

a strategy for searching the rule base in an expert system that begins with information entered by the user.

An inference engine is:

a strategy used to search through the rule base in an expert system by forward chaining or backward chaining

A MOOC is:

a type of online course.

Today's nanotechnology-produced computer transistors are roughly equivalent in size to:

a virus

Walmart's attempt to increase its online presence is an example of a firm using information systems to:

achieve low-cost leadership.

The introduction of the minicomputer:

allowed computers to be customized to the specific needs of departments or business units.

a private corporate network extended to authorized users outside the organization

an extranet

In ________, raw data is systematically acquired and transformed during various stages that add value to that information.

an information value chain

Customer service modules in CRM systems provide tools for

assigning and managing customer service requests.

All of the following are steps in the process for analyzing an ethical issue except:

assigning responsibility

Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party

asymmetry

In order to achieve maximum benefit from an enterprise software package, a business should:

change the way it works to match the software's business processes

Instant messaging is a type of ________ service.

chat

The measurement of the number of customers who stop using or purchasing products or services from a company is called:

churn rate

The telephone system is an example of a ________ network

circuit-switched

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of

click fraud

All of the following are technologies used to analyze and manage big data except:

cloud computing.

Computer forensics tasks include all of the following except:

collecting physical evidence on the computer.

All of the following job categories are expected to grow over the next eight years except:

computer programmers.

Interpretations of Moore's law assert that:

computing power doubles every 18 months

The dimension of ________ describes whether data elements are consistently defined

consistency

A drawback to high velocity, automated decision-making systems is that they are unable to

control themselves and respond to new environments.

A(n) ________ is an activity for which a firm is a world-class leader

core competency

IPv6 has been developed in order to:

create more IP addresses.

Selling a customer with a checking account a home improvement loan is an example of:

cross-selling.

Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of:

crowdsourcing.

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its

culture

The intentional defacement or destruction of a website is called:

cybervandalism.

A foreign country attempting to access government networks in order to disable a national power grid is an example of

cyberwarfare.

The total time it takes to complete a business process, from start to finish, is called its ________ time

cycle

The text defines ________ as the flow of events or transactions captured by an organization's system.

data

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

data scrubbing.

All of the following are technical solutions to protecting user privacy except:

data use policies

The term big data refers to all of the following except:

datasets with fewer than a billion records

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits

digital

Removing the business process layers in a distribution channel is called:

disintermediation.

DBMSs typically include report generating tools in order to:

display data in an easier-to-read format.

Varying a product's price according to the supply situation of the seller is called ________ pricing

dynamic

In ________, digital technology and the Internet are used to execute the major business processes in the enterprise.

e-business

Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.

e-business suites

Using the Internet to buy or sell goods is called:

e-commerce.

Which of the following best illustrates the transaction fee revenue model?

eBay receives a small fee from a seller if a seller is successful in selling an item

Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors

market niche

The ability to offer individually tailored products or services using the same production resources as bulk production is known as:

mass customization.

Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively.

micropayment

The term management information systems refers to a specific category of information systems serving:

middle management functions.

Behavioral models of management see managers as being ________ than does the classical model.

more informal

A firm can exercise greater control over its suppliers by having:

more suppliers.

A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.

multicore processor

All of the following are increased in traditional markets compared to digital markets except:

network effects

The backbone networks of the Internet are typically owned by long-distance telephone companies called:

network service providers.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization.

Implementing enterprise software from Oracle enabled Alcoa to achieve all of the following except:

obtain lower prices for raw materials.

Software that manages the resources of the computer is called:

operating system software

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected

opt-out

The practice of contracting custom software development to an outside firm is commonly referred to as:

outsourcing

A DBMS makes the:

physical database available for different logical views

BI that is designed to determine the most likely effects of changes in the business environment is called:

predictive analytics

Predictive search in Google's search engine:

predicts what you are looking for as you enter words into the query box.

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:

software packages.

A SAN is a ________ network.

storage area

If you can follow a definite procedure to make a business decision, you are making a(n) ________ decision

structured

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a/an:

supply chain

The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities

support

The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as:

switching costs

When two organizations pool markets and expertise that result in lower costs and generate profits, they are creating:

synergies.

The principal liaison between the information systems groups and the rest of the organization is a(n):

systems analyst.

The text defines ________ as expertise of organizational members that has not been formally documented

tacit knowledge

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are:

tasks, technology, people, and structure.

A(n) ________ is a scheme for classifying information and knowledge in such a way that it can be easily accessed.

taxonomy

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

technology standards

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

the Golden Rule

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called:

the Internet of Things.

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression.


Ensembles d'études connexes

Unit 2 Kinematics Triangle Formulas

View Set

Securities Industry Essentials Exam

View Set

State Exam -The Texas Real Estate Commission

View Set

Quiz 2: Denotation, Connotation, Tone, and Nuance

View Set

Part 4: Environmental Emergencies

View Set

NUR101 - Chp. 10 - End-of-Life Care

View Set

Study Guide: Federal Income Tax: Individuals Test #1

View Set