CIS 2700 Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements is NOT true?

* In order to be effective IS systems need to be owned by the organization itself.* - IS plays a critical role in both small and large organizations. - IS systems are intended to support internal processes. - Understanding IS within your organization will help increase your productivity. - In order to be effective IS systems need to be owned by the organization itself.

Which of the following is FALSE of QR codes?

* QR codes are larger than bar codes because they store information both horizontally and vertically.* - QR codes are more resistant to damage than bar codes. - QR codes are larger than bar codes because they store information both horizontally and vertically. - QR codes can be read from any direction or angle. - QR codes can store much more information than bar codes

Which of the following is TRUE of prescriptive analytics?

*Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision* - It is based on the results of descriptive analytics to describe what will happen with a probability for each potential outcome. - Prescriptive analytics do not require any prior analytics or analysis. - Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision. - The statistical procedures involved in prescriptive analytics include linear and multiple regression.

protocol

- A set of rules governing the exchange or transmission of data between devices. - The two major protocols are the Ethernet and Transmission Control Protocol/Internet Protocol.

Backbone Network (BN)

- Are high-speed central networks to which multiple smaller networks (such as LANs and smaller WANs) connect. - The LANs are called embedded LANs because they connect to the backbone WAN.

fiber-optic cable

- Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive. - consists of thousands of very thin filaments of glass fibers that transmit information through pulses of light generated by lasers. - Fiber-optic cables are significantly smaller and lighter than traditional cable media. They also can transmit far more data, and they provide greater security from interference and tapping. Fiber-optic cable is typically used as the backbone for a network, whereas twisted-pair wire and coaxial cable connect the backbone to individual devices on the network

Splinternet (Internet balkanization)

- Refers to a broad tendency to use laws and regulatory powers within territorial jurisdictions to impose limits on digital activities. - The splinternet is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and divergent national interests.

Wide Area Network (WAN)

- Spans a large geographic area such as a state, province, or country - WANs typically connect multiple LANs.

Multidimensional data analysis

- The process of performing complex, multidimensional analysis of stored data, typically using graphical software tools. Also called Online Analytical Processing

twisted-pair wire

- a communications medium consisting of strands of copper wire twisted together in pairs - relatively slow for transmitting data, it is subject to interference from other electrical sources, and it can be easily tapped by unintended recipients to gain unauthorized access to data.

Satellite transmission systems

- a wireless transmission system that uses satellites for broadcast communications - Currently, three types of satellites are circling Earth: geostationary-Earth-orbit (GEO), medium-Earth-orbit (MEO), and low-Earth-orbit (LEO). Each type has a different orbit, with GEO being farthest from Earth and LEO being the closest.

coaxial cable

- insulated copper wire; used to carry high-speed data traffic and television signals - However, coaxial cable is more expensive and more difficult to work with than twisted-pair wire. It is also somewhat inflexible.

The __________ rule of thumb is that ________ percent of individuals contribute ________ percent of the content.

20-80; 20; 80

Based on the research findings, workers distracted by modern web applications (e.g., twitters, social media, etc.) will take about ____ minutes to return to the tasks at hand.

25

Based on 1996 Federal Communications Committee (FCC)'s definition: A network that provides >= _____ Mbps download bandwidth and >= ______ Mbps upload bandwidth.

25; 3

An estimated ________ % of big data are unstructured.

80-90

Industry experts estimate that ________ percent of data in an organization is unstructured.

80-90

Ducati's sales staff struggled with conflicting or outdated data on product inventory, availability, and ordering time schedules because of __________.

A & B - multiple communication systems and tough competition and economic conditions

affinity portal

A Web site that offers a single point of entry to an entire community of affiliated interests such as a hobby group or a political party.

corporate portal (enterprise portals, information portals, and enterprise information portals)

A Web site that provides a single point of access to critical business information located inside and outside of an organization.

Container

A _________ allows programmers to develop an application that includes its own environment and can run as it was developed regardless of the operating system on which it was deployed.

Phased

A _________ conversion introduces components of the new system in stages.

Pilot

A _________ conversion introduces the new system in one part of the organization.

Parallel

A _________ conversion involves running the old and new systems at the same time.

Direct

A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time.

Virtual Machine

A _________ is a self-contained operating environment that behaves as if it were a separate physical computer.

Which of the following is NOT true for the Uber business model?

A customer may choose to pay in cash or by a credit card

broadband

A high speed connection to the Internet

ultra-wideband (UWB)

A high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps that can be used for applications such as streaming multimedia from, say, a personal computer to a television.

Local Area Network (LAN)

A network in which the nodes are located within a small geographic area.

Extranet

A private electronic network that links a company with its suppliers and customers

metasearch engine

A search engine, such as Dogpile, that searches other search engines rather than individual websites.

Internet Protocol (IP)

A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.

Global Positioning System (GPS)

A set of satellites used to help determine location anywhere on Earth's surface with a portable electronic device.

Near Field Communication (NFC)

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.

search engine

A software program you can use to find Web sites, Web pages, and Internet files.

Internet Protocol (IP) address

A unique set of numbers assigned to a specific computer that is connected to the Internet. This is similar to a house's street address.

Each of the following is a basic functional area that is supported by information systems: manufacturing and production, ________, finance, IT, sales and marketing, and HR.

Accounting

Originally, information systems were designed to support the ________ function. Systems for other functions were rolled out later. The consequences of this fragmented roll-out approach were ________.

Accounting; data silos

scope creep

Adding functions after the project has been initiated causes ________.

How are rates determined for PPC ads that appear on search engine results pages?

Advertisers "bid" on having their ads appear when someone searches on one of their keywords

A major source of revenue for search engines Google and Yahoo is _______ , such as for certain keywords.

Advertising

Data Mining

Affinity analysis is a(n) _________ application.

When people are constantly collaborating, communicating and creating online, they are referred to as being ________________.

Always on

The relationship between ethics and legality can best be described in which of the following statements?

An act can be unethical, but still be legal.

rogue access point

An unauthorized wireless access point on a corporate or private network, which allows unauthorized individuals to connect to the network.

Unstructured

As a board member, you recommend hiring a new CEO to address the scandals that have been reported in the Wall Street Journal. This is a(n) ________ decision.

Structured

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.

Information systems are used to protect companies against fraud. Which of the following is not a fraud risk factor?

Assigning a narrow range of duties to employees limiting their opportunities to commit fraud

Data integrity with real-time systems involves the ACID test, which involves ________.

Atomicity, consistency, isolation, and durability

_____________ is an example of efficiency.

Automating order entry

Which type of Electronic Commerce is employing an e-Marketplace?

B2B

_________ comprises the vast majority of e-commerce by volume.

B2B

The use of _________ to determine website ranking on search results is based on the assumption that people are more likely to link to high-quality websites than poor-quality sites.

Backlinks

Which of the following is not a correct description about 5G?

Because 5G uses shorter wavelengths in its transmission. Thus, it requires less antennas than previous generations.

Which of the following is NOT a problem associated with Big Data?

Big Data can be structured, unstructured, or semi-structured.

_____ refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions.

Business analytics

The U.S. GAAP Financial Reporting Taxonomy is an electronic dictionary of business reporting elements used to report ________.

Business data

The goal of _________ is to eliminate unnecessary non-value added processes, then to simplify and automate the remaining processes to reduce cycle time, labor, and costs.

Business process reengineering

________ helps production managers better use information to execute manufacturing plans.

CIM

________________ is the process of analyzing and selecting investments (expenditures) with the highest ROI for the company.

Capital budgeting

_________ and _________ are the two major challenges for the sellers in e-commerce.

Channel conflict; order fulfillment

broadcast media or wireless media

Communications channels that use electromagnetic media (the "airwaves") to transmit data.

Which of the following is NOT a use for data mining?

Comparing products

Automation of as many of the manufacturing processes as possible is one of the benefits of:___________.

Computer integrated manufacturing (CIM)

Network Access Points (NAPs)

Computers that act as exchange points for Internet traffic and determine how traffic is routed.

The three objectives of data and information systems security are:

Confidentiality, integrity, availability

Operational Control

Considering the nature of decisions, executing specific tasks efficiently and effectively is

Strategic Planning

Considering the nature of decisions, the long-range goals and policies for growth and resource allocation is

_______ is a process that insures that operations meet data validity standards. For instance, information systems that process checking accounts will only allow unique check numbers for each transaction—and reject duplicates.

Consistency

All of the following are examples of the influence of social, mobile, and cloud technologies except _________________.

Consumers are less likely to trust tweets from ordinary people than recommendations made by celebrity endorsements.

Virtual

Containers are another step in the development of _________ technology.

Profitability metrics for products and services can be derived from the _________ system.

Cost accounting

Which of the following is not one of the factors holding companies back from implementing HR SaaS solutions to efficiently transform and improve the HR function?

Costs

_____________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.

Customer satisfaction

Critical infrastructure, intellectual property theft, identify theft, BYOD and social networks are all examples of _________________.

Cyberattack targets

____________ modems use the digital portion of a voice telephone to offer broadband access.

DSL

To aid the SEC in regulating the securities industry, publically traded firms are required to use a(n) ________, where data items are tagged to make them easily searchable.

Data disclosure compliance system

the development of one or a few related analytics applications.

Data marts are typically associated with

_____________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors.

Data mining

the development of one or a few related analytics applications.

Data silos are often associated with

Google maintains a copy of the Internet for its search engine services, and is also constantly updating a map of the entire planet for users of its popular Google Earth application. Due to requirements like this, Google's biggest technical challenge is________.

Data storage

Decision

Decision refers to a choice that individuals and group make among two or more alternatives

_____ are computer-based information systems that combine models and data in an attempt to solve semistructured and some unstructured problems with extensive user involvement.

Decision support systems

e-learning

Delivery of formal and informal training and educational materials, processes, and programs via the use of electronic media.

___________ systems base their recommendations on factors such as age and income; and ___________ filtering systems typically rely on information about a person's behavior, such as purchases and product ratings.

Demographic; collaborative

Digital Dashboard Capabilities

Drill down Critical success factors (CSFs) Key performance indicators (KPIs) Status success Trend analysis Exception reporting

"Doing the right thing" is used as a metric for __________, and "Doint the thing right" is used as a metric for ______.

Effectiveness, Efficiency

In their effort to better manage employees, companies are developing human capital management to streamline the HR process. These Web applications are more commonly referred to as _______.

Employee relationship management

Training activities that are part of HRM may involve __________ issues in recruiting and selecting employees and in evaluating performance, in part because these activities make use of private confidential information.

Ethical

______________________ is the third step in the general framework for ethics.

Evaluate alternative actions

Semistructured

Every year, you have to give each of your employees a performance review and decide whether they have earned a raise. This is a(n) ________ decision.

Intelligence

Examination and answering the question "what is the problem" occur in the ______ phase of the IDC.

DSS

Examples of _______ include sensitivity, what-if, and goal-seeking analyses.

Business analytics applications include:

Excel spreadsheets, data warehouses, and special purpose analytic packages

____________ deals with more objective, rational, and technical knowledge.

Explicit KNowledge

________ offer limited accessibility to the ________ of participating companies.

Extranets; intranets

All unethical actions are illegal in the United States.

False

The United Nations ensures privacy laws are consistent across countries so that it is easier to do business in multiple countries.

False

___________ work by offering customers an incredible offer for a very short time. This sales method lends itself perfectly to the immediacy of social media, and it's a next stage in social commerce

Flash sales

A key element of the BAE CIM strategy was the deployment of two __________________ that can accommodate the manufacture of different parts at different volumes.

Flexible manufacturing systems (FMS)

____________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content.

Folksonomies; tags

A major reason organizations fail is their inability to __________ and/or secure sufficient cash flow.

Forecast

Job rotation is when more than one person should be familiar with each transaction cycle in the business where possible. Rotation of jobs helps prevent over reliance on a single individuals and reduces the chances of ___________.

Fraud

A system of policies and procedures to prevent and detect illegal acts committed by managers, employees, customers, or business partners is called __________.

Fraud risk management

This information system uses data visualization technologies to analyze and display data in the form of digital maps for planning and decision making purposes.

Geographical information system

In 2016, the greatest number of reported data breaches were reported to be the result of ______________.

Hacking

Which one of the following is NOT considered a C2C EC?

Hotels.com

Which of the following is an accessibility issue?

How much should companies charge for permitting access to information in their databases?

Which of the following is NOT a factor used by search engines to judge the quality of a website's content?

How well the webpage works with mobile devices

__________ is the field that deals with policies, procedures, compliance requirements associated with acquiring and keeping people in organizations.

Human resources

________ does NOT have an important role in the Internet of Things.

IPv4

IT services, IT personnel, and IT components make up the organization's ___________.

IT infastructure

An organization can demonstrate that it has implemented effective corporate governance and risk management measures by using:

IT monitoring and controlling

Outsourcing

If a company acquires IT applications from outside contractors or external organizations, it is called ________.

Use a prewritten application

If a company doesn't want to write any computer code, it would choose to ________.

custom-write an entire application

If a company wants to write all new computer code, it would choose to ________.

Customize a Prewritten Application

If a company wants to write some computer code, it would choose to ________.

customize a prewritten application

If a company wants to write some computer code, it would choose to ________.

OLAP

If you analyze a data cube, this is an example of using

Data Mining

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using

_________ systems support receiving activities.

Inbound logistics

A(n) _________________ agent is a software program that assists you, or acts on your behalf, in performing repetitive computer-related tasks.

Information

Legacy

Information systems that have become outdated and no longer meet business needs are called _________ systems.

reverse outsourcing

Insourcing is also called ________.

Which of the following increases supplier power?

Integrated supply chains

Social _____________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.

Intelligence

________ make it is easier for investors to analyze and compare the financial performance of public companies.

Interactive data

The purpose of control is to identify deviations from goals as soon as possible in order to take corrective action. Tracking sales, inventory levels, orders, and customer support are examples of control activities. What type of company data is most important at this level?

Internal data

HRISs have been moved to __________.

Intranets and clouds

Which of the following functions would not typically be part of a sales and marketing information system?

Inventory Stock Management

Which of the following is NOT what "Database Systems" to maximize?

Isolation

Which one of the following is NOT a characteristic of Cloud Computing?

It creates a virtualized computing environment (e.g., one or several virtual machines) for all customers to run their computing servers or store applications to meet corporate computing needs.

Which of the following is FALSE of the Dark Web?

It is indexed by search engines.

Satellite telephone services are provided through ________ satellites.

LEO

Coordination of several complex processes, namely ordering, purchasing or procurement, inbound logistics and outbound logistics activities is called _____________.

Logistics management

Synchronizing inbound and outbound flows of materials or goods is an example of:________.

Logistics management

Narrowband

Low speed network connection.

______________ is the ability to accurately perform new, unseen tasks, built on known properties learned from training or historic data that are labeled.

Machine learning

the output; inputs

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______).

A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software instead of custom designed software programs. It eliminates the information gap that existed in previous years by providing real time information.

Manufacturing execution system

Functions of ________ programs include compiling a bill of materials, resource management and scheduling, preparing and dispatching production orders, preparing workin-progress reports, and tracking production lots.

Manufacturing execution systems

___________ are a set of core data that span the enterprise information systems.

Master data

________ is a small, portable wireless device that provides users with a permanent Wi-Fi hotspot wherever they go.

MiFi

Using your cell phone to purchase a Coke from a vending machine is an example of ____________.

Micropayment

Full-feature logistics management systems perform each of the following functions except ________.

Minimize holding costs and CGS

The short-range wireless network that is best-suited for touchless credit card transaction is ______________.

Near-field communication

Data marts and data warehouses typically use ___________.

OLAP

Fraud is a crime with severe consequences. ___________ fraud is a term that refers to a variety of criminal behaviors perpetrated by an organization's own employees or contractors.

Occupational

______________ is how new employees acquire the necessary knowledge, skills, and behaviors to become effective members of the organization

Onboarding

Which of the following is NOT the reason that we need to know more about "wireless computing?"

Once we know more about wireless computing, then we have the knowledge about mobile commerce.

Data from functional area ISs support enterprise apps, which include all of the following except ________.

Operational performance

Which of the following is NOT one of the steps in setting up a search engine PPC ad campaign?

Optimize website to enhance rank of organic listing

__________ systems support shipping activities.

Outbound logistics

In terms of manufacturing, the business function that is responsible for transforming inputs into useful outputs is _______.

POM

__________ and lean manufacturing are two widely used methods or models to minimize waste and deal with the complexity of inventory management.

POM

In the __________ model, customers rent servers, operating systems, storage, a database, software development technologies, and network capacity over the internet.

PaaS

You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.

Passive RFID codes

_________ Human Capital Management, which is one of the market-leading HRISs, provides a global foundation for HR data and improved business processes.

PeopleSoft

A(n) _____________ agent constantly observes and reports on some item of interest.

Predictive

Which of the following is true of prescriptive analytics?

Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision.

distance learning

Process of delivering educational or instructional programs to locations away from a classroom or site.

ratio between the inputs and outputs for which a manager is responsible.

Productivity is a __________

Personal Area Network (PAN)

Provide communication over a short distance that is intended for use with devices that are owned and operated by a single user EX. Bluetooth

Which of the following cloud computing characteristics gives customers elasticity and flexibility because it allows customers to access needed computing resources automatically?

Providing on-demand self-service

___________ is a traditional function of the MIS department

Providing technical services

_________ systems provide data about the quality of incoming materials, parts, and inprocess semifinished and finished products.

QC

Transportation management systems (TMSs) support all of the following except _______.

Quality control

ICASE

RAD uses _________ tools to quickly structure requirements and develop prototypes.

__________ on LinkedIn is popular because it is more effective and efficient than traditional approaches.

Recruitment

Which of the following is NOT a basic function of TCP/IP?

Responsible for disassembling and reassembling data during transmission

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

Rights

Which if the following is NOT one of the common risk mitigation strategies

Risk analysis

At publicly traded firms, the accounting and finance functions are responsible for accurately disclosing (reporting) the firm's financial condition to the ________.

SEC

________ are a set of written instructions on how to perform a function or activity. SOPs provide the framework for complex processes to be managed more effectively.

SOPs

HR apps are leased in __________ arrangements.

SaaS

Software

SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.

__________ is extra inventory used as a buffer to reduce the risk of stockout.

Safety stock

In deciding on advertising and other marketing efforts, managers need to know the profit contribution or profit margin, which is ________.

Sale price - cost of goods

___________ can expand the capacity to create new products, services, channels, and market opportunities that lead to new revenue streams.

Sales and marketing

The main problem with ___________ transmission systems is their signals experience propagation delay.

Satellite

satelite radio

Satellite radio, or digital radio, offers uninterrupted, near-CD-quality transmission that is beamed to your radio, either at home or in your car, from space. EX. Sirius XM

Weeks

Scrum sprints typically last 2-4 ________.

Making changes to the design, programming and content of a website in order to improve the site's ranking on search engine results is called _________________.

Search engine optimization

Which of the following can be classified as unintentional threats to information systems caused by human errors?

Selecting a weak password

________ are designed to locate information based on the nature and meaning of Web content, not simple keyword matches.

Semantic search engines

_______________ decisions are partially routine and partially complex.

Semistructured

_____ is the study of the impact that changes in one or more variables of a decision-making model have on other variables.

Sensitivity analysis

Which if the following is not an example of how the Internet of Things is being used by businesses?

Sensors on packages of cereal, pasta, soup or other food products made for children that allow companies to determine young consumer's satisfaction with the nutritional value of the product.

As social media networks increase their offerings, the gap between ______________ and _______________ also increases.

Services and information security

The time between a new device or app going from 'must have' to 'cannot function without' is rather _______________.

Short

When shoppers visit a brick-and-mortar store, examine a product un person, and then shop online to get a lower price. This is called _________________.

Showrooming

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book?

Spamware

____________ is a traditional function of the MIS department.

Staffing, training, and developing IS skills

Which of the following is the correct order of the evolution of the modern IT infrastructure?

Stand-alone mainframes, mainframe and dumb terminals, standalone PCs, LANs, enterprise computing, cloud and mobile computing

A key benefit of ________ is that they minimize variation and promote quality through consistent implementation of a process or procedure within the organization, even if there are temporary or permanent personnel changes.

Standard operating procedures

Data requirements of the operational level units are extensive and relatively routine, rarely changing because they depend on fixed sources of input and __________, which is a set of written instructions that document a routine activity that is followed by an organization.

Standard operating procedures

__________ is a capability of dashboards that reflect the latest data available on KPIs or some other metric often in real time.

Status access

Business Management Systems are designed to help companies with ________________.

Strategic Planning

At what level are decisions made that set or impact the long-term direction of the entire organization?

Strategic level

________ is a document used to communicate the company's goals and the actions needed to achieve them

Strategic plan

Data from functional ISs are used extensively by enterprise applications, including business intelligence (BI), e-commerce, customer relationship management (CRM), and ____________.

Supply chain management (SCM)

Implementation

Suppose you are failing one of your classes. Based on the choice you made to start studying harder, you look over your notes every day after class and study at least an hour every night for at least a week before an exam. This action is part of the ______ phase of the IDC.

Choice

Suppose you are failing one of your classes. Based on your evaluation, you decide to start paying attention in class and talking to the teacher about ways to improve. This decision is part of the _________ phase of the IDC.

Intelligence

Suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the _______ phase of the IDC.

Investigation

Systems _________ addresses the business problem or business opportunity by means of a feasibility study.

The collection of data for ratio analysis is done by the ________, and interpretation of ratios and the ability to forecast their future behavior require expertise, which is supported by _______.

TPS; DSS

Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?

Technology is getting cheaper to acquire, operate, and maintain.

Unified communications (UC)

Technology that integrates multiple communications channels and applications into a single interface, which is accessible from many different devices.

____________ is the wireless transmission and receipt of data gathered from remote sensors.

Telemetry

Hypertext

Text that has been embedded with instructions to take a web page viewer to additional information.

80;20

The 80/20 rule means that if the software meets _________ percent of the company's needs, then the company should modify _________ percent of its business processes to use the software.

Managers from each functional area

The IT steering committee is comprised of ________.

Major scandals at Enron, WorldCom, and Tyco led to the passage of which law in 2002?

The Sarbanes-Oxley Act

Transmission Control Protocol (TCP)

The TCP performs three basic functions: (1) It manages the movement of data packets (see further on) between computers by establishing a connection between the computers (2) it sequences the transfer of packets (3) it acknowledges the packets that have been transmitted.

IS operational plan

The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan.

IT Architecture

The _________ delineates the way an organization should utilize its information resources to accomplish its mission.

IT architecture

The _________ delineates the way an organization should utilize its information resources to accomplish its mission.

Organization strategic plan

The _________ identifies the firm's overall mission, the goals that follow from that mission, and the broad steps required to reach these goals.

IS Strategic Plan

The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives need to achieve the organization's goals.

IS strategic plan

The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives need to achieve the organization's goals.

Scrum Master

The _________ is the scrum approach typically replaces a project manager.

IS Environment

The _________ is/are a summary of the information needs of the individual functional areas and of the organization as a whole.

objectives of the IS function

The _________ is/are the best current estimate of the goals of the IS function.

Constraints of the IS function

The _________ is/are the technological, financial, personnel, and other resource limitations on the IS function.

Product Owner

The _________ represents the business users and any other stakeholders in the project.

Bandwidth

The amount of data that can be transmitted over a network in a given amount of time.

Security

The biggest problem associated with end-user development is ________.

Dematerialization

The decrease in the size and weight of a product as a result of technological improvements that occur over time. Ex. smartphone includes the functions of digital cameras for images and video, radios, televisions, Internet access through Web browsers, recording studios, editing suites, movie theaters, GPS navigators, word processors, spreadsheets, stereos, flashlights, board games, card games, video games, an entire range of medical devices, maps, atlases, encyclopedias, dictionaries, translators, textbooks, watches, alarm clocks, books, calculators, address books, credit card swipers, magnifying glasses, money and credit cards, car keys, hotel keys, cellular telephony, Wi-Fi, e-mail access, text messaging, a full QWERTY keyboard, and many, many others

Design

The deliverable of the system _________ phase is the set of technical system specifications.

programming

The deliverable of the system _________ phase is the set of technical system specifications.

Analysis

The end product of the _________ stage is a set of system requirements.

Investigation

The first stage of the SDLC is ________.

analyze the organization's strategic plan

The first step in the information systems planning process is to ________.

Internet backbone

The main pathway of high-speed communications lines over which all Internet traffic flows.

Which of the following is not a reason that managers need IT support?

The number of alternatives is decreasing.

Uniform Resource Locator (URL)

The set of letters that identifies the address of a specific resource on the Web.

Hypertext Transfer Protocol (HTTP)

The set of rules that controls the transfer of web pages. It is a protocol that allows web browsers to talk to web servers.

Which of the following is NOT a reason for us to consider Cloud Computing?

There is no efficient network infrastructure that can integrate corporate hardware and software as one computing system

Which of the following does not explain why it is very difficult to determine a particular behavior ethical or unethical?

There is no published document on ethics.

Which of the following is not a factor used by digital marketers to determine the placement of digital PPC ads?

Time spent on the internet

Which one of the following is NOT a reason that we need a MODEM in telecommunication?

To maintain the transmission speed, we need a device to enhance the strength of analog waves

JIT was developed by ________ because of high real estate costs in Tokyo, Japan, that made warehousing expensive.

Toyota

_________________processing is information processing that is divided into distinct, undividable operations called transactions.

Transaction

Ideally, functional systems enable __________, which is being able to access current data to learn what is needed in order to make informed decisions without delay.

Transparency

Smartphones are sensors that can be used for electronic surveillance.

True

The Volkswagen and Wells Fargo bank cases illustrate that CEOs usually lose their jobs over ethical dilemmas.

True

The legal concept that gives individuals the right to recover damages done to them by other individuals, organizations, or systems is known as liability.

True

Many more companies are shipping via intermodals and their older TMSs cannot support or deal with intermodal movement, which refers to the use of ________.

Two or more transport modes

Which of the following is NOT a correct statement for Uber and/or airbnb?

Uber started by two model founders in a snowy New York night

Investigation

Users have the greatest involvement in the _________ stage of the SDLC.

radio transmission

Uses radio-wave frequencies to send data directly between transmitters and receivers.

Design

Validation of the model and answering the question "what are my options" occur in the _____ phase of the IDC.

Choice

Verification/testing of the proposed solution and picking an option occur in the _____ phase of the IDC.

Which of the following is NOT a characteristic of Big Data?

Viscous

Holding inventory that is not needed very soon is seen as ________ because it adds cost but not value.

Waste

___________ can perform a wide variety of tasks from automating business processes to integrating components of an enterprise-wide system to streamlining online buying and selling.

Web Services

portal

Web-based, personalized gateway to information and knowledge that provides relevant information from different IT systems and the Internet using advanced search and indexing techniques

It must meet the needs of every functional area to ensure employee buy-in.

Which of the following is NOT an objective of the IT strategic plan?

Involves many users in the development process

Which of the following is an advantage of JAD?

Bypasses the IS department and avoids delays

Which of the following is an advantage of end-user development?

Works wells for ill-defined problems

Which of the following is an advantage of prototyping?

Enforces quality by maintaining standards

Which of the following is an advantage of the traditional SDLC?

What is the markup language that was developed for business and financial reporting?

XBRL

First Choice Ski, a UK based tour operator, used real-time reporting and ________ to monitor and quickly respond to the behaviors of visitors on its travel website.

Yahoo! Web analytics

The "_______ Effect" sometimes drives physicians to provide care that patients do not actually need as a way of trying to make the patients happy.

Yelp

Sensitivity

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.

semistructured; management control

You are a marketing manager responsible for planning the budget for your department. This is a(n) ______ task and a(n) _______ decision.

structured; operational control

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision.

What-If

You assume the inflation rate will remain constant over the next few years, so you consider purchasing a home with a variable interest rate. You decide to double-check this assumption with a(n) __________ analysis.

support for organizational transformation

You decide to implement a new customer loyalty program that rewards customers for shopping in your store. To accomplish this, you need to implement a data warehouse to collect data from all your physical and online stores. This is an example of

the development of infrastructure to support enterprise-wide analytics.

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of

Descriptive

You would use OLAP and DSS as statistical procedures for __________ analytics.

Pilot

Your company decides to implement SAP in the United States before implementing it in Canada. This is an example of _________ conversion.

Behavioral

Your company's employee base is mostly comprised of older people who generally dislike and distrust technology. This means the _________ feasibility of implementing a new system is low.

Goal-Seeking

_____ analysis attempts to calculate the value of the inputs necessary to achieve a desired level of output.

Goal-seeking

_____ analysis attempts to calculate the value of the inputs necessary to achieve a desired level of output.

Sensitivity (what if) analysis

______ analysis examines the change in an output given the change in a particular input while keeping all other inputs constant.

Resource Allocator

_______ is a decisional role.

Figurehead

_______ is an interpersonal role.

Analyzer

________ is an informational role.

Spokesperson

________ is an informational role.

Descriptive

_________ analytics is the first step in data reduction.

Systems analysts

_________ are IS professionals who specialize in analyzing and designing information systems.

Users

_________ are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly.

Direct

_________ conversion is the least expensive.

Direct

_________ conversion is the most risky.

Fixed;Fixed

_________ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _________ cost.

Behavioral

_________ feasibility addresses the human issues of the systems development project.

Technical

_________ feasibility determines whether the company can develop or otherwise acquire the hardware, software, and communications components needed to solve the business problem.

Economic

_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.

OLAP

_________ involves slicing and dicing data, drilling down in the data, and rolling up data to greater summarization.

The business case approach

_________ involves system developers writing a business case to justify funding one or more specific applications or projects

Training the top managers from each functional area

_________ is NOT a major task of the IT steering committee.

Control

_________ is a disadvantage of the buy option.

JAD

_________ is a group-based tool for collecting user requirements and creating system designs.

How IT Decisions will be made

_________ is a managerial aspect of the IT architecture.

SaaS

_________ is a method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.

Agile Development

_________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks.

RAD

_________ is a systems development method that can combine tools to rapidly produce a high-quality system.

The applications software

_________ is a technical aspect of the IT architecture.

Time

_________ is an advantage of the buy option.

End-User

_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department.

End-User Development

_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department.

ROI

_________ measures management's effectiveness in generating profits with its available assets by dividing the net income generated by a project by the average assets invested in the project.

Descriptive

__________ analytics answers the question "what has happened".

Users

__________ decide what data should be stored in an organization's data warehouse.

Unstructured

__________ decisions deal with "fuzzy", complex problems.

Component-Based

________________ development is closely linked with the idea of web services and service-oriented architectures.

Component-based

________________ development is closely linked with the idea of web services and service-oriented architectures.

25. Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases. a. Implementation b. choice c. design d. intelligence e. consideration

a

27. Which of the following is not a reason why managers need IT support? a. The number of alternatives is decreasing. b. Decisions must typically be made under time pressure. c. Decisions are becoming more complex. d. There is a growing need to access remote information sources. e. Decision makers are often based in different locations.

a

33. Calculating gross pay for hourly workers is an example of ________ decision making. a. Structured b. Unstructured c. Undocumented d. Semistructured e. Procedural

a

39. _____ is the efficient and effective execution of specific tasks. a. Operational control b. Management control c. Strategic planning d. Expertise e. Wisdom

a

45. Credit card companies would most likely use which of the following to check for fraudulent credit card use? a. Data mining b. Expert systems c. Neural networks d. Multidimensional data analysis e. Structured query language

a

83. _____ is the study of the impact of a change in the assumptions (input data) on the proposed solution. a. What-if analysis b. Statistical analysis c. Sensitivity analysis d. Goal-seeking analysis e. Simulation

a

86. Which capability of digital dashboards enables users to go into greater detail? a. Drill down b. Key performance indicators c. Status access d. Trend analysis e. Exception reporting

a

A supply chain involves the flow of: a. Materials, data and money b. Materials, apps and data c. Money, materials and apps d. Money, data and supplies

a

According to the video, which of the following presents the correct order for implementing a data mining process? a. Identify, Prepare, Model, Apply. b. Prepare, Identify, Model, Apply. c. Model, Identify, Prepare, Apply. d. Model, Prepare, Identify, Apply.

a

Being a figurehead and leader is part of the _____ managerial role. a. interpersonal b. processor c. informational d. decisional e. confrontational

a

ERPs and CRMs have to interface and share: a. Data b. Files c. Orders d. Invoices

a

Front office operations such as sales and advertising are ___________ to customers. a. Visible b. Invisible c. Available d. Unavailable

a

Geocoding involves: a. integrating maps with spatially oriented databases and other databases b. encrypting spatial information c. accessing geographical information d. integrating organizational transactions with spatially oriented databases e. programming spatially oriented databases

a

Much of the complexity in implementing an enterprise system is due to getting new apps or system modules to _________ with legacy systems. a. Integrate b. Interface c. Interact d. Interchange

a

Often accounting solutions are closely integrated with enterprise systems, such as ______ systems that include an extensive accounting module. a. ERP b. CRM c. TPM d. BMS e. QA

a

Originally, information systems were designed to support the _________ function. a. Accounting b. Production and operations c. Strategic planning d. Human resources e. Inventory management

a

Rank-and-file employees tend to make more _________ decisions. a. Structured b. Unstructured c. Undocumented d. Semistructured e. Procedural

a

Stockouts of materials and parts can slow or shut down production while stockouts of final products result in ______________. a. Reduced sales b. Increased distribution charges c. Increased carrying costs d. Decreased ordering costs e. Lower marketing expenses

a

The _________ requirement of the ACID test dictates that if all steps in a transaction are not completed, then the entire transaction is canceled. a. Atomicity b. Consistency c. Isolation d. Durability e. None of the above are correct

a

The journey that a product travels is known as a: a. Supply chain b. Service chain c. Sentinel chain d. Substantive chain

a

The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a. Structured b. unstructured c. undocumented d. semistructured e. procedural

a

Utilizing business intelligence systems accomplishes all of the following except: a. It increases personnel expenses. b. It supports a new business model. c. It enables the business strategy. d. It changes the way a company competes in the marketplace

a

Which of the following is NOT a reason that managers need IT support? a. Decrease in amount of data available. b. Increase in alternatives. c. Decrease in time available. d. Increase in data available.

a

Which of the following is not a characteristic of decision support systems? a. They support only lower- and middle-level managers. b. They are easy to use and construct. c. They can adapt to changing conditions. d. They usually utilize quantitative models. e. They support all phases of the decision-making process.

a

Which of the following statements regarding data visualization is true? a. They make applications more available and attractive to users. b. They are installed on a company's computer system rather than the Internet. c. They are not related to GIS or GPS systems. d. They do not support decision-making programs.

a

______________ management systems enable real time monitoring and tracking of supply chain shipments, schedules, and orders. a. Logistics b. Transportation c. Distribution d. Order Fulfillment e. Delivery

a

decisions are more common at lower organizational levels. a. Structured b. Unstructured c. Undocumented d. Semistructured e. Procedural

a

_________________________ is a private, company-owned social media software application that promotes social connectivity and collaboration with an organization and enhances productivity and employee satisfaction. a. An enterprise social platform b. A social enterprise c. An enterprise social network d. A networked social platform

a (538)

Ethernet

a common local area network protocol

Routers

a communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a WAN such as the Internet. The Internet is an example of a WAN.

file server (network server)

a computer that contains various software and data files for a local area network and contains the network operating system

Geographical Information Systems

a computer-based system for capturing, integrating, manipulating, and displaying data using digitized maps.

Digital signals

a discrete pulse, either on or off, that conveys information in a binary form

Wireless Fidelity

a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.

Network Interface Card (NIC)

a hardware component that enables computers to communicate over a network

Packet Switching

a mode of data transmission in which a message is broken into a number of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.

Intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

enterprise network

a network, encompassing an organization, composed of interconnected multiple LANs and WANs

industrywide portal

a portal that serves an entire industry (e.g., TruckNet <www.truck.net>).

Computer Network

a system that connects computers and other devices via communications media so that data and information can be transmitted among them

peer-to-peer (P2P) processing

a type of client/server distributed processing where each computer acts as both a client and a server. Each computer can access (as assigned for security or integrity purposes) all files on all other computers. 1. The first type accesses unused CPU power among networked computers 2. The second form of peer-to-peer is real-time, person-to-person collaboration, such as Microsoft SharePoint Workspace 3. The third peer-to-peer category is advanced search and file sharing. This category is characterized by natural language searches of millions of peer systems. It enables users to discover other users, not just data and Web pages. One example of this category is BitTorrent.

Microwave transmission systems

a wireless system that uses microwaves for high-volume, long-distance, point-to-point communication

Originally, information systems were designed to support the ________ function. Systems for other functions were rolled out later. The consequences of this fragmented roll-out approach were ________.

accounting; data silos

Characteristics of an organizational decision support system include which of the following?

affects several organizational units or corporate problems, cuts across organizational functions or hierarchical layers, involves computer-based technologies, and integrates with enterprise-wide information systems

Which of the following is not true of predictive analytics?

all are true (predictive analytics are used to detect patterns, pedictive analytics provide estimates about the likelihood of a future outcome, and predictive analytics are based on probabilities)

Which one of the following is NOT related to "Why computer networks are essential to modern organizations?"

allow organizations to forego traditional face-to-face business operations and run business as pure e-firms.

Decision support systems (DSSs)

are computer-based information systems that combine models and data in an attempt to solve semistructured and some unstructured problems with extensive user involvement.

Unstructured problems

are fuzzy, complex problems for which there are no cut-and-dried solutions.

Semistructured problems

are problems in which only some of the decision process phases are structured.

Structured problems

are routine and repetitive problems for which standard solutions exist.

The _________ requirement of the ACID test dictates that if all steps in a transaction are not completed, then the entire transaction is canceled.

atomicity

26. In the _____ phase of the decision-making process, managers test potential solutions "on paper." a. implementation b. choice c. design d. intelligence e. consideration

b

36. A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision? a. structured b. semistructured c. unstructured d. informational e. wisdom

b

40. _____ is the acquisition and efficient use of resources in accomplishing organizational goals. a. Operational control b. Management control c. Strategic planning d. Expertise e. Wisdom

b

42. Computer support is least for which of the following problems? a. semistructured and strategic planning b. unstructured and strategic planning c. semistructured and management control d. unstructured and operational control e. structured and strategic planning

b

77. Which of the following is not a true statement regarding decision making? a. Most decisions must be made under time pressure. b. All of the decision makers must be located in the same location. c. The number of alternatives is constantly increasing. d. It is usually necessary to conduct a sophisticated analysis in order to make a good decision.

b

84. Which of the following is not a characteristic of DSS? a. support all managers b. relatively difficult to use and construct c. adaptable to changing conditions d. usually utilize quantitative models e. support all phases of the decision making process

b

88. What type of data visualization technique allows analysts to extract information from the usage patterns of mobile devices? a. Geographic information systems b. Reality mining c. Online analytic processing d. Data mining

b

A company initiating an enterprise business intelligence system must acquire: a. A data mart that contains industry information. b. An enterprise data warehouse containing the information from the company's existing systems. c. A workforce with experience implementing business intelligence systems. d. A larger information technology department.

b

A digitized, 24/7 supply chain is referred to as being: a. Continuous b. Always-on c. Asynchronous d. Synchronous

b

Business Management Systems are designed to help companies with ________________. a. Accounting b. Production and operations c. Strategic planning d. Human resources e. Inventory management

b

Business intelligence is: a. An information-gathering tool but not a decision-making tool. b. A tool for both gathering and analyzing data and decision making. c. A decision-making tool that works with data that have already been gathered. d. A dashboard that summarizes monthly data.

b

Digital dashboards provide all of the following capabilities except: a. drill-down b. transaction processing c. status access d. key performance indicators e. exception reporting

b

Documents stored on SharePoint can be accessed by: a. Colleagues b. Anyone in the company c. Top management d. Human resource officers

b

Early ERPs ran on an architecture known as a: a. Shared architecture b. Client-server architecture c. Collaborative architecture d. Enterprise architecture

b

HRISs have been moved to _______________wherein HR applications are leased in SaaS arrangements. a. High security computing systems b. Intranets and clouds c. Tablet computers d. Business management systems e. Isolated computing environments

b

Information systems and ___________ that have emerged in the last 10-15 years have resulted in new revenue streams, new business models, new retail, promotion and distribution channels, and entirely new industries. a. Interest rates b. Digital networks c. International markets d. Enhanced media e. Marketing systems

b

Monitor, disseminator, spokesperson, and analyzer are examples of the _________ role of a manager. a. Interpersonal b. Informational c. Decisional d. Authoritative

b

Technology and strategy are ____________ but ________________ to ensure CRM project success a. Unnecessary, insufficient b. Necessary, not sufficient c. Needed, not necessary d. Not sufficient, needed

b

The Securities and Exchange Commission requires public companies to file reports formatted in __________ with metadata tags that make it easier for investors to analyze and compare the financial performance of public companies, increasing the efficiency and transparency of reporting processes and the ability to consolidate financial data from different operating systems. a. HTML b. eXtensible Business Reporting Language (XBRL) c. A financial taxonomy d. Financial HTML e. Encrypted digital metaforms (EDM)

b

The following are CRM mistakes EXCEPT: a. Putting IT department in charge of CRM project b. Involving key business stakeholders from the outset c. Making mobile CRM strategy an afterthought d. Taking the wrong approach to CRM training

b

The trend is toward ________________ communication methods in organizations. a. Formal b. Informal c. Rapid d. Digitized

b

Which of the following functions would not typically be part of a sales and marketing information system? a. Digital advertising b. Inventory management c. Social media monitoring and promotions d. Sales and customer support e. Automated ad placement and media buying

b

Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down? a. decision support systems b. digital dashboards c. functional area information systems d. group decision support systems e. expert systems

b

Which of the following is not a basic role of managers? a. interpersonal b. processor c. informational d. decisional

b

Which of the following is not one of the inventory costs discussed in the text? a. Carrying costs b. Selling costs c. Ordering costs d. Cost of shortages

b

Which type of decision requires a combination of standard solution procedures and individual judgment? a. structured b. semistructured c. unstructured d. informational e. wisdom

b

One of the biggest problems in CRM implementations is the difficulty of defining and measure: a. Data size b. Success c. Cost d. Timeliness

b?

Which of the following bests describes a primary ethical concern related to human resource management information systems and applications? a. Employee evaluations b. Inappropriate release of confidential employee information c. Worksite conditions d. Inequities in training opportunities e. Fair pay

b?

Part of Mint.COM's content marketing strategy was to develop hundreds of interviews and online articles cited by third party sites, generating __________ to Mint's own site.

backlinks

RFID was developed to replace ________.

bar (upc) codes

4) Bandwidth is stated in ________ per second.

bits

Examples of _________________ that can be facilitated by digital technologies are credit approval, opening a new account, order fulfillment, and shipping a product.

business processes

24. In the _____ phase of the decision-making process, managers construct a model that simplifies the problem. a. implementation b. choice c. design d. intelligence e. consideration

c

34. Which of the following is not a characteristic of unstructured decisions? a. They are complex. b. They typically are fuzzy and unclear. c. Standard solutions exist. d. Human intuition is involved. e. The first three phases of the decision-making process occur in no particular sequence.

c

35. When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a. undocumented b. structured c. unstructured d. semistructured e. documented

c

38. A company's annual employee evaluation best fits which type of decision? a. unstructured b. structured c. semistructured d. confrontational e. wisdom

c

41. Computer support is greatest for which of the following problems? a. semistructured and strategic planning b. unstructured and operational control c. structured and operational control d. semistructured and management control e. structured and management control

c

43. Searching for valuable business information in a database, data warehouse, or data mart is referred to as _____. a. structured queries b. database queries c. data mining d. query by example e. expert system queries

c

79. _____ are computer-based information systems that combine models and data in an attempt to solve semistructured and some unstructured problems with extensive user involvement. a. Dashboards b. Functional area information systems c. Decision support systems d. Group decision support systems e. Expert systems

c

82. _____ is the study of the impact that changes in one or more variables of a decision-making model have on other variables. a. What-if analysis b. Statistical analysis c. Sensitivity analysis d. Goal-seeking analysis e. Simulation

c

85. This information system uses data visualization technologies to analyze and display data in the form of digital maps for planning and decision making purposes. a. Dashboard b. Transaction processing system c. Geographical information system d. Global positioning system e. Decision support system

c

A Management Cockpit is a strategic management room that contains an elaborate set of __________ that enable top-level decision makers to pilot their businesses better. a. Geographic information systems b. Mainframe computers c. Dashboards d. None of these

c

A set of complex processes involved in providing customers what they ordered on-time and all customer services related to on-time delivery of a product is referred to as: a. Order management b. Sales support c. Order fulfillment d. Logistics

c

A(n) ____________________is a large-scale application software package that supports business processes, information flows, reporting, and data analytics in complex organizations. a. Transaction processing system b. Decision support system c. Enterprise system d. Executive information system

c

All of the following are examples of enterprises systems typically implemented to improve business processes and functions through integration, EXCEPT: a. Enterprise resource planning b. Supply chain management c. Human resource management d. Customer relationship management

c

Best practices for implementing ERP involve changes in the management of: a. People, processes and strategy b. People, strategy and technology c. People, processes and existing systems d. People, strategy and existing systems

c

Collecting real-time data and closing the gap between ___________ teams can be critical to an organization's performance. a. Local b. Departmental c. Global d. Distributed

c

Data mining can be used in manufacturing and production to: a. Forecast medical coverage costs. b. Forecast levels of bad loans. c. Find key factors that help optimize manufacturing capacity. d. Correlate lists of people with critical illnesses.

c

From a technology perspective, CRM refers to the methodologies and software tools to ____________ customer data: a. Access b. Appropriate c. Leverage d. Legalize

c

In the _____ phase of the decision making process, managers set criteria for the evaluation of alternative potential solutions. a. implementation b. choice c. design d. intelligence e. consideration

c

Responding to customer complaints or answer questions that come through on Twitter and Facebook is referred to as ___________________________. a. Digital marketing b. Digital support c. Social media customer service d. Social media advertisement e. Social promotions

c

The Management Cockpit best exemplifies which type of system? a. decision support system b. expert system c. digital dashboard d. functional area information system e. group decision support system

c

The central feature of all ERP systems is referred to as a: a. Shared file b. Siloed database c. Shared database d. Shared network

c

The features of enterprise social platforms will continue to evolve and _________ existing applications and the future of work. a. Disengage b. Disrupt c. Enhance d. Change

c

The production and operations management area is most related to which of the following? a. Accounting/finance b. Strategic planning c. Supply chain management d. Transaction processing e. Business management

c

What percentage of the time do ERP implementations fail? a. 40-60% of the time b. 30-50% of the time c. 50-70% of the time d. 50-60% of the time

c

When a visitor gets to a Web site by typing in the address (or URL) of the Web site, it is considered which type of Web traffic? a. Referring site. b. Indirect traffic. c. Direct traffic. d. Search engine.

c

Which capability of digital dashboards enables users to obtain the latest data available on key performance indicators or some other metric, ideally in real time? a. Drill-down b. Key performance indicators c. Status access d. Trend analysis e. Exception reporting

c

Which of the following programs includes online analytical processing (OLAP)? a. Access b. Data Mart Query c. Excel d. Word

c

Which of the following uses a cookie to start a clock? a. Page Views. b. Pages per Visit. c. Average Time. d. Date Stamp.

c

_______________________ is a system of policies and procedures to prevent and detect illegal acts committed by managers, employees, customers, or business partners against a company's interests. a. Accounting security b. Financial standards & practices c. Fraud risk management d. Loss detection and recovery e. Criminal Act Prevention (CAP)

c

_________________processing is information processing that is divided into distinct, undividable operations called transactions. a. Event b. Data c. Transaction d. Serial e. Batch

c

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.

cold

Obamacare was created to address the ____________ approach.

common good

If you are multi-tasking or trying to function with only partial attention, a person's ability to synthesize information may be __________________ .

compromised

Donald and his tech team are working on creating a new smartphone. They want users to have the ability to connect to the internet. Which feature of mobility are they concerned with?

connectivity

____________ marketing is when companies use social computing tools to obtain feedback from customers.

conversational

A(n) ______________ portal is an intranet.

corporate

Which of the following is the correct order of the KMS cycle?

create, capture, refine, store, manage, disseminate

__________ involves __________ a task to an undefined, generally large group of people in the form of an open call.

crowdsourcing; outsourcing

Epinions is an example of ___________ ratings and reviews.

customer

23. In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem. a. implementation b. choice c. design d. intelligence e. consideration

d

28. Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment. a. less, decreased b. more, decreased c. less, increased d. more, increased e. neither more nor less, decreased

d

29. Which of the following is not a characteristic of a structured decision? a. It is routine. b. It is repetitive. c. Human intuition is not involved. d. The first three phases of the decision-making process need not occur in any particular sequence e. Standard solutionsexist.

d

67. Data mining can be used in which of the following fields? a. Retailing and sales b. Insurance c. Banking d. All of these

d

72. An example of a key performance indicator is: a. Network traffic. b. Server load. c. Transactions per second. d. Return on investment.

d

A(n) _____ provides rapid access to timely information and direct access to management reports. a. decision support system b. expert system c. neural network d. digital dashboard e. data warehouse

d

According to Economist Herbert Simon, decision making is composed of: a. Intelligence. b. Design. c. Choice. d. All of these.

d

At the end of a semester, a student knows that she must achieve a grade of 81 or higher on her final exam to get an A in the course. She has just performed what kind of analysis? a. What-if b. Qualitative c. Sensitivity d. Goal-seeking e. Simulation

d

Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role. a. interpersonal b. processor c. informational d. decisional e. confrontational

d

Business Intelligence applications can be used by: a. Managers only. b. Customers only. c. All levels of employees but no one outside of the company. d. All levels of employees plus customers and suppliers.

d

Some reports suggest that over 90% of U.S. companies use _______________ as their primary source of identifying job candidates. a. Facebook b. Twitter c. Monstor.com d. LinkedIn e. Email

d

The primary distinguishing characteristic of geographical information systems is: a. every record or digital object has a unique identifier b. every record or digital object is visible to the user c. every record or digital object must be accessed by programmers d. every record or digital object has an identified geographical location e. every record or digital object is encrypted

d

To succeed, an ERP depends on organizational and technological factors that occur: a. Prior to b. During c. After d. All of the above

d

Which of the following does not use data to make decisions? a. Operational Control. b. Strategic Control. c. Management Control. d. All areas mentioned use data.

d

Which of the following is not one of the basic features offered by most accounting software packages? a. Accounts receivable (A/R) b. Accounts payable (A/P) c. Billing and invoicing d. Price determination for products and services e. Financial reporting

d

_____ attempts to find the value of the inputs necessary to achieve a desired level of output. a. What-if analysis b. Qualitative analysis c. Sensitivity analysis d. Goal-seeking analysis e. Simulation

d

______________ management systems are relied on to handle transportation planning, which includes shipping consolidation, load and trip planning, route planning, fleet and driver planning, and carrier selection. a. Shipping b. Delivery c. Distribution d. Transportation e. Order fulfillment

d

________________ systems are older information systems that have been maintained over several decades because they fulfill critical needs. a. Legal b. Lethal c. Legible d. Legacy

d

Online retailers can personalize the webpages shown to individual customers and display a combination of products and prices customized to entice that customer to make a purchase. Which of the following was not one of the factors listed as influencing how the personalized pages are created? a. Customer's previous purchases b. Web viewing history c. Activity on social media d. Time spent online e. Product searches

d (478)

The surge in energy used to power data centers, cell towers, base stations and recharge devices is ______________ the environment and _________________ natural resources.

damaging; depleting

Day-to-day operations are connected by the ________that they share.

data and processes

The correct order of the BPI phases is ___________.

define, measure, analyze, improve, and control

Functional Business Systems (FMS)

designed to improve the efficiency and performance of a specific functional area within the org

Business management system (BMS)

designed to support planning and the implementation process across the entire org

Information systems and ___________ that have emerged in the last 10-15 years have resulted in new revenue streams, new business models, new retail, promotion and distribution channels, and entirely new industries.

digital networks

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using_____________________.

digitized maps

distributed processing

divides processing work among two or more computers. This process enables computers in different locations to communicate with one another through telecommunications links. A common type of distributed processing is client/server processing. A special type of client/server processing is peer-to-peer processing.

Which capability of digital dashboards enables users to go into greater detail?

drill down

46. A company wants to use data from past promotional mailings to identify people who would likely respond favorably to future mailings. This company would most likely use: a. Structured Query Language b. multidimensional data analysis c. neural networks d. expert systems e. data mining

e

76. Characteristics of an organizational decision support system include which of the following? a. affects several organizational units or corporate problems b. cuts across organizational functions or hierarchical layers c. involves computer-based technologies d. integrates with enterprise wide information systems e. all of the above

e

78. _____ refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions. a. Transaction processing systems b. Functional area information systems c. Expert systems d. Geographical information systems e. Business intelligence

e

81. DSS characteristics include which of the following? a. support managers at all organizational levels b. support all phases of the decision making process c. adaptable to changing conditions d. usually utilize quantitative models e. all of the above

e

87. Which capability of digital dashboards enables users to have reports that highlight deviations larger than certain threshholds. a. Drill down b. Key performance indicators c. Status access d. Trend analysis e. Exception reporting

e

Which of the following HR functions is not listed in the chapter as being facilitated by information systems or technology? a. Administering employee benefits b. Recruiting c. Employee relationship management d. Training e. All of the above are facilitated by information systems or technology

e

Which of the following is not a factor used by digital marketers to determine the placement of digital PPC ads? a. Location b. Behavior c. Interests d. Demographic information e. Frequency of web browsing

e

_____ provides users with a view of what is happening, whereas _____ addresses why it is happening. a. Multidimensional data analysis, Structured Query Language b. Data mining, multidimensional data analysis c. Data mining, expert system d. Multidimensional data analysis, neural networks e. Multidimensional data analysis, data mining

e

19. _____ is the process by which organizational goals are achieved through the use of organizational resources. a. Organizational decision making b. Operations c. Organizational strategy d. Organizational productivity e. Management

e.

The Securities and Exchange Commission requires public companies to file reports formatted in _______________ with metadata tags that make it easier for investors to analyze and compare the financial performance of public companies, increasing the efficiency and transparency of reporting processes and the ability to consolidate financial data from different operating systems.

eXtensible Business Reporting Language (XBRL)**

Cloud computing has the following benefit for employees:

efficiency

Wireless Access Point (WAP)

enables devices to connect to a wireless network to communicate with each other

Which of the following was NOT one of the strong internal controls discussed in the chapter for preventing fraud?

encrypted reporting

_____________________ tools are used by employees to find internal records in company databases and intranets as well as information on individual employee computers.

enterprise search

Decisional roles

entrepreneur, disturbance handler, resource allocator, negotiator

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

espionage

Searching for valuable business information in a database, data warehouse, or data mart refers to _____.

expert system queries

The _________ component of body camera software had caused many to express fears over the need for probably cause for searches, or stop and frisk encounters.

facial recognition

______________ is the most secure cable medium.

fiber-optic

____________ is an interpersonal role.

figurehead

Interpersonal roles

figurehead, leader, liaison

Almost all network activities are powered by the burning of ____________________.

fossil fuels

When a cyberattack is conducted by employees within the organization it is referred to as:

fraud

Google Customer Surveys is a service that publishers can use to ________ from their online content.

generate revenue

An important trend is the combination of geographical information systems with _____ to form geospatial technologies.

global positioning systems

In the early stages of a startup like Uber, valuation is based heavily on the company's ____________.

growth potential

Which of the following is NOT an impact asspciated with MOOCs?

high pass rate

Organizations that want to maintain higher security standards for some data but have less-sensitive data that does not require intranet-level protection should use a ________ cloud.

hybrid

Strong AI is __________ and could be considered to have _________

hypothetical; sentience

Ducati equipped its sales force with ________ and a custom-designed Ducati Communication System ________.

iPads; app

When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI.

improve

Analysis by consultants McKinsey and Company reveals that the IT sector could double its percent of global emissions by 2020 due to _______________________.

increased use of tablets, smartphones, apps, and services

The threats to information security are ________, and the greatest threat is ____________.

increasing; human

transaction processing systems (TPS)

info processing that is divided into distinct, undividable operations called transactions

Suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the _______________ phase of the Decision-Making Process.

intelligence

What are the three major phases in decision making as proposed by Economist Herbert Simon in 1977?

intelligence, design, choice.

Which of the manager's roles do modern information systems support?

interpersonal roles, informational roles, and decisional roles

Management control

involves decisions concerning acquiring and using resources efficiently in accomplishing organizational goals.

Strategic planning

involves decisions concerning the long range goals and policies for growth and resource allocation.

Operational control

involves executing specific tasks efficiently and effectively.

Decision Room

is a face-to-face setting for a group DSS, in which terminals are available to the participants.

Internet ("the Net")

is a global WAN that connects approximately 1 million organizational computer networks in more than 200 countries on all continents. It has become so widespread that it features in the daily routine of some 5 billion people.

Management

is a process by which organizational goals are achieved through the use of resources (people, money, energy, materials, space, time). Managers have three basic roles

management cockpit

is a strategic management room that enables top-level decision makers to pilot their businesses better. The environment encourages more efficient management meetings and boosts team performance via effective communication. Key performance indicators and information relating to critical success factors are displayed graphically on the walls of the meeting room. External information can be easily imported to the room to allow competitive analysis.

Decision making

is a systematic process composed of three major phases: intelligence, design and choice (Simon 1977), with the implementation phase added later.

wireless local area networks (WLANs)

is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.

digital dashboard

is an executive information system user interface that (similar to a car's dashboard is designed to be easy to read. For example, a product might obtain information from the local operating system in a computer, from one or more applications that may be running, and from one or more remote sites on the Web and present it as though it all came from the same source.

Group decision support system (GDSS)

is an interactive computer-based system that supports the process of finding solutions by a group of decision makers

Corporate performance management

is involved with monitoring and managing an organization's performance according to key performance indicators.

Data mining

is searching for valuable business information in a large database or data warehouse.

Data visualization

is the process of presenting data to users in visual formats, thereby making IT applications more attractive and understandable to users.

What-if analysis

is the study of the impact of a change in the assumptions (input data) on the proposed solution.

Sensitivity analysis

is the study of the impact that changes in one (or more) parts of a model have on other parts.

Goal-seeking analysis

is the study that attempts to find the value of the inputs necessary to achieve a desired level of output.

Prior to the launch of its financial service, Mint.COM made extensive use of ______ which helped search engines view this business as a credible authority for personal financial topics.

keywords

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring that average up to a B by the end of the semester. This is _____________.

knowledge

Typing in your password to access a system is an example of something the user _________.

knows

___________ users install their operating system and their application software on the cloud computing provider's computers.

laaS

Which of the following factors that make information resources more vulnerable to attack can be most easily remedied?

lack of management control

Suppose you slip in the hallway and break your arm. You sue the school for not properly marking the wet spot that caused you to slip. This is an example of _______________.

liability

Client/ Server Computing

links two or more computers in an arrangement in which some machines, called servers, provide computing services for user PCs, called clients

Paul is travelling to a new client and he receives messages about traffic along the way.Paul is using ____________.

location services

Business models designed to serve today's on-demand economy are based on time, convenience, and ____________ service.

location-based

______________ management systems enable real time monitoring and tracking of supply chain shipments, schedules, and orders.

logistics

Coordination of several complex processes, namely ordering, purchasing or procurement, inbound logistics and outbound logistics activities is called _____________.

logistics management

If there are _________ alternatives to an organization's products or services, then the threat of substitutes is high; if there are _________ alternatives, then the threat is low.

many; few

______________ is a process that spans all organizational business processes and applications.

master data management

BI systems provide computer-based information and they primarily support _________.

middle managers

Databases __________ redundancy; this means _____________.

minimize; the same data are stored in multiple locations

Informational roles

monitor, disseminator, spokesperson

Data marts can be implemented ________ quickly than data warehouses and support ________ control.

more; local

Google's translation app uses __________.

natural language processing

Data marts and data warehouses are ___________; this means they __________ be updated by users.

non-volatile; cannot

With ________, events or transactions are processed as soon as they occur.

online transaction processing

Companies prefer the _________ model of informed consent.

opt-out

___________ search listings are the result of content and website design features intended to improve a site's ranking on SERPs that result from specific keyword queries.

organic

Threat of substitute products or services refers to companies _________ the industry; rivalry refers to companies _________ the industry.

outside; inside

________________ analytics examines recent and historical data to detect patterns and predict future outcomes and trends.

predictive

You would use optimization or simulation for _____________ analytics.

prescriptive

Which analytics model requires a feedback mechanism?

prescriptive analytics

Which of the following Electronic Commerce is using Reverse Auction?

priceline

One use of hot data is _________ marketing, which refers to online advertising that "appears" on the screens of consumers' devices based on their location, behavior, interests, or demographic information

push-through pay-per-click (PPC)

Which is not one of the costs associated with inventory management?

quality

Ideally, functional systems enable __________, which is being able to respond appropriately to changes in conditions, demand, or new opportunities.

quick response

___________ transmission systems are inexpensive and easy to install but they create electrical interference problems.

radio

Business Intelligence (BI)

refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions.

Based on the textbook, which one of the following is NOT one of the FOUR factors to preserve the environment?

reprocess

In _________ auctions, buers solicit bids from many potential sellers; these auctions result in _________ prices over time.

reverse; lower

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _______________ approach.

rights

The biggest problem with using wireless networks is ____________.

security

Which one of the following is NOT one of the four categories of ethics involved with IT applications?

security

In the ____________, organizations sell their products or services to other organizations electronically from their own private e-marketplace website or from a third-party website

sell-side marketplace

Which of the following is not one of the inventory costs discussed in the text?

selling costs

You are a marketing personnel responsible for planning the budget for your department. This is a(n) _____________ task and a(n) ___________ decision.

semistructured; management control

Which of the following is not a tool used in predictive analytics?

sensitivity analysis

Cards that contain a chip containing a large amount of information are:

smart cards

An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:

social engineering

_________ collects personal information about users without their consent

spyware

At what level are decisions made that set or impact the long-term direction of the entire organization?

strategic level

The production and operations management area is most related to which of the following?

supply chain management

A(n) ________ is an interorganizational system.

supply chain system

DSS characteristics include which of the following?

support managers at all organizational levels, support all phases of the decision making process, adaptable to changing conditions, and usually utilize quantitative models

Suppose you are a salesperson. You take great pride in knowing each customers' favorite places to eat and their favorite meals. This is an example of _________________.

tactic knowledge

Crowdsourcing

the dynamic social media process of employing users to participate in product design or product redesign

communication channel

the medium of transmission that carries the coded message from the source to the receiver

commercial (public) portal

the most popular type of portal on the Internet. It is intended for broad and diverse audiences, and it offers routine content, some of it in real time (e.g., a stock ticker).

All of the following are challenges that are driving organizations to upgrade their networks to next-generation, all-IP infrastructures that are optimized and scalable, EXCEPT________________.

total cost of ownership

JIT was developed by ________ because of high real estate costs in Tokyo, Japan, that made warehousing expensive.

toyota

_______________ management systems are relied on to handle transportation planning, which includes shipping consolidation, load and trip planning, route planning, fleet and driver planning, and carrier selection.

transportation

The ______________ test is a widely used test to determine whether a computer exhibits intelligent (human) behavior.

turing

wireline media or cable media

use physical wires or cables to transmit data and information

Which of the following is NOT a factor Google uses to personalize search results?

user demographics

The ________ approach to ethics maintains that an ethical action is the one that provides the most good or does the least harm:

utilitarian approach

The NABC model is used by Stanford Research Institute for the development of a(n) ________________for an innovation project.

value proposition

Machine-to-machine (M2M) technology enables sensor-embedded products to share reliable real-time data ________.

via radio signals

An information system's _________ is the possibility that the system or resource will be compromised by a ________ that will result in its ________ to further attacks.

vulnerability; threat; exposure

IBM's Watson is considered __________ AI.

weak

Suppose you use your university's computer lab to print your research papers. If this computer lab contains desktop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab.

wireless

telecommuting

work from home, making use of the Internet, e-mail, and the telephone.

Which one of the following is NOT a meta-search engine?

yappy


Ensembles d'études connexes

NCLEX LPN Basic Care and Comfort

View Set

Principles of Marketing Chapter 13

View Set