CMIS 342 SIUE
Porter's competitive forces model identifies ________ major forces that can endanger or enhance a company's position in a given industry.
5
Almost _________ percent of ransomware victims pay the ransom and hackers ________ decrypt the data as promised.
50; do
_______ is expected to be deployed by 2020.
5G
____________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it; it is an underlying technology of _____.
A wireless sensor; the IoT
Users access the web primarily through __________.
Browsers
_________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the internet at the same time.
Cable
Most countries don't accept electronic transactions from _________ because of fraud concerns.
China
FanDuel and DraftKings rely on _______ to manage the scalability of their websites; this means _________.
Cloud computing; they have to be ready to accept a huge increase in fans right before big games
A _________ site provides only rudimentary services and facilities.
Cold
______________ refers to efforts by two or more entities who work together to accomplish certain tasks
Collaboration
__________ support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
Dashboards
Your professor hands you a piece of paper with the number 75 on it. This is ________
Data
_____________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.
Data
___________ occurs when the functions of many physical devices are included in one other physical device.
Dematerialization
Which of the following has the strategy "I am better because I am different"?
Differentiation
__________ is the result of optimizing the marketing and innovation processes
Differentiation
135.62.128.91 is an example of an __________ address
IPv4
____ is the most commonly used IP addressing scheme.
IPv4
________ does NOT have an important role in the Internet of Things.
IPv4
The adoption of ________ has been an important factor in the development of the Internet of Things.
IPv6
________ was developed because we have run out of IP addresses in the original IP addressing scheme.
IPv6
A(n) ____________ is a company that provides internet connections for a fee.
ISP
The IS function has become __________ strategic within organizations, so a growing number of CIOs are coming from _________.
Increasingly; other business units
Which of the following has the strategy "I'm doing something new and you can't catch up"?
Innovation
Which of the following increases supplier power?
Integrated supply chains
An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network.
Intranet
You decide to specialize in marketing for your first career. You take an entry-level position as XYZ Corp. This means you are a _________.
Knowledge worker
Medium-range wireless networks are ______ technology.
LAN
A large number of ______ satellites are needed for global coverage
LEO
______ satellites have the smallest footprint.
LEO
______ satellites move rapidly relative to a point on the Earth.
LEO
If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk ________ strategy.
Limitation
_________ handle the day-to-day operations of the organization and make routine decisions.
Lower-level managers
_______ satellites are used to run the GPS system.
MEO
___________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.
Mass customization
____________ transmission systems transmit data through electromagnetic waves.
Microwave
BI systems provide computer-based primarily support _________.
Middle Managers
______________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control.
Middle Managers
_______ is a medium-range wireless network.
Mifi
Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that are connected to the printer in the center of the room with Ethernet cables, it is a _____ lab
Mobile
A _____________ is a connecting system (wireline or wireless) that permits different computers to share resources.
Network
______________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.
Network neutrality
Which of the following has the strategy "I can do the same thing more efficiently than you can"?
Operational effectiveness
____________ is an example of a primary activity for most firms.
Operations
________ are the product or service created by the process.
Outputs
_________ is a consultative function of the MIS department.
Partnering with business-unit executives
_______ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet.
Passive RFID
Which of the following is TRUE?
Remote supervision will probably become a norm
_________ are people and equipment that perform process activities.
Resources
The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.
Russia
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ____________ attack.
SCADA
________ is a cloud-based team communication and collaboration software program that helps company employees communicate in real time
Slack
A(n) _________ is an interorganizational system.
Supply Chain System
__________ are the costs, in money and time, imposed by a decision to buy elsewhere.
Switching costs
_________ is the protocol of the internet.
TCP/IP
A(n) ___________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.
TPS
The USPS's IMB system is a type of ________.
TPS
Information overload is a _________ pressure.
Technology
The BYOD phenomenon is a _________ pressure.
Technology
Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?
Technology is getting cheaper to acquire, operate, and maintain
__________ does not allow participants to communicate face to face.
Teleconferencing
___________________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
The IoT
A _____________ is an intellectual work that is not based on public information.
Trade secret
____________ allows participants in one location see participants, documents, and presentation at other locations.
Videoconferencing
An information resource's _________________ is the possibility that the system will be harmed by a threat.
Vulnerability
The Internet is a __________.
WAN
Which of the following is the correct order of networks from largest to smallest?
WAN, MAN, LAN, PAN
IBM developed ___________ to answer questions on the quiz show Jeopardy!
Watson
____________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service
Watson
________ is an online grocery business that is considered the largest dotcom failure in history.
Webvan
_________ is a substitute for Bluetooth.
Wi-Fi Direct
_______ is a wide-area wireless network.
WiMAX
Suppose you use your university's computer lab to print your research papers. If this computer lab contains desktop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a _____ lab.
Wireless
___________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures.
Workflow
__________ is an unauthorized access point into a wireless network.
a rouge access point
________ refers specifically to two or more individuals who act together to perform a task
a workgroup
If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is _________.
an evil twin attack
Client/server computing links two or more computers in an arrangement in which powerful _______ provide computing services for _______.
servers; user PCs
___________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.
software defined
A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.
systems analyst
You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _____________.
tailgating; an unintentional threat to your organization
GPS uses the known speed of the signals and distance from ______ satellite(s) to find the location of a receiving station or user.
3
LTE is ______ cellular technology.
4G
It took the Democratic National Committee ________ to respond to the FBI's discovery of hacking on their system.
7 months
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.
Acceptance
______________ use internal batteries for power, and they broadcast radio waves to a reader.
Active RFID codes
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Additional management support
Auditing ___________ the computer means verifying processing by checking for known outputs using specific inputs.
Around
____________ is an example of efficiency.
Automating order entry
Six Sigma is a popular ______ technique.
BPI
Chevron supported internal improvement efforts by getting its suppliers involved using a unified _______ approach that involved standardizing processes across the entire company and consolidating process information within a central repository
BPM
Chevron identified their desired outputs and then worked backward by examining the supporting processes. They used a holistic approach that led the company to examine the interdependencies among processes used in different business units. This is a ____ approach.
BPR
Chevron improved their business processes using _______________
BPR then BPI then BPM
Spam costs US companies _______ of dollars per year.
Billions
The _______ is the highest-ranking IS manager and is responsible for all strategic planning in the organization.
CIO
A(n) _______________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time.
Commercial
A(n) ________ portal offers a personalized, single point of access through a web browser to critical business information located inside and outside an organization.
Corporate
___________ is NOT a basic function of TCP/IP.
Correct Responsible for disassembling, delivering, and reassembling data during transmission.
Which of the following is NOT an advantage of VPN?
Cost
Which of the following has the strategy "I treat my customers better than you do"?
Customer oriented
Hackers would use a botnet to perform a _________.
DDoS
Which of the following is in the current order starting with the most elementary?
Data, information, knowledge
A _____________ is a collection of related files or tables containing data.
Database
_____________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.
Enterprise Systems (ES)
_______________ offer limited accessibility to the _________ of participating companies.
Extranets, Intranets
The Internet backbone is a ___________ network.
Fiber-optic
Only a few ________ satellites are needed for global coverage.
GEO
You have satellite TV. Providers use _____ satellites to get this service to you.
GEO
________ is a market pressure.
Globalization
_____________ defines how messages are formulated and how their receivers interpret them
HTTP
___________ consists of devices such as the processor, monitor, keyboard, and printer.
Hardware
_________ is NOT an advantage of twisted-pair wire.
High bandwidth
A __________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.
Hot
A(n) _____________ is an intraorganizational system.
Human resources system
Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________
Information
__________ is organized so that it has meaning and value to the recipient.
Information
The ________ manages IS services such as help desks, hot lines, training, and consulting.
Information Center Manager
__________ industries experience the greatest threat from substitutes.
Information-based retail
An/The ______________ is a network of networks.
Internet
Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring that average up to a B by the end of the semester. This is ________.
Knowledge
_________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem
Knowledge
___________ are professional employees such as financial and marketing analysts, engineers, lawyers, and accountants.
Knowledge Workers
Typing in your password to access a system is an example of something the user __
Knows
_________ is a traditional function of the MIS department.
Managing systems development
________ s allow devices to physically connect to the LAN's communication's medium.
NIC
Which of the following is the correct order of networks from smallest to largest?
PAN, LAN, MAN, WAN
You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.
Passive RFID codes
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a __________ control.
Physical
__________ controls prevent unauthorized individuals from gaining access to a company's facilities.
Physical
Intellectual property is NOT protected under _________ laws.
Privacy
_________ is an example of a support activity for most firms.
Product and technology development
_____________________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.
RFID
The biggest problem with using wireless networks is ___________.
Security
Keystroke loggers and screen scrapers are examples of
Spyware
_______ is a medium-range wireless network.
Super Wi-Fi
A(n) ______________ to an information resource is any danger to which a system may be exposed.
Threat
Auditing ________ the computer means auditors check inputs, outputs, and processing.
Through
Your actual download speed is determined by _________.
Throughput
_________ is the amount of bandwidth actually available for you to use.
Throughput
Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk ___
Transference
A(n) __________ network is any network within your organization; a(n) ________ network is any network external to your organization.
Trusted, Untrusted
_______ is the slowest cable medium.
Twisted pair
____________ allows you to read a voice mail message in your e-mail inbox.
UC
Firemen often use _________ to communicate with each other in burning buildings.
UWB
___________ is a short-range wireless network.
UWB
Which of the following is NOT a barrier to Wi-Fi expansion?
Usability
RFID was developed to replace __________.
barcodes
_______________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda
cyberterrorism
The threat of new competitors will enter your market is high when entry is ____ and low when there are _____ barriers to entry.
easy; significant
__________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.
eavesdropping
__________ is the largest-volume application running over the internet.
Supplier power is high when buyers have _____ choices from whom to buy and low when buyers have ______ choices.
few; many
Organization's use Porter's competitive forces model to design ______ strategies; they use the value chain model to identify ________ activities to make the greatest impact.
general; specific
MOOCs _________ been proven to effectively teach the thousands of students who enroll in them and _________ provide revenues for universities.
have not; do not
_______ is an advantage of coaxial cable.
high bandwidth
Buyer power is _______ when buyers have many choices from whom to buy and ______ when buyers have few choices.
high; low
The threat from rivalry is _____ when there is intense competition among many firms in an industry and ______ when competition is not as intense.
high; low
__________ is an example of effectiveness.
increasing customer satisfaction
Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) ________ strategy.
innovation
Biometrics is an example of something the user __
is
Which of the following reduces buyer power
loyalty programs
Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a _____ lab.
mobile and wireless
IT makes managers _________ productive and ________ the number of employees who can report to a single manager.
more; increases
The internet makes customers _______ powerful; this is a ______ pressure.
more; market
Threat of substitute products or services refers to companies _______ the industry; rivalry refers to companies _____ the industry.
outside; inside
The music and newspaper industries were hurt primarily by
threat of substitutes