FINAL CIS, IT101, CSC 220 CH 9, CTS115 Final, IS 220 Exam 3, CSC 220 Chapter 6, CTS115-L6B-Fall-2017 Unit 8, CTS 115 Fall 2017 Information Systems Unit 6
Business needs and their importance are roughly the same for all companies so the IS solutions they choose are quite similar.
False
Business intelligence turns data into useful information that then is kept closely guarded to avoid this information from falling into the hands of the wrong employees.
False
Oracle is currently the market leader in general purpose databases, with about three-fourths of the multibillion dollar database market.
False
Basic data manipulations include__________which involves eliminating rows in a relational database.
Selecting
_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.
Self-service analytics
_____ is responsible for implementing a new information systems required to support an organization's existing and future business needs.
Senior IS Managers
In some cases, multiple, multiple organizations collaborate in creating and using internationally databases.
True
Schema
Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____.
is the stage of systems development that creates a complete set of technical specifications that can be used to construct an information system.
System Design
The expert system knowledge acquisition facility serves as an interface between
System Developers and Explanation Facility
True
T/F-If you wish to have a visual depiction of relative frequencies of words in a document, a word cloud would be an appropriate option.
True
T/F-The data for BI (business intelligence) comes from many sources
In the relational model, each row of a table represents a data or record and each column of the table represents an attribute or field.
True
Online transaction processing
Which of the following is NOT considered a BI and analytics tool? 1. Drill-down analysis 2. Online transaction processing 3. Data visualization 4. Data mining
Format
Which of the following is NOT a component of a KPI (key performance indicator)? 1. Direction 2. Format 3. Measure 4. Time frame
Assistive technology
_____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing.
Multimedia
_____ is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals.
Informatics
_____ is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society.
____ is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization
enterprise data modeling
A(n) _____ is a person, place, or thing (object) for which data is collected, stored, and maintained.
entity
In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.
entity symbol
What determines the size of words in a word cloud?
frequency of occurrence of the word in source documents
refers to the level of detail in the model or the decision-making process.
granularity
_____ is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products, including all types of computers, printers, and printer materials such as cartridges and toner.
green computing
_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.
grid computing
Which of these analysis methods describes neural computing?
historical data is examined for patterns that are then used to make predictions
The ______ is an advanced optical disk technology in development that would store more data than even the Blu-ray optical disk system.
holographic versatile disc
The area covered by one or more interconnected wireless access points is commonly called a(n)
hot spot
The fiber-optic cables that span the globe over land and under sea make up the
internet backbone
is a communication standard that enables computers to route communications traffic from one network to another as needed
internet protocol
Basic data manipulations include _____ that involves eliminating rows in a relational database according to certain criteria.
selecting
According to Anthony Gorry and Michael Scott Morton's framework on decision support systems, the decisions where only some of the variables can be measured quantitatively are called _____.
semi structured
An operating system with _____ capabilities allows a user to run more than one program concurrently.
multitasking
is a very short-range wireless connectivity technology designed for cell phones and credit cards
near field communication
According to Christensen, companies may have placed too great an emphasis on satisfying customers' current ___________, while forgetting to adopt new disruptive technology that will meet customers' future needs.
needs
._____ is a branch of artificial intelligence that allows computers to recognize and act on patterns or trends.
neural networks
.______ is a form of database processing that supports top-down, query-driven data analysis.
online analytical proccessing
A(n) _____ is an assessment of how well management uses the resources of an organization and how effectively organizational plans are being executed.
operational audit
_____ deals with how firms successfully plan for and implement reforms.
organizational change
.In a purchasing system, when an invoice arrives from a supplier, it is matched to ______ and a check is generated if all data is complete and consistent.
original order
Hiring an outside company to perform some or all of a systems development project is called
outsourcing
___________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
outsourcing
Data is broken into _____ to be transmitted over the Internet.
packets
RFID uses active or ________ tags in the form of chips or smart labels.
passive
The _____ is the number of years required to recover the initial cost of an investment.
payback period
__ is a form of data mining that combines historical data with assumptions about future conditions to forecast the outcomes of events.
predictive analysis
One of the goals of business intelligence is to _________.
present the results in an easy to understand manner
The primary outcome of systems analysis phase is
prioritized list of system requirements & recommendation of how to proceed with project.
Which of the following is NOT a core process associated with data management?
process for gathering BI requirements
In the context of e-commerce software, _____ helps customers select the necessary components and options
product configuration
In an order processing system, a(n) _____ is printed at the warehouse from which an order is to be filled on the day the order is planned to be shipped.
product pick list
In the context of financial MIS subsystems and outputs, a _____ is an independent business unit that is treated as a distinct entity enabling its revenues and expenses to be determined and its profitability to
profit center
_____ are sets of keywords, symbols, and rules for constructing statements that people can use to communicate instructions to a computer.
programming languages
analysis checks the impact of a change in a variable or assumption on the model.
what-if
The Pareto principle is also known as the _____.
80-20 rule
12. Competitive intelligence is gained through industrial espionage and the gathering of this information often includes illegal or unethical means.
False
13. Solid state storage devices store data in memory chips rather than magnetic or optical media and require less power to operate while providing slower data access than magnetic data storage devices.
False
15. The ability of a computer to handle an increasing number of concurrent users smoothly is called multitasking
False
17. A database need not reflect the business processes of the organization.
False
17. Compared to main memory secondary storage offers the advantages of volatility, increased capacity, and lower costs
False
22. An attribute is a general class of people, places, or things for which data is collected, stored, and maintained.
False
29. Identification of who will have access to a database has little impact on organizing a database.
False
32. The overall trend in secondary storage devices is toward use of direct access methods, higher capacity, and increased volatility.
False
32. The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files.
False
35. Online Analytical Processing and data mining are essentially the same thing.
False
42. Business and technology vendors are working to develop blue data centers that run more efficiently and require less energy for processing and cooling.
False
42. Systems software consists of programs that help users solve particular computing problems.
False
43. Netbook computers are ideal for users who need to run demanding applications, have many applications open at once, or need lots of data storage capacity.
False
44. Most operating systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of ROM.
False
45. The domain for payrate would include both positive and negative numbers.
False
46. The Database Administrator decides the contents of the database with little or not input from the users of the database.
False
51. RAID is a method of storing data so that it can be accessed more quickly
False
Data Definition Language
A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report?
100,000 to 200,000
The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.
128-bit
is a popular and sophisticated software package that can be used to edit visual images.
18. Adobe Photoshop
Michael Porter proposed a now widely accepted competitive forces model that includes _____ forces.
5
Neural Network
A _____ is a computer system that can act like or simulate the functioning of a human brain.
rule
A _____ is a conditional statement that links conditions to actions or outcomes.
community of practice (COP)
A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.
Data Mart
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
Record
A collection of fields all related to a single object, activity, or individual is a(n) _____.
theory of evolution
A genetic algorithm is an approach to solving problems based on the _____.
Primary Key
A(n) _____ is a field or set of fields in a record that uniquely identifies the record.
Primary Key
A(n) _____ is a field or set of fields that uniquely identify a record.
Virtual Reality System
A(n) _____ is a system that enables one or more users to move and react in a computer-simulated environment.
Knowledge Management System (KMS)
A(n) _____ is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization's knowledge and experience.
was the ancestor of the Internet.
ARPANET
The role of a system developer in a joint application development (JAD) is to
Accelerate efficiency & effectiveness of investigation
39. The smallest piece of data used by a computer is the _______.
Bit
Organizing
After entering data into a relational database, users can make all of the following basic data manipulations except: 1. Joining 2. Selecting 3. Projecting 4. Organizing
Your new software project manager is OK with requirements that are not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _______ approach to software development.
Agile
is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months
Agile Development
_____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months.
Agile development
27. The process of selecting the best database management system for an organization considers ___________.
All of the above
36. A tool that database designers use to show the logical relationships among data is a(n) __________.
All of the above
45. An RFID tag on an inventory item might contain information _________.
All of the above
47. Green Computing is focused at the efficient and environmentally responsible______ of IS related products
All of the above
A risk involved with using an application service provider is that
All of the above
include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning, reasoning, and self-correction
Artificial Intelligence Systems
A business that operates in a physical store without an internet presence. Example: TJ Maxx
Brick-and-Mortar Business
A _____ is a defect in a computer program that keeps it from performing as its users expect it to perform.
Bug
Which of the following is a potential disadvantage with self-service BI?
Can lead to over spending on unapproved data sources and business analytics tools.
What are the disadvantages of hosted software model
Can't customize, don't control customer data, greater dependability on supplier, and sharing resources
. A(n) _____ is a basic building block of most information, consisting of upper-case letters, lowercase letters, numeric digits, or special symbols.
Character
Suppose management wishes to start a BI project at your new job. Which of following will you recommend as the first step?
Clarify business goals and design a project plan
A busniess that operates in a physical store and on the internet. Example: Barnes and Noble
Click-and-Mortar Business
Which of the following is IBM's BI product?
Cognos
refer to errors, failures, and other computer problems that make computer output incorrect or not useful
Computer-Related Mistakes
_____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process.
Consumer to Consumer (C2C)
36. Each central processing unit consists of two primary elements: the arithmetic/logic unit and the _________ unit.
Control
____ are divisions within a company that do not directly generate revenue.
Cost Center
48. _________ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.
Counterintelligence
Suppose your employer has four manufacturing units, each with its own data operations. They are considering using BI tools. Which of the following is a valid recommendation regarding the BI initiative?
Create a data warehouse so that data from the factories are combined for BI analysis
_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.
Critical analysis
____ is a single Web site that offers many products and services at one Internet location.
Cybermall
The creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness
Cybermediation
Governance
Data _____ is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted.
The DBMS organizes the data independently of the application program, so the application is not affected by the location or type of data. This is an example of ____.
Data and Program Independence
Gather problem-related data, including who, what, where, why, and how. Be sure to gather facts not rumors or opinions about the problem.
Data Collection
(n)_____________ typically stores three to ten years of historical summary data records from many operational systems and external data sources so that it can be used for business analysis
Data Warehouse
(n) _________ contains a subset of data for a single aspect of a company's business and are used by smaller groups who want to access detailed data for business analysis.
Data mart
23. ___________ is an information analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
Data mining
_____ is used to explore large amounts of data for hidden patterns to predict future trends.
Data mining
Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?
Data visualization tool
Summarized
Data within the data cube has been ______ by specific dimensional values.
14. With _______, the databases is stored on a service provider's server and accessed by the client over a network, typically the internet.
Database as a service
A(n) _____ is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision making.
Decision Support System (DSS)
15. Data warehouses allow managers to ______ to get increasing levels of detail about business conditions.
Drill down
Under the Identity Theft and Assumption Deterrence Act of 1998, the _____________ is assigned responsibility to help victims restore their credit and erase the impact of the imposter
Department of Homeland Security
____ is the last phase of the six-phase CRISP-DM method.
Deployment
develops detailed plans for a new or modified information system and interacts with the stakeholders and users, management, vendors and suppliers, external companies, programmers, and other IS support personnel
Development Team
_____ is a strategy for gaining competitive advantage wherein a company strives to deliver distinct products and services.
Differentiation
refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.
Digital Rights Management (DRM)
Occurs when a business sells directly to the customer online and cuts out the intermediary.
Disintermediation
The elimination of intermediate organizations between the producer and the consumer is called _____.
Disintermediation
8. A database in which data can be spread across several smaller databases connected through telecommunications devices is called a(n)_________.
Distributed database
is the person or group with the expertise or knowledge an expert system is trying to capture.
Domain Expert
____ offers personalized shopping consultations for shoppers interested in upscale, contemporary clothing—dresses, sportswear, denim apparel, handbags, jewelry, shoes, and gifts.
E-Boutiques
_____ involves using information systems and the Internet to acquire parts and supplies.
E-Procurement
30. Many organizations are turning to_______, a set of integrated programs that manages a company's vital business operations for an entire multisite, global organization
ERP
evolved from materials requirement planning systems (MRP) that tied together the production planning, inventory control, and purchasing business functions for manufacturing organizations.
ERP
_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.
Economic feasibility
The focus of a DSS is on decision-making _____ when faced with unstructured or semistructured business problems.
Effectivness
is the direct sale of products or services by businesses to consumers through electronic storefronts, typically designed around the familiar electronic catalog and shopping cart model.
Electronic Retailing
.In the context of e-commerce software, _____ helps track the items selected for purchase.
Electronic Shopping Cart
___ is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.
Electronic exchange
23. People using commercially available software are usually asked to read and agree to a(n)_________.
End user license agreement
is the creation, modification, or extension of software by people who are nonprofessional software developers
End-User Systems Development
Mastery over which subject is NOT required for being a data scientist?
English
.A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective.
Enterprise Resource Planning (ERP)
Many organizations are turning to _____, a set of integrated programs that manages a company's vital business operations for an entire multisite, global organization.
Enterprise resource planning software
In the context of data-flow diagrams, the ___________ shows either the source or destination of the data.
Entity Symbol
getting employees to buy in
Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. As a means of convincing the other teams to adopt the new methods, they develop an incentive program that allows team members to earn a percentage of the money they save on each project. This is related to which phase of knowledge management project implementation?
leveraging the expertise of people across the organization
Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system?
is the component of an expert system that allows a user to understand how the system arrived at its results.
Explanation Facility
The knowledge found in databases, memos, and written documents is an example of
Explicit Knowledge
_____ is a network based on Web technologies that allows only selected outsiders, such as business partners and customers, to access authorized resources of a company's intranet.
Extranets
Database management system cost in excess of one thousand dollars.
False
Due to their size, databases must be stored on mainframe computers or other large, powerful computers.
False
The components responsible for processing the CPU and memory are housed together in the same box or cabinet called the chip set.
False
RAID storage devices provide organizations with data storage that is ____
Fault tolerant
In information systems, _____ is information from a system that is used to make changes to input or processing activities
Feedback
19. Literally thousands of programming languages have been developed, but only ______ are commonly used today.
Few dozen
A(n) _____ is typically a name, number, or combination of characters that describes an aspect of a business object or activity.
Field
If convicted for copyright infringement, software pirates could be sentenced to jail for up to
Five years
Quality information that can be used for a variety of purposes is said to be _____.
Flexible
Join
For the ____ operation, it is required that the the two tables have a common attribute.
Developers of _____ try to build on the advantages of individual support systems while adding new approaches unique to group decision making.
GSS
One special application of computer technology is derived from a mathematical theory called _______ that involves the use of information systems to develop competitive strategies.
Game Theory
is a graphical tool used for planning, monitoring, and coordinating projects.
Gantt Chart
In some cases, inaccurate information is generated because inaccurate data is fed into the transformation process. This is commonly called _____.
Garbage In Garbage Out
A _____ displays icons and menus that people use to send commands to a computer system
Graphical User Interface (GUI)
31. __________ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.
Grid Computing
.The _____ approach forces members of a decision making group to reach a unanimous decision.
Group Consensus Approach
An effective _____ MIS enables an organization to keep personnel costs at a minimum while serving the required business processes needed to achieve corporate goals.
HR
is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.
Hacker
Variety
Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with ________.
Special purpose systems that help overcome disabilities or improve health are called
Health Systems
inference engine
In an expert system, the _____ is the component that delivers the expert advice.
A(n) _____ is a 64-bit number that identifies a computer on the Internet.
IP address
________ infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
IT
Data Lake
If an organization is taking a "store everything" approach to data, it will save all the data in its raw and unaltered form in a _____.
The two phases of problem solving added by Huber to Simon's original three-stage model of decision-making are _____.
Implementation and monitoring
Extract
In the _____ process, all of the data from various sources is converted into a single format suitable for processing.
The _____ is NOT a component of the typical DSS.
Inference Engine
is the component that delivers the expert advice.
Inference Engine
is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society.
Informatics
_____ are considered to be the most important element in a computer-based information system.
Information
A(n) _____ is a set of interrelated components that collect, manipulate, store, and disseminate data and information and provide a feedback mechanism to meet an objective.
Information System (IS)
identifies those information systems development initiatives needed to support organizational strategic goals
Information Systems Planning
Refers to the depth and breadth of deatils contained in a piece of textual, graphic, audio, or video information.
Information richness
have extra knowledge that make them especially dangerous—they know logon IDs, passwords, and company procedures that help them evade detection.
Insiders
A useful guideline to protect corporate computers from criminal hackers is to
Install antivirus software on all computers.
Agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.
Intermediaries
The _____ of an investment makes the net present value of all cash flows (benefits and costs) generated by a project equal to zero.
Internal rate of return
In the context of decision support system framework developed by Anthony Gorry and Michael Scott Morton, one characteristic of a structured decision is that _____.
It is straightforward, requiring known facts and relationships
Graphic images can be stored in a variety of formats including
JPEG and GIF
is an object-oriented programming language from Sun Microsystems based on the C++ programming language, which allows small programs, called applets, to be embedded within an HTML document.
Java
In the context of types of reports generated by management information systems (MIS), a(n) _____ summarizes the previous day's critical activities in an organization and is typically available at the beginning of each workday
Key-indicator
Tacit
Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.
The process of defining relationships among data to create useful information requires ______.
Knowledge
is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision
Knowledge
stores all relevant information, data, rules, cases, and relationships that an expert system uses.
Knowledge Base
is a person who has training or experience in the design, development, implementation, and maintenance of an expert system
Knowledge Engineer
A(n) _____ is an organized collection of people, procedures, software, databases, and devices that stores and retrieves knowledge, improves collaboration, locates knowledge sources, captures and uses knowledge.
Knowledge Management System (KMS)
____ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas.
Knowledge workers
22. ________ displays are flat displays that use liquid crystals to form characters and graphic images on a backlit screen.
LCD
Web-based service system is one of several information systems used by law enforcement to recover stolen property
LeadsOnline
____ is an open source operating system whose source code is freely available to everyone.
Linux
.In the context of group decision support system alternatives, _____ can be used when group members are located in the same building or geographic area and under conditions in which group decision making is frequent.
Local Area Decision Network
is a type of Trojan horse that executes when specific conditions occur
Logic Bomb
Refers to the tail of a typical sales cycle
Long Tail
5. ___________ is an application of data mining the identifies the products and services most commonly purchased at the same time.
Market Basket analysis
The ability of an organization to tailor its products or services to the customers' specifications
Mass Customization
English
Mastery over which subject is NOT required for being a data scientist?
.A(n) _____ is the component of a decision support system that allows managers and decision makers to perform quantitative analysis on both internal and external data.
Model Base
The practice of disguising illegally gained funds so that they seem legal is called
Money Laundering.
48. An operating system with _______ capabilities allows to run more than once application at the same time
Multitasking
35. A type of memory whose contents are not lost if the power is turned off is said to be __________.
NON volatile
Choosing the right computer hardware requires understanding it's relationship to the information system and the ____ of the organization.
Needs
can process many pieces of data at the same time and learn to recognize patterns
Neural Networks
33. The __________ display monitor uses the least amount of power.
OLED
18. ________ are frequently used to capture input in standardized test such as rhe SAT and GMAT.
OMR Readers
_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.
OMR Systems
Which of the following is NOT considered a BI and analytics tool?
Online transaction processing
The Holographic Versatile Disc (HVD) is an advanced _____ technology still in the development stage and is the same size and shape as a regular digital video disc (DVD) but can hold 1 terabyte (or more) of information
Optical Disk
A _____ is a credit card issued to selected employees to help streamline the traditional purchase order and invoice payment processes.
P-Card
You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?
Parallel start up
is a small program hidden in a network or computer system that records identification numbers
Password Sniffer
allows a machine to approximate the way a person sees, hears, and feels objects.
Perceptive System
___________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.
Personalization
_____ involves running a complete new system for one group of users rather than all users.
Pilot start-up
A(n) _____ is s field or set of fields in a record that uniquely defines the record.
Primary key
The performance of decision support systems is typically a function of decision quality and _____.
Problem Complexity
Define the problem as clearly and precisely as possible.
Problem Identification
In the context of data-flow diagrams, the ___________ identifies the function being performed.
Process Symbol
takes the system design from the systems analysis team and builds or modifies the necessary software
Programmer
is a critical date for completing a major part of a project, such as program design, coding, testing, and cutover
Project Milestone
is a detailed description of when project activities are performed.
Project Schedule
is a key member and leader of a steering committee in systems development who has final approval of all requests for changes in project scope, budget, and schedule.
Project Sponsor
21. A database_________.
Provides an essential foundation for an organization's knowledge management and artificial intelligence systems
A business that operates on the Internet only without a physical store. Example: Google
Pure-Play Business
37. ___________ is a visual approach to developing database requests
Query by example
Some databases use ______, which is a visual approach to developing queries and requests.
Query by example
A type of memory that loses its contents if the power is turned off is said to be _____.
RAM
_____ is a technology that employs a microchip with an antenna to broadcast its unique identifier and location to receivers.
Radio Frequency Identification (RFID)
Steps are added to the value chain as new players find ways to add value to the business process.
Reintermediation
The final step to prevent computer-related waste is to
Review Existing Policies and Procedures
______ is a Web-delivered software application that combines hardware resources of the Web server and PC to deliver valuable software services through a Web browser interface.
Rich Internet Application
is a set of programs that enables its user to gain administrator level access to a computer or network.
Rootkit
From which vendor is the BI product Business Objects available?
SAP
The goal of _____ is to reduce costs and improve customer service, while at the same time reducing the overall investment in inventory in a supply chain.
SCM
26. _________ is a standardized data manipulation language developed in the 1970's that allows programmers to use one powerful language and use it on a variety of systems
SQL
____ databases rely upon concurrency control by locking database records to ensure that other transactions do not modify the database until the first transaction succeeds or fails, and as a result, can suffer from slow performance
SQL
Which of the following will be a 'fact' measure in a data cube used at a chain retail business?
Sales revenue
A _____ is a description that involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user.
Schema
The ______ is a credit card-sized device with an embedded microchip to provide memory and processing capability.
Smart card
is a scam that attempts to steal an individual's private information by having them respond to a text message
Smishing
_____________ bookmarking allows users to share, organize, search, and manage bookmarks.
Social
_____ consists of computer programs that govern the operation of a computer.
Software
Detail every solution possible, including ideas that seem farfetched.
Solution Generation
If the solution solves the problem, then the decisions made were correct. If not, then the decisions were incorrect and the process begins again.
Solution Implementation
Evaluate solutions in terms of feasibility, suitability, and acceptability.
Solution Test
Select the solution that best solves the problem and meets the needs of the business.
Solution selection
10. ____________ involves using a database to store and access data according to the locations it describes and to permit spatial queries and analysis.
Spatial data technology
A ________ uses computer servers, distributed storage devices, and networks to tie everything together.
Storage area network.
54. ______ are the most powerful computers with the fastest processing speed and highest performance
Supercomputers
Data visualization tool
Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?
_____ is the process of analyzing systems to make sure they are operating as intended.
System review
_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.
System testing
phase of a traditional systems development life cycle attempts to answer the question "What must the information system do to solve the problem?"
Systems Analysis
involves successfully introducing an information system into an organization.
Systems Implementation
The purpose of the ___________ phase of a traditional systems development life cycle is to gain a clear understanding of the specifics of a problem to be solved or the opportunity to be addressed.
Systems Investigation
_____ creates a complete set of technical specifications that can be used to construct an information system.
Systems design
_____ involves using a new or modified system under all kinds of operating conditions.
Systems operation
False
T/F A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.
True
T/F- A database must reflect the business processes of an organization.
True
T/F- A database, a database management system, and the application programs that use the data, make up a database environment.
True
T/F- A relational model splits the information up into many two dimensional data structures.
True
T/F- Artificial intelligence involves the development of machines and computer systems that can simulate human intelligence processes.
False
T/F- Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.
False
T/F- Data scientists do not need much business domain knowledge.
True
T/F- During drill-down, you go from high-level summary data to detailed levels of data.
True
T/F- Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence.
False
T/F- Many organizations actively attempt to convert explicit knowledge to tacit knowledge.
True
T/F- Namaste Yoga Studio's website is a great example of multimedia because it uses text, photos, graphics, and video to communicate the message of the studio's owners.
False
T/F- Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system.
False
T/F- Online analytical processing is another name for enterprise application.
knowledge is hard to measure and document and is typically not objective or formalized
Tacit
Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of
Tacit knowledge
3. The ______ features of the operating system allocate computer resources to make the best use of each systems assets.
Task Management
_____ explains the purpose of every major piece of computer code and also identifies and describes key variables.
Technical documentation
has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help you locate your position.
Telepresence Tech
The _____ is the part of the central processing unit (CPU) that sequentially accesses program instructions, decodes them, and coordinates the flow of data in and out of the arithmetic/logic unit (ALU).
The Control Unit
What is a primary element of the central processing unit (CPU)?
The Control Unit
Relational
The ____ model database makes it easy to develop queries that involve joining two tables.
explanation facility
The _____ allows an expert system user to understand how the system arrived at its results.
Relational
The _____ model has become the most popular database model.
knowledge base
The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.
support and improve decision making
The goal of business intelligence is to _____.
A conversion funnel
The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.
Touch
The haptic interface relays the sense of _____ in the virtual world.
Data Administrator
The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.
Bit
The smallest piece of data used by a computer is a(n) _____.
You are to advise XYZ so that their BI efforts are fruitful. Which among the following is the most crucial advice of all?
There must be strong commitment from the management
enterprise resource planning (ERP) vendors target large multinational firms with multiple geographic locations and annual revenue in excess of $1 billion.
Tier 1
The haptic interface relays the sense of __________ in the virtual world
Touch
One of the most effective counterintelligence measures is to define _____ information relevant to a company and control its dissemination.
Trade secret
life cycle is a sequential multistage process where work on the next stage cannot begin until the results of the previous stage are reviewed and approved or modified as necessary.
Traditional SDLC
____ is an approach to data management whereby each distinct operational system uses data files dedicated to that system.
Traditional approach to data management
A(n) _____ is an organized collection of people, procedures, software, databases, and devices used to perform and record business deals.
Transaction Processing System (TPS)
Which of the following is NOT considered business intelligence practice?
Transaction processing
14. An application service provider is a company that can provide the software, support, and computer hardware on which to run the software from the users facilities over a network.
True
16. Outsourcing global software support to one or more third-party distributors is gaing acceptance in North America.
True
2. People involved in selecting their organizations computer hardware need to clearly understand current and future business requirements so they can make informed acquisition decisions
True
20. A software suite is a collection of single programs packaged together as a bundle and typically include word processing, spreadsheet, graphics, and more.
True
20. Data mining involves the automated discovery of patterns discovery of patterns and relationships in a data warehouse.
True
21. Utility programs help to perform maintenance, correct problems, merge and sort sets of data, keep track of computer jobs, and compress files of data.
True
25. The Snow Leopard operating system allows users to view their system as it looked in the past and resurrect deleted files.
True
28. Parallel processing is a form of multiprocessing and speeds processing by linking several processors to operate at the same time.
True
29. Application programs interact with systems software, and the systems software directs computer hardware to perform the necessary tasks.
True
31. A data warehouse stores historical data that has been extracted from operational systems, external sources, and, sometimes, even unique sources.
True
34. To, run applications request services from the operating system through a defined application program interface.
True
34. Today, most organizations use the database approach to data management, where multiple information systems share a pool of related data.
True
37. There are free web-based productivity software suites the require no installation on the computer.
True
38. The clock speed affects machine cycle time and the rate at which the computer executes instructions.
True
39. Support for green computing is emerging as a new business strategy for computer manufacturers to distinguish themselves from the competition.
True
40. One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically.
True
41. Software as a service allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per use fee.
True
43. A data warehouse is used to support decision making while and OLTP database is used to support transaction processing.
True
49. Data centers are approaching the point of automation, where they can run and manage themselves while being monitored remotely in a "lights out" environment.
True
5. MICR is a technology from the 1950's, still used to process checks.
True
53. Information systems that operate within the enterprise sphere of influence support the firm in its interaction with customers, suppliers, shareholders, competitors, special-interest groups, the financial community, and government agencies.
True
9. The analysis of data on user traffic through an organizations web site is an example of data mining.
True
An application service provider is a company that can provide software, support, and computer hardware.
True
Carrying summary totals in the data records is an example of planned data redundancy.
True
Linux is not a full operating system and many distributions of Linux are available.
True
One of the first steps in installing and using a large database involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user.
True
People involved in selecting their organizations computer hardware need to clearly understand current and future business requirements so they can make and for decisions.
True
Projecting involves eliminating columns in a table.
True
The DBMS serves as an interface between an application program and the database.
True
The raw data necessary to make sound business decisions is stored in a variety of locations and formats.
True
Programming languages are sets of keywords, symbols, and rules for constructing statements that people can use to communicate instructions to a computer.
True.
The _____ visa program allows skilled employees from foreign lands into the United States.
U.S. H-1B and L-1
Which of the following statements is true of user acceptance testing (UAT)?
UAT must be completed successfully before newly developed software can be rolled out to the market.
49. ____ is a powerful operating system originally developed by AT&T for use on minicomputers but now runs on workstation, servers, and mainframe computers
UNIX
_____ is a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host.
URL
____ is a powerful operating system originally developed by AT&T for use on minicomputers but now runs on workstations, servers, and mainframe computers.
Unix
A typical decision support system (DSS) includes many components including a(n) _____ which allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases.
User interface (dialogue manager)
is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.
Variant
The most significant internal data sources for a management information system are an organization's _____.
Various TPS and ERP systems and related databases
_____ is a storage technology for less frequently needed data so that it appears to be stored entirely on tape cartridges, although some parts may be stored on faster hard disks.
Virtual Tape
In addition to the Web server operating system, each e-commerce Web site must have _____ to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, Web site development, and Web page development.
Web Server Software
Business leadership skills
Which of the following is NOT a characteristic of a data scientist? 1. Strong business acumen 2. Business leadership skills 3. A healthy appreciation of the limitations of their data 4. A deep understanding of analytics
automated customer service
Which of the following is NOT a commonly used BI tool? 1. drill-down analysis 2. automated customer service 3. data visualization 4. linear regression
Sales revenue
Which of the following will be a 'fact' measure in a data cube used at a chain retail business? 1. Product category 2. Sales revenue 3. Month Name 4. City name
The Internet Crime Computer Center (IC3) is an alliance between the
White-Collar Crime Center and the FBI.
is a file conversion program that can be used to compress multimedia files to make them easier to download from the Internet or send them as an e-mail attachment.
WinZip
Database as a Service
With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.
Structured Query Language (SQL)
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
50. An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.
Workgroup
you wish to use a visual approach to query building
You would use Query by Example, if _____.
Activities on the critical path of a project have _______ slack time
Zero
Excel
____ is the most popular spreadsheet program.
Neural networks
_____ can process many pieces of data at the same time and learn to recognize patterns.
Knowledge users
_____ do not need any previous training in computers or expert systems.
Augmented reality
_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.
Artificial intelligence systems
_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.
Game theory
_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.
Data Cleansing
_____ is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database.
Big Data
_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.
Data mining
_____ is used to explore large amounts of data for hidden patterns to predict future
Tacit
_____ knowledge is hard to measure and document and typically is not objective or formalized.
IF-THEN
_____ statements are rules that suggest certain conclusions based on certain conditions.
Self-service analytics
_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.
What is the study of the impact that changes in one (or more) part of the model have on other parts of the model? a) Sensitivity analysis b) Drill-down c) What-if analysis d) Goal-seeking analysis
a
What is the systems development life cycle? a) The overall process for developing information systems, from planning and analysis through implementation and maintenance b) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system c) Involves establishing a high-level plan of the intended project and determining project goals d) Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation
a
What means a technology can travel with the user? a) Mobile technologies b) Wireless technologies c) WiMax technologies d) wLAN technologies
a
What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML? a) WWW b) URL c) Ebusiness d) Ecommerce
a
What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable? a) WiMAX wireless broadband b) satellite television c) Wireless local area network d) Cellular phones and pagers
a
Which of the following is one of the six ebusiness tools for connecting and communicating? a) Email b) Disintermediation c) Universal resource locator d) Web personalization
a
Which of the following refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information? a) Information richness b) Information reach c) Information system d) Personalization
a
The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.
a conversion funnel
The coefficient of determination, r squared, is ____.
a number that indicates how well data fits the statistical model
_____ is a good site to develop your professional network. a. LinkedIn b. Facebook c. Google d. Twitter
a. LinkedIn
When you are looking for a 'hotspot', you are searching for _____. a. a wireless access point b. bluetooth signals c. free charging stations d. strong satellite signals
a. a wireless access point
When you connect your computer to a printer using _____, the distance between them cannot be longer than 30 feet. a. Bluetooth b. Wi-Fi c. near field communication d. Infrared
a. bluetooth
The world-wide-web uses _____ protocol for transmitting content. a. hyper-text transfer b. mail transfer c. uniform resource location d. domain name server
a. hyper- text transfer
A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. a. metropolitan area network (MAN) b. local area network (LAN) c. wide area network (WAN) d. personal area network (PAN)
a. metropolitan area network
To analyze various alternative scenarios, a manager would use _______. a. the spreadsheet's 'what-if' capability b. the graphing features of spreadsheet software c. the reporting feature of a BI tool d. a data visualization tool
a. the spreadsheet's 'what-if' capability
_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. a. The Web b. A tag c. A cache d. The motherboard
a. the web
Many Internet addresses have a code denoting _____categories, such as com for business sites and edu for education sites.
affiliation
Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.
alpha testing
The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.
analysis
Programmers use _____ to create application software without understanding the inner workings of an operating system as it provides a software-to-software interface, not an end user interface
application program interface
During modeling of the CRISP-DM method, we would ______.
apply selected modeling techniques
27. Embedded operating systems _______.
are changing the way we interact with many household devices.
24. As long as the tables in a relational database share one common _________, the tables can be linked to provide useful information and reports.
attribute
Which of the following is NOT a commonly used BI tool?
automated customer service
The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free—is known as ________. a) Web 1.0 b) Web 2.0 c) Web 3.0
b
What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards? a) Telematics b) Electronic tagging c) Mobile commerce d) None of these are correct.
b
What is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants can be easily interconnected using a short-range wireless connection? a) WiMAX b) Bluetooth c) GIS d) GPS
b
What is the implementation phase in the SDLC? a) Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation b) Involves placing the system into production so users can begin to perform actual business operations with the system c) Involves establishing a high-level plan of the intended project and determining project goals d) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system
b
What is the science of making intelligent trade-offs between time, cost, and scope? a) Project deliverable b) Project management c) Project d) PMO
b
What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department? a) Tacit knowledge b) Explicit knowledge c) Pure knowledge d) Virtual knowledge
b
What refers to any source code made available freely for any third party to review or modify? a) Open system b) Open source c) User-contributed content d) Collaboration software
b
Which of the following companies is an example of a pure-play or virtual business? a) Barnes & Noble b) Google c) T. J. Maxx d) All of these are correct
b
Which of the following is a key challenge associated with Business 2.0? a) Technology independence b) Information vandalism c) Copyright independence d) All of these are correct.
b
Which of the following is not a phase in the systems development life cycle? a) Analysis phase b) Prediction phase c) Planning phase d) Testing phase
b
Which of the following is the correct definition of RFID? a) Radio frequency internal diagnostics b) Radio frequency identification c) Radio fast internal diagnostics d) Radio frequency interoperability device
b
Which organization develops procedures and concepts necessary to support the profession of project management? a) Project Milestone Institute b) Project Management Institute c) Project Management Office d) None of these
b
What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report? a. 100,000 or less b. 100,000 to 200,000 c. 200,000 to 500,000 d. more than 500,000
b. 100,000 to 200,000
Which of the following is a markup language for defining the visual design of a Web page or group of pages? a. JavaScript b. Cascading Style Sheets (CSS) c. Java d. Extensible Markup Language (XML)
b. Cascading Style Sheets (CSS)
_____ is a markup language designed to transport and store data on the Web. a. Standard Generalized Markup Language (SGML) b. Extensible Markup Language (XML) c. Hypertext Markup Language (HTML) d. Hypermedia/Time-based Structuring Language (HyTime)
b. Extensible Markup Language (XML)
From which vendor is the BI product Business Objects available? a. IBM b. SAP c. Google d. Microsoft
b. SAP
Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____. a. Web portals b. Web browsers c. Web analytics software d. search engines
b. Web browsers
_____ consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. a. Web browsers b. Web services c. Hyperlinks d. Web forms
b. Web services
The coefficient of determination, r squared, is ____. a. the same as the error term in a linear regression b. a number that indicates how well data fits the statistical model c. a number that must be close to zero to be useful d. the same as the slope of the linear regression
b. a number that indicates how well data fits the statistical model
The fiber-optic cables that span the globe over land and under sea make up the Internet _____. a. ultrastructure b. backbone c. layer d. protocol
b. backbone
In a _____, all network devices are connected to a common backbone that serves as a shared communications medium. a. star network b. bus network c. ring network d. mesh network
b. bus network
The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____. a. a word cloud b. a conversion funnel c. a scatter diagram d. a pivot chart
b. conversion funnel
_____ is used to explore large amounts of data for hidden patterns to predict future trends. a. Data governance b. Data mining c. Linear regression d. Drill down
b. data mining
The area covered by one or more interconnected wireless access points is commonly called a(n) _____. a. reception area b. hot spot c. coverage zone d. access area
b. hot spot
Data within the data cube has been ______ by specific dimensional values. a. correlated b. summarized c. regressed d. drilled into
b. summarized
The ancestor of the Internet was _____. a. TCP/IP b. the ARPANET c. Telnet d. Web 1.0
b. the ARPANET
With _____, business transactions are accumulated over a period of time for processing in a single unit.
batch processing system
46. One advantage of proprietary software versus off-the-shelf software is that_____
being involved in the development offers control over the results
The most efficient and effective ways to complete a business process are called _____.
best practices
____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of dealing with them.
big data
A(n) _____________ is another term for an online journal that allows users to post their own comments, graphics, and video.
blog
is a wireless communications specification that describes how cell phones, computers, and printers can be connected over distances of 10 to 30 feet at a rate of about 2 Mbps and allows users of multifunctional devices to synchronize information.
bluetooth
A Web __________, such as Internet Explorer or Mozilla's Firefox, allow users to access the World Wide Web.
browser
all network devices are connected to a common backbone that serves as a shared communications medium.
bus network
Which of the following is NOT a characteristic of a data scientist?
business leadership skills
is a subset of e-commerce in which all the participants are organizations
business-to-business (B2B) e-commerce
What applies to businesses buying from and selling to each other over the Internet? a) C2B b) C2C c) B2B d) B2C
c
What are specific key words or phrases incorporated into website content for means of classification or taxonomy? a) Social media b) Social networking analysis c) Tags d) All of these are correct.
c
What checks the impact of a change in a variable or assumption on the model? a) Sensitivity analysis b) Drill-down c) What-if analysis d) Goal-seeking analysis
c
What is a geographic information system (GIS)? a) A device that determines current latitude, longitude, speed, and direction of movement b) Contains a microchip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag c) Designed to work with information that can be shown on a map d) Commonly used to transmit network signals over great distances
c
What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house? a) Project management b) Insourcing c) Outsourcing d) None of these are correct.
c
What is an online journal that allows users to post their comments, graphics, and video? a) Microwiki b) Wiki c) Blog d) Mashup
c
What is consolidation? a) Enables users to view details, and details of details, of information. b) Finds the inputs necessary to achieve a goal such as a desired level of output. c) The aggregation of data from simple roll-ups to complex groupings of interrelated information. d) The ability to look at information from different perspectives.
c
What is the buying and selling of goods and services over the Internet? a) Emarket b) Emall c) Ebusiness d) Ecommerce
d
What is the ability to purchase goods and services through a wireless Internet-enabled device? a) Telematics b) Electronic tagging c) Mobile commerce d) None of these are correct.
c
What is the outsourcing option that includes the closest location and direct customer control? a) Offshore outsourcing b) Nearshore outsourcing c) Onshore outsourcing d) None of these are correct.
c
What measures the number of people a firm can communicate with all over the world? a) Mass customization b) Personalization c) Information reach d) Information richness
c
What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs? a) What-if analysis b) Sensitivity analysis c) Digital dashboard d) Drill-down dashboard
c
Which of the following is not an example of explicit knowledge? a) Patent b) Trademark c) Employee opinion d) Marketing research
c
Which of the following is not one of the four primary information technology areas where businesses are focusing in the 21st century? a) IT infrastructures b) Security c) DBMS d) Ebusiness
c
The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices. a. 32-bit b. 64-bit c. 128-bit d. 256-bit
c. 128-bit
Which of the following is IBM's BI product? a. Power BI b. Business objects c. Cognos d. Hyperion
c. Cognos
If your home air conditioner has an IP address, it is part of the ____. a. satellite communication network b. virtual private network c. Internet of Things d. satellite communication network
c. Internet of Things (IoT)
_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. a. Microwave transmission b. Wireless mesh c. Near field communication (NFC) d. Wi-Fi
c. Near Field communication (NFC)
Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document. a. cookies b. subroutines c. applets d. packets
c. applets
A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. a. very small aperture terminal (VSAT) b. microwave c. low earth orbit (LEO) d. geostationary
c. low earth orbit (LEO)
Which of the following is NOT considered a BI and analytics tool? a. Data visualization b. Drill-down analysis c. Online transaction processing d. Data mining
c. online transaction processing
The goal of business intelligence is to _____. a. provide access to novel tools to the users b. reduce the cost of data processing c. support and improve decision making d. improve employee morale
c. support and improve decision making
_____ is a communication standard that enables computers to route communications traffic from one network to another as needed. a. The ARPANET b. A Uniform Resource Locator (URL) c. The Internet Protocol (IP) d. A Wi-Fi
c. the Internet Protocol (IP)
Which of the following is NOT true about linear regression? a. both of the variables must be quantitative variables b. the line minimizes the sum of the squared errors of prediction c. the technique implies causality between the independent and the dependent variables d. consists of finding the best-fitting straight line through a set of observations
c. the technique implies causality between the independent and dependent variables
refers to the rate at which data is exchanged, usually measured in bits per second (bps).
channel bandwidth
During the _____ stage of the decision-making phase, a course of action is selected.
choice
In the context of number of technologies used to control and streamline a manufacturing process, the goal of a _____ system is to tie together all aspects of production, including order processing, product design, manufacturing, inspection and quality control, and shipping.
computer integrated manufacturing
Once new software has been selected, implementation will include all of these tasks EXCEPT _________.
consulting with stakeholders to establish future needs
A _____ contains an embedded chip that only needs to be held close to a terminal to transfer its data; no PIN number needs to be entered.
contactless payment card
The term _____ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.
counter intelligence
The process of switching from an old information system to a replacement system is called _____.
cutover
What applies to any business that sells its products or services to consumers over the Internet? a) C2B b) C2C c) B2B d) B2C
d
What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete? a) RAD methodology b) Agile methodology c) Waterfall methodology d) Extreme programming
d
What is it called when you engage another company within the same country for services? a) Outsourcing b) Business process outsourcing c) Insourcing d) Onshore outsourcing
d
What is the ability to purchase goods and service through a wireless Internet-enabled device? a) Semantic Web b) WWW c) Egovernment d) Mobile business
d
What is the innovator's dilemma? a) A new way of doing things that initially does not meet the needs of existing customers b) Produces an improved product that customers are eager to buy, such as a faster car or larger hard drive c) Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction d) Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders
d
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system? a) Management system b) Reputation system c) Knowledge system d) open system
d
What is using organizations from developing countries to write code and develop systems? a) Outsourcing b) Business process outsourcing c) Insourcing d) Offshore outsourcing
d
What is wireless fidelity? a) Commonly used to transmit network signals over great distances b) An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together c) A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers d) A means of linking computers using infrared or radio signals
d
Which of the below is not a characteristic associated with Mozilla Firefox? a) Mozilla Firefox holds over 20 percent of the web browser market. b) Mozilla Firefox offers a free email service called Thunderbird. c) Mozilla Firefox is a prime example of open source software. d) Mozilla Firefox is a prime example of a reputation system.
d
Which of the below represents the three elements in the triple constraints of project management? a) Plan, analysis, design b) Deliverables, milestones, scope c) Development, testing, implementation d) Time, resources, scope
d
Which of the follow represents a trait of disruptive technology? a) Enters the marketplace at the low end b) Is a new way of doing things that initially doesn't meet the needs of existing customers c) Tends to open new markets and destroy old ones d) All of these are correct.
d
Which of the following are the primary challenges to the ebusiness models? a) Protecting customers b) Adhering to taxation rules c) Providing security d) All of these are correct.
d
Which of the following is a benefit an organization can receive from outsourcing? a) Increase technical abilities b) Financial savings c) Market agility d) All of these are correct.
d
Which of the following is a challenge of outsourcing? a) Length of contract b) Threat to competitive advantage c) Loss of confidentiality d) All of these are correct.
d
Which of the following is a common DSS analysis technique? a) What-if analysis b) Sensitivity analysis c) Optimization analysis d) All of these are correct.
d
Which of the following is a common use for GIS? a) Finding what is nearby b) Routing information c) Information alerts d) All of these are correct.
d
Which of the following is a fundamental of the RAD methodology? a) Focus initially on creating a prototype that looks and acts like the desired system. b) Accelerate collecting the business requirements through an interactive and iterative construction approach. c) Actively involve system users in the analysis, design, and development phases. d) All of these are correct.
d
Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption? a) Only authorized individuals can access applications for which they are entitled. b) Only authorized individuals can gain access to the network. c) Individuals cannot understand or alter information while it is in transit. d) All of these are correct.
d
Which of the following is not a form of outsourcing? a) Onshore outsourcing b) Offshore outsourcing c) Nearshore outsourcing d) Inshore outsourcing
d
_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. a. Grid computing b. Distributed computing c. Utility computing d. Cloud computing
d. Cloud computing
_____ is the standard page description language for Web pages. a. Extensible Markup Language (XML) b. JavaScript c. .NET d. Hypertext Markup Language (HTML)
d. Hypertext Markup Language
Which of the following is NOT considered business intelligence practice? a. Data extraction b. Visualization c. Analysis d. Transaction processing
d. Transaction processing
Which of the following is NOT a commonly used BI tool? a. data visualization b. linear regression c. drill-down analysis d. automated customer service
d. automated customer service
Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful? a. Word cloud tool b. Querying tool c. Reporting tool d. Data visualization tool
d. data visualization tool
____ is the last phase of the six-phase CRISP-DM method. a. Evaluation b. Modeling c. Business understanding d. Deployment
d. deployment
Which of the following is NOT a component of a KPI (key performance indicator)? a. direction b. measure c. time frame d. format
d. format
What determines the size of words in a word cloud? a. length of the word or phrase b. difficulty in pronouncing the word or phrase c. whether the word is a pronoun d. frequency of occurrence of the word in source documents
d. frequency of occurrence of the word in source documents
A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. a. cookie b. server c. Web portal d. search engine
d. search engine
A _____ network is one in which all network devices are connected to one another through a single central device called the hub node. a. mesh b. personal c. bus d. star
d. star
The ____ position is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.
data administrator
A _____ involves reentering data that was not typed or scanned properly.
data correction
A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
data definition language
.A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
data mart
41. _________ employs multidimensional databases and analytics to store and deliver data warehouse information efficiently.
data marts
____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
data mining
involves updating one or more databases with new transactions
data storage
A business intelligence dashboard is a _____ tool that displays the current status of the key performance indicators (KPIs) for an organization.
data visualization
In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.
data-flow line
16. Someone responsible for planning, designing, creating, operating, securing, monitoring, and maintain databses is called a(n)___________.
database administrator
With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.
database as service
Project ___________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
deliverables
In the context of supply chain management (SCM), ____ refines the production plan by determining the amount of weekly or daily production needed to meet the requirement for individual products.
demand managment
In the _____ stage of the problem-solving process, alternative solutions to a problem are developed and their feasibility is evaluated.
design
Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.
drill down
A(n) _____ is a type of management report that is automatically produced when a situation is unusual or requires management action.
exception report
is a markup language for Web documents containing structured information, including words and pictures.
extensible markup language
making hardware decisions, the overriding considerations of a business should be technology cost and energy?
false
25. A database is a collection of integrated and related
files
A(n) _____ is a simple database program whose records have no relationship to one another.
flat files
Which of the following is NOT a component of a KPI (key performance indicator)?
format
_____ are specially denoted text or graphics on a Web page that, when clicked, open a Web page containing related content.
hyperlinks
The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.
implementation
_____ is the stage of the problem-solving process in which a solution is put into effect.
implementation stage
____ auditing is performed by employees within an organization
internal
One of the disadvantages of proprietary software is that:
it can take a long time and significant resources to develop the required software features
A scrum team usually consists of _________.
less than a dozen people
In a relational database, _____ is the ability to combine two or more tables through common data attributes to form a new table with only the unique data attributes.
linking
satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles.
low earth orbit satellite
The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.
maintenance
A project ___________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.
manager
The _____ MIS subsystems and outputs are used to monitor and control the flow of materials, products, and services through an organization.
manufacturing
A _____ MIS uses data gathered from both internal and external sources to provide reporting and aid decision making in areas of product design, media selection, channel distribution, and product pricing.
marketing
is a network that uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area.
mesh network
A(n) _____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
methodology
is a telecommunications network that connects users and their computers in a geographical area that spans a campus or city
metro area network
An ebusiness __________ is an approach to conducting electronic business by which a company can become a profitable business on the Internet.
model
is a telecommunications device that translates data from a digital form (as it is stored in the computer) into an analog signal that can be transmitted over ordinary telephone lines.
modem
Information __________ refers to the number of people a business can communicate with, on a global basis.
reach
11. A collection of fields about a specific object is a
record
After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.
release
Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.
schedule feasibility
A _____ is a description of the logical and physical structure of data and the relationships among the data for each user.
schema
The ____ is a description that involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user
schema
A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest.
search engine
is often conducted on phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user
social engineering
___ is a data visualization technique in which data is represented as networks where the vertices are the individual data points and the edges are the connections among them.
social graph analysis
is one in which all network devices are connected to one another through a single central device called the hub node.
star network
An agreement between two or more companies that involves the joint introduction and distribution of goods and services is called ______.
strategic partnership
Data within the data cube has been ______ by specific dimensional values.
summarized
._____ are the most powerful computers with the fastest processing speed and highest performance.
super computer
The goal of business intelligence is to _____.
support and improve decision making
A(n) ___________technology produces an improved product customers are eager to buy.
sustaining
The goal of the _____ step of systems development is to gain a clear understanding of the problem to be solved or opportunity to be addressed.
systems investigation
Social __________ describes the collaborative activity of marking shared online content with key words or tags as a way to organize it for future navigation, filtering, or search.
tagging
.Operating systems use _____ techniques to increase the amount of processing that can be accomplished in a given amount of time
task managment
A disruptive ___________ is a new way of doing things that initially does not meet the needs of existing customers.
technology
One advantage of proprietary software versus off-the-shelf software is that _____.
the software provides a company a competitive advantage by solving problems in a uniquemanner
1. A blade server houses many computer motherboards that include one or more processors, computer memory,secondary storage, network connections, and a common power supply and air-cooling source with a single chassis.
true
A new _____ is a major program change, typically encompassing many new features.
version
Companies such as IBM have developed ______ database systems to allow different databases to work together as unified database system
virtual
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.
volume testing
The Web as a computing platform that supports software applications and the sharing of information among users is referred to as _____.
web 2.0
A _____________is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.
wiki
A _____ is a single user, non-portable computer designed to perform engineering, computerassisted design (CAD), and heavy mathematical computing.
workstation
Visualization
Data ______ tools can take raw data and immediately provide a rich visual image.
apply selected modeling techniques
During modeling of the CRISP-DM method, we would ______.
Key performance indicators
Metrics that track progress in executing strategies to attain organizational objectives are also known as _______ (KPIs).
Dashboards
Similar to what you find in a car, a business _____ provides rapid access to information, in an easy-to-interpret and concise manner, which helps organizations
the spreadsheet's 'what-if' capability
To analyze various alternative scenarios, a manager would use _______.
Frequency of occurrence of the word in source documents
What determines the size of words in a word cloud?
Can lead to over spending on unapproved data sources and business analytics tools.
Which of the following is a potential disadvantage with self-service BI? 1. Gets valuable data into the hands of the people who need it the most—end users. 2. Can lead to over spending on unapproved data sources and business analytics tools. 3. Encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. 4. Accelerates and improves decision making.
Deployment
____ is the last phase of the six-phase CRISP-DM method.
In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.
entity symbol
Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.
joint application development
Which of the following is NOT true about linear regression?
the technique implies causality between the independent and the dependent variables