CMIS 342 SIUE

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Porter's competitive forces model identifies ________ major forces that can endanger or enhance a company's position in a given industry.

5

Almost _________ percent of ransomware victims pay the ransom and hackers ________ decrypt the data as promised.

50; do

_______ is expected to be deployed by 2020.

5G

____________ is an autonomous device that monitors its own condition as well as physical and environmental conditions around it; it is an underlying technology of _____.

A wireless sensor; the IoT

Users access the web primarily through __________.

Browsers

_________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the internet at the same time.

Cable

Most countries don't accept electronic transactions from _________ because of fraud concerns.

China

FanDuel and DraftKings rely on _______ to manage the scalability of their websites; this means _________.

Cloud computing; they have to be ready to accept a huge increase in fans right before big games

A _________ site provides only rudimentary services and facilities.

Cold

______________ refers to efforts by two or more entities who work together to accomplish certain tasks

Collaboration

__________ support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.

Dashboards

Your professor hands you a piece of paper with the number 75 on it. This is ________

Data

_____________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.

Data

___________ occurs when the functions of many physical devices are included in one other physical device.

Dematerialization

Which of the following has the strategy "I am better because I am different"?

Differentiation

__________ is the result of optimizing the marketing and innovation processes

Differentiation

135.62.128.91 is an example of an __________ address

IPv4

____ is the most commonly used IP addressing scheme.

IPv4

________ does NOT have an important role in the Internet of Things.

IPv4

The adoption of ________ has been an important factor in the development of the Internet of Things.

IPv6

________ was developed because we have run out of IP addresses in the original IP addressing scheme.

IPv6

A(n) ____________ is a company that provides internet connections for a fee.

ISP

The IS function has become __________ strategic within organizations, so a growing number of CIOs are coming from _________.

Increasingly; other business units

Which of the following has the strategy "I'm doing something new and you can't catch up"?

Innovation

Which of the following increases supplier power?

Integrated supply chains

An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network.

Intranet

You decide to specialize in marketing for your first career. You take an entry-level position as XYZ Corp. This means you are a _________.

Knowledge worker

Medium-range wireless networks are ______ technology.

LAN

A large number of ______ satellites are needed for global coverage

LEO

______ satellites have the smallest footprint.

LEO

______ satellites move rapidly relative to a point on the Earth.

LEO

If you limit your risk by implementing controls that minimize the impact of the threat, you have implemented a risk ________ strategy.

Limitation

_________ handle the day-to-day operations of the organization and make routine decisions.

Lower-level managers

_______ satellites are used to run the GPS system.

MEO

___________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.

Mass customization

____________ transmission systems transmit data through electromagnetic waves.

Microwave

BI systems provide computer-based primarily support _________.

Middle Managers

______________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control.

Middle Managers

_______ is a medium-range wireless network.

Mifi

Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that are connected to the printer in the center of the room with Ethernet cables, it is a _____ lab

Mobile

A _____________ is a connecting system (wireline or wireless) that permits different computers to share resources.

Network

______________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.

Network neutrality

Which of the following has the strategy "I can do the same thing more efficiently than you can"?

Operational effectiveness

____________ is an example of a primary activity for most firms.

Operations

________ are the product or service created by the process.

Outputs

_________ is a consultative function of the MIS department.

Partnering with business-unit executives

_______ rely entirely on readers for their power, are less expensive, and can be read only up to 20 feet.

Passive RFID

Which of the following is TRUE?

Remote supervision will probably become a norm

_________ are people and equipment that perform process activities.

Resources

The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.

Russia

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ____________ attack.

SCADA

________ is a cloud-based team communication and collaboration software program that helps company employees communicate in real time

Slack

A(n) _________ is an interorganizational system.

Supply Chain System

__________ are the costs, in money and time, imposed by a decision to buy elsewhere.

Switching costs

_________ is the protocol of the internet.

TCP/IP

A(n) ___________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.

TPS

The USPS's IMB system is a type of ________.

TPS

Information overload is a _________ pressure.

Technology

The BYOD phenomenon is a _________ pressure.

Technology

Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?

Technology is getting cheaper to acquire, operate, and maintain

__________ does not allow participants to communicate face to face.

Teleconferencing

___________________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.

The IoT

A _____________ is an intellectual work that is not based on public information.

Trade secret

____________ allows participants in one location see participants, documents, and presentation at other locations.

Videoconferencing

An information resource's _________________ is the possibility that the system will be harmed by a threat.

Vulnerability

The Internet is a __________.

WAN

Which of the following is the correct order of networks from largest to smallest?

WAN, MAN, LAN, PAN

IBM developed ___________ to answer questions on the quiz show Jeopardy!

Watson

____________ is an IT system that uses natural language processing and machine learning to reveal insights from large amounts of data. It has transformed many industries including healthcare and customer service

Watson

________ is an online grocery business that is considered the largest dotcom failure in history.

Webvan

_________ is a substitute for Bluetooth.

Wi-Fi Direct

_______ is a wide-area wireless network.

WiMAX

Suppose you use your university's computer lab to print your research papers. If this computer lab contains desktop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a _____ lab.

Wireless

___________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures.

Workflow

__________ is an unauthorized access point into a wireless network.

a rouge access point

________ refers specifically to two or more individuals who act together to perform a task

a workgroup

If someone simulates a valid wireless access point to get people to provide usernames, passwords, and account numbers without that person's knowledge, this is _________.

an evil twin attack

Client/server computing links two or more computers in an arrangement in which powerful _______ provide computing services for _______.

servers; user PCs

___________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.

software defined

A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.

systems analyst

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _____________.

tailgating; an unintentional threat to your organization

GPS uses the known speed of the signals and distance from ______ satellite(s) to find the location of a receiving station or user.

3

LTE is ______ cellular technology.

4G

It took the Democratic National Committee ________ to respond to the FBI's discovery of hacking on their system.

7 months

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.

Acceptance

______________ use internal batteries for power, and they broadcast radio waves to a reader.

Active RFID codes

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

Additional management support

Auditing ___________ the computer means verifying processing by checking for known outputs using specific inputs.

Around

____________ is an example of efficiency.

Automating order entry

Six Sigma is a popular ______ technique.

BPI

Chevron supported internal improvement efforts by getting its suppliers involved using a unified _______ approach that involved standardizing processes across the entire company and consolidating process information within a central repository

BPM

Chevron identified their desired outputs and then worked backward by examining the supporting processes. They used a holistic approach that led the company to examine the interdependencies among processes used in different business units. This is a ____ approach.

BPR

Chevron improved their business processes using _______________

BPR then BPI then BPM

Spam costs US companies _______ of dollars per year.

Billions

The _______ is the highest-ranking IS manager and is responsible for all strategic planning in the organization.

CIO

A(n) _______________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time.

Commercial

A(n) ________ portal offers a personalized, single point of access through a web browser to critical business information located inside and outside an organization.

Corporate

___________ is NOT a basic function of TCP/IP.

Correct Responsible for disassembling, delivering, and reassembling data during transmission.

Which of the following is NOT an advantage of VPN?

Cost

Which of the following has the strategy "I treat my customers better than you do"?

Customer oriented

Hackers would use a botnet to perform a _________.

DDoS

Which of the following is in the current order starting with the most elementary?

Data, information, knowledge

A _____________ is a collection of related files or tables containing data.

Database

_____________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.

Enterprise Systems (ES)

_______________ offer limited accessibility to the _________ of participating companies.

Extranets, Intranets

The Internet backbone is a ___________ network.

Fiber-optic

Only a few ________ satellites are needed for global coverage.

GEO

You have satellite TV. Providers use _____ satellites to get this service to you.

GEO

________ is a market pressure.

Globalization

_____________ defines how messages are formulated and how their receivers interpret them

HTTP

___________ consists of devices such as the processor, monitor, keyboard, and printer.

Hardware

_________ is NOT an advantage of twisted-pair wire.

High bandwidth

A __________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.

Hot

A(n) _____________ is an intraorganizational system.

Human resources system

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________

Information

__________ is organized so that it has meaning and value to the recipient.

Information

The ________ manages IS services such as help desks, hot lines, training, and consulting.

Information Center Manager

__________ industries experience the greatest threat from substitutes.

Information-based retail

An/The ______________ is a network of networks.

Internet

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring that average up to a B by the end of the semester. This is ________.

Knowledge

_________ is organized and processed to convey understanding, experience, accumulated learning, and expertise as it applies to a current business problem

Knowledge

___________ are professional employees such as financial and marketing analysts, engineers, lawyers, and accountants.

Knowledge Workers

Typing in your password to access a system is an example of something the user __

Knows

_________ is a traditional function of the MIS department.

Managing systems development

________ s allow devices to physically connect to the LAN's communication's medium.

NIC

Which of the following is the correct order of networks from smallest to largest?

PAN, LAN, MAN, WAN

You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.

Passive RFID codes

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a __________ control.

Physical

__________ controls prevent unauthorized individuals from gaining access to a company's facilities.

Physical

Intellectual property is NOT protected under _________ laws.

Privacy

_________ is an example of a support activity for most firms.

Product and technology development

_____________________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.

RFID

The biggest problem with using wireless networks is ___________.

Security

Keystroke loggers and screen scrapers are examples of

Spyware

_______ is a medium-range wireless network.

Super Wi-Fi

A(n) ______________ to an information resource is any danger to which a system may be exposed.

Threat

Auditing ________ the computer means auditors check inputs, outputs, and processing.

Through

Your actual download speed is determined by _________.

Throughput

_________ is the amount of bandwidth actually available for you to use.

Throughput

Your company decides to purchase security insurance from Travelers Insurance in case your systems get hacked and employee information is stolen. This is an example of risk ___

Transference

A(n) __________ network is any network within your organization; a(n) ________ network is any network external to your organization.

Trusted, Untrusted

_______ is the slowest cable medium.

Twisted pair

____________ allows you to read a voice mail message in your e-mail inbox.

UC

Firemen often use _________ to communicate with each other in burning buildings.

UWB

___________ is a short-range wireless network.

UWB

Which of the following is NOT a barrier to Wi-Fi expansion?

Usability

RFID was developed to replace __________.

barcodes

_______________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda

cyberterrorism

The threat of new competitors will enter your market is high when entry is ____ and low when there are _____ barriers to entry.

easy; significant

__________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.

eavesdropping

__________ is the largest-volume application running over the internet.

email

Supplier power is high when buyers have _____ choices from whom to buy and low when buyers have ______ choices.

few; many

Organization's use Porter's competitive forces model to design ______ strategies; they use the value chain model to identify ________ activities to make the greatest impact.

general; specific

MOOCs _________ been proven to effectively teach the thousands of students who enroll in them and _________ provide revenues for universities.

have not; do not

_______ is an advantage of coaxial cable.

high bandwidth

Buyer power is _______ when buyers have many choices from whom to buy and ______ when buyers have few choices.

high; low

The threat from rivalry is _____ when there is intense competition among many firms in an industry and ______ when competition is not as intense.

high; low

__________ is an example of effectiveness.

increasing customer satisfaction

Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) ________ strategy.

innovation

Biometrics is an example of something the user __

is

Which of the following reduces buyer power

loyalty programs

Suppose you use your university's computer lab to print your research papers. If this computer lab contains laptop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a _____ lab.

mobile and wireless

IT makes managers _________ productive and ________ the number of employees who can report to a single manager.

more; increases

The internet makes customers _______ powerful; this is a ______ pressure.

more; market

Threat of substitute products or services refers to companies _______ the industry; rivalry refers to companies _____ the industry.

outside; inside

The music and newspaper industries were hurt primarily by

threat of substitutes


Ensembles d'études connexes

ECO2013 - Homework Chapters 1 & 2

View Set

Office Applications I Unit 4 Test

View Set

Life and Health: Life Insurance Basics

View Set

Intro to computer tech Chapter 2

View Set

MGMT 470: Ch. 9, 10, & Other Key Terms

View Set