Chapter 9 & Chapter 15 CIS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A​ ________ is considered a planned activity to achieve a specific business objective.

project

Enterprise applications introduce​ _________ that describe how once a company adopts an enterprise application from a single​ vendor, it is very costly to change​ vendors, and the firm becomes dependent on the vendor.

switching costs Your firm can become dependent on the vendor to upgrade its product and maintain your installation.

Copyright protects creators​ (individuals) of intellectual property for​ ________.

70 years after the​ author's death Copyright is a statutory grant that protects creators of intellectual property from having their works copied for any other purpose for the life for the author plus an additional 70 years after the​ author's death.

​________ targeting techniques increase the effectiveness of​ banners, rich​ media, and video ads.

Behavioral Many​ e-commerce marketing firms use behavioral targeting techniques to increase the effectiveness of​ banners, rich​ media, and video ads.

Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a​ peer-to-peer network nearly instantaneously without a central​ authority?

Blockchain Blockchain is a distributed database technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority.

Design engineers​ (knowledge workers) often use​ ________ as a routine aspect of their work.

CAD Design engineers often use​ three-dimensional (3D) CAD systems to help create knowledge for the organization.

________ are one of several techniques used to measure the value of investing in​ long-term capital investment projects.

Capital budgeting models

Who is responsible for educating and training users and information systems specialists about​ security, keeping management aware of security threats and​ breakdowns, and maintaining the tools and policies chosen to implement​ security?

Chief security officer​ (CSO) The chief security officer​ (CSO) is in charge of information systems security for the firm and is responsible for enforcing the​ firm's information security policy.

​________ are small text files loaded on a computer when a user visits Web sites.

Cookies Cookies are small text files deposited on a computer hard drive when a user visits Web sites.

A​ powerful, current example of a rapidly expanding ecosystem is the mobile Internet platform. In this ecosystem there are four​ industries; select the answer that identifies them.

Device​ makers, wireless telecommunication​ firms, independent software applications​ providers, and Internet service providers Each of these industries has its own​ history, interests, and driving forces. But these elements come together in a sometimes​ cooperative, and sometimes​ competitive, new industry we refer to as the mobile digital platform ecosystem. More than other​ firms, Apple has managed to combine these industries into a system.

Which of the knowledge management​ systems' IS activities involve search​ engines?

Disseminate Disseminate activities include intranet​ portals, search​ engines, and collaboration.

Which below is the correct definition of​ "war driving"?

Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic Wireless networks in many locations do not have basic protections against war driving. An intruder that has associated with an access point by using the correct SSID is capable of accessing other resources on the network.

​________ avoid the problem of having databases in areas such as​ finance, human​ resources, sales and​ marketing, and manufacturing that are not capable of sharing information.

Enterprise resource planning​ (ERP) systems Enterprise systems​ (also known as enterprise resource planning​ systems) are based on a suite of integrated software modules and a common central database. The database collects data from many different divisions and departments in a firm.

​A(n) ________ is used by senior managers to make decisions.

Executive support systems​ (ESS) help senior management make decisions.

What type of service can tell you the price of a house you are looking at or about special exhibits at a museum you are​ passing?

Geoinformation services A geoinformation service can provide a special kind of browser for smartphones equipped with a​ built-in GPS and compass that can identify your precise location and where the phone is pointed.

Which of the following options is a page description language for generating Web pages​ (e.g., text, dynamic​ links)?

HTML Hypertext Markup Language​ (HTML) is a page description language for specifying how text and graphics are placed on a Web page.

What does HTML stand​ for?

Hypertext Markup Language HTML​ (Hypertext Markup​ Language) is a page description language for specifying how​ text, graphics,​ video, and sound are placed on a Web page and for creating dynamic links to other Web pages and objects.

A new version of IP​ addressing, which contains​ 128-bit addresses, is called​ ________.

IPv6 The old addressing system is being replaced by a new version of the IP addressing schema called IPv6​ (Internet Protocol version​ 6), which contains​ 128-bit addresses​ (2 to the power of​ 128), or more than a quadrillion possible unique addresses. IPv6 is not compatible with the existing Internet addressing​ system, so the transition to the new standard will take years. Next Question

What are the steps that companies go through while practicing business process​ manage

Identify processes for​ change, analyze existing​ processes, design the new​ process, implement the new​ process, and continuous measurement.

What are the steps in​ prototyping?

Identify the​ user's basic​ requirements, develop an initial​ prototype, use the​ prototype, and revise and enhance the prototype.

The SQL​ ________ statement allows you to combine two different tables.

JOIN The JOIN statement allows you to combine two more tables in a database.

Managers determine how to measure the effectiveness of an organization by identifying​ ________.

KPIs

Knowledge workers perform three key roles that are critical to the organization and to the managers who work within the organization. Select the list below that contains these three roles.

Keeping the organization current in​ knowledge, serving as internal​ consultants, acting as change agents. Knowledge workers usually have high levels of education and memberships in professional organizations and are often asked to exercise independent judgment as a routine aspect of their work. For​ example, knowledge workers create new products or find ways of improving existing ones.

Which statement below best describes an enterprise​ system?

Large scale software that encompasses a whole company across many departments and business functions. Enterprise systems feature a set of integrated software modules and a central database that enables data to be shared by many different business processes and functional areas throughout the enterprise.

​________ systems are older transaction processing​ systems, usually created for mainframes.

Legacy Legacy systems are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.

Which list below contains all the factors you can use to answer the​ question: How much should our firm spend on IT​ infrastructure?

Market demand for your​ firm's services, your​ firm's business​ strategy, your​ firm's IT​ strategy, infrastructure and​ cost, information technology​ assessment, competitor firm​ services, and competitor firm IT infrastructure investments Your firm does not necessarily need to spend as much​ as, or more​ than, your competitors. Perhaps it has discovered much​ less-expensive ways of providing​ services, and this can lead to a cost advantage.​ Alternatively, your firm may be spending far less than competitors and experiencing commensurate poor performance and losing market share.

​________ states that the number of components that a computer chip can hold doubles every two years.

Moore's Law In​ 1965, Gordon​ Moore, the director of Fairchild​ Semiconductor's Research and Development​ Laboratories, an early manufacturer of integrated​ circuits, wrote in Electronics magazine that since the first microprocessor chip was introduced in​ 1959, the number of components on a chip with the smallest manufacturing costs per component​ (generally transistors) had doubled each year. This assertion became the foundation of​ Moore's Law.

​________ is a method for encrypting network traffic on the web.

SSL Secure Sockets Layer is a method for encrypting network traffic during a secure Web session.

n​ 2002, the​ ________ Act was passed to help protect investors with new financial statements reforms.

Sarbanes-Oxley Sarbanes-Oxley Act was designed to protect investors with new compliance regulations.

Which item below would be considered direct​ goods?

Sheet steel used for auto body construction Direct goods are goods used in a production process.

Formalizing​ standards, rules, and procedures to ensure that the​ organization's general and application security controls are properly executed and enforced is​ a(n) ________ control.

administrative Formalize​ standards, rules,​ procedures, and control disciplines to ensure that the​ organization's general and application controls are properly executed and enforced.

The Law of Mass Digital Storage suggests that the​ ________.

amount of digital information doubles each year According to the Law of Mass Digital​ Storage, the amount of digital information is roughly doubling every year.

A risk​ ________ determines the level of risk to an organization if an activity or process is not properly controlled.

assessment A risk assessment determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all risks can be anticipated and​ measured, but most businesses will be able to acquire some understanding of the risks they face.

Another name for a database field is​ a(n) ________.

attribute An attribute and a field are often used interchangeably.

The most common form of organizational change is​ ________.

automation Automation is the most common form of organizational change. It is considered low​ risk, low return. Automatically calculating paychecks is an example of simple automation.

The widespread use of personal devices in the workplace and school is often referred to as​ ________.

bring your own device​ (BYOD) The​ popularity, ease of​ use, and rich array of useful applications for smartphones and tablet computers have created a groundswell of interest in allowing employees to use their personal mobile devices in the​ workplace, a phenomenon popularly called​ "bring your own​ device" (BYOD). Next Question

Global communication and transportation technologies are an example of​ a(n) ________.

business driver

​Databases, data​ warehouses, data​ marts, and analytic platforms are part of the​ ________.

business intelligence infrastructure

When a strategic system is​ adopted, managers will need to devise new​ ________ for coordinating their​ firm's activities with​ customers, suppliers, and other organizations.

business process Business processes must be created for coordination with​ customers, suppliers, and other organizations.

A​ ________ is a component in the computer system data hierarchy that represents an ASCII character like a​ letter, a​ number, or another symbol.

byte A group of​ bits, called a​ byte, represents a single​ character, which can be a​ letter, a​ number, or another symbol.

Downloading a Kindle​ e-book from​ Amazon, buying a computer online at Best​ Buy, and downloading a music track from​ iTunes, are examples of how information systems help business processes​ ________.

change the flow of information New technology can actually change the flow of​ information, making it possible for many people to perform tasks that can be performed simultaneously.

The person responsible for information security in most organizations is the​ ________.

chief security officer The chief security officer is responsible for the information security of the firm and for enforcing the​ firms' security policies.

The​ ________ model of management describes the five traditional functions of managers as​ planning, organizing,​ coordinating, deciding, and controlling.

classical The classical model of management describes what managers do as​ planning, organizing,​ coordinating, deciding, and controlling.

Working together as a team to align a competitive strategy with the​ company's goals is an example of​ ________.

collaboration Collaboration is working with others to achieve shared and explicit goals.

Craigslist is an example of a massive​ ________ electronic commerce organization.

consumer-to-consumer (C2C) C2C electronic commerce involves consumers selling directly to consumers. Craigslist and eBay are among the largest C2C organizations.

Allowing each country unit the opportunity to develop an application first in its home country is​ a(n) ________ strategy.

cooptation

Shopkick is a mobile application that enables retailers to offer customers​ ________.

coupons Shopkick is a mobile application that enables retailers such as Best Buy to offer coupons to people when they walk into their store. This technology uses GPS to help identify the location of the shopper.

Which of the following is NOT an expected consequence of a systems development project that is poorly​ managed?

customer satisfaction

Businesses that collaborate and use social business often see benefits in​ productivity, quality,​ innovation, sales​ growth, and​ ________.

customer service Business benefits of collaboration and social business include​ productivity, quality,​ innovation, customer​ service, and financial performance.

A(n) ________ is a tool which contains information about individual pieces of data and data groupings within a system.

data dictionary

Data​ cleansing, also known as​ _________, consists of activities for detecting and correcting data in a database that are​ incorrect, incomplete, improperly​ formatted, or redundant.

data scrubbing Data cleansing not only corrects errors but also enforces consistency among different sets of data that originated in separate information systems. Specialized​ data-cleansing software is available to automatically survey data​ files, correct errors in the​ data, and integrate the data in a consistent​ company-wide format.

​A(n) ________ is a collection of data organized to serve many applications efficiently.

database A database is a collection of data organized to serve many applications efficiently.

SQL injection attacks are related to​ ________.

databases An attacker uses a rogue SQL query to the underlying database to access the database or network.

The classical model of management includes the managerial functions of​ planning, organizing,​ coordinating, controlling, and​ _____________.

deciding Deciding is the fifth classical function of management.

A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.

denial of service In a​ denial-of-service attack, hackers flood a network server with false communications.

U.S. schools are experiencing​ a(n) ________, which means that students in poorer schools have less access to technology.

digital divide A digital divide exists in U.S.​ schools, with schools in​ high-poverty areas less likely to have​ computers, high-quality educational technology​ programs, or Internet access availability for their students.

An innovation that dramatically changes the business environment is called​ a(n) ________.

disruptive technology Disruptive technologies are substitute products that perform as well as or better​ (often much​ better) than anything currently produced and​ so, dramatically change the business environment.

The Domain Name System​ (DNS) converts​ ________ to​ ________.

domain​ names; IP addresses The Domain Name System​ (DNS) converts domain names​ (English-like) to IP addresses.

A company that purposefully centralizes most business activities in its home country is said to utilize​ a(n) ________ strategy.

domestic exporter

​Nike's distributors are​ ________ in the supply chain.

downstream

Regarding business intelligence and analytics​ capabilities, a(n)​ ________ allows moving from a​ high-level summary to a​ micro-level view.

drill down Drill down is the ability to move from a​ high-level summary to a more detailed view.

​A(n) ________ is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.

enterprise software application The resulting IT infrastructure links different pieces of computer hardware and smaller networks into an​ enterprise-wide network so that information can flow freely across the organization and between the firm and other organizations. It can link different types of computer​ hardware, including​ mainframes, servers,​ PCs, and mobile​ devices, and it includes public infrastructures such as the telephone​ system, the​ Internet, and public network services.

A type of Net marketplace that has experienced many failures is the​ _______, an​ independently-owned Net marketplace.

exchange Exchanges are independently owned​ third-party Net marketplaces that connect thousands of suppliers and buyers for spot purchasing.

Systems that are used by senior management to make decisions are called​ ________.

executive support systems Executive support systems are used to provide senior management with data in order to make decisions.

A combination of hardware and software that prevents unauthorized users from accessing a network is called a​ ________.

firewall Firewalls prevent unauthorized users from accessing private networks. A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

Norway currently ranks​ ________ worldwide in the percentage of the total population using the Internet.

first

Information systems can​ ________ the organization by empowering​ lower-level employees.

flatten Information systems can decrease the number of levels in an​ organization, which flattens the​ organization, by providing​ lower-level employees more​ decision-making authority.

A company such as McDonalds or KFC uses​ a(n) ________ global strategy.

franchiser

The first consideration when considering an international information system architecture includes examining​ ________.

global environment business drivers and challenges

Information systems project costs include​ ________.

hardware, software, workspace and human costs

The number of cycles per second that can be sent through a network medium is calculated in​ ________.

hertz The number of cycles per second that can be sent through a network medium is measured in hertz.

All of the following are important questions about IT governance EXCEPT​ ________.

how data should be stored in a database IT governance deals with more​ broad-based and​ higher-level issues.

For companies practicing business process​ management, the​ ________ step is the critical phase where the​ question, "what business processes need​ improvement" is asked.

identify processes for change Identify processes for change is the first step in the business processing management procedure.

The first step of the prototyping process is to​ ________.

identify the user's basic requirements

Immanuel​ Kant's Categorical Imperative states​ ________.

if an action is not right for everyone to take, it is not right for anyone to take One question to ask when thinking about this is​ "If everyone did​ this, could the​ organization, or​ society, survive?"

Advances in data storage techniques and the rapidly declining costs of data storage threaten​ ________.

individual privacy Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on​ individuals, employees,​ customers, and potential customers.

FIP is a set of principles governing the collection and use of​ ________.

information about individuals FIP​ (Fair Information​ Practice) is a set of principles governing the collection and use of information about individuals. It was first set forth in a report written in 1973 by a federal government advisory committee and updated most recently in 2010 to consider new​ privacy-invading technology​ (FTC, 2010; U.S. Department of​ Health, Education, and​ Welfare, 1973).

​A(n) ________ specifies the rules of an organization for sharing and disseminating information.

information policy An information policy specifies the​ organization's rules for​ sharing, disseminating,​ acquiring, standardizing,​ classifying, and inventorying information.

Regarding moral dimensions of the information​ age, ________​ include(s) the issue of determining the data that individuals and organizations can protect.

information rights and obligations Information rights and obligations include what information rights individuals and organizations possess with respect to themselves.

​E-commerce refers to the use of the​ ________ and​ ________ to transact business.

internet and web E-commerce is about digitally enabled commercial transactions between and among organizations and individuals.

A supply chain management system is considered a type of​ ________ system because it shares data across multiple organizations.

interorganizational Supply chain management systems are one type of interorganizational system.

A scientist who works to create information for organizations is considered​ a(n) ________ worker.

knowledge Knowledge workers include​ researchers, scientists, and people who primarily create knowledge and information for organizations.

The global positioning system​ (GPS) enables​ ________ -based services for consumers via their smartphones.

location Seventy-four percent of smartphone owners use​ location-based services. What ties these activities together and provides the foundation for mobile commerce is the global positioning system​ (GPS)-enabled map services available on smartphones.

The typical computing configuration in 1960 was​ ________.

mainframe The mainframe computer emerged in 1959.

Determining if you can convince local units to conform to international standards is part of the​ ________ dimension for developing an international information systems architecture.

management and business processes

In an enterprise​ system, the integrated software modules that focus on production capacity are related to​ ________.

manufacturing and production Enterprise systems related to manufacturing and production include production capacity and shipment dates.

The functional area which includes the business process to check quality is called​ ________.

manufacturing and production Quality assurance is done within the functional area of manufacturing and production.

The fact that universal technical standards for the Internet and electronic commerce exist lowers​ ________ costs, making it cheaper for merchants to sell their goods.

market entry The universal technical standards of the Internet and​ e-commerce greatly lower market entry costslong dash—the cost merchants must pay simply to bring their goods to market.

Customer relationship management applications that track campaign data are related to the​ ________ aspect of customer relationships.

marketing Marketing aspects of CRM include campaign​ data, content, and data analysis.

The systems development life cycle method for building an information system is​ a(n) ________ approach.

phased

A(n) ________ is an Internet business model that provides an initial point of entry to the web along with specialized content and other services.

portal Portals are gateways to the Web where users start their Web searching and linger to read​ news, find​ entertainment, meet other​ people, and, of​ course, be exposed to advertising which provides the revenues to support the portal.

According to the value chain​ model, sales and marketing is considered a​ ________ activity of the firm.

primary Sales and marketing is considered a primary activity of the firm.

The coupling of files used to store information and the application program that updates and maintains those files is called​ ________.

program-data dependence Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

A positive regarding cloud computing includes​ ________.

rapid elasticity If you need thousands of​ servers, you can readily scale up to use them with the cloud.

When thinking about​ security, controls​ ________.

refer to policies and procedures that ensure the safety of an organization's assets. Controls are​ methods, policies, and organizational procedures that ensure the safety of the​ organization's assets, the accuracy and reliability of its​ records, and operational adherence to management standards.

A challenge for international networks are the​ ________ in countries like​ China, Iran, and Saudi Arabia.

regulatory constraints

The primary benefit of disintermediation to the consumer is​ ________.

removing layers and reducing costs The primary benefit of disintermediation to the customer includes removing layers​ (i.e., distribution​ channels) and lowering costs to customers.

The​ ________ of the web makes it possible to deliver messages with​ text, audio, and video simultaneously to large numbers of people.

richness Information richness refers to the complexity and content of a message. The web makes it possible to deliver rich messages with​ text, audio, and video simultaneously to large numbers of people.

In relational​ databases, the​ ________ operation creates a subset of records in the file that meet stated criteria.

select The select operation creates a subset consisting of all records in the file that meet the stated criteria.

Social​ e-commerce is commerce based on the idea of the digital​ ________ graph.

social The digital social graph is the mapping of all significant online social relationships.

According to the​ E-Commerce Presence​ Map, activities such as conversation and engagement are considered​ a(n) ________ type of presence.

social media Social media presence includes activities such as conversation and engagement.

A​ top-down chart showing each level of​ design, its relationship to other​ levels, and its place in the overall design structure is a​ ________.

structure chart The structure chart is a​ top-down chart, showing each level of​ design, its relationship to other​ levels, and its place in the overall design structure.

Examining college admission scores as the sole criteria for admission is an example of​ a(n) ________ decision.

structured Decisions that always apply under specific conditions or situations are structured decisions.

Ethical issues in information systems have become more of an urgent topic because of the rise of​ ________.

the Internet and​ e-commerce Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce. Internet and digital firm technologies make it easier than ever to​ assemble, integrate, and distribute​ information, unleashing new concerns about the appropriate use of customer​ information, the protection of personal​ privacy, and the protection of intellectual property.

The​ accessibility, storage, and distribution of information and knowledge is increased dramatically by​ ________.

the internet The Internet increases the​ accessibility, storage, and distribution of information and knowledge for organizations. In​ essence, the Internet is capable of dramatically lowering the transaction and agency costs facing most organizations. Next Question

Senior executives determining​ five-year goals is an example of​ a(n) ________ decision.

unstructured Unstructured decisions are those in which the decision maker must provide judgment.

A useful tool for storing and sharing corporate knowledge is​ a(n) ________.

wiki A wiki is a type of website that makes it easy for individuals to contribute and edit text content as well as graphics.

​________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.

​In-memory computing Another way of facilitating big data analysis is to use​ in-memory computing, which relies primarily on a​ computer's main memory​ (RAM) for data storage.​ (Conventional DBMS use disk storage​ systems.) Users access data stored in system primary​ memory, thereby eliminating bottlenecks from retrieving and reading data in a​ traditional, disk-based database and dramatically shortening query response times.​ In-memory processing makes it possible for very large sets of​ data, amounting to the size of a data mart or small data​ warehouse, to reside entirely in memory.

Which of the following is NOT an example of a​ company's transaction processing​ system?

​Walmart's internal email system

Businesses are using​ ________ development to create applications for shopping​ carts, user​ authentication, search​ engines, and catalogs with pieces of software for their own unique business requirements.

​component-based

​A(n) ________ is a major type of KM that​ collects, stores, and disseminates digital content and knowledge.

​enterprise-wide KMS An​ enterprise-wide KMS is a major type of KM that is used to​ collect, store, and disseminate digital content and knowledge.

A supply chain management system using​ a(n) ________ model bases production schedules on actual customer orders.

​pull-based In a​ pull-based model, production master schedules are based on actual trigger events in the supply chain.

According to Panorama Consulting​ Solutions, in​ 2018, the average time to implement an ERP project is approximately​ ________.

17.4 months The average time to implement is 17.4 months with an average cost of 2.8 million dollars.

What is a touch​ point?

A method of interaction with a customer Also known as a contact​ point, it is a method of interaction with the​ customer, such as​ telephone, e-mail, customer service​ desk, conventional​ mail, Facebook,​ Twitter, Web​ site, wireless​ device, or retail store.​ Well-designed CRM systems provide a single enterprise view of customers that is useful for improving both sales and customer service.

​________ help(s) ensure that important network traffic receives high​ priority, and​ less-critical network traffic receives lower priority.

Deep packet inspection​ (DPI) DPI examines data files and sorts out​ low-priority online material while assigning higher priority to​ business-critical files.

​________ enables the​ computer-to-computer exchange between two organizations of standard transactions such as​ invoices, shipment​ schedules, or purchase orders.

EDI Electronic data interchange enables the​ computer-to-computer exchange between two organizations of standard transactions such as invoices and bills of lading.

The​ ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.

Privacy Act of 1974 the Privacy Act of 1974 has been the most important act regarding credit​ reporting, financial​ records, newspaper​ records, and electronic communications.

The acronym CRM stands for​ ________.

customer relationship management CRM stands for customer relationship management. The CRM focuses on improving interactions with​ past, current, and future customers.

Identifying the projects that deliver the most business value requires organizations to develop​ a(n) ________.

information systems plan

To reduce agency​ costs, the text recommends developing​ ________.

only a few core global systems that are vital for global operations


Ensembles d'études connexes

12 Cranial Nerves & their functions

View Set

Entrepreneurship 5.2 (True/False)

View Set

ATI fundamentals dynamic quizzes

View Set

A&P Chapter 7 - The Axial Skeleton (lecture notes)

View Set

Ch. 15 Oncology: Nursing Management in Cancer Care

View Set

IB Business Management Marketing 4.6 The Extended Marketing Mix - Seven Ps Model

View Set