Chap 8, 11, 12
________ is the collective and individual experience applied to solving problems.
Wisdom
Data mining and big data analytics are examples of ________.
a business analytics toolset
A strong foundation in database technology is required for ________.
business intelligence and analytics
Databases, data warehouses, data marts, and analytic platforms are part of the ________.
business intelligence infrastructure
From an information technology perspective, ________ includes the infrastructure for warehousing, integrating, reporting, and analyzing data from the business environment.
business intelligence (BI)
according to the balanced scorecard framework, a firm's ________ strategic objectives include accident ratios and equipment downtown.
business process
Viruses differ from worms because worms ________.
can operate on their own without attaching to other computer program files
The ________ model of management describes the five traditional functions of managers as planning, organizing, coordinating, deciding, and controlling.
classical
Business intelligence users can be grouped into two types: _______ who comprise _______ of employees, and _______ who comprise ________ of employees.
power users; 20%; casual users; 80%
What type of analytics uses statistical analysis, data mining techniques, historical data, and assumptions about future conditions to predict future trends and behavior patterns?
predictive
FedEx has been using ________ to develop models of how customers will respond to price changes and new services.
predictive analytics
The knowledge management value chain begins with the ________.
procurement
Regarding business intelligence and analytics capabilities, a(n) ________ could include submitting financial documents to the SEC using XBRL (industry-specific requirements).
production report
A form of encryption that uses two keys is called ________.
public key
When thinking about security, controls ________.
refer to policies and procedures that ensure the safety of an organization's assets.
A decision where only part of the problem has an obvious answer is an example of a(n) ________ decision.
semi-structured
Examining college admission scores in addition to interviewing the applicant is an example of a(n) ________ decision.
semi-structured
A company's marketing managers meet to create a new marketing plan. According to Leila, this is an example of _____ decision making.
semistructured
Asking what happens to mining profits if the price of silver drops by 5 percent is an example of ________.
sensitivity analysis
______ help(s) ensure that important network traffic receives high priority, and less-critical network traffic receives lower priority.
Deep packet inspection (DPI)
________ are data files used to identify and protect online transactions using a trusted third party.
Digital certificates
Which below is the correct definition of "war driving"?
Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
Identifying ________ is a way for managers to determine how to measure the effectiveness of an organization
KPIs
How is a knowledge asset different from a physical one?
Knowledge is not subject to the law of diminishing returns as physical assets are.
A ________ is a software program that mimics another program and often causes damage.
Trojan horse
MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted.
disaster recovery planning
Which of the knowledge management systems' IS activities involve search engines?
disseminate
Regarding business intelligence and analytics capabilities, a(n) ________ allows moving from a high-level summary to a micro-level view.
drill down
When the data in a message is converted from plain text to cipher text, a process called _________ is used.
encryption
A manager interested in a system that can organize and disseminate knowledge throughout the organization is likely interested in a(n) ________.
enterprise content management system
the acronym ESS stands for ________.
executive support system
A(n) ________ system is a decision-making tool that follows a series of IF-THEN-ELSE rules.
expert
FAQs and product manuals are examples of _____ knowledge.
explicit
what are the two major components of knowledge management?
explicit and tacit
According to the balanced scorecard framework, a firm's ________ strategic objectives include cash flow and return on equity.
financial
A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________.
firewall
IS security firewalls are an example of a ________.
gatekeeper
________ algorithms were inspired by biological systems that examine optimal solutions for a given problem based on big data.
genetic
Mapping areas of the country with higher RSV rates is an example of a ________.
geographic information systems (GIS)
A ________ is an interactive computer-based system for facilitating the solution of unstructured problems by a set of decision makers.
group decision-support system (GDSS)
Someone who intends to gain unauthorized access to a computer system is considered to be a ________
hacker
The ________ role is NOT one of the activities that managers are expected to perform in an organization.
high velocity
If someone loads a program that tracks everything you type, the specific spyware is a(n) ________.
key logger
The acronym KPI stands for ________.
key performance indicator
A scientist who works to create information for organizations is considered a(n) ________ worker.
knowledge
To transform information into _________, resources are used to discover patterns, rules, and context.
knowledge
to transform information into ________, a firm must expend additional resources to discover patterns, rules, and contexts.
knowledge
Expert systems model human knowledge in a structure known as a(n) ________.
knowledge base
Neural networks are used for ________.
knowledge discovery
Based on the information in this video, _____ tools are used to collect and store employee knowledge and to make that knowledge available to employees, customers, and others who need it.
knowledge management
_______ represents an organization's business processes that are designed to create, store, transfer, and apply knowledge.
knowledge management
A(n) ________ is a major type of KM which includes specialized workstations that enable scientists, engineers, and other knowledge workers to create and discover new knowledge.
knowledge work systems
Neural networks ________ to distinguish between valid and fraudulent credit purchases.
learn from patterns in data
neural networks are now being used by companies (e.g., Visa International) to detect credit card fraud by ________.
learning from patterns in transaction data
_______ systems are used by both organizations and universities to manage, deliver, and assess learning and training content.
learning management
Canvas and Blackboard are examples of ________.
learning management systems
________ refers to identifying patterns in very large database without explicit programming but with significant human training.
machine learning
________ is the study of how computers can potentially improve without human programming.
machine learning
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware
The multidimensional analysis tool in spreadsheets is called a ________.
pivot table
A manager that is considered to be a "super user" ________.
wants to create their own reports and use more sophisticated analytics
_________ describes the collective and individual experience of applying knowledge.
wisdom
independent computer programs that copy themselves from one computer to others over a network are called ________.
worms
The law that requires financial institutions to ensure confidentiality of customer data is called the ________
Gramm-Leach-Bliley Act
Storing past experiences in the form of cases is a KM method called ________.
case-based reasoning (CBR)
the single largest threat to the Internet is _____.
denial-of-service attacks
A(n) ________ is a major type of KM that collects, stores, and disseminates digital content and knowledge
enterprise-wide KMS
A ________ is a program that monitors information traveling over a network and ________.
sniffer; is never legitimately used
Studies of actual managerial performance indicate that managers perform work at a pace of _______ different activities each day.
600
which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.
What would describe proper use of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet?
Acceptable use policy
________ allows scientists the ability to create graphical renditions of DNA.
Augmented Reality
Design engineers (knowledge workers) often use ________ as a routine aspect of their work.
CAD
________ allows for the automated creation of designs using advanced graphics software.
CAD
What is GDSS?
Group decision support systems
If you work in the health care industry, your firm will need to comply with which Act below?
HIPAA
_______ was passed in 1996 to protect medical records.
HIPAA
_______ feature(s) monitor the network at its most vulnerable points.
Intrusion detection systems
A massive online course available to the general public is called a ________ .
MOOC
What are MOOCs?
Massive open online course
Which list below contains the analytic functionalities that BI systems deliver?
Production reports, parameterized reports, dashboards/scorecards, ad hoc query/search/report creation, and drill down.
A type of malware that takes advantage of poorly coded Web applications is called ________.
SQL injection attacks
________ is a method for encrypting network traffic on the web.
SSL
In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.
Sarbanes-Oxley
What are knowledge work systems?
Specialized systems for discovering and creating new knowledge.
All of the following are methods of authentication EXCEPT ________.
TCP/IP
Which of the knowledge management systems' IS activities involve data mining?
acquire
Regarding business intelligence and analytics capabilities, a(n) ________ allows users to generate their own reports based on searches.
ad hoc query
Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.
administrative
Data which are not visible to the average user are called ________.
ambient data
Organizational learning is the result of knowledge ________.
applications
The use of computers (hardware and software) to emulate human behavior is called ________.
artificial intelligence (AI)
A risk ________ determines the level of risk to an organization if an activity or process is not properly controlled.
assessment
An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats.
audit
Use of MRI and CAT technologies during image-guided surgery are considered _______
augmented reality
________ is used to ensure the person is who he/she claims to be.
authentication
Hackers flooding a network server with many thousands of false communication requests is called _____
a denial-of-service attack
Using your handprint to access a safe deposit box is an example of ________ authentication
biometric
In March 2016, a high ranking political figure received an email indicating that his account had been compromised and that he should follow the enclosed link to reset his Google password. This was an example of ________.
click fraud
A ________ is an informal social network of professionals and employees within and outside the firm who have similar work-related activities and interests.
communities of practice
When a manager is provided all the facts necessary to support a decision, the ______ dimension of information quality is satisfied.
completeness
The career field that deals with collection and examination of computer data for legal evidence is called ________.
computer forensics
is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
computer forensics
A firm's ________ should include an awareness of computer forensics.
contingency planning process
According to the balanced scorecard framework, a firm's ________ strategic objectives include customer loyalty and customer retention.
customer
SQL injection attacks are related to ________.
databases
The classical model of management includes the managerial functions of planning, organizing, coordinating, controlling, and _____________.
deciding
A manager's ________ role includes handling disputes.
delusional
A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.
denial of service
Regarding the decision-making process, ________ includes examining alternatives to solve the problem.
design
When a decision maker outlines and investigates several potentially useful solutions to a problem, the ________ stage of decision-making is being performed.
design
________ consists of processes and tools to identify the valid users of a system.
identity management
Regarding the decision-making process, ________ includes making the chosen solution work.
implementation
_______ represents an organization's business processes that are designed to create, store, transfer, and apply knowledge.
increases
Knowledge workers usually have ________ as a routine aspect of their work.
independent judgement
Which of the following is NOT a requirement of a knowledge work system?
inference engine
A(n) ________ examines the firm's overall security including controls governing individual systems.
information systems audit
A manager's ________ role includes obtaining the most up-to-date information.
informational
All of the following are general controls EXCEPT ________ controls.
input
Regarding the decision-making process, ________ includes discovering and understanding problems occurring in the organization.
intelligence
The iPhone voice Siri is a type of ________.
intelligent agent
When someone uses a software program to carry out a specific task using a learned knowledge base, this is an example of a(n)________.
intelligent agents
A(n) ________ is a major type of KM which provides tools for discovering patterns and applying knowledge to discrete decisions.
intelligent technique
When managers act as leaders, motivating, counseling, and supporting their subordinates, they are performing the ___________ role.
interpersonal
________ includes computer viruses, worms, and Trojan horses.
malware
Business strategy is considered part of the ________.
managerial users and methods
MIS, DSS, and ESS are part of the ________.
managerial users and methods
Behavioral models suggest that the actual actions of managers are ________ than previously believed.
more informal
A(n) ________ network learns from identifying patterns in large datasets.
neural
The most commonly used authentication technique used for end users is ________
password
If someone sends you an email trying to appear as a normal site that you commonly visit to obtain unauthorized information, the person is ________.
phishing
how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers
spoofer
Not allowing credit if an individual's credit score is below 600 is an example of a(n) ________ decision
structured
What types of decisions are repetitive, routine, and involve a definite procedure for handling?
structured
last quarter's sales figures are considered ________ knowledge.
structured
A lead chef quitting at a restaurant and taking his secret recipes with him or her is considered ________ knowledge.
tacit
the knowledge an employee has in his mind that has not been documented is called _______
tacit knowledge
A unified threat management system does NOT include a(n) ________.
token
Public key encryption uses ________ key(s).
two
Information in folders, messages, memos, proposals, emails, graphics, electronic slide presentations, and even videos created in different formats and stored in many locations is considered ________ knowledge.
unstructured
a company's decision to introduce a new product is an example of ____
unstructured
which types of decisions are made at the executive level of an organization?
unstructured
Senior executives determining five-year goals is an example of a(n) ________ decision.
unstructured (provide Judgement)
A decision about whether or not to enter a new market would be characterized as ________ and is the responsibility of _______ management.
unstructured; senior
A report showing an employee's age as a negative number is useless because it lacks ________.
validity