Information Systems Management - C724 (Set 2)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a characteristic of big data?

Object data

Analytical modeling

various scenarios are run mathematically, so decisions can be made (computers do this)

broadband

video is also called _________ due to its intense data bandwidth requirement

vulnerability

the possibility that an information resource will be harmed by a threat.

byte hertz

A _______ is a unit of digital information. A ________is a measurement of frequency

system-oriented, function-oriented, and strategy-oriented.

There are three types of system evaluation:

bytes each consist of

8 bits

multiplexer

If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single device, you would use a ____________

There are many database tools and technologies that help with business performance. What capabilities does a DBMS enable in a database?

Input, modification, and retrieval of data

basic operations in the information processing cycle that hardware operates and that every computer performs?

Input, output, process, and storage

What is extraction?

Extraction is the operation of removing data from a source for use in a data warehouse

Chapter 6

Valuing Organizational Information

object-oriented are designed to store audio or mixed media, while relational links tables of records

What is the difference between and object-oriented database model and a relational model?

database administrator

Who is responsible for checking on an employees' access to the company's database?

information security analyst

Who is responsible for the risk and vulnerability assessment to prevent security breaches of company or government data?

system-oriented evaluation

_______________________________ is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.2 This form of evaluation also includes query response speed and memory space demands.

People

are the most important component of an information system (IS) and their requirements are the primary reason IS are developed. Individuals who interface with the hardware, software, network, and data.

The network layer

includes the protocols used to describe the network layout and the interfaces necessary for data transmission.

A network protocol

is a set of rules, at different levels in the connection that communication devices use to ensure quality of signal transmission and reception.

Hyper Text Markup Language (HTML)

is a system used to convert a plain-text document into one optimized for viewing as a web page, integrating colors, graphics, fonts, and links.

Wireless communication

is a type of telecommunication network that uses radio waves to send and receive signals.

Agile software development methodology

is an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software.

The human resource function

is responsible for processes related to the employees of an organization, including benefits, compensation, training, and performance.

Processors are constructed of

microscopic electrical circuits using highly conductive gold (and soon, perhaps graphene) connections sandwiched by multilayer ceramic or silicon substrate

De-centralized

share no systems between units, eaqch meets its own needs

Cloud fabric

software that makes the benefits of cloud computing possible, such as multi-tenancy.

the process of building relationships between tables based on keys.

Describe referential integrity

Information technology

Entire process of collecting, storing, processing, securing, disseminating information, not just computers

Chapter 33 in COS, 31 in ebook

Global Information Systems

Which type of computer system would an employee need to complete a project requiring a spreadsheet? A. File server B. Microcomputer C. Mainframe D. Midrange System

Microcomputer

Word processing software

provides tools and resources used to create documents.

website

specific location

Functional business Systems

Support business operations; accounging, marketing, HR, etc.

Routers

are used to link networked computers so they can share resources and information.

internet and databases

What factors help e-business accurately target individual customers?

operational efficiencies

What helps e-businesses respond and react quickly to changes within the business environment, more than their traditional brick and mortar counterparts?

partitioning is done to improve performance

Why is partitioning done when administering relational database systems?

delivering quality systems on time, managing the budget, and planning for the unexpected

Why is project management essential for managing information technology?

computer network

is a collection of interlinked computers that can exchange information over links in the form of digital packets.

supportive, collaborative, culture that includes corporate learning to foster corporate efficiency and gain value from intellectual assets. Employees sharing of their expertise and best practices across business units.

KM (knowledge management)

Human Resource management

Keep track of employees, skills, PD, achievements; identify staffing needs

A method used by hackers to develop a relationship to trick employees into revealing confidential information or passwords.

What is social engineering?

blacklisting

a process in which a company identifies certain types of software that are not allowed to run in the company environment.

strategic goals, objectives, or decisions are

typically developed by upper managers to directly support the organization's vision and mission.

Identify the three different types of outsourcing

See Pic

customer satisfaction

What is an intangible benefit when evaluating information systems cost and benefits?

External

What's going on in the enfironment surrounding the organization

sensitive.

When a project is determined to have multiple critical activities leading to multiple critical paths, the schedule is _____________________

View

helps see contents, make changes, sort, query

logic bombs

segments of computer code embedded within an organization's existing computer programs.

convergence

The ability for a telecommunication network to carry voice, data, and video is called .

What is the conceptual data model?

The conceptual data model is the highest level model, containing the least amount of detail within the data.

Which item below is NOT a database model? Relational Structured Object

Structured

Which of the following attributes or fields would be a good choice for a primary key?

Student ID

Downward information flow

Directives from upper management

Data mining is used by businesses to analyze internal factors in order to improve business performance.

True

Objective

raw facts and data, can be quantified

Content creator

the person responsible for creating the original website content.

Focus

target a specific customer segment with a certain type of product

the consequences of an event

What is the meaning of outcomes in decision theory?

password

a private combination of characters that only the user should know.

Certificate authority

a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

Identify the primary project planning diagrams.

Two primary diagrams used in project planning include PERT and Gantt charts

Throughput

amount of info that can pass through a system at once

Tactical management

develops goals and strategies

Database management system

create databases, manage users, general maintenance, makes it user friendly

Tangible User Interface(TUI)

A person interacts with digital data through a physical environment.

business

A systems analyst should try to have an understanding of _________________ processes.

URL (uniform resource locator)

A web browser is required to surf the internet. What other protocol is needed by a client computer to request a web site via HTTP or HTTPs?

Information systems

Combination of implementing data storage, processing, and communicating hardware

What is the process to update or backup a data warehouse?

Extract, transform, load

circuit switching

Fixed packet size and rates of transmission exist only in____________________

an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.

Hacktivist

Chapter 25 COS, 23 ebook

Hardware and Software Basics

Out/In information flow

Info to and from customers, supplyers, partners; yields competitive advantage

A group of two or more computers and other devices connected to each other. Choices: Hardware Software Data People Network

Network (page 8)

Chapter 27 COS, 25 ebook

Networks and Telecommunications

A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.

Platform as a service (PAAS)

Employees and the business owner communicate via emails using this protocol.

SMTP

application, presentation, session, transport, network, data link, and physical.

The seven OSI layers are:

one-to-one, one-to-many

Types of relationships in a relational database model

audit

an examination of information systems, their inputs, outputs, and processing.

Open systems

hardwar and software standards that make it possible for many different devices to communicate

tracking barcodes and wireless sensor networks, some used in supply chain operations.

radio frequency identification (RFID)

Radio transmissions travel through

the air or atmosphere.

Intelligent agents

ex auto fill boxes

consequential

What does network economics see the cost of adding new members as?

Sell-Source-Ship

Alternative to distribution chain; helps reduce fixed costs due to less storage space and wasted product

the cooperation of two or more companies to gain efficiency and growth

Define synergy

sniffing

Most prevalent hacker attack on wireless networks

Quality

Timeliness, location, form, validity

when conveying documentation

When should oral communication be avoided?

Chapter 23 COS, 21 ebook

BUSINESS BASICS

What is business intelligence? A. Knowledge B. Technology C. Data sources D. Collective Information

Collective Information

Competitive business strategies

Cost leadership, differentiation, innovation, growth, alliance

Chapter 2

Identifying Competitive Advantages

DAC1

Learning outcomes from all COS chapters

chronological evolution of computing in business.

Mainframe, minicomputers, microcomputers

Malware is spread through a variety of methods, direct download (intentional or not), as a part of another application or utility

Trojan Horse

True or False. Predictive analytics is used by businesses to predict trends or behaviors from customers.

True

fix bugs, are expensive and time consuming

What are software patches?

data access

What is the best reason to implement a database for a growing business?

more scalable than wired networks.

Wireless LAN networks are _____________

Testing

Write test conditions, and perform testing (unit, system, integration, user acceptance)

Packet Switched Networks

_______________________________________ group data in packets and are transmitted in multiple simultaneous communication sessions

phishing attack

an attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail.

Computer

electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data.

Committee of Sponsoring Organizations (COSO)

key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting.

Legacy Information Systems

massive long-term business investment in a software system with a single focus; often brittle, slow

A hub is a networking device

that connects computer devices together in a LAN, sending data traffic to all networked components.

Which type of software manages the users and contains an array of programs that ensure that data is being transmitted to the correct user, computer, or other devices? A. Device B. Utility C. Network Operating System D. Open-source system

Network Operating System

4

Networks with __G provide IP-based voice, data, and multimedia traffic speeds between 100 Mbps and 1 Gbps (100 Mbit and 1 Gbit per second)

What are two fundamental elements that are used in modern networking infrastructure?

One is packet transmission and the other is the TCP/IP protocol.

Voice over Internet Protocol (VoIP)

modern telecommunications technology that offers convergence between voice and data networks

ERP Requirements

modular, contralized database, integrated functions, flexible best practices, real time functions, internet enabled

A network host is a _______ in a data communications network and is assigned an IP address.

node Correct! A network host or data terminal equipment is a node in a network.

True or False. A retail company such as Amazon.com uses DBMS to discover customers' past spending trends and to predict future shopping behaviors.

False

a. Supports data modeling e. Unstructured

35. What are two key features of object-oriented systems development? a. Supports data modeling b. Impedes reusability c. Monolithic nature d. Ease of design e. Unstructured

c. Frequent customer feedback

40. What is a primary characteristic of extreme programming (XP)? a. Increased risk during development b. Greater number of features developed c. Frequent customer feedback d. Detailed documentation

analyzing data to gain insight or intelligence

Describe the process of data mining

economic feasibility

Does a decision fit with the budget

Which of the following terms defines a database entity?

Something for which a business collects data

used to measure performance of data communications

What is QoS?

the entire recruitment community

Who does the the LinkedIn model benefit?

Collaboration system

an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.

spam

unsolicited e-mail.

energy usage and reduces the operating costs in an organization

What does EMS (energy management system) manage?

systems analysts to create professional diagrams that simplify complex information through collaboration tools and data-linked diagrams

What does Microsoft Visio enable?

Scrum

___________________is a type of agile software development with emphasis on planning.

Manual Keying

_________________is the simplest, but most protracted data capture method.

Second, 2

______________generation is ___G, with an ability to carry 64 kbps data rates

digital certificate

an electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.

cloud computing VPN

an exchange that provides more flexibility: an exchange that provides more security:

a. Ethics training for all employees b. Scenarios of unethical behaviors and their resolution

48. What should a company's code of ethics include? Choose 2 answers. a. Ethics training for all employees b. Scenarios of unethical behaviors and their resolution c. Ethics training for customer-facing employees d. Job descriptions and responsibilities

Which of the following is an example of a business or entrepreneur utilizing a customer relationship management (CRM) system? A chain of three pizza restaurants utilizing a Web-based software that keeps track of customer email addresses and uses that system to send out weekly coupons A doctor's office utilizing file folders with physical papers to keep track of patient information A hair salon keeping track of appointments and customer phone numbers in the salon owner's cell phone An author using a spreadsheet to keep track of fans' email addresses

A chain of three pizza restaurants utilizing a Web-based software that keeps track of customer email addresses and uses that system to send out weekly coupons (page 12)

Predictive analytics of multidimensional data can lead to better decisions and lower costs. What is a multidimensional database?

A relational database that is structured as a cube

Which type of ecommerce model is used when a company sells tires to automobile companies? A. G2B B. B2B C. C2C D. C2B

B2B

promote and market their organizations

Businesses, news networks, government agencies,and nonprofit organizations are all actively using social media to primarily do what?

What information is enclosed in transmission packets? Select the most accurate statement.

Data packets include destination address, relay information, and error detection.Correct! Among other things, data packets have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.

PPP stands for Point-to-Point protocol.

Encryption is used for this protocol to ensure the privacy of the content being communicated

The computer and all of its peripherals Choices: Hardware Software Data People Network

Hardware (page 8)

Joe is shy and is not one to go to bars to meet people, but would like to find a suitable companion. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping

Online Dating (page 9)

Due to age and fatigue, Barbara's mall days are over so this is a good option when buying gifts for the grandkids. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping

Online Shopping (page 9)

Students can buy e-books and access codes directly from the textbook publishers' websites.

Sell digital goods-Correct! Textbook publishers such as Pearson and McGraw-Hill yield a bigger profit margin from selling digital goods to students.

Relational Database Model

Stores information in the form of logically two-dimensional tables.

synchronous

These are forms of ________communication Instant message (IM) Video conferencing Online chat

Identify which description goes with which of Porter's competitive forces. Switching from one product or service to another similar product or service with little cost. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry

Threat of Substitutes (page 11)

What is virtualization in computer system infrastructure?

Virtualization is assigning part of a computer system to run different operating systems.The act of virtualization creates a virtual environment in a host computer to save space, reduce costs, and provide a safe test environment.

WEP is a legacy wireless encryption protocol that has been replaced by a more secure protocol called WPA.

WEP and WPA are protocols embedded in both hardware and the operating system; they are part of the wireless network's Open System Interconnection (OSI) layer of encryption and always in place for all wireless networks. What is the difference between the WEP and WPA encryption protocol?

speed is the ability to share information in seconds, and amplification is the re-posting news in a community.

What is meant by speed and amplification in social media?

MIS (management information systems)

Which system helps managers manage their departments more efficiently?

an authorized and ethical computer hacker**, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.

White Hat

enables faster response to market dynamics due to new entrants, new products, supplier chain, or customer

Who does good IT planning help an enterprise achieve a competitive advantage?

data administrator

Who is in charge of determining and monitoring the employees' access to the company's DBMS?

they are simpler table relationships than hierarchical databases

Why did relational database models replace hierarchical database models in business applications?

An individual writes a program that will take over a computer for the purpose of launching attacks on additonal computers. Which type of threat is being used? A. zombie B. Phishing C. Vishing D. Pharming

Zombie

Transmission Control Protocol/Internet Protocol Protocol

____________________ is the standard communication rule of the Internet. Internet __________________________ governs Internet data network rules.

Protocols

_________________________ are used to ensure the transmission of digital data communicated in packets between devices is accurate and understood by the receiving device.

Satisficing

a Decision making model, make a choice that is satisfactory, even if it is not the best; works for unseen issues where a decision needs to be made quickly

patent

a document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years.

whitelisting

a process in which a company identifies acceptable software and permits it to run, and either prevents anything else form running or lets new software run in a quarantined environment until the company can verify its validity.

risk mitigation

a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.

firewall

a system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the internet, and private networks, such as your company's network.

Network interface cards

allow computers to connect to networks

An integral component of planning and organizing IT systems for businesses includes which of the following? blending the attributes of different IT system designs to meet the unique user needs of the business avoiding consultations with outside vendors and customers relying exclusively on expert IT consultants to evaluate all facets of the business operation duplicating IT systems models of competitive businesses in order to minimize start-up and development costs

blending the attributes of different IT system designs to meet the unique user needs of the business (Page 15)

You are managing a small business network. They have a web or database server so you will need to design their network as a _____ topology, while a large enterprise would best benefit from a ______ network to manage network moves and changes.

client-server virtual

Collective intelligence

collaborating and tapping into the core knowledge of employees, partners, and customers.

Output

components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).

identity theft

crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud.

A relational database which stores data in tables can be designed using a(n) ___________

entity-relationship model

External database

exists outside your direct control; fee based; ex marketing database

Optimization analysis

finds optimal value given certain constraints

Strategic management

focuses on overall direction and guidance

Query by example tools

graphically design answer to a question

Capability maturity model integration method

process improvement approach that contains 22 process areas.

When installing a wireless LAN,

the access points must be configured to TCP/IP, and the network must be configured to IEEE 802.11 standards and the IP address scheme.

security

the degree of protection against criminal activity, danger, damage, and/or loss.

one-bit CPUs

used only two connections, one for input and one for output, and allowed for the processing of thousands of bits per second. Later, in the 1970s, four- and eight-bit architectures allowed for parallel processing.

Data mining is sometimes referred to as ___________.

knowledge discovery

What are artificial neural networks?

nonlinear algorithm models used in data mining.

Query

process of requresting info out of a database

Workstation

A more powerful system used by individuals in order to run more resource-intensive applications.

Why an organization would need to understand global enterprise architectures when expanding operations abroad.

Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets An organization must manage its global enterprise architecture to support its global business operations

information systems

What accepts data as input?

Recommendation engines

based on likes, dislikes, past purchases

Coaxial cable

cable that can carry a wide range of frequencies with low signal loss.

Autonomous agent

can adapt and alter the manner in which it attempts to achieve its assigned task

Enterprise resource planning systems typically utilize one _______________. database manager computer employee

database (page 12)

Break even analysis

Determining at what point the financial impact of a resource becomes reasonable

Development

Build technical architecture, database and programs

analog packet-switched data networks (PSDN)

Early cellular networks, such as 1G, were ___________________Subsequent technological evolution produced _________________________________. Each evolutionary generation enabled faster data transfer rates with the current 4G broadband networks providing multimedia traffic.

Frameworks and standards were developed to help businesses manage the development of complex systems due to the explosion of the Internet. Which of the following is NOT a framework or standard developed to deal with the complex systems?

ISO 20 Correct! ISO stands for International Organization for Standardization. ISO 20 is not an ISO standard. The two frameworks are ITIL and COBIT and the standard is the ISO 20000.

Bluetooth is a wireless technology that allows the exchange of data. Why is this technology a benefit to business?

It is relatively easy to configure.Correct! Bluetooth is a benefit to business because it is wireless, allows for easier communication, and is very easy to configure.

In the beachwear clothing market, a number of key brands have been in the industry for a long time. An entrepreneur decides to start a new clothing line that is targeted at individuals who like the beach and who like dolphins. In terms of Porter's five competitive forces, the new clothing line is an example of Bargaining Power of Suppliers Threats of new Entrants

Threats of new Entrants (page 11)

Request for proposal

official request for bids from vendors

True or false. A core competency is an activity for which a business is a marketplace leader.

True (page 11)

software development, proving, and integration

What does the programming stage in the waterfall method of software development focus on?

provides more focus on individual transactions versus lasting relationships

What is a characteristic of a Net marketplace?

identify user system and software requirements

What is the objective of the systems analysis stage in the waterfall method?

smartphone

What portable device combines the functionality of the phone technology with the computing of a desktop or laptop?

petabyte

What size is big data database considered?

Compare the two types of network structures.

1) Peer-to-peer networks 2) Client-server networks

d. Differentiation e. Cost

22. What are the two primary criteria used to define the main strategies of Porter's generic strategies model? a. Government regulations b. Automation c. Consumer loyalty d. Differentiation e. Cost f. Asset requirements

Wearable Interface

A pocket projector, a mirror, and a camera contained in a head-mounted, handheld or pendant device that connects to a mobile computing device in the user's pocket.

Platform as a service (PAAS)

A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. An example would be Amazon Web Services.

Server

A system used to provide services to other systems. need not be powerful computers

Describe artificial intelligence, and identify its five main types.

Artificial intelligence (AI) simulates human thinking and behavior, such as the ability to reason and learn. The five most common types of AI are: 1. Expert systems—computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. 2. Neural networks—attempts to emulate the way the human brain works. 3. Genetic algorithm—a system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. 4. Intelligent agents—a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users. 5. Virtual reality—a computer-simulated environment that can be a simulation of the real world or an imaginary world.

Which type of emerging computing technology allows a computer to diagnose its own failure and develop a workaround that enables the computer to continue to function? A. Autonomic B. Auto-correction C. Alternative D. Avatar

Autonomic

Chapter 1

Business Driven Technology

databases, data warehouses, and analytics

Business intelligence consists of what?

How do info systems support accounting functions? A. By planning for upcoming capital expenses and loan payments B. By generating balance sheets and income statements C. By managing corporate wealth and interest expenditures D. By automating inventory and customer management systems

By automating inventory and customer management systems

A sales manager for a national chain wants to provide customer demographics and historical sales data to staff in the sales and production departments to help them determine how many products to make and ship to each retail location for the upcoming holiday season. Which approach would allow the staff to most efficiently extract that information? A. Decision support B. Data Warehouse C. Relational D. Object-oriented

Data Warehouse

DNS

Domain Name Service. Server-based service that translates human language web address or URL into an IP address, which is used.

Identify the different computer categories, and explain their potential business use.

See Pic

Chapter 3

Strategic Initiatives for Implementing Competitive Advantages

LAN

Wireless _______networks are more scalable and can be configured in any topology and can be easily changed, provided that they are properly planned

Classification

assigns records to one of a predefined set of classes.

Data management

database to organize and store info

Customer resource management

focus on customer relationship/info about customers

Collaborative demand planning

helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability.

Server

manages network resources and services

Fuzzy logic

mathematical models for forming conclusions from vague information ex spam filters

Operational database

necessary for operation of business; ex HR personnel

Long-tail economics

niche products

three bits set to ____

on

asynchronous

one way communication, such as email and global overnight mail) communication.

Hardware

physical IT devices (i.e., equipment) that are integrated into an information system

Output devices

printer, monitor, speakers, etc.

Unstructured

several indefinate answers

Virtual reality

simulation of the physical world, ex flight simulators

Distributed database

stores info across many systems; fault toleratnt because data is stored in several places

Systems development life cycle

structured spproach for developing IS, Waterfall method

Summarization

sums, averages, other stats

More than _____ pins or connections (e.g., one input, one output) allows parallel processing (more than one bit is processed at once), and additional pins allow more bits to be processed at any given time.

two

synchronous

two way communications, such as audio/video teleconference and instant messaging

Complex instruction set computer chip (CISC)

type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly.

Three factors to consider when defining big data are:

volume variety velocity

cyberwarfare

war in which a countries' information systems could be paralyzed from a massive attack by destructive software.

CDMA (code division multiple access)

was developed as the protocol during the second generation cellular networks. he second generation is 2G, with an ability to carry 64 kbps data rates.

product and project.

what are the two primary type of requirements in SDLC?

the ability to GROW

what is meant by network scalability?

Replenishment frequency

when to move products and where

Decentralized development

where developers in different locations develop their own solutions independently

Select the best definition to describe a database.

A database is a set of data that are organized and easily searchable through queries.

A restaurant relied on an old manual ordering and accounting system. The restaurant owner decided to purchase a point-of-sale (POS) system to save time and money. This scenario is an example of an advantage of _____. Choices: Information Systems Information Technology Management Information Management

Information Technology Management (Page 16)

TPS (Transaction process system)

This system tracks the flow of daily routine transactions that are necessary to conduct business.

The information system professionals and users. Choices: Hardware Software Data People Network

People (page 8)

usually hold a bachelor's degree, have digital marketing experience, and excellent communication skills

Traits of a social media marketing manager

knowledge

Understanding why the poverty line increased in the city of Tampa is an example of

URL

Uniform Resource Locator is a protocol used by a client computer to request a website from a server via HTTP or HTTPS.

benchmarking and metrics

The measurement function of business intelligence creates a hierarchy of what?

Identify the different media types found in networks

The two types of media are wired and wireless

Two - There are two methods for modeling and designing systems: object-oriented and structured.

There are _________ main methods for modeling and designing systems.

serve organizational goals

To be a strategic information system, an information system must ______________________ .

Sensitivity Analysis

Change one variable and see how the others change

make team assessments and evaluations, demonstrate leadership and have good communication skills, establish project milestone and deliverables

What are the responsibilities of a project manager?

Information, People, Input, Output, Processes, Data

What are the six major components of a computer-based information system?

one record or data set in a row. A record in a row or table

What are tuples and how are they used in databases?

hardware and software

What are two examples of information technology?

presentation and staging

What are two key elements that make up the data warehouse?

age

What customer attribute is not helpful for accurately pricing goods to increase profit margins?

Buying digital goods online makes the buyer more prone to online fraud.

What is a disadvantage of buying digital goods online?

new drug discovery

What is an example of big data analytics applications?

knowledge discovery

What is another term used to describe data mining?

what happens when the same attribute has different values because the data is stored in more than one location

What is data inconsistency

data is accurate and consistent through its use and application time

What is data integrity?

the measurement of probability and consequences of risks

What is qualitative risk analysis?

The process of identifying, analyzing, and responding to risk

What is risk management in system security?

authentication

a process that determines the identity of the person requiring access.

authorization

a process that determines which actions, rights, or privileges the person has, based on verified identity.

spyware

alien software that can record your keystrokes and/or capture your passwords.

EDI - electronic data interchange

an organization can utilize ________________________________ to transfer documents automatically without human intervention to their suppliers

Processes

and procedures provide a structured sequence of activities to govern the use, operation, and maintenance of IS. must have clearly defined input and output guidelines. Other examples are equipment maintenance schedules and backup and recovery policies.

Expert systems

designed to apply human like reasoning to reach a conclusion

Operational feasibility

does a decision fit the needs and mission of the organization

Legal and political feasibility

does it comply with laws?

Basic reporting

everyday stuff

Massive Multi Player Online Role Playing Games

ex world of warcraft

Clickstream data

exact pattern of a consumer's navigation through a site.

Choice

examine options and select one

Regression

find a causal replationship between sets of data

Data manipulation subsystem

helps add, change, and delete info in a database and query it

POP stands for Post Office Protocol

in the application layer of the Internet standard protocol and is used to retrieve email from a mail server.

packet

is simply a unit of data forwarded by a network

Telecommunications

is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.

The primary component categories that make up a computer-based information system (CBIS)

people, processes, hardware, software, networks, and data

information security

protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Keys

ways to access data, such as last name or phone number

Financial metrics

what is the financial impact

Distributed agent

works on multiple distinct computer systems

Compare the four categories of ebusiness models

See Pic

Explain the ethical issues in the use of information technology

See Pic

Six epolicies organizations should implement to protect themselves

See Pic

Differences among data, information, business intelligence, and knowledge.

See below

edge router

(also known as a boundary router) transfers data packets between one or more LANs and an asynchronous transfer mode (ATM) network.

Chapter 15

Creating Collaborative Partnerships

Decision support system

Helps make decisions

Chapter 7

Storing Organizational Information—Databases

central processing unit (CPU)

brain of the computer and carries out program instructions.

Core routers

gather, link, or route data from a business campus and aggregate it to optimize high bandwidth transmission.

Demand prediction

how much of something will be needed

Goal seeking analysis

makes repeated changes to variables until a chosen value is reached

Artificial Intelligence

making systems that can imitate aspects of human resoning and motion, ex weather prediction

Customer resource management system

not just software; total business objective; hardware, servers, support, etc

Cloud computing

refers to resources and applications hosted remotely as a shared service over the internet.

Hardware

refers to the physical IT devices (i.e., equipment) that are integrated into an information system

Capital

represents money whose purpose is to make more money.

Which organizational behavior leads to information system implementation failures?

resistance to change.Resistance to change by stakeholders is a primary reason for implementation failure.

Push dynamic info

today's web; tailored to individual needs; RSS, personalized recommendations (shopping carts, etc.)

offshore outsourcing

using resources that reside outside the country in another geographical region

e. Data flow

13. What does an arrow with a dashed line represent in a business process model diagram? Pg 364 a. Activity b. Decision c. Start d. Control flow e. Data flow f. End

A large part of IS management's main agenda changes every _____ year(s) due to the constant evolvement of information systems, confirming the highly dynamic nature of the IS management function. Choices: 1 3 4

3 (page 8)

packet analyzer or sniffer

A _____________ or _________________ is used to monitor or log traffic on a network for troubleshooting or analysis

Which security technique uses private key and public key pairs to protect sensitive information? A. Antivirus software B. Encryption C. Firewalls D. Biometric Security

Biometric Security

Surveymonkey.com is a good website for businesses to collect information from its customers.

Gain intelligence. Correct! There are several survey sites that allow businesses to collect opinions or information from their customers and potential customers.

mobile devices or laptops

How does web-based databases allow users to access information?

Transaction speed

How fast the system operates, ie response time

Recruiting, training, and maintaining employees and their records Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance

Human Resources (page 10)

Recruitment; training; employee records; benefits; payroll and employees' records; benefits administration; employee relationship management Choices: Production and Operations Accounting and Finance Human Resources

Human Resources (page 10)

HTTP

Hypertext Transfer Protocol is the communications protocol at the foundation of all communication of the world wide web.

structured query language

Info is processed to give correct answer

Which of the following involves employees from various business functions in an organization who share their information with others within the organization? Information systems management Information technology management Information management

Information management (Page 16)

data

Information systems accept _______________ as input.

Walmart utilizes SCM to order its inventories.

Interact with suppliers Correct! Supply chain management (SCM) allows retailers to order their inventories directly from the manufacturers.

When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Employees Choices: Internal External

Internal (Page 15)

Customer relationship management (CRM)

Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability. This also allows a Company to gain insight into a customers shopping and buying behaviors in order to develop and implement enterprisewide strategies.

Management information systems (MIS)

Is a business function which moves information about people, products and processes across the company to facilitate decision making and problem solving

Human factors feasiliby

Is the decision accepted by staff

A company has recently acquired a former distribution competitor in another country. The new subsidiary is found to use obsolete CRM software, so the company decides to create a new, proprietary CRM solution to be used company-wide. The company proposes to use a mutlinational team to develop the new software. Why has this approach been proposed?

It takes into account the needs of the end users.

This system provides first level managers with reports on current performance and historical records to help keep an organization running smoothly. Choices: EIS TPS MIS DSS

MIS (page 8)

Organizations are complex and have many similarities and differences. Having a motivated and knowledgeable team can make a business run smoothly and keep managers aware of what is happening at all levels and in all areas of the organization. Pick the most accurate statement below regarding managers. Managers need an MBA to understand organizational features to build and use information systems successfully. Managers need to understand the essential features of their organization to build and use information systems successfully. Managers need to undergo human resource training to understand organizational features to build and use information systems successfully.

Managers need to understand the essential features of their organization to build and use information systems successfully. (page 10)

virtual company model

Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries. is one that does not have any physical offices but a team of employees who work remotely.

_____ is the strategy of having tasks performed by companies in other countries using information technology advancements such as the Internet and cloud computing. Choices: Insourcing Outsourcing Offshoring

Offshoring (Page 17)

Systems design

Once logical model is finished, translate into appropriate information technologies

data

One of the advantages of information systems for businesses is to take raw data and turn it into information, and then transform that information into knowledge. The number of people in Florida below the poverty line is an example of

standardized business procedures.

One of the key business benefits of enterprise resource planning is the foundation that it provides for a business to standardize its business procedures across all business units.

A development team is creating a new reporting system to track vacation and expenses. Which converstion implementation should the team use if it uses the new vaccation reporting module first and implements the expense reporting module two months later? A. Pilot B. Plunge C. Phased D. Parallel

Phased

what is the DBMS?

The database management systems (DBMS) is the component of the database that enables and supports the decision-making process.

cellular wireless standards

The term "generations" is used to describe changes in which type of technology?

True or false. Information is data that have been organized to provide value to an organization.

True

True or False. A web developer is responsible for designing and coding the website to allow users to engage and navigate website information and services.

True (Page 14)

Which method measures the ease with which people perform transactions or find information? A. Transaction speed B. Usability C. Accuracy D. Response time

Usability

Component development

Use existing pieces of development to combine their functionality to produce new output

This approach values human behaviors that allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more.

Virtue approach

Wireless Sensor Networks

What does WSN stand for?

webbed formats used by publishers

What is a rich site summary (RSS)?

a type of data diagram

What is the definition of a systems analysis logical model?

ETL (extraction, transfer, and load)

What is the process associated with data warehouse updates and backup?

direct-move

What is the process of transferring data that does not need to be transformed to the data warehouse?

A company's general evaluation of their MIS is to analyze the system performance against outlined objectives.

What is the purpose of a general MIS evaluation?

data warehouse analysis leads to business intelligence

What is the relationship between business intelligence and a data warehouse?

accounting and finance

What is the system that tracks and processes company revenues, purchases, and payroll?

circuit switch

When streaming data or voice, which type of switched network is used?

Lack of training or acceptance for new system

Why do users fail to adopt new information systems?

Clustering

discovering how groups of people are similar

static information

early web; users started internet, went to a website, found what they wanted

Redundance

goal is to remove this, making it easier to keep a database organized

Filtering

hide data that don't matter

Three Primary information security areas and an example of each.

1) People: Authentication and Authorization EX: Identity theft 2) Data: Prevention & Resistance EX: Encryption 3) Attack: Detection & Response EX: Intrusion detection software

b. Planning

31. Which phase of the systems development life cycle (sdlc) includes feasibility studies? Pg. 373 a. Maintenance b. Planning c. Analysis d. Design

documents

A process description tool __________________________ the functions of a process in a logical format.

Managing financial assets and maintaining financial records Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance

Accounting and Finance (page 10)

Issues created by the trustworthiness, accuracy, and legitimacy of information.

Accuracy issues

Vertical Application

An accounting software application is a ____________ _______________ because it is designed for a specific function, department, or industry.

agile

Collaborative, self organized, cross functional teams used to develop software systems represent the ____________________ methodology.

bus

Connection and data transfer between computer components

making sure that all data values are correct, accurate, and consistent

Define data integrity

Chapter 9

Enabling the Organization-Decision Making

True or false. Although information technology has increased the speed and number of processes that can be completed, it poses no risk to any employee's job because there is more IT to manage.

False (Page 16)

What is forecasting?

Forecasting analyzes a series of values in order to predict or forecast the value of other variables.

Revenue

How much you sell a product for

A(n) _____ consists of all the components that work together to process data into useful information. Choices: Outside Influence Business Information System

Information System (page 8)

1.Data 2.Information

Information systems accept ___________ as input and process it into information as ___________.

ensures that data is produced and modified in the correct way.

Integrity

Why would a school admin choose to utilize Microsoft Office?

It inegrates all department and functions into a single IT system

Open standards is a hot new career field as it relates to networking and/or servers. What technologies might you be an expert in that would fit the criteria of open standards with a web development and/or server emphasis?

Java and Linux OS

Pulled dynamic info

Late 1990, search for real time info, like stocks, travel sites; birth of e-commerce

A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.

Mainframe

Which of the following is not a database model? Hierarchical Object defined Relational Flat file

Object defined

What is the physical data model?

One or more physical data models may exist within the logical data model, containing greater detail, such as database tables and key indexes.

communication

One reason IT is important is because video conferencing has become cheaper, quicker, more collaborative, and more efficient. Of what IT benefit is this an example?

Which function is not performed by an IT professional? Online marketing Software development Database design

Online marketing (Page 14)

Information technology helps ensure quality new products reach the market faster and to more customers and suppliers. Choices: Globalization Communication Cost Effectiveness More Time Product Development

Product Development (page 9)

productive

RFID technology helps companies to be more ______________ with inventory management because they eliminate the need for physical handling of materials during cycle counting.

Which of the following is considered an efficient database backup strategy?

Reducing volume of data for regular backups

The potential for loss, commonly associated with the monetary and non-monetary impact to such a ,,,,,,,,,,, as well as the probability of occurrence.

Risks

Client-server networks

See Pic

Database Management System (DBMS)

See Pic

Which one of the following systems represents a strategic information system? Choices: Superior Real Estate Company created a mobile application to allow prospective clients to view information about listed properties from their smartphone. No other real estate agents in their area currently offer such technology. Superior Real Estate Company created a mobile application to allow its realtors to track their annual sales. This application will also calculate the realtor's commission on each sale.

Superior Real Estate Company created a mobile application to allow prospective clients to view information about listed properties from their smartphone. No other real estate agents in their area currently offer such technology. (page 11)

False - some businesses charge a fee the service

T or F: an information repository allows a business to store important information and documents that are accessed remotely by its stakeholders for free.

Identify the advantages of using business intelligence to support managerial decision making.

The Problem: Data Rich, Information Poor Businesses face a data explosion as digital images, email in-boxes, and broadband connections doubles every year The Solution: Business Intelligence BI enables business users to receive data for analysis that is: ■ Reliable ■ Consistent ■ Understandable ■ Easily Manipulated Summary: BI can provide managers with the ability to make better decisions.

What is knowledge management? The process of sharing knowledge across business units and amongst employees of a business The process of combining customer data into one system

The process of sharing knowledge across business units and amongst employees of a business (page 12)

employees

There is a higher chance of failure in information system projects if ________________ do not use and leverage the system on behalf of their organization.

False - Cloud computing can be private, public, or a combination of the two.

True or False. Cloud computing relies on private resources to achieve economies of scale among users.

We are currently in the ______________ of wireless communication,

We are currently in the fourth generation (4G) of wireless communication, with the anticipated rollout of the fifth generation by the end of the decade.

all devices connected to the internet with sensors to be automatically re-filled or serviced when needed

What is the IoT (internet of things)

the integrated environments type of CASE tools

What is the most common SDLC analysis?

human resources

What is the system that helps improve employee productivity by managing the workforce?

TCP/IP Protocol

When installing wireless LAN, the access points must be configured to:

Intensity of Competitive Rivalry

When there are many competitors in an industry, this threat is high.When there are many competitors, firms have to compete aggressively for market shares, which can result in lower profits.

business process

When using the balanced scorecard method, quality would fall under what measurement?

Describe the Information Age

Where infinite quantities of facts are available to anyone who can use a computer.

internet

Which of the following is a great, free, and ubiquitous source of information for systems analysts?

They display data in a structured format

Why are DBMS reports a valuable database tool in helping managers make business decisions?

1G

______G networks were "voice only" analog communication networks

project

a set of tasks with a clear objective and an ultimate deliverable

Object oriented database

abstract related pieces of information into units; can easily be extended, promotes reuse of existing database architecture

Classification

aka prediction, evaluate historical data to make current predictions

Neural networks

attempts to simulate human ability to classify items and recognize patterns, ex handwriting and speech recognition

proprietary

belonging to a single organization, then

Which tool do store managers at Best Buy Electronics use to price their products appropriately and attract customers to make more purchases?

business intelligence

network controls

communications controls

Input

components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.

Data mining

computer searches large quantities of data for unseen patterns

Data dictionary

contains logical structure for the info in a database

piracy

copying a software program (other than freeware, demo software, etc.) without making payment to the owner.

Two factors that have contributed to the globalization of business are the availability of inexpensive communication and improved transportation. These factors have also contributed to the creation of a common global _____. Choices: Software Culture Information System

culture (Page 17)

Software as a service

delivery model for software where a company only pays for what it uses; like Cloud; reduces fixed costs

Intelligence

diagnostic pahse - detect and interpret that something needs attention

If you want to visit the Barnes & Noble website, you will type the _____ of barnesandnoble.com in the ______ of your web browser. The DNS will convert barnesandnoble.com into _______, and you will use the _____ protocol to communicate with the world wide web.

domain name URL IP address HTTP

Topline competitive advantage

focus on increasing revenue

Head Tracking

A display device, worn on the head, with a small display in front of each eye.

Grid computing

A form of supercomputer constructed from many smaller systems that have been connected together.

Which security technique helps protect systems by examining each message as it enters the system and blocking improper or unauthorized messages? A. Biometric security B. Firewalls C. Encryption D. Antivirus software

Antivirus software

Which one of the following scenarios describes a strategic information system? Starfish Seafood Restaurant implemented a new system to help track transactions, manage employee hours, and help with routine questions about inventory. Big Bean Coffee shop implemented a new system to determine trends and identify new operational methods in order to improve customer service.

Big Bean Coffee shop implemented a new system to determine trends and identify new operational methods in order to improve customer service. (page 11)

2.4

Bluetooth wireless communications use the _____GHz band in the radio frequency spectrum to exchange data over short ranges

Maintenance

Build helpdesk support, provide environment to support changeds

which is the brain of the computer. Historically, this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components.

Central Processing Unit (CPU)

Challenges of business mobility (wireless networks).

Challenges: Protecting against theft, Protecting wireless connections, Preventing viruses on a mobile device, and addressing privacy concerns with RFID and LBS.

The highest level executives in senior management usually have titles beginning with Hint, displayed below and are part of a "C-suite." Choices: President Chief Manager

Chief (Page 14)

What is clustering?

Clustering classifies events or entities when no known group exists for the data.

ISP

Companies and individuals who are not able to connect directly to the Internet through a local area network (LAN) server could access the Internet by subscribing or connecting to an _________________

Enterprise Resource planning

Connects different departments

Which term describes the procedure in ETL (extract, transform, and load) that correlates the data with the data warehouse format?

Consolidates the algorithm

Explain the cultural, political, and geoeconomic challenges facing global businesses.

Cultural business challenges include differences in: Languages, Cultural interests, Religions, Customs, Social attitudes, and Political philosophies. Political business challenges include: Numerous rules and regulations surrounding data transfers across national boundaries (especially personal information), Tax implications, Hardware and software importing and exporting, and Trade agreements. Geoeconomic challenges: See Pic

an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.

Cyber Criminal

conceptual, logical, and physical

Data models used when mapping business processes, relationships, and data requirements

The decision to implement a relational database system depends mostly on two factors. The first factor to consider is the ________ he second factor to consider when implementing a relational database is users

Data, users

Risk avoidance

Developing an alternative plan for achieving objectives by avoiding a specific risk or risk category

traffic, locations, taxes

Due to its data capture and display ability, GIS can be a very beneficial tool for law enforcement. Which data is most useful in a GIS to help fight crimes?

What is a benefit of introducing knowledge management? Employees develop more of a personal role and feel empowered to be the only one with their expertise. Employees of a business more readily share information across business units.

Employees of a business more readily share information across business units. (page 12)

Group decision support systems (GDSS)

Executive management,who are interacting simultaneously in different locations to collectively participate in the decision-making process, use what type of decision support system?

Carly's Consignment shop keeps track of sales at the cash register and then downloads them into two spreadsheets at the end of the week to verify inventory sold and to calculate profits. This is an example of sales that are processed and tracked digitally in a database management system.

False

banking transactions must be encrypted to be safely communicated over the internet

For an individual or a business, data can be uploaded to the internet in many forms. What data should not be communicated on the internet?

Describe the relationships and differences between hackers and viruses.

Hacker—Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. EX: * Black-hat hacker * Cracker * Cyberterrorist * Hactivist * Script kiddies or script bunnies * White-hat hacker Virus—Software written with malicious intent to cause annoyance or damage

provides real-time, relevant, and user customized information that is easily shared

How does business intelligence make information actionable?

extranet

If a manufacturing plant uses their systems to communicate with suppliers and vendors to manage their inventories, what application connection is used?

Competitive advantage

Is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

employment and occupation related

LinkedIn posts and profile information is typically about what?

Accounting and Finance

Managing financial assets and maintaining financial records. Investment management, budgetary control, auditing; economic forecasting; global stock exchanges; managing multiple currencies

What are decision trees?

One data mining methodology is decision trees, which generate rules and classify data sets.

Along with their benefits and challenges.

Outsourcing Benefits: Increased quality and efficiency of business processes. Reduced operating expenses for head count and exposure to risk for large capital investments. Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies Increased flexibility for faster response to market changes and less time to market for new products or services Outsourcing Challenges: * Length of contract * Threat to competitive advantage * Loss of confidentiality

Marketing and Sale

Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization

Database management systems help businesses manage and organize their information more efficiently. What tools organize a company's data into two-dimensional tables?

Relational DBMS A relational DBMS is a collection of files (tables) that are organized by columns (fields) and rows (records).

If you were setting up a new database, which of the following items would represent "objects" in your database?

Reports

A communication protocol is defined as a set of rules that does what?

Rules that allow communication systems to interact. Telecommunication protocols are created by governing bodies to define how data are communicated over the networks. Popular examples of telecommunications protocols include the 802.3 standard and the TCP/IP.

Explain the business benefits of a data driven website.

See Pic

What are sequences?

Sequences are events that take place in a specific order, like a customer purchasing a GPS device after purchasing an automobile.

Personal computers (PC)

Small systems are used on an individual basis (i.e., one-person use) and include traditional multicomponent desktop systems and integrated systems, such as laptops and tablet computers.

Software life cycle

Software is typically introduced to the market, grows in demand, matures as it is overcome by newer technology or tools, and declines in popularity and rate of adoption.

Software as a service (SAAS)

Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a Web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps.

The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. This system is one in which businesses are interconnected and working to create a product or service for the customer. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System

Supply Chain Management (SCM) System (page 12)

Corrective Perfective Preventive Adaptive

The four types of maintenance are: ______________: to fix errors ______________: to increase efficiency _______________: to decrease the chance of future system failures _______________: to add new capabilities to the system

more complexity due to the need for more systems and better improvements in their processing capabilities.

The internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what?

system development life cycle

The six formal steps that need to be followed to develop an information system is known as what?

Threat of New Entrants

The threat of new competitors is high when there are few barriers to prevent competitors from entering a business. If an industry is profitable and there are few barriers to enter that industry, then rivalry will be great as new businesses enter the market.

Communication among the users is most critical because communication is key for driving change acceptance.

There are six methods to increase user adoption and lower post-implementation costs. Which one is the most important for driving user adoption?

Computer networks enable circuit switching. What does this mean?

They create a point-to-point packet digital circuit in circuit switching. Correct! Computer networks create a point-to-point packet digital circuit in circuit switching, which allows point-to-point communication.

Proprietary software

is closed source because the owner does not usually reveal the source code. Microsoft Windows and Mac OS X are examples of proprietary software.

Cost leadership

lower price for same or better quality than competitors

Hypermedia database

media based database; ex youtube

organizations can communicate Hint, displayed below ______ with their clients via bulletin boards, blogs, and streaming videos.

organizations can communicate Hint, displayed below asynchronously with their clients via bulletin boards, blogs, and streaming videos. Asynchronously refers to events happening at different times

a. Setting user expectations c. Verifying full functionality of the product

33. What are two purposes of prototyping a product? a. Setting user expectations b. Minimizing development time c. Verifying full functionality of the product d. Performing large-scale testing e. Decreasing the time required to start testing

it provides automated data collection and reporting reducing labor cost

How does a corporation benefit from a business intelligence program?

Corporations have used private branch exchanges (PBX) for many years to manage their own internal phone systems. Which of the following statements about private branch exchanges (PBX) is false?

The Internet is the backbone for PBX. Correct! The PBX system is based on the telephone technology and does not require the Internet to function.

Software licensing

The acquisition of software typically requires organizations to recognize that due to copyright law, copying software or installi

Quality and Types of information

Time, content, form

There are many types of data warehouses with many different applications. Which of the following item is not a data warehouse application? Information processing Data mining Analytical processing Transaction processin

Transaction processing

False - Quality does prevent failure, but not system security breaches.

True or False. System-level security maintains the quality of the software and protects the system from events and processes that can exploit or violate the system.

uniform resource locater

URL

25 and 1. The last two bytes are assigned to and managed by the client. The first two bytes are assigned to and managed by the ISP

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network?

Larger networks consist of a ____ network, or multiple LANs and WANs, and can be managed more productively through virtual network capability.

WAN

Synergy

Where people, information, and technology come together

because users have more flexibility than they do with VPN

Why has cloud computing become more popular?

it is a tunneling encryption protocol that secures wireless data transmissions

Why is WPA critical to wireless networks?

radio waves atmosphere

Wireless communication is transmitted over ____________________________through the _________________________.

False-Correct. Software as a service (SaaS) is proprietary software that is stored in the cloud and can be accessed by users who have a license.

[True/False] Software as a service is an example of software that is loaded on existing hardware.

Functional flow

_____________________ diagrams emphasize element behavior, function, and flow.

hot sites

a fully configured computer facility, with all information resources and services, communications links, and physical plant operations, that duplicates your company's computing resources and provides near real-time recovery of IT operations.

copyright

a grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 70 years.

warm site

a site that provides many of the same services and options of the hot site, but does not include the company's applications.

What is a key advantage in business in having a web-based database rather than a client-server traditional database?

access from anywhere

c. Hardware firewall d. Effective alarm system

52. What are two security options that protect the hardware component of an organization's information systems? a. Cloud-based backup system b. Offsite, offline backup system c. Hardware firewall d. Effective alarm system e. Disk drive locks f. Antimalware system

turns raw data into meaningful information based on the criteria specified by the user.

What does the query function do?

100,000 kbps

What is the typical broadband data speed of a 4G network?

smart phones

What will soon surpass desktop computers accessing the internet?

it is virtually connected not physically

Why is a virtual network easier to manage during moves and changes

IPv4

addressing scheme that uses dotted-decimal notation of four sets of octets. Each set is 1 byte totaling four byte=32 bits

adware

alien software designed to help pop-up advertisements appear on your screen.

spamware

alien software that uses your computers as a launch platform for spammers.

centralized

all IT services are coordinate from one source; can be inflexible

Capacities for data storage are written in

bytes

Secondary storage

is also called external memory, which includes the hard drive and other permanent devices.

A core competency

is an activity for which a business is a marketplace leader. This activity is central to how the employees of the business work. A core competency that is not easy to imitate creates competitive advantage

Google "Voice" Search

is an example of an application that was developed to allow smartphone and PC users to speak search instructions into their computer instead of using a keyboard.

AppDynamics

is an example of the evolution of application technology that includes application intelligence and analysis platforms, which allow companies to mine and monitor data in order to spot trends.

Information management

is concerned with collecting, managing, manipulating, organizing and reorganizing, and distributing information from a variety of sources to a variety of audiences.

Information management technology

is concerned with the management of resources that facilitate access to information. These resources include computers and the technical infrastructures such as software, hardware, networking, and data center technologies, and staff that support them, including the technicians, analysts, project managers, and others. Information technology supports and implements management systems objectives in order to increase an organization's competitive advantage.

1G

is considered the first generation with an ability to carry 2.4kbps data rates.

A good first step in selecting a computer system

is defining a list of jobs that the computer system is expected to accomplish (e.g., identifying the problem), as well as the benefits to the user.

The modern communication system

is digital (whereas earlier systems were analog), and relies on various technologies to perform fast and reliably.

Sniffing

is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network.

Synergy

is the cooperation between several businesses to produce a better product or service than would be possible if each business worked independently.

information repositories

knowledge centers, that provide helpful information to remote suppliers, partners, employees, and customers for free or as a revenue-generating service.

One key role of a system administrator is to _____________. select a database vendor design networks maintain computer systems

maintain computer systems (Page 14)

Data admin subsystem

manage overall data base enfironment like security, backup/recovery

Just in time manufacturing

method for delivering product at the exact time a customer wants; ex target having products on shelves so all a customer has to do is buy it

Relational database

most common; data presented as a series of values in 2-dimensions called tables; can create several relationships

Input devices

mouse, keyboard, touchscreens, voice recognition, microphones, scanner, etc.

External Hardware

peripheral devices that can be connected to the computer for specific purposes:

Spreadsheet software

provides tools and resources used to create tables, which help to organize, sort, calculate, and analyze data.

Content editor

the person responsible for updating and maintaining website content.

Two key elements that make up the data warehouse are

the presentation and the staging area.

encryption

the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Cartography

the science and art of making an illustrated map or chart.

Input

the value of an information system is found how it "collects data"

Why do communications networks use defined rules or standards called protocols?

to ensure communication between packets is accurate and understood. n communications networks, data are transmitted by devices, travel over a medium, and are received by other devices. Protocols are used to ensure the transmission of digital data communicated in packets between devices is accurate and understood by the receiving device.

Big data can be structured, semistructured, or

unstructured

Networked development

where development and operations are planned, combined, and coordinated between international locations

website visit (e.g. drive-by download), or merely by being connected to the Internet or affected network

worm

Analysis

Gather business requirements, prioritize them

demilitarized zone (DMZ)

a separate organizational local area network that is located between an organization's internal network and an external network, usually the internet.

management and coordination, production, operation, supply, distribution, global customers, and global marketing

What are the major contributions or factors that drive global systems and the internationalization of business?

keep passwords private, be alert to impersonators trying to get your information, and read privacy policies.

What is a good management technique for securing information?

buyer profiles, behaviors, and demographics

What is considered when determining the target audience of e-commerce?

scope

What is included or defined in a project, including goals, deliverables, costs, and deadlines?

Master data are objects shared across the enterprise.

What is meant by master data in entity-relationship modeling?

copper building wire

What is not practical for telecommunications, especially with the advent of wireless?

Poor data quality affects system output, which severely impacts management decisions.

What is one consequence of poor data quality?

Only some of the core systems should be shared initially, and then gradually share some of the other systems, but only if they share key elements.

What is one management solution to overcome global information system challenges?

to educate stakeholders on the company's mission and vision, production information, and community efforts

What is the primary purpose for publishing company information on the internet?

trend analysis

What reveals the patterns of behavior, such as currency fluctuations, which can affect a stock or an entire industry or market?

data mining, modeling, statistics, OLAP

What tools and techniques does business analytics consist of?

The part-time employees used this old and unsecured technology to transfer files between the bookstore's server and their home computers.

FTP

[True/False] Laptops and desktops come only with dual core CPUs, while server computers come only with quad core.

False

True or false. Data are more secure when they are stored in the cloud.

False (Page 16)

Information

(i.e., typically output) is data that has been transformed by a predefined process (e.g., organization, format, calculations, etc.), through which it takes on an additional informing quality, that adds value for the end user recipient.

SMTP, IMAP and POP3

3 popular email protocols

router

A __________ is a networking device used to pass packets to the next network node until the packets reach the ultimate destination

Extensible markup language (XML)

A computer language similar to HTML, makes it easier to exchange, validate, store, and interpret data between a variety of applications and systems.

have the most experienced workers complete tasks on the critical path

ABC playground company has been asked to build new playground at a local elementary school. The project must be completed before the first day of school. What steps would increase the likelihood of finishing the project on time?

What term is used to describe the properties of data components?

Attributes

a tool used by management to track and monitor staff and organizational activities

Balanced scorecards are often used in business. What is a balanced scorecard?

3) Information Quality

Business decisions are only as good as the quality of the information used to make them. Information inconsistency occurs when the same data element has different values.

What is Business intelligence?

Business intelligence is the term used to describe the infrastructure, data, and software tools that help to analyze, organize, and control access to data in order to enable managers and others in the enterprise to make better and more informed decisions.

Technical feasibility

Does it fit within employee skills, what about system maintenance

digital pricing strategies

Freemium involves what?

viral

How does social media enable distribution of information?

secured access

May businesses require their employees use VPN to gain remote access to the corporate network. What is an advantage of VPN?

Information systems simplify business processes and remove unnecessary activities. Select the choice that would NOT help a business. Removing controls to employee processes Eliminating repetitive tasks Increasing accuracy Project planning and implementation

Removing controls to employee processes (page 10)

This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent.

Rights approach

Explain the four primary traits that determine the value of information.

See below

Summarize the different software development methodologies.

See below

On premises (private cloud)

Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization.

SNMP

Simple Network Management Protocol. Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status.

Horizontal Structure

The information systems structure is horizontal as it encompasses many different business functions within an organization.

the user knowledge and background of target audience

When communicating, what is important for IT professionals to understand during the system development process?

Network Access Point

Where severalc onnections converge on internet

UNIVAC

_____ was the first general purpose computer for commercial use.

64-bit processors are able to process _________

billions of bits per second

Knowledge management

centralized mechanisms for storing and querying info

Most technology companies have a _____to manage their technology development. A _____ oversees information systems matters in companies that specialize in information technology or that rely on it for supporting their infrastructure. Choices: chief information officer chief technology officer

chief technology officer chief information officer (Page 14)

alien software

clandestine software that is installed on your computer through duplicitous methods.

Assume you are are explaining the types of servers involved in databases to a group of coworkers. You note that a _________ is a dedicated computer that stores database files and database management systems.

database server

Metrics

measures used to indicate progress or quality

transport layer security (TLS)

see secure socket layer.

Compliance

the act of conforming, acquiescing, or yielding.

risk analysis

the process by which an organization assesses the value of each asset being protected, estimates the probability that each asset might be compromised, and compares the probable costs of each betting compromised with the costs of protecting it.

Search engine optimization (SEO),

the process of ensuring the site is visible and highly ranked in search results, is a high priority.

privacy

the right to be left alone and to be free of unreasonable personal intrusion.

biometrics

the science and technology of authentication (i.e., establishing the identity of an individual) by measuring the subject's physiologic or behavioral characteristics.

Processing

the value of an information system is found how it "converts that data"

five competitive forces

threat of new entrants, threat of substitute products or services, bargaining power of customers (buyers), bargaining power of suppliers, and intensity of competitive rivalry.

Supply Chain management system

tracks inventory and informtion among business processes

Genetic algorithms

trian and error to develot increasingly better solutions to a problem

Chipless RFID tags

uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without drying the chip.

data warehouse

What enables analytics of operational data from various sources?

d. A graphical representation of the relationship between components

15. What is process modeling? Pg 364 a. An application that changes inputs into outputs b. A database that is used to consolidate business operations c. An integrated series of processes d. A graphical representation of the relationship between components

DHCP

Dynamic Host Configuration Protocol. A DHCP server or appropriately configured router automatically and temporarily assigns IP addresses to DHCP-enabled systems on the network.

is a process by which data is encoded so that only persons with a decryption code may unlock and retrieve stored messages.

Encryption

What is one tool a business can use to map process requirements and data to develop a supporting relational database?

Entity relationship diagram

Before selecting software applications, what requirements need to be reviewed?

Hardware

dumb terminals

Hybrid systems called thin- or zero-clients. Use input and output devices, such as a monitor, mouse, and keyboard, but connect to a centralized server for processing.

HTTPS

Hypertext Transfer Protocol Secure, which uses HTTP as well as technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and web server.

Which application is utilized by GPS and GIS? ch 16 A. Automatic vehicle location B. Location-based services C. Edge mapping D. Mapping densities

Location-based services (LBS)

otherwise known as CPU cache and random access memory (RAM), are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed.

Primary Storage

government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.

Nation state

production and maintenance

System development life cycle (SDLC) consists of 6 stages. What is the last stage?

User adoption rates

System implementation success depends on a number of factors, but true system success is measure by :

diagrams, charts, and maps

Systems design models typically consist of:

False - models are NOT coded they are diagrammed

T or F: A model is an image of an item, system, or process that we code in order to imitate, follow, or duplicate whatever the model represents.

True or false. Enterprise resource planning involves utilizing computer technology to link various aspects of a business, including human resources, accounting, and inventory control.

True (page 12)

conversion, development, testing

What are the systems implementation phases?

Schema is a planned design of the data organization.

What is a database schema?

allow easy access to information

What is a key benefit to business organizations for using a relational database?

monitor network traffic

What is the purpose of a network sniffer?

cybercrime

illegal activities executed on the internet.

Bridges

in network topologies are used to connect or link separate networks together, but do not have data switching capability.

Carbon emission

includes the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems.

Intelligent agents

incorporates AI capabilities like learning and reasoning

Primary key

uniquely identifies only one key, ex employee id

secure socket layer (SSL)

(also known as transport layer security) an encryption standard used for secure transactions such as credit card purchases and online banking.

Top level domain

.com .net, etc.

Web 2.0

2nd generation of web focuses on online collaboration

b. Acceptance and filtering

69. What is the first step of the change management process? a. Building, testing, and implementing b. Acceptance and filtering c. Approval d. Classification e. Post-implementation review

firewall

A ____________ can be hardware with software, or is just software embedded in a network at strategic access locations to prevent intrusion

schema

A _____________ is a planned design structure database

internet

Among all the connections- internet, intranet, and extranet- which is the most widely used channel for business?

What is the difference between an analog signal and a digital signal?

Analog signals are continuous while digital signals are not continuous. Correct! Analog signals are continuous electrical waveform signals while digital signals are discrete, binary, noncontinuous electrical waveforms.

Business Intelligence

Business Intelligence: Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making EX: Lowest sales per week with the economic interest rates Best selling product by month compared to sports season and city team wins and losses.

This person, in partnership with the Board, is responsible for the success of Fred's Foundation, Inc. Together, the Board and this person assure Fred's Foundation's relevance to the community and determine the company's mission and vision statement. This person provides direction and enables the Board to to carry out its governance functions. Which of the following job titles best fits this description? CIO CFO CEO COO

CEO (Page 14)

The ___________ is in charge of the people who design, build, use, and manage information technology in the organization. CSO CEO CIO CTO CFO

CIO (Page 14)

There are many data management challenges created by big data. Which of the following items is NOT one of those challenges? Variety Size Cost Speed

Cost

Chapter 34 in COS, 32 in ebook

Global Trends

standards

Global business challenges are typically no worse than domestic business challenges except for the distance. What problem can be alleviated by knowing the challenges up front?

What company's computer popularized the term PC?

IBM

facilitate communication

IPv4 was created and standardized in the 1970s by the original ARPANET group to _______________ __________________

Biomimicry

Learn how people based systems behave, predict how they will behave, improve human systems to make them more efficient and effective

Chapter 26 in COS, 24 in ebook

MIS Infrastructures

or similarly the backplane, of a system is the device that contains the system bus and connects the various input and output devices that compose any given computer system.

Motherboard

What kind of database management system enables businesses to create new records and update and delete records, providing real time information for decision making?

Online transaction processing

Which term is used to describe an iterative approach to building a system? A. Sketching B. Scrum C. Waterfall D. Prototyping

Prototyping

GANTT CHART

SEE PIC

PERT CHART

SEE PIC

Network Topologies

See Pic

To increase the number of unique IP addresses

The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose?

Three years

The main agenda of information systems is expected to change every three years due to the dynamic nature of IS functions.

a data warehouse subset focused on a single area or function

What is a data mart?

Systems Software

an operating system, which will direct and control the hardware components of the IS

threat

any danger to which an information resource may be exposed

Horizontal applications

are more popular and general purpose, such as word processing, spreadsheets, and presentation software.

Operational processes

can outline the procedure for taking customer orders.

A project manager is responsible for _________________. developing organization goals communicating the project plan choosing strategic projects deciding who is a stakeholder

communicating the project plan (Page 14)

Critical path

estimates the shortest path through the project ensuring all critical tasks are completed from start to finish. The red line displays the critical path for the project.

Normalization

process of removing redundancy and ensuring consistency

Which organizational behavior leads to information system implementation failures? increased management layers resistance to change alignment of IT and business goals increased bureaucracy

resistance to change (Page 15)

Chief security officer

responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses.

TCP/IP stands for Transmission Control Protocol/Internet Protocol,

shortened to IP, and is the standard communication rule of the Internet. Internet Protocol governs Internet data network rules.

Computer-aided software engineering (CASE)

software suites that automate systems analysis, design, and development.

Semmi-structured

some measurable elements, some not measurable

Global information systems facilitate global business strategies by connecting and providing multiple modes of _____communication such as teleconferencing and instant messaging, and _____ communication, such as email and overnight mail. Choices: Asynchronous Synchronous

sychronous sychronous (Page 17)

Differentiation

Offer a product that is new and different

When designing a database, you must consider its use or function. One type of database is OLAP. What does it stand for and what is it used for?

OLAP stands for online analytical processing and are databases used to assist decision making.

Open System Interconnection seven

OSI Stand for________________ and consists of ___________ layers

historical data

What does predictive analytics use to better understand customers and other business entities in order to define areas of opportunities or areas of risks?

the unpredictable and less systematic aspects of decision-making

What does the behavioral model hope to a accomplish in management decision making?

the speed required to process or analyze big data

What does velocity mean when describing big data?

hierarchical database

Tree style with root nodes and child nodes; not easy to query

quality

What is the variable in project management that must be monitored when managing information technology to ensure it is completed on time, within budget, according to specs, and with high quality and low risk?

a comprehensive list of all activities needed to complete a project.

What is the work breakdown structure (WBS)?

Query language

What is used to retrieve specific data from a database?

pointers (or linked lines)

What is used to show the relationship between data fields and tables in entity-relationship models?

structured

What kind of decisions involve an established procedure, are repetitive and routine, and can be handled in the same manner each time?

hierarchical

What kind of database is a tree-like structure?

telegraph technology

What led to the innovation of the telephone?

end user development

What method uses 4th generation computer languages?

help align the organization with business objectives

What must an effective business intelligence platform accomplish?

data cleansing

What occurs during the transformation step in ETL?

5-12 Mbps

4G data networks offer download speeds of:

Fine granularity

Info based on specific details

Why has information technology become critical to the success of business enterprise in the last 20 years?

Information technology has automated business operations and changed the economics of information. Information technology enables automation and faster response to market needs.

What is the main challenge to growth that is encountered when e-business is used? A. Product or service limitations B. Poor social media presence C. Underdeveloped system security D. Inability to adhere to taxation rules or regualtions

Product or service limitations

Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance

Production and Operations (page 10)

risk transference- shifting the risk to someone or something else.

Purchasing homeowner's insurance in case of a fire or hurricane is an example of what?

Compare LANs, WANs, and MANs.

See Pic

reporting- generate reports that have information or business intelligence

What are OLAP databases used for?

denial-of-service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources.

Tactical activities

are those that are performed to accomplish the overall strategy.

Which field continues to grow due to privacy threats and will be one of the most relevant in an Internet-based technology? Software engineering Web design Cyber security

Cyber security (Page 14)

VoIP

Delivers audio and sometimes video information in digital form using the packet switching technique

b. Planning d. Designing c. Coding a. Testing e. Listening

41. Place the phases of Extreme programming (XP) in order from first (1) to last (5). a. Testing: b. Planning: c. Coding: d. Designing: e. Listening:

a. Activity c. Resource

16. What are two key components of a business process? a. Activity b. Diagram c. Resource pg 360 d. Model

Database

A database maintains info about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

ERD (entity relationship model) describes the data and map processes to data requirements

A database schema can be represented by which model?

As a database administrator, you must avoid inconsistencies, which cause errors and integrity issues. Database inconsistencies are avoided by implementing what concept?

Referential integrity

Convergence

The ability for a telecommunication network to carry voice, data, and video is called

convergence

The ability for a telecommunication network to carry voice, data, and video is called

asynchronous

These are forms of ________communication: Bulletin boards, blogs, and streaming videos

The major components of projects

Time: the time allotted to complete the scheduled tasks of the project Scope: the specifically defined output or deliverable(s) intended at the end of the project Resources (cost): the necessary human (laborers), capital (equipment), and liquid (cash) assets necessary to complete the project's output Quality: the degree of satisfaction by which each of the above components is satisfied

public, private, and hybrid

What are the classifications of cloud computing?

resistance to change, user, technical ability

What are the factors that must be considered when implementing anew information system?

transnational, multinational, franchisers, domestic exporter

What are the for main global business strategies that form a global firm's organizational and information systems structure?

distributed denial-of-service (DDoS) attack

a denial-of-service attack that sends a flood of data packets form many compromised computers simultaneously.

Reliability

how consistently a system performs

Sarah is doing a presentation on big data at a company lunch and learning to help employees understand the ways IT can help the business. Which of the following is the best definition of big data?

Big data is used to describe large, complex data sets.

Design stage

Design technical architecture (hardware, software, telecommunications equipment), design system model, draw graphical representation of a design

Which of the following scenarios would benefit the most from a knowledge-based system? John has a lawn maintenance company and when he gets very busy, he hires extra workers to help with mowing, blowing, and trimming people's yards. It is not unusual for him to have a new helper each week during the busy season. Fred has worked for Selma's Training services for 20 years and is ready to retire. The company will be hiring a new employee to take over Fred's responsibilities. It will take the new employee a while to learn the many new job responsibilities.

Fred has worked for Selma's Training services for 20 years and is ready to retire. The company will be hiring a new employee to take over Fred's responsibilities. It will take the new employee a while to learn the many new job responsibilities. (page 12)

petabytes

What is the typical data size of big data?

NAT - network address translation

___________________ was introduced to allow private users to redefine network addresses to assign their own addresses, even within complex networks.

Managerial Consideration

business processes, strategies, and leadership. (solving business problems)

Transaction processing systems TPS

collect, store, update, and retrieve transaction data within an organization. Common business transactions include employee payroll, customer sales, and supplier payments. One of the earliest types of IS, are developed to decrease costs, decrease processing time, and increase accuracy. achieve these benefits by automating and recording routine business transactions that are too tedious and monotonous for front-line employees to process manually in an effective and efficient manner.

Portals and connections

consist of applications, protocols, and other technology that allow protected and unprotected connections from one computer to another.

radio frequency identification (RFID)

enables a company to track merchandise or inventory by radio frequency signals, eliminating the need to physically handle each item during the inventory process.

electronic communications

examples include email, instant messaging, and video teleconferencing, which help a business to operate, reduce the need for travel, and even allow employees to work from anywhere.

Porter's Five Forces

existing competition, threat of new entrants, power of buyers, power of suppliers, threat of substitution

Threat of Substitute Products or Services

f there are lots of choices for consumers for a product, then this threat is high. For example, consumers can buy e-books instead of hard copies of a book and digitized music instead of CDs. These options are usually cheaper, and the quality is high.Switching from one product or service to another similar product or service with little cost.

chief technology officer (CTO)

has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company. The ___ focus is on day-to-day operations, overall implementation of technology strategies, and efficiency of the IT systems. In most corporations, the ___ reports to the CIO.

Organization Consideration

include business procedures, culture, and organizational hierarchy. (solving business problems)

Operational activities

include the repetitive activities that occur at a basic level within the function.

Materials Requirement Planning II

included MRP and accounging and finance

What is a network host? This is also known as data terminal equipment in computer networking hardware.

is a physical node with an IP address.

radio frequency (RF) site survey

is a process used to determine the number and placement of access points that provide adequate coverage throughout a facility.

FTP stands for File Transfer Protocol

is a protocol used to transfer files from one computer to another

value chain

is a set of inputs used by a strategic information system and put into meaningful outputs to help a company gain a competitive advantage in the marketplace.

computer software

is a set of machine readable instructions that directs a computer.Computer programmers create __________ _________ to make computers execute tasks; this includes the operating system and applications on a computer.

Application software

is a set of one or more programs that allows a computer user to perform a group of coordinated activities, functions, or tasks.

Culture

is our collective experience, characteristics, and knowledge as a society and is important in global business. Having a global mindset and the creation of a global business culture will help businesses expand and become more profitable.

microprocessor

is the most advanced integrated circuit and holds millions of integrated circuits in a semiconductor chip. They are programmable devices that process instructions and incorporate the four functions of a computer central processing unit (CPU), which includes fetch, decode, execute and store.

Knowledge

is the practical application of the information given.

supply chain

is the sequence of processes involved in getting raw materials for a product all the way to the production and distribution of a product into the hands of the customer.

In which type of organization would information system development appear to follow the sun, with development occurring on projects until such time as the work might be handed off to the next division or location as their day ended? multinational exporting

multinational (Page 17)

The term Internet of Things (IoT)

refers to a future trend in which all devices—including appliances, cars, networks, and systems—will be connected to the Internet, which will facilitate servicing automation and e-commerce.

You are working on a project with a colleague in Los Angeles, and you have a technical question. You see that your colleague is currently logged into the company's instant messaging system, so you send her a message. She replies within one minute with the needed information. This is an example of ______________ communication. asynchronous synchronous

synchronous (Page 17)

dashboards

used to present information from multiple inputs in order to enable managers and staff to make better decisions and use of their time.

Porter's Three Generic Strategies

1) Cost Leadership 2) Differentiation 3) Focused Strategy Broad strategies reach a large market segment, while focused strategies target a niche or unique market with either cost leadership or differentiation.

Transmission Control Protocol/Internet Protocol

TCP/IP

Network economics:

The cost of adding another business participant to a business venture is small, and the potential gain is great.

common functionalities of business intelligence

What are measurement, analytics, reporting, collaboration, and knowledge management?

the internet

What is the biggest impact to global business?

RFID WSNs

_________are typically used in logistics and inventory management applications whereas _______________are typically used to monitor physical or environmental conditions.

WPA2

________has replaced WPA as the standard Wi-Fi encryption protocol.

least privilege

a principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.

it provides high level information in KPI format for executive level monitoring and decision making.

How does executive management use executive support systems (ESS)?

By providing information about the company's vision, mission, and community efforts.

How does the internet help to improve a company's reputation?

Voice and video data are packetized, but transmitted on circuit switching networks instead of packet switching networks.

How is voice or video information carried on digital networks?

Operating systems, programming languages, and computer hardware

In what areas should a systems analyst be a subject matter expert? Embedded software, databases, and microchip Operating systems, programming languages, and computer hardware Network design, electronics, and databases

Data mining

a logical collection of information gathered from many different operational databases, used to create business intelligence

visual private network (VPN)

a private network that uses a public network (usually the internet) to securely connect users by using encryption.

risk transference

a process in which the organization transfers the risk by using other means to compensate for a loss, such as by purchasing insurance.

What is the name of the notation used to diagram the relationship between entities?

Crows foot

Which database model connects or relates different data tables using common fields called primary keys?

Relational

True or false. One benefit of a supply chain management system is to plan daily operations of the company.

True (page 12)

jargon and terminology

What should be avoided in effective written communication?

Operational management

day to day operations

Conditional formatting

highlights individual cells that match criteria

Consolidation

involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.

trap doors

see back doors.

creating a believable scenario (e.g. whether innocuous or serious) for the purpose of obtaining information. For example, a user receives an official looking email that alerts them to recent successful phishing attacks, and asks them to respond with their credentials in order to ensure their validity.

Pretexting

Chapter 20

Developing a 21st-Century Organization

a. Purchasing product parts

10. Which activity is an example of a business process? Pg 80 a. Purchasing product parts b. Signing accounts payable checks c. Maintaining inventory d. Calling a customer

single character=______ bits

8 bits

Risk reduction

Acting to reduce the potential for a risk to occur or affect damage to the project.

A company engineer would like to produce a new product that stores, views, and analyzes data to create multidimensional charts. Which decision support system will be the foundation for this new product? A. Business Intelligence B. Geographic information systems C. Online analytical processing D. Executive information systems

BI

Online Analytical Processing

BI info about customers; uses analytics, integratd use of technology tools and stats to create real-time high quality info

What measures computer speed? A. RPM B. CPU C. Hard disk size D. Network interface card

CPU

Graphin information system

DSS method, displays map-based infor

Output

Processed data into meaningful and actionable information that forms the basis of action.

targeting

Social media benefits to businesses are made possible because social media offers both location specific and time time specific ____________________ .

True or False. Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity.

True Correct! Data packet switching can be broken up and sent throughout the entire network to be reassembled at the destination.

Describe Web 3.0 and the next generation of online business.

Web 3.0 is based on "intelligent" web applications using natural language processing, machinebased learning and reasoning, and intelligent applications. Web 3.0 is the next step in the evolution of the Internet and web applications. Business leaders who explore its opportunities will be the first to market with competitive advantages. Web 3.0 offers a way for people to describe information such that computers can start to understand the relationships among concepts and topics.

False-small biz can run with just a router

You are installing a new network for a small business. Your client makes the statement, "Businesses, regardless of size, need hubs, switches, and routers to access the world wide web." Is this true or false?

False-Managing software licenses is a concern for modern organizations because licenses usually have expiration dates or limited downloads and the free software is more limited in capability.

[True/False] Because a lot of free software is available, managing software licenses is not a concern for modern organizations.

core router

A _____________________ is used to connect the enterprise to the Internet in the backbone in order to handle large amounts of data traffic

What is rule induction?

A third type of data mining is rule induction, which is a technique based on statistical importance.

Frank works as a database administrator and focuses a lot of time and attention on data integrity and the quality of data in the database. What are some of the desirable characteristics of data integrity that he should look for in his work? (Select all that apply.) Accuracy Duplication Consistency

Accuracy Consistency

What e-Business tool converts an audio broadcast to a file that can be played on a digital music player? A. Videoconferencing B. Instant Messaging C. Podcasting D. Webinar

C. Podcasting

True or false. Differences in language, culture, and technology do not present a challenge for a company implementing a global information system.

False (Page 17)

is the most advanced integrated circuit and holds millions of integrated circuits in a semiconductor chip. They are programmable devices that process instructions and incorporate the four functions of a computer central processing unit (CPU), which includes fetch, decode, execute and store.

Microprocessor

Partner relationship management

Relationship between business and channel partners

Data design

User doesn't see it, analyst identifies the underlying structures of the system

project structure, size, and team technical background

What are 3 levels of risks associated with system design and implementation?

Competitive click-fraud

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

risk management

a process that identities, controls, and minimized the impact of threats, in an effort to reduce risk to manageable levels.

Competitive advantage

a product or service that an organization's customers place a greater value on than similar offerings from a competitor.

cyberterrorism

can be defined as a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

Design

develop as many solutions as possible

Electronic communication consists of

emails, instant messaging, audio clips, video communications, and unified communications.

social engineering

getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.

software engineer

higher level programmer. Someone in this position not only writes the code but is responsible for designing a new application, developing specifications, overseeing the implementation, and supporting users after implementation.

Cloud fabric controller

individual who monitors and provisions cloud resources similar to a server administrator at an individual company.

A customer relationship management system provides a business with the opportunity to: analyze common contract elements to streamline the contracting process. allow customers to know which products are currently available by displaying them on a website. integrate information about each client's likes and dislikes to be able to tailor conversations with them.

integrate information about each client's likes and dislikes to be able to tailor conversations with them. (page 12)

A virtual company _____ Choices: is not limited by physical location or geography provides only virtual services

is not limited by physical location or geography (page 11)

Production and operations

is responsible for converting inputs, such as raw materials and labor, into useful outputs, such as products and services.

accounting and finance department

is responsible for managing the flow of cash through an organization

System aviailability

measure of reliability; average amount of time a system is usable

A software package is a

prewritten set of software programs that performs a specific business function, such as accounting or order management.

exposure

the harm, loss, or damage that can result if a threat compromises an information resource.

WAN stands for wide area network

typically connects business campuses consisting of computer systems across large distances. transmitted through the "cloud,"

LAN stands for local area network,

typically connects computer systems of an organization or a floor of a building

The impact of the Internet on the scope of information systems is large. Which of the following statements about the impact of the Internet is false?

**1.The Internet has created a simplified network of client-server computers. 2.The Internet is an enabler to business intelligence and data mining tools. 3.At the very least, the Internet is little more than another channel through which businesses do business. 4.The Internet's effect on the scope of information systems is that of a multiplier. Correct! The impact of the Internet has resulted in a very extensive and complex interconnected network that spread out over the entire globe.

Identify the three primary areas associated with an information MIS infrastructure

- Backup and Recovery - backup: exact copy of sys info; recovery: get it up and running after crash - Disaster Recover Plan - details process for recovering info - Business Continuity Plan - HOW a company recoveres and restores operations

Three components of sustainable MIS and their business benefits

- Grid computing: collection of computers that are geographically dispersed, that are coordinated to solve a common problem. With grid computing, a problem is broken and sent to many machines allowing for faster problem processing that could occur with a single system. - Virtualized computing - creates multiple virtual machines on single device. - Cloud computing - is a model for enabling on demand network access to a shared pool of computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned with minimal management effort or service provider interaction. Cloud computing connect people and resources from any location where an internet connection is available.

Identify the environmental impacts associated with MIS

- Increased energy consumption - Increased carbon emissions -Increased electronic waste

Major structures and functions used by the DBMS include:

-Data dictionary: defines and manages the data types and structures that dictate how the database is organized. -Data management: the creation, update, and deletion of the data within the database. -Data retrieval: using queries, data is retrieved and combined. -Data administration, including maintaining data integrity: recovering corrupted information, and managing users and group access to the data.

Three hierarchical levels may exist in the development of entity-relationship diagrams:

-conceptual data models -logical data models -physical data models

select two other types of primary storage

1-Cache and on-board memory 2-CD and DVD 3-Flash drive and hard drive (Cache and on-board memory are high-speed memory and are considered primary storage since they are internal and easily accessed by the CPU.)

a. Data b. Information c. Information d. Data

1. Classify each example as being either data or information. a. The price of a book at a bookstore: b. The average final exam grade for a class: c. The top-selling book for the month: d. The grade achieved on a final exam:

Which of the following is NOT a computer network hardware device?

1.Hub 2.Switch 3.Sniffer correct 4.Router

a. Fully automated b. Partially automated c. Manual d. Manual e. Partially automated

11. Classify each business as fully manual, partially automated, or fully automated. Pg. 13-14 a. Nationwide office supply store: b. Fast-food franchise: c. Farmer's market produce vendor: d. Small owner-operated bakery with only one location: e. Boutique retail store that features locally produced products:

b. Suppliers, customers, and inventory are items of value represented in a business process.

12. Which phrase explains the relationship between business processes and information systems? a. Business process modeling and its components make information system design more difficult. b. Suppliers, customers, and inventory are items of value represented in a business process. c. Business processes provide the information required for creating an information system. d. Organizations create an information system regardless of the business process model.

d. Decision

14. What does a diamond shape represent in a business process model diagram? Pg 364 a. Control flow b. Data c. Start d. Decision e. Activity

b. To solve a major problem c. To achieve goals and objectives

18. What are the two main reasons that organizations create information systems? Pg ix 403 a. To develop an organizational strategy b. To solve a major problem c. To achieve goals and objectives d. To address tactical challenge e. To formulate an organizational mission

c. Value chain

19. Which management model was developed by Michael Porter to help organizations identify opportunities to save money and integrate information systems? a. Competitive strategies b. Five forces industry analysis c. Value chain d. Generic strategies

c. Information is created when meaning is applied to data.

2. What is the relationship between data and information? a. Data is defined as meaning applied to information. b. Data consists of processed information. c. Information is created when meaning is applied to data. d. Information is to data like gasoline is to an automobile.

a. Threat of new entrants

20. Which component is part of Porter's five forces industry analysis model? a. Threat of new entrants b. Automation c. Generic strategies d. Value chain

a. Customer bargaining power

21. Which component of Porter's five forces industry analysis model describes an influence that can restrict an organization's ability to raise prices without losing customers? a. Customer bargaining power b. Buyer cost switching c. Buyer substitution propensity d. Customer brand loyalty

b. Narrow differentiation

23. A small business wants higher profits and does not want to compete with larger businesses for lowest cost. Which strategy from Porter's generic strategies model should the business implement? a. Narrow cost leadership b. Narrow differentiation c. Broad differentiation d. Broad cost leadership

b. Operations c. Inbound logistics f. Service

24. Which three activities are primary activities of Porter's value chain model? a. HR management b. Operations c. Inbound logistics d. Procurement e. Infrastructure f. Service

a. Primary b. Support c. Primary d. Support

25. Classify each activity by its value chain level. Primary or Support. a. Marketing and sales: b. Procurement: c. Operations: d. HR management:

a. Automation

26. An organization wants to gain a competitive advantage by maximizing staff efficiency. Which method should the organization use to accomplish this goal? Pg 12 a. Automation b. Broad cost leadership c. Prototyping d. Broad differentiation

d. Management preferences c. Technological changes

27. What are two primary factors to consider when developing a new information system for an existing organization? Pg 15 a. Personnel requirements b. Minimum asset requirements c. Technological changes d. Management preferences

a. Configuration control

28. Which term describes the use of policies, practices, and tools by systems developers to manage a project's resources? Pg 383 a. Configuration control b. Critical path c. Work breakdown structure d. System development life cycle e. Agile development

d. Decreased communication between the company and its clients

29. What is a possible drawback of outsourcing the development of an information system? Pg 415 a. Increased cost of employee benefits b. Increased cost of facilities c. Decreased employee productivity d. Decreased communication between the company and its clients

Web 2.0

2nd generation of web focusing on online collaboration, users as both crators and modifiers of content

agile - adaptive planning and fast delivery. scrum(incremental form of agile) - recognizes that customer needs and wants can change throughout the project. Prototyping -quick modules that can be tested, deployed, and fixed.

3 options that Companies have different for what method to use when developing an information system and their benefits

sniffing, spoofing, probing

3 risks to wireless networks

b. Procedures

3. Which information system component provides the instructions for using a system or for backing up system data? Pg10 a. Hardware b. Procedures c. Software d. People e. Data

b. To provide evidence of usability

30. What is the purpose of prototyping, in the context of systems development? a. To model nonfunctional system elements b. To provide evidence of usability c. To provide indirect user experience d. To lower development costs

d. Analysis

32. Which systems development life cycle phase includes defining specific system functions and application operations to meet project goals? Pg 373 a. Planning b. Design c. Implementation d. Analysis e. Maintenance

a. User involvement provides valuable feedback to developers b. It increases user expectation of the final system

34. What are two benefits of using a prototype approach for information systems? a. User involvement provides valuable feedback to developers b. It increases user expectation of the final system c. The final system is likely to meet user requirements d. Limited functionality of a prototype allows users to focus on singular tasks

a. i. The ability to appear in different forms b. c. d.

36. Match each term on the left with its corresponding characteristic on the right as it relates to object-oriented systems development. a. Polymorphism i. The ability to appear in different forms ii. The act of storing data and procedures together iii. The ability to interact with other entities b. Encapsulation i. The act of storing data and procedures together ii. The ability to appear in different forms iii. The act of storing similar components together c. Classes i. Entities that can interact with one another ii. Collection of similar components iii. Data and procedures that are stored together d. Objects i. Entities that appear in different forms ii. Entities that can interact with one another iii. Collections of similar components

a. Prototyping

37. An IT team is trying to identify the appropriate methodology for an upcoming development project. The methodology must have sample business requirements and support a narrow project scope, a short development time frame, and a low number of users. Which development methodology fits the requirements? a. Prototyping b. Rapid application development c. Object-oriented development d. Extreme programming (XP)

a. Iterative

38. What is a characteristic of the activity planning process when using agile systems methodology? a. Iterative b. Strategic c. Centralized d. Predictive

c. The project is collaborative

39. What are two characteristics of a project that uses an agile method such as extreme programming (XP)? a. The project develops incrementally b. The project requires large development teams c. The project is collaborative d. The project has a rigid schedule

c. Procedures d. Data

4. What are two components of a business information system? pg 10 a. Strategic decision b. Information c. Procedures d. Data

a. Defining a mission statement for an organization e. Replacing legacy systems with new systems that use emerging technologies

42. What are two purposes of information systems management? a. Defining a mission statement for an organization b. Maintain data integrity within an organization c. Coordination the release of public relation information d. Formulating functional requirement for a business unit e. Replacing legacy systems with new systems that use emerging technologies

a. i. Keeps systems from becoming obsolete by deciding to replace legacy systems with new systems that use emerging technologies b. ?

43. Match each group on the left with the corresponding information systems management task(s) it performs on the right a. IS steering committee i. Keeps systems from becoming obsolete by deciding to replace legacy systems with new systems that use emerging technologies ii. Owns the hardware, installs and maintains the software, and manages permissions. iii. Endures a well-planned, approach to all information needs. b. IT department i. Keeps systems from becoming obsolete by replacing legacy systems with new system that use emerging technologies ii. Owns the hardware, installs and maintains the software, and manages permissions. iii. Endures a well-planned, approach to all information needs.

b. Don't release any information on the customer's co-worker, but explain the return policy in case they find they've made duplicate purchases.

45. A pharmacy customer wants to purchase an over-the-counter medication, but only if his coworker did not make a similar purchase earlier the same day. The customer asks the pharmacy clerk to retrieve the coworker's purchase records to verify whether the medication was purchased. How can the clerk assist the customer in an ethical manner? a. Require the customer to sign a waiver of responsibility b. Don't release any information on the customer's co-worker, but explain the return policy in case they fin they've made duplicate purchases. c. Require the customer to provide the coworker's personal identifiable information d. Provide the coworker's purchase records to the customer because the medication does not require a prescription

c. Ensuring information security d. Ensuring information accuracy

46. What are two ethical concerns in regard to information systems? a. Preventing employee discrimination b. Filling government paperwork c. Ensuring information security d. Ensuring information accuracy

a. Use and promote specific rules and guidelines for each line of business d. Conduct formal ethics training

47. Which two approaches can business mangers use to help manage ethics? a. Use and promote specific rules and guidelines for each line of business b. Focus training on the decisions that have the most customer interaction c. Form cross-department ethics committees d. Conduct formal ethics training

b. Physical

49. The electricity in a company's main office building often fluctuates. Which type of threat does this present to the company's information systems? a. Environmental b. Physical c. Natural disaster d. Insertional human threat e. Unintentional human threat f. Unintentional technical threat

c. Coarsely granular

5. Which type of information do executives require to make strategic decisions? pg. 38 a. Speculative b. Detailed c. Coarsely granular d. Finely granular

d. Theft of computer equipment

50. Which threat source is categorized as an intentional physical threat to information systems? a. Terrorist attack against company headquarters b. Purposeful flooding of an office c. Theft of other users passwords d. Theft of computer equipment

b. Optical media

53. A company is developing a backup strategy for small amount of data. Backup files must be created and stored at the organizations head-quarters, and copies must be stored offsite. Which backup should the company use? a. Magnetic tape b. Optical media c. Cloud data storage d. Semiconductor data storage

a. Magnetic tape

54. A company is developing a backup strategy for large amount of data. There are no specific data restoration time requirements, but the company must minimize costs. Which backup media should the company use? a. Magnetic tape b. Cloud data storage c. Optical media d. Semiconductor data storage

a. Credit card number c. Driving license number d. Home address

57. Car rental agencies collect personal information and payment information from customers. Which three types of information should be protected? a. Credit card number b. Reason for rental c. Driving license number d. Home address e. Age range f. Make, model, and color of car

b. Internal financial information

58. Which type of corporate information should be protected because it would be useful to the company's competitors? a. Annual shareholder reports b. Internal financial information c. Better business bureau reports d. Employee work contact information

a. Protect the company and its customers b. To limit the possible damages

59. What are two reasons that employees should report all security compromises? a. Protect the company and its customers b. To limit the possible damages c. To prosecute the offender d. To warn upper management

a. Software

6. Which type of component controls the system resources and productivity applications of an information system? a. Software b. Data c. Hardware d. Procedures e. Information

a. To prove the effectiveness of severity policies and procedures c. To bring attention to a potential security breach d. To limit damages to the company

60. Jill made plans to attend a family reunion. Jill's coworker, Mary, exercised seniority and took her vacation during the week of the reunion, so Jill could not attend the event. Jill and Mary share a cubicle. Jill recently overheard a telephone conversation in which Mary implied that she plans to leave the company soon. Jill has also seen Mary copy files from her office computer to portable USB drives. What are three reason Jill should report Mary to her supervisor a. To prove the effectiveness of severity policies and procedures b. To improve her annual review c. To bring attention to a potential security breach d. To limit damages to the company e. To even the score with Mary about last year's vacation f. To get Mary transferred to another cubicle

d. ID badges

61. Which security management technique helps to protect a physical workplace from unauthorized personnel access? a. Cubicle design b. Firewall c. Unique ID's and passwords d. ID badges

d. Software firewall

62. An information system administrator connects from his workstation to several remote servers that host sensitive and protected data. What should the administrator use to protect against web-based hackers and malware? a. Biometric authentication b. Smart card authentication c. Frequently changed password d. Software firewall

b. Record the issue c. Categorize the issue e. Check the issue against known issues a. Track the issue d. Close the issue

63. Place the basic problem-management process steps in order. a. Track the issue: b. Record the issue: c. Categorize the issue: d. Close the issue: e. Check the issue against known issues:

d. Record the incident b. Categorize the incident e. Verify whether the incident is part of a known problem a. Track the incident c. Provide closure

66. Place the techniques a customer service representative should use to manage problems in chronological order from first (1) to last (5). a. Track the incident: b. Categorize the incident: c. Provide closure: d. Record the incident: e. Verify whether the incident is part of a known problem:

Wireless technology can be described in terms of technological evolution and generations. Which of the following is not a wireless technology generation?

6G Correct! The next cellular wireless network will be the fourth generation.

b. Data

7. Which business information system component can be processed and then converted into meaningful information? a. Hardware b. Data c. Procedures d. Software

d. Acceptance and filtering c. Classification a. Approval e. Building, testing, and implementing b. Post-implementation review

70. Place the stages of the change management process in order from first (1) to last (5). a. Approval: b. Post-implementation review: c. Classification: d. Acceptance and filtering: e. Building, testing , and implementing:

d. Computer user

8. Which role represents the first step toward mastering computer skills? a. Expert user b. Super user c. Power user d. Computer user

Describe an example in a business where a strategic information system was implemented. How did this provide a key competitive advantage in the marketplace?

A Florida electrical distributor stocks thousands of products from hundreds of manufacturers. The company recently implemented a new system to streamline the process of customer orders. Instead of looking at all of the individual manufacturer inventory reports, the company now merges data from all of its manufacturers. Sales reps are now able to recognize ordering trends and make better predictions about future inventory needs. This new system has improved customer satisfaction, increased sales, saved employee time, and increased annual profits. The company is getting the products into the hands of the customers faster and cheaper than any of its competitors. (page 11)

information system

A ______________ consists of all the components that work together to process data into useful information.

denial-of-service

A ______________________ attack is a means to disrupt, interrupt, or suspend services of an Internet host computer. These attacks do not turn off the host, but instead overwhelm the host with queries, rendering the website unavailable.

Systems Analyst

A _____________________________uses analysis and design techniques to solve business problems, then develops and implements the systems using information technology.

work breakdown structure (WBS)

A ___________________________is a broken down list of all deliverables showing what the customer will get at the end of a project. The ____________ concept was developed along with the Program Evaluation and Review Technique (PERT) by the U.S. Department of Defense in 1957.1

What is telematics? A. A form of telecommunication technology that is used to identify and track assets via radio frequency. B. A telecommunication chip embedded in store shelving to help retailers. C. A blend of computers and wireless telecommunications technologies. D. A telecommunications device that allows goods and services to be purchased wirelessly

A blend of computers and wireless telecommunications technologies.

Which of these choices best describes an ERP system? A bookkeeper enters information into the bookkeeping system, which feeds the necessary information into the accounting system, where the accountant can perform his or her tasks and run financial reports for top management. A foreman conducts a warehouse inventory using a mobile barcode scanner, which compiles product quantities and types in a mobile database. He then takes the mobile scanner to management where the barcode data are uploaded into an inventory database. A receptionist and a secretary at a law firm both input and access client information in separate databases, related to legal issues, in order to complete their specific tasks.

A bookkeeper enters information into the bookkeeping system, which feeds the necessary information into the accounting system, where the accountant can perform his or her tasks and run financial reports for top management. (page 12)

The rules allow communication systems to interact and communicate with and transmit information to each other. Telecommunication protocols are created by governing bodies to define how data are communicated over the networks. Popular examples of telecommunications protocols include the 802.3 standard and the TCP/IP.

A communication protocol is defined as a set of rules that does what?

Large business enterprises require core routers in their telecommunications computer network to support multiple telecommunications interfaces of the highest speed. What else does a core router do?

A core router operates in the Internet backbone.A core router is very powerful (and expensive), and is used to aggregate data and connect the enterprise to the Internet in the backbone in order to handle large amounts of traffic.

A business owner opens a new store and begins collecting customer information at the register. This information includes email addresses and other information that the customers are willing to share. The business owner also starts to create paper contracts for special orders that involve embroidery and personalization. These papers are stored in a folder in the store location. Which of the following systems will help the business owner manage their this type of information? Management information system (MIS) A customer relationship management (CRM) system An enterprise resource planning (ERP) system

A customer relationship management (CRM) system (page 12)

Zappos

A data driven website model

What is a data quality audit?

A data quality audit should be executed to ensure that a database efficiently, consistently, and accurately accepts, stores, and produces information. The data quality audit helps database administrators to find and ascertain the source of problems caused by poor data quality.

Companies rely on data to drive information and decision making. Why would a business or enterprise implement a data warehouse?

A data warehouse improves decision making.

Consumers use data warehouses everyday, many times without even knowing it. Facebook is an example of a data warehouse that most consumers use on a daily basis. Which of the following best defines a data warehouse?

A data warehouse is a collection of business data from multiple systems used for data analysis and mining.

levels

A decision tree tool is not viable when data contains a different number of

Mainframe

A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.

node

A network host is a ___________________________ in a data communications network and is assigned an IP address.

Business ecosystems

A network of businesses, such as suppliers and distributors, are involved in providing delivery of a service or product through cooperation. The ecosystem must be flexible and adaptable to meet market demands. The rapid changes in technology have caused businesses to work together, aligning talents and resources, to reach a common goal or vision in a mutually beneficial relationship.

ATM stands for Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via circuit switching.

A network protocol designed to handle broadband integrated services such as voice and video is

Why do home office or small business computer networks sometimes use a peer-to-peer topology?

A peer-to-peer topology allows file sharing between computers.Small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable.

Gesture recognition

A person would point a finger at the computer screen to make the cursor move according to their finger direction.

What is the difference between a dual core and quad core chip?

A quad core offers more power, allowing more multitasking capabilities.

a secure platform for internal use

A reliable intranet connection provides organizations and their suppliers and vendors with __________________________________

Infrastructure as a service (IAAS)

A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace.

Explain how Business 2.0 is helping communities network and collaborate.

A social network is an application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0. Social networking is the practice of expanding your business and/or social contacts by constructing a personal network. Business 2.0 simplifies the way individuals communicate, network, find employment, and search for information.

Virtual computing

A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems.

Supply chain management system

A system where businesses work together to create a product or service for a customer.works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer. software provides tools to help the business manage supplier relationships, develop strategies to ensure quality products or services, create production schedules, procedures for returning defective products, and delivering the product or service to the customers. systems help lower expenses by providing for supplies to be available at just the right time and in the right quantity.

Managing information systems is a challenging role because of the constant changes and threats to computer based information systems. Which of the following can be a major threat to information systems? Choices: Floods Earthquakes Power outages All of the above

ALL (page 8)

A network protocol designed to handle broadband integrated services such as voice and video is

ATM stands for Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via circuit switching.

Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. Joe has a beautiful home on a golf course. He has done nothing to protect his home from poorly hit golf balls. Choices: Acceptance Avoidance Sharing Reduction Transferance

Acceptance (Page 15)

Risk acceptance

Accepting that a risk will occur and doing nothing to avoid or prevent it.

Chapter 8

Accessing Organizational Information-Data Warehouse

List and describe the seven departments commonly found in most organizations

Accounting department - provides quantitative information about the finances of the business including recording, measuring, and describing financial information. Finance - deals with the strategic financial issues associated with increasing the value of the business while observing applicable laws and social responsibilities. Human resources management (HR) - includes the policies, plans, and procedures for the effective management of employees ('human resources'). Sales - the function of selling a good or service and focuses on increasing customer sales, which increases company revenues. Marketing - the process associated with promoting the sale of goods or services. Operations/production management - includes the methods, tasks, and techniques organizations use to produce goods and services. Management information systems (MIS) - the function that plans for, develops, implements, and maintains IT hardware, software, and applications that people use to support the goals of an organization

Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it. Although the availability of information on a wide basis is generally a positive attribute, property rights and the propriety of information sharing may cause and perpetuate conflict.

Advanced networking

Agile Methodology

Agile Methodology—Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. Agile methodology is what it sounds like: fast and efficient, with lower costs and fewer features.

social networking

Allowing people to connect and express themselves, from the comfort of their computers, when otherwise they may have been too shy or introverted to do so, is an example of what?

Information repositories

Also known as knowledge centers, provide helpful info to remote supplier, partners, employers and customer for free or as a revenue generating service

Which of the following is an effective use of predictive analysis?

An insurance company is analyzing medical records to determine malpractice rates.

systems development life cycle (SDLC) consists of seven stages.

Analysis Phase 1. Identify problems, opportunities, and objectives 2. Determining information requirements 3. Analyzing system needs Design Phase 4. Designing the recommended system 5. Developing and documenting software Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system

Explain the three challenges associated with Business 2.0.

As much as Business 2.0 has positively changed the global landscape of business, a few challenges remain in open source software, user-contributed content systems, and collaboration systems. These challenges include individuals forming unrealistic dependencies on technology, vandalism of information on blogs and wikis, and the violation of copyrights and plagiarism.

In a project, which of the following best describes risk management? Assessing and acknowledging unknown factors Assessing staff and evaluating offshoring options Reducing tasks and increasing timelines

Assessing and acknowledging unknown factors (Page 15)

What are associations?

Associations are data that are linked to a specific event, such as how frequently customers purchase jelly when they purchase peanut butter.

Ethernet replaced token rings as a data communications

Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with?

Businesses invest in information systems for a number of reasons. Of those listed, which one is NOT essential enough for a business to make the costly investment in an information system. Choices: Promote competitive advantage Attain customer information Improve decision making Achieve operational excellence Develop new products and services

Attain customer information (page 10)

Identify which description goes with which of Porter's competitive forces. Buying in large quantities results in lower prices for the buyer and lower profits for producers. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry

Bargaining Power of Buyers (page 11)

Many credit card companies offer loyalty programs and reward points that can be used to purchase extra items. Airline points can be a big draw in the credit card industry. In terms of Porter's five competitive forces, this is an example of Choices: Bargaining Power of Buyers / Customers Threats of new Entrants

Bargaining Power of Buyers / Customers (page 11)

Identify which description goes with which of Porter's competitive forces. There are few suppliers, but many buyers and this affects the buying firms' profits because it has to pay more for materials. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry

Bargaining Power of Suppliers (page 11)

action specific verbs

Because feedback is not readily available with written communication, the content must be accurate and contain sufficient detail. Which of the following is most likely to increase the audience understanding of written communication?

Classify the different operational support systems, managerial support systems, and strategic support systems, and explain how managers can use these systems to make decisions and gain competitive advantages.

Being able to sort, calculate, analyze, and slice-and-dice information is critical to an organization's success. Without knowing what is occurring throughout the organization there is no way that managers and executives can make solid decisions to support the business. The different operational, managerial, and strategic support systems include: ■ Operational: A transaction processing system (TPS) is the basic business system that serves the operational level (analysts) in an organization. The most common example of a TPS is an operational accounting system such as a payroll system or an order-entry system. ■ Managerial: A decision support system (DSS) models information to support managers and business professionals during the decision-making process. ■ Strategic: An executive information system (EIS) is a specialized DSS that supports senior-level executives within the organization.

improves decision making, delivers business intelligence

Benefits of data warehousing to businesses

flexibility, consistency, and organization

Benefits of database normalization

Benefits of business mobility (wireless networks).

Benefits: Enhances mobility, Provides immediate data access, Increases location and monitoring capability, Improves work flow, Provides mobile business opportunities, Provides alternative to wiring.

competitors' public pricing information

Besides customer attributes, what factor can be used by an e-business to accurately price goods?

Customer relationship management (CRM) is a strategy that a companies use to handle customer interactions. The business benefits of a CRM system include all except which of the following? Focused marketing effort Better internal communication Better customer experience Automated reporting

Better internal communication (page 12)

Horizontal information flow

Between departments and functional work teams

2.4Ghz

Bluetooth is a wireless protocol that connects nearby devices with peripherals at what spectrum band?

differentiating products, customer lock-in, and barrier to competitors

Business strategy is how a business achieves its goals and outperforms its competitors. Strategic Information Systems (SIS) are used to help companies accomplish business strategies. Some of the initiatives for implementing an SIS include:

technology

Businesses face difficult decisions regarding their hardware needs. Constant changes in ___________________________ can lead to obsolescence.

businesses use databases to store employee, customer, and product data to help them automate processes and get useful information for quicker decision making. Can also lead to business intelligence when combined with market, economics, and other government regulations.

Businesses uses databases for many reasons, so it is important to understand their basic fundamentals such as...

Computer-aided software engineering

CASE is a method used to organize and control software development on big projects. What does CASE stand for?

typically second in command, also known as the vice president of operations. Reports to the CEO or president and makes sure all company operations run smoothly.

CIO (chief information officer)

ABC Nonprofit is seeking to dramatically accelerate growth. The board and executive director are looking for a mission-focused, seasoned, strategic, and process-minded leader with experience leading an executive management team and developing a performance culture among a group of diverse individuals. This person must be a leader who is able to help others at ABC deliver measurable, cost-effective results that make the company's vision a reality. This person will have the skills, sensitivity, and personal confidence to tap into the power that each employee brings to ABC's mission. Which of the following job titles best fits this description? CIO CEO COO CFO

COO (Page 14)

Primary Storage

CPU cache and random access memory (RAM), are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed.

focused marketing efforts, better customer experiences, automated reporting, and better cooperation to respond to customer needs. For a new business, to collect customer information online and at the register and to consolidate and merge the information to better serve customers. Your boss asks you to collect zip codes for every customer who purchases something in your store and then generate a report to show where they all come from so he can market to the low zip code areas.

CRM (customer relationship management

Effectiveness metrics

CRM SCM Call center performance

What strategic role has emerged as critical in recent years in large organizations due to cyber attacks? Knowledge of information technology Chief Database Officer Chief Legal Officer Chief Security Officer

Chief Security Officer (Page 14)

Which of the following is one approach to selecting a strategic project? Allow customers to choose the project. Choose projects based on company goals and return on investment. Let the project manager choose the project. Let IT staff select the project.

Choose projects based on company goals and return on investment. (Page 15)

one approach to selecting a strategic project

Choose projects based on company goals and return on investment. good approach to selecting a strategic project is to categorize projects based on organizational goals.

What are classifications?

Classifications look for patterns that indicate customer or entity behavior in order to target marketing efforts.

Swarm intelligence

Collective behavior of groups of simple agents

This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.

Common good approach

With the help of information technology, video conferencing has become cheaper, quicker, more collaborative, and more efficient. Choices: Globalization Communication Cost Effectiveness More Time Product Development

Communication (page 9)

database integrity

Companies must maintain _______________ by keeping their data safe from unauthorized changes.

systems development life cycle (SDLC)

Companies should use ___________________________ to gain control and monitor large information system projects.

Why are competitive advantages often temporary?

Competitors quickly seek ways to duplicate the product.

The Internet has become a valuable tool for businesses. Which of the following is NOT a business benefit of the Internet?

Conduct personal matters. Although access to the Internet allows employees to save time and potentially improve productivity, using the Internet for personal matters can cause employees to waste time and the business may lose productivity to personal aims. For this reason, many businesses restrict employees from accessing part of or the entire Internet.

What is the purpose of the Domain Name System?

Converts domain names to IP addresses Correct! Every host connected to the Internet has a unique IP address that is difficult to use and remember. Therefore, the Domain Name System (DNS) converts unique IP addresses to domain names, such as Google.com to its IP address (i.e., 216.58.217.206).

Information technology has helped to computerize businesses to streamline processes that increases productivity and profits. Choices: Globalization Communication Cost Effectiveness More Time Product Development

Cost Effectiveness (page 9)

Run-Grow-Transform

Cost leadership to simply exist, focus and differentiate to increase market, innovative project to find a new market

radio frequency identification (RFID)

Countless businesses are deploying___________________________________ technology to help manage information technology assets or with business operations—specifically inventory management and supply chain operations.

Chapter 13

Creating Innovative Organizations

Critical Success Factors (CSFs)

Critical success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies. EX: Create high quality products, reduce product cost, increase customer satisfaction.

Enterprise Businss Systems

Custom built to meet specific needs of an organization; very expensive, work to integrate internal processes with external entitites

The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. These systems entail all aspects of interaction that a company has with its customers, including contacts, clients, contract wins and sales leads and more. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System

Customer Relationship Management (CRM) System (page 12)

Database management systems can be used in businesses and at home to store and manipulate important data ranging from complex customer information to kitchen recipes. Microsoft Access is an example of what kind of DBMS?

DBMS for personal computer systems

This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends. Choices: EIS TPS MIS DSS

DSS (page 8)

The input the system accepts to produce useful information Choices: Hardware Software Data People Network

Data (page 8)

Information systems accept _____ as input and process it into _____ as output. Choices: Information Data

Data Information (page 8)

4) Information Governance - Data Governance

Data Governance Refers to the overall management of the availability, usability, integrity, and security of company data. A company that supports a data governance program has a defined a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, timeliness, and completeness. The policy should clearly define the processes concerning how to store, archive, back up, and secure the data. In addition, the company should create a set of procedures identifying accessibility levels for employees. Then, the firm should deploy controls and procedures that enforce government regulations and compliance with mandates such as Sarbanes-Oxley.

Describe the roles and purposes of data warehouses and data marts in an organization.

Data Warehouse—A logical collection of information gathered from many different operational databases - that supports business analysis activities and decision-making tasks. The primary purpose of a data warehouse is to aggregate information throughout an organization into a single repository for decision-making purposes Data Mart—Contains a subset of data warehouse information.

Which of the following is a major function of a database management system?

Data administration

Which investigative tool is used during the analysis phase of systems development to guide process improvement? A. An entity-relationship diagram B. A brainstorming diagram C. A data flow diagram D. A flow chart

Data flow diagram

Information

Data is input in a computer and then processed into _______________.

What is the difference between data and information as they relate to business functions? A. Data is related to hardware but info is not related B. Data is stored but information is not stored C. Data comes from info D. Data is processed to get information

Data is processed to get information

What is data mining?

Data mining is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.

multiplexer

Data signals and data packets travelling over computer networks from multiple devices are combined together into a single signal, or aggregated by this device

circuit switching packet switching

Data transmitted in a virtual circuit is known as ______________________________, like a voice communication, whereas ______________________________ is used for data.

Data

Data: raw facts that describe the characteristics of an event or object. EX: order date, amount sold, customer number, quantity ordered.

Management information systems will require expertise in what type of distributed systems to connect users to information? Virtual private networks (VPN) Desktop support Database

Database (Page 14)

A database administrator is responsible for which functions? Chose all that apply: Database design Security and access Testing

Database design Security and access Testing (Page 14)

Explain the importance of decision making for managers at each of the three primary organizational levels along with the associated decision characteristics.

Decision-making skills are essential for all business professionals, at every company level, who make decisions that run the business. At the operational level, employees develop, control, and maintain core business activities required to run the day-to-day operations. Operational decisions are considered structured decisions, which arise in situations where established processes offer potential solutions. Structured decisions are made frequently and are almost repetitive in nature; they affect short-term business strategies. At the managerial level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change. Managerial decisions cover short- and medium-range plans, schedules, and budgets along with policies, procedures, and business objectives for the firm. These types of decisions are considered semistructured decisions; they occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision. At the strategic level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan. They also monitor the strategic performance of the organization and its overall direction in the political, economic, and competitive business environment. Strategic decisions are highly unstructured decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice. They are infrequent, extremely important, and typically related to long-term business strategy.

You are a database administrator defining the major functions of a DBMS. These include a data dictionary, data management, data retrieval, and data administration. What is the purpose of a DBMS's data dictionary function?

Defining and managing the data types

It is a single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations

Definition of a private industrial network

A method or algorithm that uses statistics and data mining to forecast models.

Describe predictive analytics.

The benefit of applying critical path analysis is that it defines the longest paths for each task, as well as calculates the earliest and latest dates each task. This process identifies tasks that are critical and those that cannot be delayed; it also identifies the tasks that can incur delays without adversely affecting the project.

Describe the benefits of applying critical path method (CPM) to complex projects.

Data mining is used to analyze business databases, while big data analyzes big data sets.

Describe the difference between data mining and big data?

a social media communication strategy

Despite security risks, businesses must implement what?

Which is not a function of a database administrator? Ensure database performance. Develop firewall strategy to protect data. Develop database strategy.

Develop firewall strategy to protect data. (Page 14)

Chapter 17

Developing Software to Streamline Operations

What business strategy is a large computer company using if it offers products with several appearances and screen interfaces? A. Cost Leadership B. Differentiation C. Loss Leadership D. Focus

Differentiation

they can be purchased and downloaded instantly, they do not have a physical presence to acquire

Digital goods provide several benefits for e-commerce. What is a benefit achieved from digital goods?

Compare the disruptive and sustaining technologies, and explain how the internet and WWW caused business disruption.

Disruptive Technology: A new way of doing things that initially does not meet the needs of existing customers. Disruptive technologies tend to open up new markets and destroy old ones. Sustaining Technology: Produces a new product customers are eager to buy, such as a faster car or larger hard drive. ■ How the internet caused business disruption: The internet caused many business distractions when it hit big. Many people didn't think that the internet was going to be so widely used and that it would be such a big part of business. Now people are able to easily go online and order products without ever having to leave their house. Now companies are able to increase their profit margins while also cutting costs by using the internet.

Thousands of fields use information technology to boost effectiveness. The need for health care is especially important to everyone, and technology has helped the medical field meet the demand. Of the items listed below, select the primary growing benefit of information technology to the health care industry. Choices: E-learning has become very popular in the medical field to help support the health care demand and supply the field with the necessary workers more quickly through the use of information technology. Information technology helps to ensure the safety and privacy of a patient's records and then use that information to treat them properly. Information technology helps reduce human error in medicine and gives health care workers the tools they need to diagnose and treat patients with new devices and methods. Communication plays a huge role in healthcare and information technology is able to provide the communication tools to reach patients and staff more easily through the Internet.

E-learning has become very popular in the medical field to help support the health care demand and supply the field with the necessary workers more quickly through the use of information technology. (page 9)

This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends. Choices: EIS TPS MIS DSS

EIS (page 8)

standardized business procedures that allow for more consistency within the business and remove redundancy. Typically uses one database to store all information needed by various business units and increases operational efficiency. Implementing this system and automate tasks so employees could do their jobs more efficiently.

ERP (enterprise resource planning)

It is critical to build a data integrity check algorithm to ensure the quality of data in a database before the Hint, displayed below _________ scheduled activities. Therefore, it is important to apply effective _________

ETL, Partition

Chapter 14

Ebusiness

What is the most recent federal bill that addresses computer monitoring of employees?

Electronic Communications Privacy Act of 1986??

SMTP (simple mail transfer protocol) the popular mail protocols include IMAP and POP3

Electronic communications has predominantly become the primary form of communications in first world countries. What protocol is used to mange and monitor the massive amount of emails that we receive every day?

PPP stands for Point-to-Point protocol.

Encryption is used to ensure the privacy of the content being communicated.

Which risk is reduced when the investigation step is well executed during the planning and analysis phases of systems development? A. Scope creep B. System obsolescence C. End user training failure D. Continual maintenance

End user training failure

The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. These systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System

Enterprise Resource Planning (ERP) System (page 12)

Assume you are building out wired technologies in an old building. If you are replacing token rings, what technology are you most likely to be replacing it with?

Ethernet replaced token rings as a data communications standard in LAN applications.

Chapter 29 in COS, 27 in ebook

Ethics

A strategic team is using the aggregate results from the decision support system to support long-term decisions that require judgement. Which system is being used by the team? A. Virtual reality system B. Expert system C. Executive information system D. Transaction processing system

Executive information system

A local college has just upgraded to a new, more user-friendly learning management system (LMS). An LMS is a software platform used for the administration and delivery of electronic educational courses and programs. Moving the entire college to a new system requires training for all faculty, students, and support employees, and it requires upgrades to the database, computer server, and network system. Think about this scenario and what you have learned about information technology and information systems. Identify which components listed above in the local college upgrade are information technology and which are information systems components?

Explanation: The information technology components in the above scenario are the LMS, database for student, instructor, and course information, computer server, and network system. The information system consists of the faculty, students, support employees, training, procedures, processes, and all of the information technology items previously listed. (page 9)

When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Community Choices: Internal External

External (Page 15)

When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Customers Choices: Internal External

External (Page 15)

When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Government Choices: Internal External

External (Page 15)

Which solution would allow a company to host a computing service on an internal network and restrict it to employees within the organization? A. Exchange server B. Extranet C. Private Cloud D. Virtual private network

Extranet

If a manufacturing plant uses their systems to communicate with suppliers and vendors to manage their inventories, what application is used?

Extranet. ! Internet, intranet, and extranet are excellent means of communications for businesses, customers, and suppliers, but typically the extranet is used to communicate with suppliers and vendors to manage their inventories.

This approach values individual moral rationality, otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you," asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated.

Fairness approach

Consider how your doctor's office creates, organizes, and stores your medical information. They might be stored digitally or in paper form. Medical records kept in a doctor's file cabinet file is an example of the old traditional file environment, but is just as efficient as those stored in a database management system, so there is no need to convert to a DBMS.

False

True or false. Two disadvantages of information technology management are time and cost.

False (Page 16)

True or false. The amount of organizational oversight is not dependent on the centralized or decentralized nature of the global business type.

False (Page 17)

True or False. There is considerable organizational resistance to implementing new information systems because they change many important organizational dimensions, such as culture, structure, politics, and information technology.

False (page 10)

True or false. If a student decides to switch classes because she wants a different teacher, this would be considered a transaction to the college's information system but would not involve any interaction with its accounting or human resources systems.

False (page 10)

True or false. There are four major business functions: sales and marketing; production and operations; finance and accounting; and technology and systems.

False (page 10)

True or false. Synergy is the cooperation between several businesses to produce a better product or service than would be possible if each business worked dependently.

False (page 11)

True or false. The term "business ecosystem" describes the relationship between the various departments within a firm.

False (page 11)

True or false. One benefit of a supply chain management system is for U.S. businesses to lower costs by relocating their operations to cheaper, overseas locations.

False (page 12)

True or false. Information technology and the systems they serve impact every facet of our lives. However, to use information technology efficiently and benefit from all its features, you must have a degree in the subject area and work in the IT field.

False (page 9)

True or false. The great advancement in information technology is due to the development in information systems.

False (page 9)

True or False. You are installing a new network for a small business. Your client makes the statement, "Businesses, regardless of size, need hubs, switches, and routers to access the world wide web." Is this true or false?

False Correct! Large business might require significant network equipment in order to optimize network performance, but small businesses can manage with only a router.

True or False. The telecommunications innovation is nothing new; it started 30 years ago with the founder of the telephone, Mr. Samuel Morse.

False Correct! Mr. Samuel Morse and others invented the telegraph in the 1820s. Mr. Alexander Graham Bell was the inventor of the telephone more than 130 years ago, which evolved from the telegraph.

True or False. The 802.3 standard, created in 1983 by the Institute of Electrical and Electronics Engineers (IEEE), is also known as the Internet standard.

False Correct! The TCP/IP, which defines how data are relayed between networks, is the Internet standard. 802.3 is an Ethernet standard and defines local area network (LAN) connections.

True or false. The amount of organizational oversight is not dependent on the centralized or decentralized nature of the global business type.

False, The amount of organizational oversight is dependent on the centralized or decentralized nature of the global business type.

True or false. There is considerable organizational resistance to implementing new information systems because they change many important organizational dimensions, such as culture, structure, politics, and information technology.

False-Although information technology is a subset of information systems, it is not an organizational dimension that would cause organizational resistance to information systems.

True or False. For referential integrity to be enforced in a relational database, a primary key does not need a corresponding entry of equal value in the referenced table.

False. A row value or primary key in a table only exists if an item with an equal value (foreign key) exists in a referenced table.

Which of the following is a governing agency that determines what is and is not acceptable on the Internet?

Federal Communications Commission (FCC)The governing bodies that define standards and help with the continuity of communications on the Internet include: IAB, ICANN, W3C, IETF, and IEEE, but FCC is the only governing agency that determines what is and is not acceptable on the Internet.

Systems Analysis

Figures out how hardware, software, network, people, data, and information work together

FTP

File Transfer Protocol is an insecure method used to transfer files from one computer to another.

The European Union Data Protection Directive (1998) restricts the transfer of personal information from participating nations into other nations that do not maintain the same information privacy standards. Which industry would be the most affected by this law? Automotive manufacturing Financial services Mining

Financial services (Page 17)

Describe the five characteristics of competitive priorities.

Five key competitive priorities which a company can add value to its OM decisions including: 1) Cost: There can be only one lowest-cost producer, and that firm usually establishes the selling price in the market 2) Quality: Is divided into two categories product and process quality - Six Sigma Quality - Malcolm Balridge National Quality Awards - ISO 900, ISO 14000 - CMMI 3) Delivery: a firms ability to provide consistent and fast delivery 4) Flexibility: a firms ability to offer a wide variety of products 5) Service: high-quality customer service adds tremendous value to an ordinary product

Process design

Flow of application logic is determined; can't be overly complicated

Data cleansing and normalization

For the DBMS of a financial institution to function properly, ____________ should be performed after a data quality audit on tables that are merged or imported.

List and describe the four 21st century trends that businesses are focusing on and rank them in order of business importance.

Four technology areas where organizations are focusing: * IT infrastructures * Security * Ebusiness * Integrations * IT infrastructure - the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals. * Security - Physical security integration and best security practices * Ebusiness Mobile commerce - the ability to purchase goods and services through a wireless Internet-enabled device. Telematics - blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations. Electronic tagging - a technique for identifying and tracking assets and individuals. Radio frequency identification (RFID) - chips or smart labels that can store unique identifiers and relay this information to electronic readers. Integration - A new series of business success factors and challenges are emerging. *Organization agility *Focus on core competencies and processes *Redefinition of the value chain *Instantaneous business response *Ability to scale resources and infrastructure across geographic boundaries

mobile phone apps and games, free product samples and trial versions offered to users, product quality and available features can be tightly controlled

Freemium is not a new concept in doing business. What is true of freemium?

Production and operations

Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance.Warehouse operations, inventory management, quality control, materials requirements planning; resource planning; in-house logistics and materials management; product lifecycle management

An internet service provider offers subscribers e-mail accounts and would like to develop software to identify spam. Which tup of artificail intelligence technology should be used? A. Fuzzy Logic B. Virtual Reality C. intelligent agents D. Genetic algorithms

Fuzzy Logic

Which investigative activity must occur during the analysis phase of this project? A. Designing the technical architecture B. Setting the projet scope C. Defining the system to be developed D. Gathering the business requirements

Gathering the business requirements

_____ is/are making technology and information more difficult to manage because the barriers of language and geography have been broken down. Choices: Information Systems Information Technology Management Cultural Issues Globalization

Globalization (Page 16)

IT has brought the world closer together and made the world's economy a single interdependent system. Choices: Globalization Communication Cost Effectiveness More Time Product Development

Globalization (page 9)

Describe governance and compliance and the associated frameworks an organization can implement.

Governance is a system for management and control. Compliance is agreeing, accepting and yielding. See Pic for Frameworks

Graphics tools

Graphics, video, animations, and interactive multimedia are popular elements in web pages. Popular tools used to create these elements include Adobe's Photoshop, Flash, and Premier products.

Two types of business strategies include _____ Choices Growth and Product Differentiation Growth and Synergy

Growth and Product Differentiation (page 11)

Growth

Growth can include adding new products or new enhancements to existing products. Growth can also include acquisition whereby one business purchases another.

The bookstore customers use this method to visit the website to order books and check on their order status.

HTTPS

The IS function is _____ in structure and its success depends on its cooperation and relationship with the other functions in an organization. Choices: Horizontal Diagonal Vertical

Horizontal (page 8)

Horizontal and vertical partitioning are the two most common processes in partitioning databases. What is horizontal partitioning?

Horizontal partitioning restricts the rows to replicate in a back up process.

Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.

Hot sites

Via the Internet, private networks, and the public switched telephone network

How are WANs connected

manual or automated

How are methods of data capture categorized?

by employees who travel a lot for business

How are portable decision support systems utilized?

create direct channel for doing business, advertise through product or brand marketing using integrated applications, and develop salable mobile applications

How can mobile e-commerce help businesses actively market to their customers?

people can use this medium to influence reserved bystanders

How do social media platforms play an increasing role in shaping events?

to find flaws, fix processes, and boost efficiency of its production

How does FedEx use big data?

enabling collaboration and interaction among users

How does Web 2.0 sites create a virtual online community?

allow for distribution of information with external business entities, allow mobile and external resources to access information which allows for better communication with business partners and a good use of information technology

How does the use of internet-based technologies help businesses?

7- physical, data, network, transport, session, presentation, application

How many layers are in the standard OSI model?

4- user basic requirements, development of prototype, using prototype, and revising prototype

How many steps are in the prototyping software development method?

There are six types of CASE tools and they include business, graphic modeling, development, verification and validation, metrics, project management, and configuration.

How many types of CASE tools are there?

is a system used to convert plain-text document into one optimized for viewing as a Web page, integrating colors, graphics, fonts, and links.

Hyper Text Markup Language (HTML)

In a client-server network linking several individual computers or a LAN network together, each of the client computers connected to the network server is provided with which of the following so that it can be found by others on the network?

IP address Correct! IP stands for Internet Protocol. An IP address is a unique address assigned to a computer or device connected to the Internet.

Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Online reservation booking

IS (page 9)

Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Predicting future sales patterns

IS (page 9)

Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Track customer activities

IS (page 9)

Companies and individuals who are not able to connect directly to the Internet through a local area network (LAN) server could access the Internet by subscribing or connecting to which of the following?

ISP Correct! ISP stands for Internet Service Provider. It is a paid service, whereby individuals and organizations can subscribe to the provider to have access to the Internet services.

Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Computer peripherals

IT (page 9)

Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Telephone and radio equipment

IT (page 9)

cost effectiveness

IT is important because it helps businesses streamline processes that increase productivity and profits. What IT benefit does this exemplify?

product development

IT is important because it helps ensure new, quality products reach the market faster and to more customers and suppliers. This is an example which IT benefit?

which requires each individual in an organization to be appropriately identified and authenticated at specific entry points to an organization and its information systems, and which help with the enforcement of access control, with the appropriate authorizations pre-selected for them.

Identity management

domain name URL IP address HTTP

If you want to visit the Barnes & Noble website, you will type the ___________________of barnesandnoble.com in the ___________________of your web browser. The DNS will convert barnesandnoble.com into an__________________ , and you will use the ______________protocol to communicate with the world wide

Supply Chain management

Improve process of obtaining sourece materials, manufacturing, delivery, manages entire life cycle of a product

IP address -

In a client-server network linking several individual computers or a LAN network together, each of the client computers connected to the network server is provided with which of the following so that it can be found by others on the network?

input

In information systems, what is the act of capturing data for processing called?

methodical and process oriented

In systems modeling and design, the structured systems model is _________________

Carrie works for a software company and is in charge of communicating with the clients about their business needs pertaining to their software. Carrie helps her clients identify and describe their business needs in such a way that the software development team can take that information and turn it into a useful piece of the software system. Carrie plays an important role in the _____ function of her company. Choices: Information Systems Management Information Management Information Technology Management

Information Management (Page 16)

Chapter 28 in COS, 26 in ebook

Information Security

_____have shown tremendous growth in the last few decades, leading to more sophisticated _____ Choices: Information Technologies Information Systems

Information Technologies Information Systems (page 9)

Keith works at a software company and is in charge of the computer server room. He is also in charge of keeping track of which employees have certain computers and monitors and other various technology associated with their roles. Keith plays a key role in the _____ function of his company. Choices: Information Systems Management Information Management Information Technology Management

Information Technology Management (Page 16)

_____ is concerned with the management of resources that facilitates access to information. Choices: Information Systems Management Information Management Information Technology Management

Information Technology Management (Page 16)

What is the difference between data and information in information systems? A. Information is processed data B. Data contains numbers where information contains text C. Information and data are synonymous D. Data is written reports where info is the raw numbers

Information is processed data

Why has information technology become critical to the success of business enterprise in the last 20 years? Information technology has automated business operations and changed the economics of information. Information technology increases management layers for better decision making. Information technology creates more data and information for decision making.

Information technology has automated business operations and changed the economics of information. (Page 15)

online banking

Information technology is used everywhere; where you work, where you live, and where you play. Keeping track of financial information and making transfers at anytime, from home, without waiting in line is an example of what?

Information

Information: data converted into meaningful and useful context. EX: best-selling product, best customer, worst selling product, and worst customer.

components include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.

Input

Assume you are an IT Project Manager dealing with competing priorities, stakeholders and budgets. Many times, one or more stakeholders wants to outsource a specific element of a project to save time, money or both. From the project management perspective, how would you explain the difference between insourcing and outsourcing to non-technical team members? Insourcing is internal development, while outsourcing involves contracting out development. Insourcing is contracting development, while outsourcing is doing the project in another country. Insourcing is the act of launching a project, while outsourcing is the act of ending a project. Insourcing is hiring employees, and outsourcing is laying off employees.

Insourcing is internal development, while outsourcing involves contracting out development. (Page 15)

Chapter 16

Integrating Wireless Technology in Business

Identify which description goes with which of Porter's competitive forces. When there are many competitors, firms have to compete aggressively for market shares, which can result in lower profits. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry

Intensity of Competitive Rivalry (page 11)

The website for healthcare corporations, such as Anthem Blue Cross Blue Shield, contains tons of medical information and ways to stay healthy.

Interact with customers Correct! Corporations often utilized their websites as a means to communicate important information to their customers.

When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Managers Choices: Internal External

Internal (Page 15)

When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Owners Choices: Internal External

Internal (Page 15)

environment

Internal and external elements that effect various parts of an organization, for instance the government, competitors, customers, and suppliers, are examples of what organizational feature?

Small office or home office routers enable computers to access the _______. Connection to the web is enabled by service providers called _______> .

Interntet ISP

Systems Thinking

Is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.

Business process reengineering (BPR)

Is the analysis and redesign of workflow within and between enterprises. The goal is to make all business processes best-in-class.

address specific issues or concerns that a security policy is needed, or even controversial areas where the company takes a given position on an issue. Examples include policies for:

Issue specific policies

What can happen when the testing phase in system development projects is skipped? A. It can lead to a lack of business requirements B. It can lead to unfound errors C. It can lead to missing user training documentation D. It can lead to insufficient design alternatives

It can lead to unfound errors

reduce

It is a good practice to _________________ data that is backed up on a regular basis.

What is a drawback of outsourcing system development projects? A. It increases operation expenses for head count B. It leads to a decrease in project quality C. It leads to a loss of confidentiality D. It increaes the time needed to market for products

It leads to a loss of confidentiality

In database modeling and design, what is meant by database normalization?

It means removing redundancy in conceptual model.

Why would a vendor choose to utilize electronic data interchange (EDI)?

It permits secure transmission of business information

What is true of a relational database? A. It provides relational integrity for the database B. It allows for the creation of data marts C. It compiles the metadata about the data elements in the data model D. It creates an indirect backup of data in the database

It provides relational integrity for the database

Why would a company consider using a prototype when converting an existing order entry system to a web-based system? A. It detects errors after development B. It supports change through iteration C. It ensures managerial participation D. It creates a secure system

It supporst change through iteration

What would be the impact of a hospital using a medication system that automatically distributes prescriptions in the hospital pharmacy?

It would decrease errors in medicaitons

Internet Corporation for Assigned Names

Keeps track of internet domains

Key Performance Indicators (KPIs)

Key performance indicators are the quantifiable metrics a company uses to evaluate progress toward critical success factors. KPIs are far more specific than CSFs. EX: Turnover rate of employees and percentage of help-desk calls answered in the first minute are examples of a key performance indicators.

The technology system that a business needs depends on the needs of the business. Put the correct system with the correct description. This system creates the process of sharing knowledge among people for the benefit of the business. Choices: Knowledge Management System (KM) Supply Chain Management (SCM) System Customer Relationship Management (CRM) System Enterprise Resource Planning (ERP) System

Knowledge Management System (KM) (page 12)

Small networks are usually _____ networks and are managed physically.

LAN

Business managers often review the financial costs of a decision as a normal part of the planning and execution process when determining what to outsource in information technology. However, less frequently identified are the cultural costs or benefits related to the offshore outsourcing strategy. Which of the following are elements of the cultural cost? Choose all that apply: Language barriers Cultural incompatibility Working remotely Perceived lack of talent

Language barriers Cultural incompatibility Perceived lack of talent (Page 17)

online learning

Learning and research with a computer and the internet from anywhere, anytime is an example of what?

is the legal state of being responsible. An example would be the CEO and CFO who have certified the accuracy and validity of financial documentation and who would be legally penalized should errors be found.

Liability

LDAP

Lightweight Directory Access Protocol. Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them. Many applications use the LDAP standard. The most used example is Microsoft Outlook's global address list and Microsoft Active Directory.

Open standards is a hot new career field as it relates to networking and/or servers. What technologies might you be an expert in that would fit the criteria of open standards with a web development and/or server emphasis? Choose all that apply: Linux OS Java Windows 10

Linux OS Java (Page 14)

In contrast with a ________, a _________ uses a flexible model in which data are distributed among several machines, often in a cloud-computing format.

Machine-based relational database, web-based database

malicious software applications

Malware One high-profile example of a malware threat is SQL Injection, which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.

Materials Requirement Planning

Management knew what was needed when

Managerial

Managerial Decision Making— Managers evaluate company operations to identify, adapt to, and leverage change

Describe the correlation between operations management and information technology.

Managers use IT to heavily influence OM decisions including : What: What resources will be needed and in what amounts? When: When should the work be scheduled? Where: Where will the work be performed? How: How will the work be done? Who: Who will perform the work?

Chapter 19

Managing Organizational Projects

Web design tools

Many graphical and traditional text-based HTML editors exist and range from the unsophisticated text editors to feature rich graphical WYSIWYG (What You See Is What You Get) interfaces. Modern popular examples include Adobe's Dreamweaver and Microsoft's Visual Studio.

Information systems are used in many functional business areas. Select the most common. (Select all that apply.) Choices: Marketing Maintenance Human resources Accounting

Marketing Human resources Accounting (page 10)

Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization Choices: Production and Operations Human Resources Marketing and Sales Accounting and Finance

Marketing and Sales (page 10)

Which of the following describes a virtual office? Choices: Mary works for Happy Charities. She calls and emails potential donors each day. She is able to work from home because her entire job is based on using Web and phone services. Jane works for Living Well Vitamins. Her store is located in Miami. She has a 30 minute commute each day to get to her job.

Mary works for Happy Charities. She calls and emails potential donors each day. She is able to work from home because her entire job is based on using Web and phone services. (page 11)

Which of the following is not a responsibility of a CIO? Strategic alignment of IT with business objectives Knowledge of information technology Merger and acquisition strategy Ensuring information systems availability, reliability, and effectiveness

Merger and acquisition strategy (Page 14)

With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places. This availability of information allows benefits, such as localization and personalization, but direct and specific invasions of privacy require faster reputation management and for information controls in more places.

Mobile Information Availability

coined by the co-founder of Intel, described that components in integrated circuits or microchips will double every two years.

Moore's Law

says that computing power and storage capacity will continue to increase or double approximately every two years.

Moores Law

Information technology helps eliminate repetitive tasks and increases accuracy, allowing employees to concentrate on more high-level functions. Choices: Globalization Communication Cost Effectiveness More Time Product Development

More Time (page 9)

manufacturing and production

Most large corporations have several information systems to support their functional business areas. The system that processes raw metal into car frame is...

Upward information flow

Moves from the actual information up to upper management. Ex, selling a product, flows to different departments

Change brings about fear and fear causes employees to resist (and even undermine) implementation.

Name one key reason why a large majority of system implementations result in failure.

Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Technology upgrades

Neg (page 9)

_____ is and will continue to be a highly paid and a high demand IT career. Choices: Project Coordinator Helpdesk Specialist Network Specialist

Network Specialist (Page 14)

WAN - wide area network

Network interconnected via the internet, private networks or public switched telephone networks

Which of the following statements are true regarding Voice over Internet Protocol (VoIP)? (Select all that apply.)

No 1.It uses the standard public switched telephone network (PSTN) connection. *2.It is based on a high-speed Internet connection to *deliver voice communications. 3.It results in lower phone charges for businesses because long-distance calls are toll free. Check My Answer Correct! To use the VoIP effectively, a high-speed Internet connection must be in place. VoIP uses the Internet connection. It does not require a landline to make phone calls; therefore, all long-distance calls are toll-free, resulting in lower operating costs.

One goal of a database administrator is to have a database that has the same entities and values in one or more tables. The database should go through what process to optimize?

Normalization

__________ is a process or practice to eliminate data redundancy, and ___________ is the process of establishing relationships between tables using keys.

Normalization, Referential integrity

communication style

North americans are usually very straightforward and distrust evasive behavior. This characteristic is an example of a cultural difference in what?

lengthy ETL load phase

OLAP databases are multidimensional, that is, data sets are referred to as cubic. What is a disadvantage of a multidimensional database?

associate with other companies, without being physically tied to them

One network-based strategy is that of virtual companies that can do what?

Rachel needs to deposit a check, but the bank is closed. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping

Online Banking (page 9)

Sally wants to take classes, but has a disability that does not allow her to leave the house. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping

Online learning (page 9)

is software whose source-code is freely available to developers and users. .............. is developed not by single users or companies, but by communities of connected users and groups.

Open Source Software

Operational

Operational Decision Making— Managers develop, control, and maintain core business activities required to run the day-to-day operations

Chris is explaining to management some ways in which an operational database can be used to improve performance and business decision making. What is a common business use of an operational database?

Operational databases can be used to track real time inventory.

Chapter 28 in ebook

Operations Management **EXTRA CHAPTER**

Explain the operations management's role in business.

Operations management is the systems or processes that convert or transform resources (including human resources) into goods and services.

A company wants to find a technique that will provide the best value for a target variable. Which analysis should the company select? A. Sensitivity B. Optimization C. What-if D. Goal seeking

Optimization

retrieve

Organizations can help to maintain data integrity by implementing data governance policies. Only employees with appropriate access can __________________ data from the server

Organizations can use the Internet as a communication tool. For instance, organizations can communicate Hint, displayed below ______ in real time, with their clients using online chat or instant messaging applications.

Organizations can use the Internet as a communication tool. For instance, organizations can communicate Hint, displayed below synchronously in real time, with their clients using online chat or instant messaging applications. Synchronously refers to happening at the same time.

Identify global system development issues organizations should understand before building a global system

Organizations should be sure to understand the global standardization of data definitions. Difference in language, culture, and technology platforms can make the global data standardization quite difficult. They must also support a diverse base of customers, users, products, languages, currencies, laws, and so on. Developing efficient, effective, and responsive information systems for multiple countries, differing cultures, and global ebusinesses is an enormous challenge for any organization.

Network Service Provider

Owns Network access points

US Department of Defense

PERT - Program Evaluation and Review Technique, was developed by:

What is a required process in implementing and maintaining a data warehouse?

Partitioning

What is partitioning?

Partitioning means dividing the database into more manageable parts.

Risk sharing

Partnering with groups or individuals who have more experience and who will accept or absorb some or all of the risk involved.

Information technology leaders must take into consideration many factors when determine what, if anything, to outsource or offshore in their technology process or services. What are some of the factors to consider when deciding if a product, service, or element of technology should be outsourced? Choose all that apply: Working remotely Perceived lack of talent Language barriers Cultural incompatibility

Perceived lack of talent Language barriers Cultural incompatibility (Page 17)

When considering data mining and its benefits to business, what is required for an enterprise today to be competitive and gain business intelligence from day-to-day operations?

Perform analytics on enterprise data stored in data warehouses.

Describe the different wireless networking categories.

Personal Area Networks. Personal Area Networks (PAN)—Provides communication over a short distance that is intended for use with devices that are owned and operated by a single user. EX: Bluetooth Wireless LAN (WLAN)—A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet. EX: WIFI Wireless MAN (WMAN)—A metropolitan area network that uses radio signals to transmit and receive data EX: WiMax Wireless WAN (WWAN)——Cellular Communication System A wide area network that uses radio signals to transmit and receive data EX: Smartphone

Which conversion implementation should a company use if it plans to discontinue using the legacy payroll system on Friday and begin using a new payroll system on Monday? A Phased B. Pilot C. Parallel D. Plunge

Plunge

new market entrants, substitute products, customers, suppliers, and competitive rivalry

Porter's 5 competitive forces include

new market entrants, substitute products, customers, suppliers, and competitive rivalry

Porters 5 competitive forces include

Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Competitive advantage

Pos (page 9)

Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Opportunities for the disabled

Pos (page 9)

A computer's main memory is directly accessible to the CPU and consists of random access memory (RAM), cache memory, and read-only memory (ROM). What is it called? A. Secondary storage B. Output device C. Primary storage D. Input Device

Primary Storage

Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information.

Privacy issues

Warehouse operations, inventory management, quality control, materials requirements planning; resource planning; in-house logistics and materials management; product lifecycle management Choices: Production and Operations Accounting and Finance Human Resources

Production and Operations (page 10)

(aka strategic level) frameworks are documents that establish the security program, define specific or general risks that it will be responsible for handling, and specify its purpose, extent, objectives, responsibilities (including the command structure within the security department), and enforcement.

Program/Charter level policy

A company has recently acquired a former distribution competitor in another country. The new subsidiar uses obsolete CRM software. To streamline integration with the new subsidiary, the CEO and CIO have decided to replace the outdated software with the system the company currently uses. What is a political challenge to implementing this decision?

Prohibitions gainst the transfer of certain technologies across national boundaries

Issues created by the association of rights of property ownership to tangible and intangible goods and information.

Property issues

politics

Pursuing individual interests or agendas in an organization without regard for company goals is an example of what organizational feature?

Wireless Network Business Applications

Radio-Frequency Identification (RFID)—Uses electronic tags and labels to identify objects wirelessly over short distances. EX: Retain stores utilize RFID to track and manage inventory. Global Positioning System (GPS)—A satellite-based navigation system providing extremely accurate position, time, and speed information EX: Automatic Vehicle Location Geographic Information System (GIS)—Consists of hardware, software, and data that provide location information for display on a multidimensional map EX: Finding what is nearby - restaurants, gas stations, etc.

Additional Methodologies

Rapid Application Development (RAD) Methodology—Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process Extreme Programming (XP) Methodology—Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete Rational Unified Process (RUP) Methodology—Provides a framework for breaking down the development of software into four gates Scrum Methodology—Uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal

Which of the following terms represents a set of data, typically aligned as a row in a table?

Record

Human Resource

Recruiting, training, and maintaining employees and their records. Recruitment; training; employee records; benefits; payroll and employees' records; benefits administration; employee relationship management

Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. The IT department keeps the server room cool for the equipment. Choices: Acceptance Avoidance Sharing Reduction Transferance

Reduction (Page 15)

Network of businesses that are connected to provide products and services more efficiently to customers, accommodate rapid growth, and meet requirements of retailers and distributors. Lower costs, improve collaboration, reduce cycle times, respond to conflict, forecast demand, and manage product flow. Diane's Designer clothing wants to be the price leader in the industry by cutting out the middleman, renting warehouse space, producing easier clothing designs, and bringing products to market in less than 3 weeks.

SCM (supply chain management)

Which of the following companies has created a network-based strategy with other businesses? Choices: Jamie's Jewels, Inc., is an upscale jewelry store. Jamie and her husband search for rare gemstones and then design and create original jewelry pieces. Due to their artistic abilities in jewelry design, Jamie's Jewels, Inc., has been recognized worldwide. Their clients always give them five star reviews on the Jamie's Jewels website. Furry Grooming is a mobile dog grooming business. The business goes to the client's home to groom their pets. For an extra charge, the business is happy to exercise the dog before grooming. The business has been so successful that the owner is considering buying another van to grow the business. Savvy Smartphones is a business that sells smartphones and smartphone accessories. The business works with various cell phone carriers to offer a few products from each carrier. The result for consumers is that they can go to one store and learn about the options available from multiple companies, including pricing and available smartphones.

Savvy Smartphones is a business that sells smartphones and smartphone accessories. The business works with various cell phone carriers to offer a few products from each carrier. The result for consumers is that they can go to one store and learn about the options available from multiple companies, including pricing and available smartphones. (page 11)

SFTP

Secure File Transfer Protocol. Much like HTTPS, SFTP uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer.

Information systems executives must make difficult hardware decisions regarding _____ issues that pose possible outside threats to the system. Choices: Security Capacity Performance

Security (page 8)

Explain the many different global information issues an organization might encounter as it conducts business abroad

Security is a very important issue when organizations begin to conduct business abroad. They must have appropriate levels of authentication, access control, and encryption in place to ensure (1) that only authorized individuals can gain access to the network, (2) that they have access to only those applications for which they are entitles, and (3) that information cannot be understood or altered while in transit.

Business advantages of a relational database

See Pic

Describe characteristics of Agile MIS infrastructure

See Pic

Explain why understanding trends and technologies can help an organization prepare for the future.

See Pic

Four global IT drivers that should be included in all IT stategies

See Pic

Identify the technologies that will have the greatest impact on future business.

See Pic

Identify the trends that will have the greatest impact on future business.

See Pic

Peer to peer networks

See Pic

Six ebusiness tools for connecting and communicating

See Pic

Wired

See Pic

Wireless

See Pic

IOS (International organization for standardization), ARPANET (creator of the original internet in 1967), IETF (internet engineering task force)

Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. What are the 3 governing bodies that recommend and decide communications standards?

Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. The Lakeview Community Festival has included vendors to participate in this new community event. Each vendor will contribute money to participate in the festival. Choices: Acceptance Avoidance Sharing Reduction Transferance

Sharing (Page 15)

Risk transference:

Shifting risk to another party. For example, in the case a risk cannot be avoided, shared, or reduced to an acceptable non-damaging level, insurance can be purchased to provide restorative reimbursement for damaged equipment or services and, potentially, lost revenue.

SMTP

Simple Mail Transfer Protocol. One of several popular email protocols in use today (others include IMAP and POP3).

client-server. virtual

Small businesses with computer server needs should design their networks as ____________________ Large enterprises can manage moves and changes more productively with __________________________ network capability.

While both networks can be sniffed, because wireless network traffic is airborne, it can be more readily intercepted.

Sniffing can occur in any type of network. Why is it easier to sniff a wireless network than a wired, landline network?

normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.

Social Engineering

social e-commerce allows customers to shop and buy products online.

Social e-commerce has become an important internet tool for businesses to connect with their customers. Which of the following is not a benefit for companies to use social e-commerce as a business tool?

real time

Social media has enhanced customer relationship management by enabling companies to best educate customers about new and existing products and services in ____________________.

Which factor does not influence the interaction between a business enterprise and its information system? Organization Processes Social networks Culture

Social networks (Page 15)

The programs comprised of pre-coded instructions written in a programming language which the end user typically uses to interact directly with the IS. Choices: Hardware Software Data People Network

Software (page 8)

What are two of the six major components of a computer-based information system? Choices: Telecommunication and hardware Software and data Data and external influences Software and telecommunications

Software and data (page 8)

Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a Web browser. Examples include Salesforce.com's CRM (Customer Relationship Management) application or Google Apps.

Software as a service (SAAS

Define the three common business forms

Sole Proprietorships - one person owning and operating a business (Advantages: ease of start/ending business, own boss, less regulation / Disadvantages: unlimited liability, limited financial resources). Partnerships - legal business with two or more parties (Advantages: financial resources, shared risks, no special taxes / Disadvantages: unlimited liability, profits shared, disagreements). Corporations - legal entity with authority to act/have liability separate from owners (Advantages: limited liability, more money to invest, talented employees / Disadvantages: double taxation, expensive to incorporate, hard to terminate).

Spoofing

Spoofing is penetrating a network by disguising intruding data packets.

Which type of software application is most effective for analyzing small to medium numbers? A. Database B. Web browser C. Spreadsheet D. Word processor

Spreadsheet

An individual writes software that collects personal data about a user from a computer and transmits it over the internet without the user's knowledge. What type of threat is this? A. Spyware B. Virus C. Worm D. Trojan Horse

Spyware

components include primary temporary storage and secondary long-term storage devices.

Storage

A _____ is created to meet a specific business goal and to provide a competitive advantage. Choices: Strategic Information System Transaction Processing System

Strategic Information System (page 11)

Which of the following best describes disruptive technology? Substitute products cost less and have less capabilities, but eventually displace legacy, established products. Substitute products cost less but have more capabilities and replace established products. Substitute products are based on chaos and fuzzy logic.

Substitute products cost less and have less capabilities, but eventually displace legacy, established products. (Page 15)

Which of the following best describes disruptive technology?

Substitute products cost less and have less capabilities, but eventually displace legacy, established products.Disruptive technology is usually cheaper and not as capable as established products before they emerge as leading options.

A company would like to implement a new network system. The company is looking for a system that will provide management functions of financial, production, and distribution operations at the same time. Which network system should this company use? A. Partner relationship management B. Supply chain management C. Enterprise resource planning D. Technology resource planning

Supply chain management

Chapter 31 in COS, 29 ebook

Sustainable MIS Infrastructures

Identify the two main types of software.

System Software - controls how the various technology tools work together along with the application software. System software includes both operating system software and utility software. Application Software - is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others. See pic for examples.

feasibility feasible

Systems analysis necessitates the performance of a __________________study to determine whether the solution is financially, technologically, or organizationally ____________

True - passive tags are small and inexpensive because they have no internal power source

T or F: Passive tags leverage energy from radio signals

False - WSNs wireless sensor networks are sensors located in strategic locations to monitor conditions.

T or F: RFID are located in strategic locations and used to monitor physical or environmental conditions

False - Sensors in WSNs are able to transmit and receive signals via built-in antennas.

T or F: WSNs have sensors that need to be wired into a network in order to transmit and receive signals.

True

T or F: Wireless Wi-Fi access points built before 2003 have WEP encryption protocol and cannot be upgraded to the more secure WPA standard.

False - In wireless networks, WEP is being replaced by more secure Wi-Fi Protected Access (WPA).

T or F: Wireless network security is improving because of the new security protocol called WEP.

False - Domain names have four parts but if the website is located in a foreign country it will have a 5th part indicating the country code

T or F: all domain names have 4 parts

What is the primary networking standard used to communicate over the internet? A. TCP/IP B. XBRL C. HTTP D. URL

TCP/IP

This system tracks the flow of daily routine transactions that are necessary to conduct business, such as payroll or order processing. Choices: EIS TPS MIS DSS

TPS (page 8)

A four-level pyramid depicts different types of information systems, as they relate to different hierarchical levels within an organization. Select the correct ascending ordered list of four systems (i.e., bottom to top of the pyramid), that relates to the end users' increasing hierarchical level within an organization. Choices: TPS, MIS, DSS, EIS TPS, DSS, MIS, EIS EIS, MIS, TPS, DSS EIS, DSS, MIS, TPS

TPS, MIS, DSS, EIS (page 8)

Because of limited funding, the bookstore employees are still using this very old and unsecure method to log on to the company's server from home.

Telnet

local area network (LAN) connections.

The 802.3 standard, created in 1983 by the Institute of Electrical and Electronics Engineers (IEEE), defines ____________________________________________________________________

Why does the ETL process run in parallel and not in sequential order?

The ETL process to update a data warehouse runs in parallel because the extraction step is lengthy.

waterfall model

The _________________ is not a good model for complex and object-oriented projects, and is a poor model for long and ongoing projects.

architecture

The _________________ of a global information system is the basic structure of the information required to coordinate international business activities.

critical path method (CPM)

The _____________________ is a step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.

waterfall model

The ______________________is the traditional systems development method, so named because each stage must be completed before moving on to the next stage.

Which of the following describes information management? The acquiring and managing of information systems within an organization The acquiring and managing of information within an organization and the sharing of that information with its stakeholders The acquiring and managing of technology resources within an organization

The acquiring and managing of information within an organization and the sharing of that information with its stakeholders (Page 16)

information management?

The acquiring and managing of information within an organization and the sharing of that information with its stakeholders Correct. Information management refers to the collecting and sharing of information within an organization.

information technology management

The acquiring and managing of technology resources within an organization

What is information technology management? The acquiring and managing of technology resources within an organization The acquiring and managing of information systems within an organization The acquiring and managing of information within an organization and the sharing of that information with its stakeholders

The acquiring and managing of technology resources within an organization (Page 16)

The application layer

The application layer is where applications create and communicate user data to other applications on the same or another host

The sales, purchasing, and accounting departments at a wholesale restaurant distributor each maintain their own separate information systems. Recognizing the benefits of sharing data among departments, the company decided to develop and implement a new centralized information system. The new system would allow all employees to access, analyze, and modify data stored in one central location. What are some of the advantage/benefits or disadvantages/challenges of information technology management or information management in this scenario?

The departments in this scenario are interdependent and would benefit from the ability of each department to share information. Each of these business functions impacts the other (purchasing must purchase products to fulfill sales orders, and accounting must bill the sales customers and pay for the purchased products). One advantage of this new system is the ability to assist the separate departments with their planning. A disadvantage of this system is that incorrect information entered by one department might adversely impact another department. For example, if the sales department did not delete or remove an order that had been cancelled by a customer, this would result in the purchasing department buying unwanted product(s). If the products were custom manufactured or non-returnable, the company could be stuck with excess inventory. One of the challenges presented by the centralized option is to ensure all information is updated on a timely basis. (Page 16)

What is a requirement of a field when it is in a table and is defined as the primary key? A. The field must have numeric values B. The field must appear in another relation C. The field must have duplicated values in the relation D. The field must have unique values

The field must have unique values

connect

The first internet social media site was Six Degrees in 1997. Six Degrees was a social network site that allowed users to develop an online profile to __________________ with other users.

strategic-oriented

The focus of _________________________ evaluation is the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization.

discovery

The intelligence phase in the decision making process consists of the ____________________, identification, and understanding of the problem.

. What is the logical data model?

The logical data model contains more detail than a conceptual data model, often defining operational and transactional entities for the database

Critical Path Method - CPM

The longest path through the network diagram, indicating the shortest amount of time in which a project can be completed is the:

Supply chain management (SCM)

The management of information that flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.

information

The number of people in Florida with incomes below the poverty line increased in the city of Tampa between 2010 and 2015 is an example of _______________________ .

synergy

The output from area is used to create input for another, thereby lowering costs and generating more profit is what?

There are five rules that pertain to the relational database model. Which one of the following examples breaks one of the rules?

The primary key of the orders table is the video title.

problem solver

The primary role of a systems analyst is

CDMA (code division multiple access) was developed during the second generation cellular networks.

The second generation, or 2G, launch used which digital standard for data and voice communication?

Knowledge

The skills, expertise, and experience, coupled with information and intelligence, that creates a person's intellectual resources. EX: Choosing not to fire an employee who is underperforming knowing that person is experiencing family problems. Listing products that are about to expire first on the menu or creating them as a daily special to move the product.

ENIAC

The____ is considered the first electronic, digital computer and was called 'Great Brain' by the press; was the first general purpose computer for commercial use.

EIS executive information systems is at the top of the hierarchy.

There are different types of information systems based on the different levels of hierarchy in an organization. Which one helps senior executives analyze information and come up with alternate actions and business strategies?

Bargaining Power of Suppliers

There are few suppliers, but many buyers and this affects the buying firms' profits because it has to pay more for materials.

benchmarking, teaches best practices usability testing, testing is critical user communication, MOST CRITICAL, drives acceptance forming an internal user group, builds support infrastructure planning, leveraging existing resources, drives costs down

There are six methods to increase user adoption, and lower post-implementation costs. The methods include: benchmarking, usability testing, user communication, forming an internal user group, planning, and leveraging existing resources

project structure, project size, and staff technical capabilities

There are three levels of risk associated with system design and implementation:

extranet

This connection which allows an organization to communicate directly or provide specific resources to suppliers, customers, regulatory entities, and other external users.

Windows

This operating system is the market leader for workstations and servers. It has its own internal software and a graphical user interface that is easy to use.dominates the world of personal computers, running on more than 90 percent of home and business user machines.

Hardback textbooks are no longer as in demand because of the creation and quick distribution of e-books. In terms of Porter's five competitive forces, e-books are an example of Choices: Threat of Substitute Products or Services Intensity of Competitive Rivalry

Threat of Substitute Products or Services (page 11)

Identify which description goes with which of Porter's competitive forces. If an industry is profitable and there are few barriers to enter that industry, then rivalry will be great as new businesses enter the market. Choices: Threats of new Entrants Bargaining Power of Suppliers Bargaining Power of Buyers Threat of Substitutes Intensity of Competitive Rivalry

Threats of new Entrants (page 11)

RF site survey -To ensure optimal network performance, it is critically important to conduct a radio frequency (RF) site survey

To determine the best location for access points, what assessment should be conducted?

intranet - an internal connection w/ in the organization to facilitate internal biz affairs

To facilitate efficient and effective business, corporations utilize the ________________ to mange employee affairs

all aspects of cost from the inception to decommissioning, along with associated maintenance, upgrades, support, and training.

Total cost of ownership (TCO) is a useful strategy when evaluating information systems costs and benefits. What does TCO entail?

Cross functional systems

Transcends different divisions to change how info is used and increase efficiency by eliminating redundancy

Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. Bob recently purchased long-term disability insurance. Choices: Acceptance Avoidance Sharing Reduction Transference

Transference (Page 15)

Describe the protocols and the importance of TCP/IP

Transmission Control Protocol/Internet Protocol - the most common telecommunications protocol - provides technical foundation for the public internet as well as for large numbers of private networks - uses special transmission method that maximizes data transfer and automatically adjust to slower devices and other delays met on a network - TCP provides transport functions, ensuring among other things that the amount of data rec'd is the same as the amt transmitted...IP provides the addressing and routing mechanisms that acts as a postmaster - contains five protocols: FTP (file transfer protocol), SMTP (simple mail transfer protocol), telnet, HTTP (hypertext transfer protocol), and SNMP (simple network mgmt protocol) See pic for importance of TCP/IP

Two individuals are notified that soaftware has been found on their computers that collects personal information about them w/out their knowledge. Which type of threat has been found? A. Spyware B. Worm C. Virus D. Trojan horse

Trojan horse

True or false. Information technology has increased the speed and volume of information that can be communicated within and between businesses, and managing this information has become very challenging.

True (Page 16)

True or false. Companies, such as 24x7 helpdesk operations, use centralized information systems, in which work occurs on projects until such time as the work might be handed off to the next division or location as their day ended. When a client calls or continues a helpdesk call, the next group can pick up the call without any break in the work flow.

True (Page 17)

True or false. The benefit of having multiple locations working on the same development project is that work does not need to stop when the workday ends.

True (Page 17)

True or false. The political climate in a country can have an impact on globalization.

True (Page 17)

True or False. Implementing information systems within an organization should be carefully considered. It can be quite costly, but the long-term benefits can be even greater.

True (page 10)

True or false. One of the advantages of information systems for businesses is to take raw data and turn them into valuable information, and then help transform that information into organizational knowledge.

True (page 10)

True or false. A Real Estate Company has a website that is integrated with a software system that keeps track of all the realtor's sales leads and listing information. The system keeps track of each person's name and contact information. This software system is an example of a customer relationship management system.

True (page 12)

True or false. One challenge of introducing knowledge management is that employees are often not willing to share information that they perceive gives them unique value to a business.

True (page 12)

[True/False] One of the most important IS management issues facing businesses today is hiring skilled IS workers.

True (page 8)

True or false. Even though information technology functions in the background, it is the backbone of most organizations.

True (page 9)

True or False. The increasing complexity of the new computer systems resulted in the development of two frameworks Information Technology Infrastructure Library (ITIL) and the Control Objectives for Information and Related Technology (COBIT). .

True Correct! The Information Technology Infrastructure Library (ITIL) and the Control Objectives for Information and Related Technology (COBIT) framework were created to allow businesses to better plan their infrastructure, manage IT services, control changes, and reduce complexity as the scale of their information systems grew.

True or false. A risk mitigation activity in project management is implementing a "lessons learned" process after each project.

True (Page 15)

True or false. One of the challenges in today's IT advances is the development of varying screen display sizes for computer monitors, tablets, smartphones, and PDAs.

True (Page 16)

True or false. An information technology manager should seek to standardize software and hardware when developing a global information system for an organization.

True (Page 17)

True or false. One management solution for addressing the challenges posed by implementing a global information system is to outsource the project to an offshore company that has global information system development expertise.

True (Page 17)

[True or false] Information is data that have been organized to provide value to an organization.

True (page 8)

True or false. The political climate in a country can have an impact on globalization.

True. Globalization can be defined as the integration of international economies, and it does benefit from general political stability around the globe.

[True/False] Integrated circuits consist of sets of electronic circuits on a chip or plate of semiconductor material and replaced vacuum tube transistors.

True:Old electronic computers were powered by vacuum tubes until the invention of the integrated circuit.

[True/False] The earliest commercially available electronic, digital computer occupied a 20 foot by 40 foot room and consisted of 18,000 vacuum tubes.

True:The earliest computers took up entire rooms and consisted of vacuum tubes for transistors.

Management Information systems

Use to manage business processes in a business/department for decision making, managing data, people, and projects

Customer communication - An intranet is a network connection meant for internal use only, not to communicate with customers.

Using a web server to connect to the corporate databases on the cloud, an intranet can provide many benefits. Which of the following is NOT a benefit of an intranet? Email and collaborative software Customer communication Centralized storage repository Centralized information sharing

142 and 212

Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider?

This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual.

Utilitarian approach

culture

Values and behaviors that contribute to the social and psychological well-being of an organization are examples of what organizational feature?

software

Various types of _____________________ enable companies to utilize their information systems hardware and networks more effectively.

Big data has many characteristics, each with their own challenges. What is meant by "velocity" when discussing big data characteristics?

Velocity is the speed required to process or analyze big data.

In the dead of winter in Minnesota, Jim has the option of working from home. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping

Virtual Office (page 9)

Which technology allows businesses to use network phone software to make calls to other network users? A. Token Ring B. Frame relay C. VoIP D. ATM

VoIP

How is voice or video information carried on digital networks?

Voice and video data are transmitted using circuit switching methods.Voice and video data are packetized, but transmitted on circuit switching networks instead of packet switching networks.

A real estate office has several divisions located in different areas. Which type of network should the real estate company implement to connect their divisions? A. MAN B. P2P C. LAN D. WAN

WAN

Waterfall Methodology

Waterfall methodology—A sequence of phases in which the output of each phase becomes the input for the next.

Explain web 2.0 and identify its four characteristics.

Web 2.0, or Business 2.0, is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. Web 2.0 encourages user participation and the formation of communities that contribute to the content. In Web 2.0, technical skills are no longer required to use and publish information to the World Wide Web, eliminating entry barriers for online business. The four characteristics of Web 2.0 include: ■ Content sharing through open sourcing. ■ User-contributed content. ■ Collaboration inside the organization. ■ Collaboration outside the organization.

Pushed static info

Websites provided static info (SPAM)

DBMS (database management system)

What application does one use to query and administer databases?

web enabled storefront

What application provided by the internet allows an online retailer to conduct business?

packet transmission and TCP/IP protocol

What are 2 fundamental protocols that can describe modern telecom networks?

detailed staged process, ability to monitor large projects

What are benefits of using SDLC when implementing an information system program?

small in comparison to private industrial networks, online platform host where transactions may take place between a seller and a buyer, provide more of a focus on individual transactions versus lasting relationships

What are characteristics of a net marketplace

participate, share, shape, and influence discussions

What are discussion actions that social media users can perform while immersed in an activity or current event?

provide a venue for the sale of physical goods, can be traditional brick-and-mortar retailers

What are e-Tailers?

new market entrants, substitute products, customers, suppliers, competitive rivalry

What are examples of competitive forces?

functionality of the system, the quality of the data, the usefulness of the system, system usage, system efficiency, user satisfaction

What are factors that influence the success of an information system?

facilities

What are needed for information systems infrastructure?

connect each user in a network directly

What are peer-to-peer network topologies?

ETL load phase

What are pitfalls when maintaining a data warehouse database?

audio files that contain educational content

What are podcasts, and why are they a good source of information for systems analysts?

modular design, decision tables, decision trees

What are process description tools?

to entice potential customers to shop, to educate stakeholders on product status, specifications, features and capabilities, and to inform customers of upcoming sales and events

What are reasons for providing company information on the internet?

eliminates data redundancy, reduces data complexity

What are reasons to normalize a database?

define problem, develop alternatives

What are steps in the decision-making process?

1NF, 2NF, and 3NF

What are the 3 norms in normalization?

goal selection, attainment measurement, and achievement intervention

What are the 3 primary activities associated with business performance management?

application, presentation, session, transport, network, data link, physical

What are the 7 layers of the OSI model?

consolidation, slicing and dicing, and drilling down

What are the basic analytical operations?

data manageability

What are the benefits of partitioning when maintaining a data warehouse database?

interpersonal roles, decisional roles, informational roles

What are the categories from Henry Mintzberg's management behavior roles?

data mining, predictive analytics, OLAP

What are the categories of business intelligence?

automation, rationalization, process redesign, and paradigm

What are the four categories of an organizational change?

processes and employees

What are the key factors to consider when planning and organizing information technology in business?

system design, programming, testing, conversion, and production and maintenance

What are the stages in the waterfall model?

1st. collect information about the proposed system, 2nd. development of functional flow diagrams, functional specifications, and a flow dictionary, 3rd. functional flow diagram presented to customer, user input obtained, model is revised, and user approval is obtained

What are the steps in building a logical model of a system?

Tools, workbench, and environment

What are the three CASE software classifications?

algorithms

What are used in most cases to look for relationships, patterns, and trends.

Non-relational database

What are used to handle large amounts of data in a database, and the databases can be stored in multiple locations?

User requirements means documenting all user needs, wants, and requirements.

What are user requirements in the SDLC process?

the classical management model supports planning and controlling

What best describes the classical model in management decision making?

Google

What business earns much of its revenues from online advertising and by providing e-business services to hundreds of millions of individuals and businesses?

corporations

What business structure is a legal entity that can encompass a big number of shareholders?

corporations

What business structure is an individual not help personally accountable for any liabilities, risks, and debts from business operations?

redirect/redistribute funds, build schools, approve commercial sites, demographic analysis to predict sales

What can a GIS (Geographic Information System) be used for?

product marketing

What can be disseminated to millions of consumers through social media, reducing marketing costs compared to traditional print, radio, and television advertising?

predictive analysis

What can be used to predict future outcomes or trends, but it does not tell you what will happen in the future?

workbenches

What category of CASE does Microsoft Visual Basic fall under?

CASE (computer aided software engineering)

What combines multiple tools or workbenches to support the complete software cycle?

structured query language

What computer language is used with relational database applications?

client/server configuration

What configuration does the server control the traffic going back and forth the network, thereby maximizing the traffic on the network.

relational database

What data is stored in related tables that can be accessed and joined in many different ways without having to reorganize the tables?

logical, physical and analytical

What data models are used by businesses to map processes to data requirements?

corrupted data

What data should be scrubbed so that they are consistent with the design of the database?

data governance

What defines the policies and processes to manage and maintain the data integrity and security of a government agency?

internet search and social media sources

What do hiring managers use to identify inconsistencies in a candidate's background?

confidentiality, integrity, and availability

What do the letters CIA stand for?

social media

What do you call the web-based applications that allow user content to be created and shared over the internet?

Online transaction processing

What does OLTP stand for?

packet switched data networks

What does PSDN stand for?

helps the CPM visualize the activity diagrams that define the critical path

What does WBS (work breakdown structure) do?

code software to solve problems or perform tasks

What does a software engineer do?

looks for patterns that indicate customers' shopping behavior in order to target marketing efforts

What does classification do?

corrects or removes duplicated, incomplete, or inaccurate data

What does data cleansing do?

breaks a big table into several smaller tables, which will in turn modify the structure of the existing or any new tables

What does data normalization do?

analyzes a series of values in order to predict or forecast the value of other variables.

What does forecasting software do?

network based thinking, pooling resources, and expanding contracts to be more successful and competitive

What does network strategies involve?

radio waves over the radio spectrum

What does wireless communication use to send and receive signals?

passwords and Login ID's

What information can be gained by sniffing a wireless network?

Among other things, data packets have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.

What information is enclosed in transmission packets

normalization

What involves correctly defining keys, tables, columns, and relationships?

A database of possible employees or candidates

What is LinkedIn?

a multidimensional database that is used for analyzing business data to discover and gather business intelligence

What is OLAP (online analytic processing)

RFIDs are small, removable tags attached to objects that emit a radio frequency signal for the purpose of being identified. Identification is usually carried out by handheld wireless readers. RFID helps companies increase productivity because the need to physically handle material during inventory management is reduced or completely eliminated.

What is RFID and how does it work?

a general purpose modeling language (unified modeling language)

What is UML

a modeling language used to help model systems

What is UML?

interact with suppliers, often via an SCM

What is a benefit of an extranet?

Public cloud computing reduces capital expenditures because resources are leased.

What is a benefit of public cloud computing?

a collection of loosely coupled, interdependent industries that provide related services and products across many industries.

What is a business ecosystem?

they carried continuous electronic waveforms

What is a characteristic of a legacy or old analog network?

technical and economic

What is a component of a feasibility study?

Used to analyze a business unit, or a single unit

What is a data mart business application?

A hacker attempt to tie up network host resources making them unavailable

What is a denial of service attack?

they are very difficult to return

What is a disadvantage for purchasing digital goods?

single table with no structured relationships

What is a flat file database?

An expensive application used by large businesses to improve computer network performance without having to physically change the network. It is not necessary for small businesses

What is a hypervisor?

economic, compatibility, limitations

What is a key factor to consider when evaluating system alternative?

introducing business process changes slowly will make the transition to the new system less disruptive, and there will be less resistance to the change

What is a management solution when developing global systems?

Explain why a business would use metrics to measure the success of strategic initiatives

What is a metric? A metric is nothing more than a standard measure to access performance in a particular area. Business leaders want to monitor key metrics in real time to actively track the health of their business.

a physical node with an IP address.

What is a network host? This is also known as data terminal equipment in computer networking hardware.

arbitrator and consultant

What is a primary role of a systems analyst?

a major corporation in the industry that can provide leadership and resources to the smaller counterparts.

What is a private industrial network?

a signal strength detection process to identify the best wireless access point locations.

What is a radio frequency survey?

VPN (virtual private network)

What is a secure tunnel through the internet using a public infrastructure?

clickstream

What is a series of human or user Web visitor page requests?

Caseficio Scalabrini

What is a successful business that uses big data to find flaws, boost production, and rootlet counterfeiters?

TCP/IP

What is a universal telecommunication network protocol that most operating systems can recognize?

it allows visitors to access the internet

What is an advantage of a wireless LAN?

the ability to collect, organize and process data from internal and external sources and distribute the resulting information to support decision making and business processes.

What is an advantage of information management?

brainstorming

What is an alternative tool that requires a group of users to collectively review and analyze the alternative, prior to making a decision.

databases that contain multimedia files or executable code in records or fields.

What is an object oriented database?

data terminal equipment

What is another name for a network host?

easy access to information

What is both an advantage and disadvantage to information management?

it is characterized by noticeable impact to the organization

What is considered to be low level security risk during system post implementation?

the management of resources that facilitate access to information

What is information technology management concerned with?

college computers, logins, network access, help desk support, and keeping the technology maintained, upgraded and secure

What is information technology management responsible for in a college setting?

describes Internet sites that emphasize usability, interoperability, and active user-generated content.

What is meant by Web 2.0?

Informal user support means training, communication, and acceptance.

What is meant by informal user support when a system comes into production?

How stakeholders respond to system changes

What is meant by the political aspect of a feasibility evaluation?

Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity.

What is more efficient data packet switching or circuit switching?

allowing users to experiment with the system during development.

What is one way to define user requirements?

channels and analyzes to assist executives in making orders, pricing, and inventory decision.

What is supply chain management software used for?

scalability

What is the ability of a network to grow user and services without forklift upgrades?

denial of service

What is the act of bringing a network host down?

information management

What is the application of management techniques to collect, communicate, and process information in order to make better management decisions?

connect large business to backbone of internet

What is the definition of a core router?

a discrete, non continuous electrical waveform

What is the definition of a digital signal?

dividing database for manageability

What is the definition of a partition in database concepts?

records where a user clicks on a web page

What is the definition of clickstream?

getting data from data sources

What is the definition of data extraction?

a process to ensure data is not corrupted

What is the definition of data integrity?

single table database

What is the description of a flat file database?

ICR (intelligent character recognition) is an intelligent or advanced form of OCR. (optical character recognition

What is the difference between ICR and OCR?

primary keys define columns in a table, while foreign keys are typically a constraint to reference two tables.

What is the difference between a primary key and a foreign key in a relational database?

Analog signals are continuous electrical waveform signals while digital signals are discrete, binary, noncontinuous electrical waveforms..

What is the difference between an analog signal and a digital signal?

Data mining examines and reveals patterns in a structured DBMS, while web mining discovers patterns in a less structured format, such as the internet.

What is the difference between data mining and web mining?

to evaluate the quality and functionality of information and output

What is the focus of a functional evaluation of a management information system?

it serves as the depository of all extracted data for the load function of the data warehouse

What is the function of the data integration service in business intelligence?

The most important activity is determining access points and locations. - Access point number and location have significant impact on performance.

What is the key planning activity when setting up a wireless network?

provide vision and leadership for IT initiatives

What is the key role of the CIO

maintaining corporate security, both physically and digitally

What is the main role of the chief security officer (CSO)?

analyze and modify software systems, implement and test programs, and document software requirements

What is the main role of the software analyst?

social engineering

What is the method used by hackers to develop a relationship with users in order to extract information?

analysis, design, and implementation

What is the overall job function of the systems analyst?

1G enabled mobile voice telecommunication while 4G offers voice, data and video

What is the primary difference between a 1G cellular network and the current 4G network?

decision making

What is the primary role of information systems managers?

an analysis to determine if a proposed system is possible, evaluates cost, return on investments, and the likelihood of project success.

What is the relationship of a feasibility study to an information system development project?

fiber optics, ethernet, radio frequency

What is the required mediums for communications

manage company workflows, identify and fix network issues, and maintain equipment and software

What is the role of the computer systems administrator?

Controller

What is the title of the cloud fabric person who monitors and provides cloud resources to users?

a study to determine economic feasibility

What is the total cost of ownership? (TCO)

scrum

What method can address unexpected changes or challenges that cannot be addressed effectively with SDLC?

Any post or activity that represents discriminatory behavior

What social media activity should be avoided by job seekers?

documentation

What step in system implementation documents all system specifications

Group decision support system (GDSS)

What system supports creative thinking and allows users to interact simultaneously at multiple geographic locations to collectively participate in decision making?

ESS (executive support systems)

What systems do upper management use for decision making?

normalization

What takes place during the database design process to eliminate data redundancy?

RFID

What technology is used to track inventory and can be read hundreds at a time, even if the tag is covered?

internal enterprise data, as well as external data from financial, industry, and trade databases

What type of data is included in executive support systems? (ESS)

transactional processing systems

What type of management information systems do operational and middle management use for structured decisions?

Bargaining Power of Customers (Buyers)

When consumers have many options of where to buy a product this threat is high. Some businesses will implement customer loyalty rewards to encourage a buyer to continue using their products. Many credit card companies offer perks to encourage you to do business with a particular lender. If there are few purchasing options for a consumer, then this risk is low.Buying in large quantities results in lower prices for the buyer and lower profits for producers.

perform a strategic analysis

When determining business benefits from implementing a strategic information system, several factors need to be considered. Businesses need to consider their business objectives, look at who their customers are, create justification for the project and then seek support. What would be the first step in determining benefits?

A feasibility study looks at financial, technical, and organizational issues that could impede success.

When performing systems analysis, why is a feasibility study important?

data dictionary

Where would metadata about customer and product tables be stored?

The waterfall model

Which model is appropriate when system requirements are clear, well-documented, and unlikely to change. This model is also useful when the technology is understood and will not change, when the project is relatively short term, and when sufficient resources and expertise are available to support the process.

DSS

Which system helps support business decision making activities by manipulating and building upon the information from the systems below it in the hierarchy?

value chain analysis

Which views a firm as a series of business processes that each add value to the product or service. The goal of value chain analysis is to identify processes within a firm that the company can add value for the customer and thus create a competitive advantage for itself, with a cost advantage or a product differentiation.

instant message

While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which internet application?

they can be mined or analyzed for trends or patterns

Why are data warehouses beneficial to business managers?

Small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable. peer-to-peer allows file sharing

Why do home office or small business computer networks sometimes use a peer-to-peer topology?

to capture this new community of users and to address issues of social care

Why is it imperative that modern businesses have a social media marketing strategy?

Alternative solutions should be evaluated for system compatibility with existing architecture and organization, return on investment, and scalability.

Why is it important for companies to evaluate various alternatives to a system development program?

analytics would affect the database performance

Why is it not good practice to perform analytics on an online transaction processing database?

budgets are reduced, and the implementation team takes on new tasks.

Why is providing user support after system production a challenge?

they must be able to communicate system capacities and benefits.

Why must a systems analyst be a good communicator?

Which networking standard is used by businesses to transfer information through radio waves over distances up to several miles? A. RFID B. WiMAX C. WiFi D. NFC

WiFi

Signals that travel through the air can be intercepted and decoded using sniffing techniques. Sniffing wireless networks can lead to network spoofing and probing, giving hackers access to the network.

Wireless networks enable communication via the air through the radio frequency spectrum. These signals are easily intercepted because they are travelling through open space, in contrast with wired networks. Identify the key risks to network security using radio frequency spectrum or wireless networks.

Wireless sensor networks (WSN)

Wireless sensor networks (WSN) are location or spatially distributed sensors that emit wireless signals with specific information.

direct implementation

With ________________________, the old system is replaced by the new system without any rollout or overlap.

Cultural difference can have an impact on the successful implementation of a global business strategy, which includes in part offshoring and/or outsourcing. Which of the following elements of cultural differences can play a role in the successful implementation of the global business strategy? Choose all that apply: Workforce motivation Cultural Norms Perceived lack of talent Language barriers Check My Answer

Workforce motivation Cultural Norms Perceived lack of talent Language barriers Check My Answer (Page 17)

A company wanst to discourage someone from inappropriately accessing the company's technology resources for personal use. Which step should the company take? A. Explain the budget process for technology B. Write guildlines for usage of technology C. Establish a reward system for whistelblowers D. Train employees to use technology efficiently

Write guildlines for usage of technology

Which of the following are common organizational features that should be considered when building and using information systems? Structure Incentives Environment Culture Politics

Yes No Yes Yes Yes (page 10)

unit testing, system testing, and acceptance testing.

You are testing a new system implementation. What are the three elements of the testing phase?

Product ID

You have created a database to store the products sold in a department store so they can be managed, updated, and manipulated more easily. The store manager wants to create a query to show the items that are selling today. What would be an appropriate field to sort the data?

False Correct. Analytic applications are a type of application, not an operating system; they are used to measure and improve business performance.

[True/False] Analytic applications are a type of operating system that are used to measure and improve business performance.

WSN's WSN's Wireless sensor network

________ are networks composed of sensors located in strategic locations and are able to transmit and receive signals via built-in antennas, but they are NOT considered antenna mesh. __________ are sensor networks, not wireless network access points. A company that wants to monitor a warehouse temperature across various locations can deploy a _________________________ to relay temperature information.

WEP Wi-Fi Protected Access

_____________ is a legacy wireless encryption protocol. WPA is a newer more secure encryption protocol for wireless networks and stands for ________________________. .

Wireless LAN

______________ can offer businesses greater productivity, cost savings and can be easily changed and configured. They are more scalable than wired networks and can be easily configured and changed in any topology.

Quality Reliability

_______________ refers to the factors that affect system design, behavior, and the user experience. _____________ is concerned with inconsistent output, system failure, and system unresponsiveness.

Job recruiters

_________________ have mentioned that inappropriate or provocative photos or information and evidence of alcohol and drug abuse, by the job seeker revealed during social media search can negatively impact employment opportunities

Decision trees

__________________ are graphs that use a branching method to illustrate every possible decision outcome.

Sniffing

__________________ is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding

Prototyping

____________________ is a four-step process in which an experimental system is quickly and inexpensively built and provided to end users for evaluation, and is then refined based upon user feedback.

Rapid application

__________________________ development allows adaptability because specifications are developed during the process.

Parallel adoption

___________________________ is a method of system transfer in which the old system continues to operate for a period of time while the new system is implemented

Systems analysis

___________________________ looks at an organizational problems and determines if it can be solved with an information system.

Total cost of ownership (TCO)

____________________________ is one method for determining the economic feasibility of a system or project. ______takes into account the total costs over time, including hardware, software, labor, lease fees, and licensing.

Information Repositories

__________________________________ also known as knowledge centers, provide helpful information to remote suppliers, partners, employees, and customers, either for free or as a revenue-generating service. It does not transfer documents for businesses.

Function-oriented

____________________________evaluation examines the performance of data, hardware, software, networks, and human resources.

Voice over Internet Protocol (VoIP)

__________________________is a technology that enables the traditional use of a telephone, but with only a high speed Internet connection instead of a standard telephone circuit connection

Prototyping

_____________________is a four-step method that results in quick module development. This methodology develops software modules quickly and inexpensively for user evaluation.

Automation

______________is one of the desired critical outcomes of business implementation of a new or upgraded information system.

cold site

a backup location that provides only rudimentary services and facilities.

computer network

a collection of interlinked computers that can exchange information over links in the form of digital packets.

privilege

a collection of related computer system operations that can be performed by users of the system.

Multi channel service delivery

a company's offering multiple ways in which they interact with customers; ex email, fax, phone, web

Wi-Fi Protected Access (WPA),

a newer, more secure encryption protocol for wireless networks.

tunneling

a process that encrypts each data packet to be sent and places each encrypted packet inside another packet.

Cold site

a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster.

What is the best definition of a project? a set of tasks that have no deadline and a constantly changing objective a planning activity a set of tasks with a clear objective and an ultimate deliverable

a set of tasks with a clear objective and an ultimate deliverable (Page 15)

trojan horse

a software program containing a hidden function that presents a security risk.

risk acceptance

a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur.

risk limitation

a strategy in which the organization limits its risk by implementing controls that minimize the impact of a threat.

certificate authority

a third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.

Interoperability

ability of 2 or more vomputer components to share info and resources, even if made by different manufacturers

Scalibility

ability of a ssytem to meet increased service demands

Click-fraud

abuse of pay-per-click, pay-per-call, and pay-per-conversation revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

Central processing unit (CPU)

actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together.

Global exporting

all services from the organization's home location means not changing the centralized structure and requiring all but production to stem from the centralized domestic location, including systems and data storage.

Collaborative engineering

allows an organization to reduce the cost and time required during the design process of a product.

FTP stands for File Transfer Protocol

and is a protocol used to transfer files from one computer to another.

OSI stands for Open System Interconnection

and is the foundation for data communication protocols

older Open System Interconnection (OSI) protocol that consisted of seven layers:

application, presentation, session, transport, network, data link, and physical. Before OSI became the standard protocol, computer networks used proprietary protocols.

Transmission Control Protocol, or TCP protocol, consists of four abstraction layers

application, transport, Internet, and network access

Consumer-to-business (C2B)

applies to any consumer that sells a product or service to a business over the internet.

Consumer-to-consumer (C2C)

applies to sites primarily offering goods and services to assist consumer's interacting with each other over the internet.

Implementation

apply selected option, monitor results, make corrections

Data

are more than just raw material; they are facts that are a valuable organizational resource that must be well managed to benefit all end users in an organization. typically input) can take on many forms, including alphanumeric data, text data, image data, and audio data.

Barcodes

are passive encoded images that have been used in logistics and inventory management applications.

Application Software

are programs that are commonly used by end users as a means of increasing their productivity by directly applying them to specific tasks inherent in the work they are responsible for accomplishing. Examples of application software include word processors, electronic spreadsheets, and presentation software.

Web developers

are responsible for creating and maintaining a company's website. This includes layout design, programming, and website usability studies. The web developer must have a good understanding of design (i.e., what customers find visually appealing), function (i.e., satisfying technical objectives), and form-factor (i.e., how to optimize the website for mobile devices).

Sales and marketing

are responsible for forecasting and creating demand for the products and/or services being offered and for making sure that customer needs and demands continue to be met.

Information security analysts

are responsible for the security of a company's network, data, and information. Security analysts must determine where a company might be vulnerable to a cyber attack and install or recommend protection against these threats, such as firewalls, data encryption programs, and changes to training or operational policy.

tactical goals, objectives, or decisions

are set or made by middle managers to support the organization's strategic direction.

Information systems specialists

are the people who develop, operate, and maintain the systems. Specialists include programmers, systems analysts, testers, computer operators, and other managerial IS personnel.

Strategic activities

are those that are key to the overall strategy or direction in which the company is moving.

Growth and Product Differentiation

are two different types of business strategies.

Cloud computing and mobile platforms

are two of the fastest growing trends in MIS because mobile platforms for consumer and business applications are driving the need to move data to the cloud.

Protocols

are used to ensure the quality and accuracy of the transmission, and that the transmission is understood by the receiving device.

Satellite communications

are used to link telecommunications networks over long distances.

Firewalls

are used to prevent intrusion into a network and are not related to data communication protocols. It can be hardware with software, or is just software embedded in a network at strategic access locations to prevent intrusion.

Sales force automation systems

automatically trachs steps in sales process; contact management, empower sales reps

Organizations gain many benefits with knowledge management systems, but one of the most important benefits is that the systems make _____ available for employees at any time so they can learn the most effective and efficient ways of doing things. Choices best practices data

best practices (page 12)

An integral component of planning and organizing IT systems for businesses includes which of the following?

blending the attributes of different IT system designs to meet the unique user needs of the business.A blended IT organization takes the attributes of different IT designs to meet the unique user needs of a business; these attributes may include delivering and maintaining IT infrastructure as well as optimizing important business assets, such as production, services, customer relations, and information management.

Database administrators (DBA)

build databases to store data to meet business needs. This is a growing profession because data are a tremendous business asset. designs the databases, ensures that the databases operate efficiently, maintains data security, and applies upgrades as needed.

Product differentiation strategy

can include offering a higher quality product or service. This product differentiation strategy is built on a business identifying a core competency and basing their business strategy around that core competency.

Mobile agent

can relocate itself onto different computer systems

Step #2 in selecting a computer system

categorizing, prioritizing, and finding conflicts in this list

WAN

collections of remote business campuses that use the Internet, private, and public switched networks.

Computer simulation

complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to determine "what if" analysis.

Storage

components include primary temporary storage and secondary long-term storage devices. Other storage includes peripheral devices such as external hard drives and removable media (floppy disks, optical discs, and flash drives).

Processing

components include the central processing unit (CPU), which is the brain of the computer. Historically this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components.

A bus enables

computer components to communicate with one another.

Client

computer that is designed to request information from a server.

internal bus

connects motherboard components to CPU

communications controls (network controls)

controls that deal with the movement of data across networks.

physical controls

controls that restrict unauthorized individuals from gaining access to a company's computer facilities.

access controls

controls that restrict unauthorized individuals from using information resources and are concerned with user identification.

Internet, video/audio communications, and PSN resulting in VoIP and smartphone applications

converged communication structure is based on what

Data resource management

database structures and how info is linked through primary keys

controls

defense mechanisms (also called countermeasures).

Communication plan

defines the how, what, who regarding the flow of project information and is key for managing expectations.

subjective

describes something; interpreted data

worms

destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.

Capacity planning

determines the future IT infrastructure requirements for new equipment and additional network capacity.

Communication device

equipment used to send information and receive it from one location to another.

Supercomputer

fastest category of computer available.are purpose built to handle vast amounts of information very quickly.

Management information systems focus on technology, people, and organizations. They primarily serve _______. Choices: first level managers front-line staff consumers executives

first level managers (page 8)

RAM

gets instructions from ROM to launch the operating system during bootup.

Data definition subsystem

helps create and maintain data dictionary and define structure of files in a database

hyper text transfer protocol

http

coarse granualrity

info based on summaries of time periods; used by strategic management

Network and computer system administrators

install and repair computer systems, as well as identify and fix network issues. These IT professionals ensure a company's web pages are loading and emails were sent. Examples of professionals in this role might be server administrators, email administrators, capacity analysts, and network analysts. Network engineers design the system's network configuration.

trade secret

intellectual work, such as a business plan, that is a company secret and is not based on public information.

Decision making model

intelligence, design, choice, implementation

fax machine

invented before the internet, but developed based on telephone technology

chief information officer (CIO)

is a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects. This position requires strong organizational and interpersonal skills. The job focus is strategic in nature: developing and implementing the corporate IT strategy. The ___ must have a broad knowledge of IT.

Multicore processor

is a chip with multiple, independent, CPUs. Correct. A chip with multiple CPUs is called a _______. This typically provides more computing power for they can run multiple instructions in parallel.

Information Technology Infrastructure Library (ITIL)

is a common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change.

A service level agreement (SLA)

is a formal contract between a customer and the service provider detailing the level of service expected from the provider.

OS X

is a graphical user interface used on Mac computers since the early 80s.Used on Apple computers and runs on a UNIX engine, but with an easy to use graphical interface.

An intranet

is a network connection meant for internal use only, not to communicate with customers.

A router

is a networking device used to pass packets to the next network node until the packets reach the ultimate destination. _______ are used to connect multiple networks together and forward data packets between those separate networks to the destination host.

Unix

is a widely used operating system for multi-users.Primarily used on servers but does not support the range of applications that most users need on a desktop.

A standard

is an accepted model from which independent parties or governing bodies agree as a basic concept from which to operate.

Random access memory (RAM)

is temporary or short-term storage used by the processor.

Project management

is the application of planning, organizing, time management, leadership, communication, and problem-solving skills to accomplish an objective and deliverable on time and on budget.

chief operations officer (COO)

is the director of operations, responsible for the oversight of internal operations on a day-to-day basis and for monitoring production quotas. The ___ ensures that the limited resources are used to provide the maximum value for stakeholders. This role communicates the organization's mission statement to employees.

COBOL (Common Business Oriented Language)

is the first computer language developed in the 1950s for business computing .

system bus,

is the medium through which communications between the input, processor, storage, and output occur.

Internet of Things (IoT)

is the network of products (or things) that can be connected, communicate with each other and with the environment, and transfer data over a network.

Knowledge management

is the process of sharing knowledge among people for the benefit of the business.

Offshoring

is the strategy of having tasks performed by companies in other countries using information technology advancements such as the Internet and cloud computing.

public switch telephone network (PSTN)

is the total circuit switch-based telephone network that uses technology invented by Alexander Graham Bell.is a wired infrastructure, composed of wires, cables, switches, repeaters, and other telecommunication components.

The frequency

is the wavelength or position on the radio frequency spectrum in which the signals are exchanged. The _____ is measured in cycles per second, or hertz (named after the scientist who discovered wavelengths).

category 5 (Cat5) cable

is typically made of copper but is much smaller than copper building wire that is used to carry electricity.

Quality of Service (QoS)

is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.

A packet analyzer or sniffer

is used to monitor or log traffic on a network for troubleshooting or analysis. can be used by hackers to obtain authentication information needed to hack a network

Globalization

is/are making technology and information more difficult to manage because the barriers of language and geography have been broken down. Correct. Globalization is an advantage of information technology because it has broken down the barriers of language and geography; however, it is also making technology and information more challenging to manage.

Child Online Protection Act (COPA)

law that protects minors from accessing inappropriate material on the internet.

Wired Equivalent Privacy (WEP).

legacy wireless protocol, The earlier wireless encryption protocol was known as

End-user development

let users themselves create what they need; IT support is crucial!

In some cases, internal attackers, such as disgruntled employees, may introduce malware

logic bomb

A hard drive is

long-term storage that acts as a reserve aide for short-term storage or to store output data.

malware

malicious software such as viruses and worms.

viruses

malicious software that can attach itself to (or "infect") other computer programs without the owner of the program being aware of the infection.

chief financial officer (CFO)

manages the company's cash flow and evaluates and communicates financial risks. The ___ is the financial planner and is responsible for analyzing the company's financial strengths and weaknesses. This individual must be transparent and accountable, providing financial data and advice to stakeholders. The ___ often works as a strategic partner with the CEO. For example, the CEO and ___ might work together in merger and acquisition strategies. (Mergers are when two companies join as one company; acquisitions are when one company buys another company as the new owner.)

Choose the two essentials for successful project management. Choose 2: managing people managing communications managing information systems

managing people managing communications (Page 15)

Association or dependency modeling

market basket analysis

multinational organization

means that organizational divisions would be headquartered in different locations, whether partially with an international organization or completely with a transnational organization.

denial-of-service attack

means to disrupt, interrupt, or suspend services of an Internet host computer.

Client/server network

model for applications in which the bulk of back-end processing, which involves communicating with the users, is handled by the clients.

Network database

more flexible than hierarchical, data defined in sets, must define ALL potential relationships ahead of time

computer systems analyst

must combine business knowledge with technical expertise. to analyze a user's needs and determine the most efficient and effective solution.makes hardware and software recommendations, performs cost analysis, and oversees the implementation and troubleshooting of new systems.

A Converged

network is able to carry data, voice, and multimedia information.

One business owner specializes in Web design and graphic design. A second business owner specializes in email marketing and social media marketing. A third business owner focuses on Web programming. The three business owners work together with some clients and refer some clients to each other. These business owners have a created a _____ among their businesses. Choices: Network-Based Strategy Merger Competition

network-based strategy (page 11)

error rate

number of mistakes a system generates per thousand or million transactions

Host-to-host communications

occur on the transport layer on the same or different hosts, as well as on the local network or any network remotely connected through a router.

A spoofing attack

occurs when network access is obtained without authorization, and can occur on both wired and wireless networks.

five bits set to ___

off

asynchronous

one advantage of ________________ communication is sending or replying to messages at a time that is convenient and not in real-time.

Motherboard

or similarly the backplane, of a system is the device that contains the system bus and connects the various input and output devices that compose any given computer system

asynchronously

organizations can communicate ____________ with their clients via bulletin boards, blogs, and streaming videos.

synchronously

organizations can communicate ________________in real time, with their clients using online chat or instant messaging applications

IT managers, project managers, and architects

organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization. These individuals often have many years of general (for IT managers and IT project managers) or specific (for IT architects) work experience or training in IT in one or more disciplines, such as software development, information security, networking, and database or systems administration.

Non-management

perform daily tasks

Storage devices

portable hard drive, flash drive, tape drive, Cloud, etc.

chief executive officer (CEO)

president or managing director, is responsible for the success or failure of the company, creating the company culture, selecting the senior management team, setting strategy and vision, and selecting projects to fund. In larger companies, this position deals with high-level strategies and overall business growth planning.

Test analytics

process of using statistical, artificial intelligence and linguistic techniques to convert info in textual sources into structured info (email, survey, etc)

Text analytics

process of using statistical, artificial intelligence and linguistic techniques to convert info in textual sources into structured info (email, survey, etc)

Utility Software

programs perform periodic system maintenance activities, such as virus detection, storage space consolidation, backup and recovery, intrusion detection, and access authentication monitoring.

Web forms

provide direct data input into a business from a remote location.

Specialized application software

provide tools and resources used to facilitate specialized functions, including smaller examples of more powerful enterprise applications.

The accounts payable, accounts receivable, payroll, and other processes

provide valuable information for the overall organization for the purposes of budgeting, planning, and control.

computer support specialist

provides technical support to customers and employees through direct interaction or telecommunications. The support could be through training or troubleshooting technical issues.

Database software

provides tools and resources to create and manage small databases.

Collaboration software

provides tools and resources used to connect and facilitate electronic communication and collaboration between users.

Desktop publishing software

provides tools and resources used to create professionally printed materials. Examples include Microsoft Publisher, QuarkXPress, and Adobe InDesign.

Presentation software

provides tools and resources used to create slideshows, presentations, and narrative videos

Multimedia software

provides tools and resources used to create, edit, or manipulate photos, images, animations, videos, and three-dimensional objects.

Development software

provides tools and resources used to create, edit, or manipulate web pages and software applications.

Report generators

quickly define formats of reports

Wireless communication is transmitted over _________ through the _________.

radio waves atmosphere

Repeaters

receive and retransmit data at higher power so it can travel over long distances. They strengthen or amplify signals for long transmissions, but do not serve a broadcast function in a network and do not store data.

Software

refers to pre-packaged sets of coded instructions that end-users directly interact with, in order to indirectly communicate with the other major components of the information system to get tasks done.

File storage and hosting

refers to repositories of information, storage for retrieval, or archival of documents.

Technical Consideration

relate to hardware, software, data management, and networking (solving business problems)

Data warehouses can be described as repositories of data from several sources and are mostly used for _______ and for________ to help management decision making.

reporting, analysis

Moden management

representation of a situation, statistical models or equations

Capacity

represents the maximum throughput a system can deliver;i.e., capacity of a hard drive represents the size or volume.

Chief knowledge officer (CKO)

responsible for collecting, maintaining, and distributing the organization's knowledge.

Chief privacy officer (CPO)

responsible for ensuring the ethical and legal use of information within an organization.

Chief technology officer

responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.

Chief information officer (CIO)

responsible for overseeing all uses of information technology, ensuring strategic alignment of IT with business goals and objectives.

Integrity Constraints

rules that help ensure the quality of the information

Open source software

s developed collaboratively, and the source code is available to anyone. The Linux operating system and Mozilla Firefox are examples of open source software.

chief security officer (CSO), sometimes also called the chief information security officer (CISO),

s the highest level executive concerned with the overall security functions and policies of a business. identifies business protection goals, works with the other executives to identify and analyze risks, and prioritizes security needs. works with vendors and consultants to ensure both physical and data security.must have up-to-date knowledge and experience in information security because it is a rapidly changing field. Important traits for this position include good judgment and excellent planning ability. Due to recent security breaches, the chief security officer job has become more critical to organizations. The U.S. president recently declared cyber-threats, breaches to critical technology infrastructure, a national emergency.

Clustering

segmenting a heterogeneous population of records into a number of more homogeneous subgroups.

Community cloud

serves a specific community with common business models, security requirements and compliance considerations.

Communications protocol

set of rules every computer follows to transfer information

Because data warehouses consist of data from__________ systems with different formats, the ETL process must be carefully designed to ensure data_______ during the load process

several, integrity

Simulation software

simulates actual systems and is typically used for training, entertainment, or research.

cookie

small amounts of information that web sites store on your computer, temporarily or more or less permanently.

software agent

small piece of software that acts on your behalf

Cache memory

small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM.

anti-malware systems (antivirus software)

software packages that attempt to identify and eliminate viruses, worms, and other malicious software.

Internal

specific operational aspects of an organization

A business benefit of enterprise resource planning systems is standardized business procedures. ease of implementation. ease of use. higher salaries for executives.

standardized business procedures. (page 12)

Moore's Law

states that the number of transistors in an integrated circuit doubles every two years. _________coined by the co-founder of Intel, described that components in integrated circuits or microchips will double every two years.

Knowledge management systems (KMS)

strive to reach organizational goals by making the best use of corporate knowledge. These systems focus on methods of capturing, refining, developing, and storing this knowledge.use technology, such as the Internet, collaboration software tools, and databases, to facilitate the capturing of corporate data.

Electronic communications,

such as email, instant messaging, and video teleconferencing, help a business to operate with a reduced need for travel, and even allow employees to work from anywhere.

Pivot table

summarizes by sorting, counting, totalling cells

A system where businesses work together to create a product or service for a customer is called a _____ Choices: supply chain management system customer relationship management

supply chain management system (page 12)

A bank software company purchases another bank software company and begins utilizing employees from both development teams to create a new software product for their clients. The bank software company is benefitting from the _____ created through the acquisition. Choices: synergies Core competencies

synergies (page 11)

employee monitoring systems

systems that monitor employees' computers, e-mail activities, and internet surfing activities.

False: The PBX system is based on the telephone technology and does not require the Internet to function.

t or f: The Internet is the backbone for PBX. (private branch exchanges)

Cloud analysis

technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different group as far apart as possible.

One of the trends that is influencing the globalization of business is the increased role played by ________. technology offshoring outsourcing

technology (Page 17)

network of physical devices exchanging data in real-time with embedded chips to communicate performance over the internet.

the IoT (internet of things) is a growing topic in business and a hot IT career field. What best describes IoT?

POP post office protocol

the application layer of the Internet standard protocol and is used to retrieve email from a mail server

Confidentiality

the assurance that messages and information are available only to those who are authorized to view them.

The two objectives of data normalization are

the elimination of redundant data and ensuring that data dependencies are related.

Competitive intelligence

the process of gathering information about the competitive environment, including competitor's plans, activities, and products, to improve a company's ability to succeed.

User interface

the way for the decision maker to interact with the system

Enterprise resource planning systems (ERP)

tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive system. The focus for ERP is more internally focused on the business functions.

Relational database models were first developed in the 1970s. It has become the most widely used database model in business. Which one of the following traits is NOT one of the benefits leading to widespread use of relational database?

tree-like structure

Strategic information systems

use technology resources to enable an organization to meet a specific business goal or initiative and to provide a competitive advantage. The competitive advantage might involve better prices, better service, or perhaps a more innovative product.

Customer relationship management (CRM) systems

use technology to merge marketing with business processes to strengthen customer relationships and organize customer information. CRM begins with marketing to earn customers. Once a purchase is made, the business works to create a high-value customer who generates a revenue stream for the company. CRM manages the customer relationship, often in a very personal way, to develop a long-term relationship with that customer.

Predictive Analysis

uses infor and business analysis to build a predictive model for a given application

structured query language

uses relational databases to look for info

Data inconsistency is prevented by?

using referential integrity rules that ensure that the relationships of data between tables is consistent. Referential integrity rules prevent a user from adding a record to a table containing a foreign key unless there is a similar record in the linked table.

What does offshore outsourcing mean? using internal resources and contractors using internal and external resources to staff projects using resources that reside outside the country in another geographical region using contractors to staff projects

using resources that reside outside the country in another geographical region (Page 15)

Tertiary storage

usually consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs. With the intention of storing unchanging data, regular and frequent snapshots or backups of data are placed on magnetic or optical media and then stored and/or removed from the automated system and archived.

Large organizations leverage _____ network management applications to better handle changes and moves.

virtual

John Von Neumann

was the first to write about the computing structure

Cloud bursting

when a company uses its own computing infrastructure for normal usage and access the cloud when it needs to scale for high/peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes.

Duplicated systems development

where developers in the centralized location develop information systems and tools, which are then intended to be operated on similar systems at each of the international locations

web-enabled storefront

which enables the facilitation of e-commerce, yet another channel for a business to conduct business through.

he most common protocol is TCP/IP

which establishes the connection, and data packet quality transmission.

Electronic Data Interchange (EDI),

which is the electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention. It is most commonly used to exchange reports, purchase orders, or view invoices.

Database management systems allow businesses to organize large amounts of information. What is a popular online, collaborative database that contains a massive collection of data, categorized according to keywords and topics?

wikipedia

Computer programmers

write code to instruct computers to perform certain tasks.must have an eye for detail, along with strong analytical and problem solving skills.

Implementation stage

write detailed user documentation, provide training

Different Departments in Companies ■ Accounting ■ Finance ■ Human Resources ■ Marketing ■ Operations Management ■ Sales For the firm to be successful, all departments must work together as a common unit and share information, and not operate independently or in a silo.

■ Accounting - Monetary Data - Records, measures, and reports monetary transactions. ■ Finance - Monetary Data - Tracks strategic financial issues including money, banking credit, investments, and assets. *Human Resources - Employee Data -Maintains polices, procedures and plans for the effective management of employees. ■ Marketing - Transactional Data - Support sales by planning, pricing, and promoting goods and services. ■ Operations Management - Production Data - Manages the process of converting or transforming resources into goods or services. ■ Sales - Transactional Data - Performs the function of selling goods or services.

Four challenges associated with ebusiness.

■ Identifying Limited Market Segments. The main challenge of ebusiness is the lack of growth in some sectors due to product or service limitations. ■ Managing Consumer Trust. Internet marketers must develop a trustworthy relationship to make that initial sale and generate customer loyalty. ■ Ensuring Consumer Protection ■ Adhering to Taxation Rules. Companies that operate online must obey a patchwork of rules about which customers are subject to sales tax on their purchases and which are not

1) Information Type TRANSACTIONAL AND ANALYTICAL

■ Transactional information encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks. Organizations need to capture and store transactional information to perform operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry. ■ Analytical information encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks. Analytical information is useful when making important decisions such as whether the organization should build a new manufacturing plant or hire additional sales personnel. Analytical information makes it possible to do many things that previously were difficult to accomplish, such as spot business trends, prevent diseases, and fight crime.

Describe web 1.0 along with ebusiness and its associated advantages

■ Web 1.0 - Web 1.0 refers to the first stage in the World Wide Web, which was entirely made up of Web pages connected by hyperlinks. ■ See pic for ebusiness advantages

public-key encryption

(also called asymmetric encryption) a type of encryption that uses two different keys, a public key and a private key.

Mr. Alexander Graham Bell

_____________________________________was the inventor of the telephone more than 130 years ago

database applications enable businesses to store and analyze essential sales data

How can database applications help managers respond to changing market conditions?

Porter's Five Forces Model

1) Knowledgeable customers can force down prices by pitting rivals against each other. (buyer power) 2) Influential suppliers can drive down profits by charging higher prices for supplies. (SUPPLIER POWER) 3) Competition can steal customers. (RIVALRY AMONG EXISTING COMPETITORS) 4) New market entrants can steal potential investment capital. (THREAT OF NEW ENTRANTS) 5) Substitute products can steal customers. (THREAT OF SUBSTITUTE PRODUCTS OR SERVICES)

Information Partnership

2 or more companies cooperate by integrating IT systems, offereing customers the best of what each can offer

1. mobility 2. less expensive to deploy and maintian 3. scalability and flexibility in configuration

3 Reasons why businesses are deploying wireless networks

Computer Network

A group of two or more computers and other devices connected to each other, is a telecommunications network that enables computers to exchange data resources and information. They support the interactions between people, as well as the interactions between end users and the other components of an information system (e.g., hardware, software, and data resources).

A grocery store has an extensive inventory control process. They carry thousands of products and shelf-space for those products is competitive. If the grocery store is out of a particular item, then they are losing money. They need to keep all of their products in stock to meet customer demand and make a profit. This grocery store should consider looking into which system to help manage this type of information? A knowledge management system An enterprise resource planning (ERP) system A supply chain management (SCM) system A customer relationship management (CRM) system

A supply chain management (SCM) system (page 12)

Investment management, budgetary control, auditing; economic forecasting; global stock exchanges; managing multiple currencies Choices: Production and Operations Accounting and Finance Human Resources

Accounting and Finance (page 10)

65 years and older

Although teen usage of social media exceeds that of adults, what adult demographic is experiencing an increased use of social media, with 31% of members of that age group reportedly using social media?

TELNET

An early and insecure remote access protocol used to allow a user to log on to a remote system. Many newer, more secure, and more modern forms exist, including secure shell (SSH) and Remote Desktop Protocol (RDP).

Why an organization would want to integrate its databases

An integration allows separate systems to communicate directly with each other.

is a control known by quite a number of divisions and departments within an organization. to an accounting department implies that an impartial and independent third party will determine if policies and procedures have been followed, and whether fraud exists within the organization's finances.

Auditing

Several strategies for managing project risk exist. Match the correct risk management technique with the correct description. Mary has dinner plans with friends after work. Due to heavy traffic she realizes she will not be able to get to the restaurant at 6 p.m. as planned. She texts her friends and moves the dinner to 7 p.m.. Choices: Acceptance Avoidance Sharing Reduction Transferance

Avoidance (Page 15)

What are the two fastest growing trends in MIS that are impacting IT careers? Cloud computing and mobile platforms Centralized database and closed standards Mainframes and legacy software

Cloud computing and mobile platforms (Page 14)

Business Intelligence

Collective info about customers, competitors, business partners, competitive environment, own internal operations; used to make effective strategic decisions

What do database management systems provide?

Database management systems provide support for data integrity, keeping the database accurate and safe from unauthorized changes. Some organizations enforce a principle of least privilege, which suggests that to avoid fraud, abuse, and theft, personnel are given only enough access to a database in order to complete tasks within their job.

Enterprise resource planning systems typically utilize one _______________.

Database. Enterprise resource planning systems typically utilize one database to store all the information needed by the various business units. This allows for consistency within the business.

Planning

Define system to be developed, scope, and plan

Which of the following examples represents a one-to-one type of relationship between entities?

Each person has one social security number

Joe's Tire Store has been in business for 20 years. Last month, a new warehouse store opened a mile away. The warehouse store is able to sell tires at a bigger discount, and this is very concerning to Joe. Businesses must operate in the midst of many pressures. Which of the following pressures represent Joe's current dilemma? Economic pressure Political pressure Cultural pressure Technological pressure

Economic pressure (Page 15)

You need to design information systems that serve the existing organization, but you must be ready and willing to restructure the organization to take advantage of the improvements an information system can offer. Which takes precedence, the organization or the information system? Explain your reasoning.

Explanation: Neither takes precedence. The goal in designing and implementing information systems is to try and adapt the system to the organization and vice versa. Change is challenging for most organizations, so it must be done carefully and strategically. Changing the way things have been done in the past too quickly could create chaos, so implementing organizational changes and new systems incrementally will help and allow adaptation to occur more smoothly. Communication and training to all those involved is key. Introducing the changes gradually will be less disruptive for the business, if that is possible. (page 10)

communication and training

How are user expectations best managed during system implementation?

When identifying useful strategies for managing project risk, project and technology managers must look at the stakeholders involved to assess the risk to each; as well as to the projects that are on the critical path of the one being analyzed. To do this, it is helpful to identify who the stakeholders for each project are - including external and internal stakeholders. Sometimes a stakeholder is an organization or a group that isn't considered when conducting risk analysis. For example, a team may work on a project without looking outside the organization to see who influences the project or who, outside of the immediate business colleagues, may be impacted. Identify the internal and external project stakeholders from the list below. Supplier Choices: Internal External

External (Page 15)

Which industry would be the most affected by The European Union Data Protection Directive (1998)

Financial services, healthcare, and travel industries are industries most affected by the European Union Data Protection Directive because they involve a large amount of personal customer information.

Describe the seven phases of the systems development life cycle

Following are the seven phases of the SDLC: Planning (1), Systems Analysis (2), Systems Design (3), Development (4), Testing (5), Implementation (6) and Maintenance (7)

Which main business function is responsible for maintaining employee records? Human resources Finance and accounting Sales and marketing Production and operations

Human resources (page 10)

Information technology (IT) is used throughout computer-based information systems (IS). It is important to know their different uses. Choose whether the following examples are IT or IS. Data, voice, and video equipment

IT (page 9)

A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. Benefits include dynamic scaling and may include geographic distribution. An example would be Windows Azure or Rackspace.

Infrastructure as a service (IAAS)

facebook

Instagram, Pinterest, and Snapchat have experienced significant user growth, but still trail _________________ in number of users and user management.

Enterprise resource planning (ERP)

Integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations, at all times.

Explain why software problems are business problems.

MIS project failures can cost companies financially or even ruin business reputations. The primary reasons for project failure are: ■ Unclear or missing business requirements ■ Failure to manage project scope ■ Failure to manage project plan ■ Changing technology

Chapter 18

Methodologies for Supporting Agile Organizations"

Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Digital divide

Neg (page 9)

Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Misinformation

Neg (page 9)

Information systems support an organization's many functional business areas. These functional areas can be grouped into what two main categories? Marketing and sales Operations and management Finance and accounting

Operations and management (page 10)

transmit discrete, parsed data in small packets

Packet switching refers to a computer networks ability to do what?

Information technology impacts everyday life in many different ways. When looking at how it impacts business, education, and society, there are several positive and negative impacts. Decide whether each example is a positive or negative impact, and choose the appropriate response to indicate your decision. Globalization

Pos (page 9)

Explain project management and identify the primary reason projects fail.

Project Management—The application of knowledge, skills, tools, and techniques to project activities to meet project requirements. Primary reason for failure: ■ Unclear or missing business requirements ■ Failure to manage project scope ■ Failure to manage project plan ■ Changing technology

You are helping to design a spreadsheet table for accounting. You explain to the team that a spreadsheet table is similar to a database; the difference is that database tables have ________

Relationships

Prototyping

Sample of final design, users try it and give feedback

field- describes one piece of information for each record.

Sarah is a sales associate at a major bookstore. A customer calls the store to order a book, but he could only remember part of the book title. So, Sarah logs into the bookstore's DBMS and searches the book title _______________ for a listing of the book

Describe the relationship between information security policies and an information security plan.

See Pic

Describe the six major categories of hardware and provide an example of each

See Pic

Describe the three Business 2.0 tools for collaborating.

See Pic

Explain MIS infrastructure and its three primary types

See Pic

Explain topology and the different types found in networking.

See Pic

A system used to provide services to other systems. Servers need not be powerful computers. Server operating systems may be used on personal computers, including desktops or laptops, though usually servers are built on more resilient and reliable components.

Server

Tara has a blog about celiac disease and has many followers that want to discuss recipes and share with her. Choices: Online learning Virtual Office Online Dating Online Banking Social Media Networking Online Shopping

Social Media Networking (page 9)

Assume you are leading a team of project managers and conducting training for your group. Your objective for the day is to identify reasons that projects fail, with the ultimate goal of having each of your project managers assess their projects for potential risks. Identify reasons that projects fail from the list below. Choose all that apply: Stakeholders not supporting project manager through project milestones. Too much or too little planning and evaluation prior to project launch. Lack of stakeholder engagement during planning and implementation.

Stakeholders not supporting project manager through project milestones. Too much or too little planning and evaluation prior to project launch. Lack of stakeholder engagement during planning and implementation. (Page 15)

Strategic

Strategic Decision Making—Managers develop overall strategies, goals, and objectives

2) Information Timeliness

Timeliness is an aspect of information that depends on the situation. Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to requests. The growing demand for real-time information stems from organizations' need to make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully. Information also needs to be timely in the sense that it meets employees' needs, but no more.

Search engine optimization

Tools that allow webmasters and developers to achieve better rankings from search engines, implying that traffic would better route to a site as a result.

True or False. Relational database systems give organizations the ability to analyze data to make better and faster managerial decisions.

True

True or false. The decision to outsource or go offshore with a project is based on a lack of core competencies inside the business or where there is financial savings in labor cost.

True (Page 15)

True or False. If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single device, you would use a multiplexer.

True Correct! Data signals travelling over computer networks are combined together by the use of a multiplexer.

UI design

User interface, keep end user in mind, get feedback from users to create clear, intuitive controls

RFID tags can be passive but not inactive. That is, they must respond or be powered by readers or interrogator signals.

Which of the following is NOT applicable to RFID tags? RFID tags can be inactive. RFID tags can be passive. RFID tags can be active. RFID tags can be active via battery power.

FCC The governing bodies that define standards and help with the continuity of communications on the Internet include: IAB, ICANN, W3C, IETF, and IEEE, but FCC is the only governing agency that determines what is and is not acceptable on the Internet.

Which of the following is a governing agency that determines what is and is not acceptable on the Internet?

distributed model

connect separate components at different locations or within different units

Data generation sybsystem

contains facilities to help develop transaction-intensive applications

Variable

costs that change to acquire and product the product

The revolutionary Internet innovation has provided corporations with many applications to conduct business. For instance, an organization can utilize ______ to transfer documents automatically without human intervention to their suppliers. They can communicate with their stakeholders via ______. Their suppliers can access product and inventory information from the ______ and their customers can shop 24/7 via the _______. .

electronic data interchange electronic communications information repositories Web-enabled

The Internet layer

exchanges data sequences (known as datagrams) across network boundaries, providing a uniform network interface concealing the layout of the actual network connections.

Fixed cost

expenses that never change (ie rent)

A hypervisor

is an expensive virtual machine monitoring application used by large organizations to improve computer network performance without having to physically change the network.Although hypervisors have no routing capability, they enable network management through virtual design and operations.

Linux

is an open-source operating system that works on many devices and is similar to many of the other graphical user interfaces.This is a free OS and a re-creation of UNIX, but more popular than UNIX for workstations. Millions of programmers participate in its development.

Cloud computing

is facilitated by many computers meshed or connected together in what is termed cloud fabric, which provides common resources to service providers.

productivity

key benefit to wireless LAN networks

A restaurant develops a new ordering system that allows for online ordering both from desktop and mobile sites. No other restaurant in their local area is offering online ordering. This restaurant is using a business strategy of _____ Choices product differentiation growth

product differentiation (page 11)

digital

technological advances have enabled the redesign of telecom networks to carry text, video, or voice over the same network using _______________________signals.

intellectual property

the intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws.

risk

the likelihood that a threat will occur.

Relational database systems are valuable to organizations because ________.

they use SQL, which is easy to master, making it a very productive tool

back door

typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.

website address

unique name to identify a specific site

Multi table relationships

use different tables to keep track of various features of the same person

Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information. Even innocuous information tied with other innocuous information may, when combined, paint an attractive picture for identity thieves.

Dumpster Diving

(EDI) Electronic Data Interchange

What application provided by the internet allows a business to transfer documents automatically without human intervention?

volume, velocity, variety

What are the 3 V's used to describe big data?

False-Proprietary software is purchased by a license, which usually has an expiration or renewal date and download limits.

[True/False] Once a company has purchased proprietary software, there is usually no additional cost to allow other employees to download and use the software.

Conversion

__________________________ is the process of replacing the old system with new system.

is a programming environment that provides tools to developers to write code.

Integrated Development Environment (IDE)

Small systems are used on an individual basis (i.e., one-person use) and include traditional multicomponent desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers.

Personal Computer (PC)

is temporary or short-term storage used by the processor.

Random Access Memory (RAM)

One high-profile example of a malware threat is.................... which uses vulnerabilities in the most popular type of database, SQL, to modify, delete, or steal information.

SQL Injection

A person interacts with digital data through a physical environment.

Tangible User Interface (TUI)

are actions by which individuals may help to avoid data theft, but that may have little to do with the computer-based actions mentioned below.

Behavioral actions

A computer language similar to HTML, XML makes it easier to exchange, validate, store, and interpret data between a variety of applications and systems.

Extensible markup language (XML)

of 1999, which requires organizations and individuals to adhere to rules and procedures for storing and transferring financial information.

Financial Services Modernization Act (aka Gramm-Leach-Bliley Act)

is an important decision point for a business to implement controls or security for any risk, because managers need to evaluate the benefits versus the financial cost for implementing these controls.

cost-benefit analysis

Issues created by barriers to access, implying that some should have access while others should not.

Accessibility issues

was the first computer software language for business applications

Common Business Oriented Language (COBOL)

Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password. However, it can also take the form of a misleading and/or masked hyperlink that directs a victim to an official looking website (i.e. a pharming page) that asks for sensitive information.

Phishing

Offsite facilities shared with other organizations for the purpose of disaster recovery, requiring only adequate or prioritized staffing, but at a cost shared with another organization. An obvious disadvantage and risk is that multiple tenants affected by a common event may cause a conflict.

Shared hot sites

which is the medium through which communications between the input, processor, storage, and output occur.

System Bus

DSS (Decision Support System)

This system provides modeling and analytical tools that support middle to senior managers in all aspects of the decision making process, when problems are unique, unstructured, and not easily specified in advance, to project potential future trends.

ensures that only authorized personnel are admitted access.

Confidentiality

which specifies acceptable and tolerable uses of an organization's computer systems, equipment, and information assets.

Acceptable use

is the application of responsibility or an obligation to accept responsibility. An example might be the person who has agreed to pay for a meal that she or someone else has consumed.

Accountability

ensures that access to resources is unimpeded.

Availability

a computer hacker** with criminal intent.

Black Hat

is a process by which a business identifies its critical processes, or those areas of its business that must occur without failure lest the business will also fail. Such planning defines specific lengths of time for acceptable outages, responsible parties, contact information, and partners that have assumed the risk of supporting emergency continuity services.

Business continuity planning

Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.

Cold sites

a loss of access created by cut cables or power services, malware, hoaxes, bots and botnets (i.e. a computer or groups of hijacked computers to attack others, often without notice to their owners), smurf attacks, SYN floods, DNS poisoning, or outright hijacking and/or redirection of services.

Denial of service

is that which is primed for discharge in the case that a disastrous event occurs and business operations need recovery. Such measures include the creation and execution of processes, and the assignment of certain people to help to restore a business to an operational state.

Disaster recovery planning

are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong.

Ethics

Graphics, video, animations, and interactive multimedia are popular elements in Web pages. Popular tools used to create these elements include Adobe's Photoshop, Flash, and Premier products.

Graphics tools

a computer hacker** with skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or sold to the highest bidder.

Grey Hat

A form of supercomputer constructed from many smaller systems that have been connected together.

Grid computing

is a perceived, moral, or legal duty that someone possesses to control or handle a specific or general task.

Responsibility

Tools that allow webmasters and developers to achieve better rankings from search engines, implying that traffic would better route to a site as a result.

Search engine optimization

is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies. On the other hand, costs per byte for ........... have historically been quite a bit less than primary storage technologies. Examples of ............. include magnetic hard disk drives, which are spinning magnetic disks with moving read and write heads, as well as newer, more modern solid state nonvolatile flash storage. ............. also includes removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives.

Secondary Storage

A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.

Shoulder Surfing

This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly. Examples of supercomputer applications include simulating global weather patterns, decoding genome structures, or simulating the human mind.

Supercomputer

A weakness in the technology, process and procedure, or people involved with any given information asset. Such ,,,,,,,,,,,,,,, may include weaknesses in the technologies used, including their configurations, and the security policies that are enforced or not within an organization.

Vulnerabilities

With the increasing use of computer-based information systems, an ocean of data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or nonobvious relationships and connections, leading to breaches of privacy and trust.

Advanced Data Analysis

The damaging or potentially damaging acts that are the product of an attacker's process, which may include: reconnaissance, scanning, gaining and maintaining access, escalating privileges, building backdoors, and destroying evidence.

Attacks

A low tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot. A victim, through greed or curiosity might take such a device and plug it into a corporate computer, perhaps attempting to identify or return it to its owner or merely to obtain the value of the materials contained, but receive malicious code.

Baiting

include those actions that require the use of a computer to apply. Several tactics and strategies exist, though each is derived from behavioral actions, strategies, and tactics. Awareness, understanding threats, minimizing or eliminating risks of loss, and acting to ensure fraud and abuse is limited or eliminated will reduce the potential for impact from computer-related sources.

Computer based actions

of 1974, which requires educational institutions receiving certain federal funding to protect the information and privacy of certain aspects of a student record.

Family Education Rights and Privacy Act (FERPA)

of 1996, which requires organizations and individuals who handle medical information to adhere to rules and procedures for billing and information transfer.

Health Insurance Portability and Accountability Act (HIPAA)

A chip with multiple CPUs is called a ........ This typically provides more computing power for they can run multiple instructions in parallel.

Multicore processor

Services are provided in-house on servers or in a datacenter owned, managed, and administered by the organization.

On Premises (private cloud)

components include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).

Output

A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information such as names, addresses, phone numbers, usernames and passwords, and security questions and answers. One particularly insidious example of pharming is DNS poisoning, which changes the DNS record for a specific site to redirect all requests and web access to another specific site, even without providing the user with a fraudulent phishing message.

Pharming

of 2002, which requires organizations to adhere to rules and procedures to ensure the accuracy, integrity, and security of financial information that leads to the creation and storage of financial statements.

Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act)

An exchange of something of value for information. For example, the gift of a T-Shirt in exchange for personally identifiable information.

Quid Pro Quo

A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point. Organization entry points are often protected by electronic badge access, which may be circumvented by not allowing a door to close properly, or authorized personnel who are not observant, are ignorant of or not properly trained in information security, intentionally or unintentionally allowing an unauthorized person to enter an otherwise locked door.

Tailgating

MIS (Management Information Systems)

This system provides first level managers with reports that provide performance and historical records that help keep a business running smoothly.

EIS (Executive Information Systems)

This system supports senior executives in the form of data, graphs, charts to analyze long term trends.

The identified and unidentified actors that have the potential for attacking the information assets. Such actors may include elements both internal and external to the organization.

Threats

A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance.

Virtual computing

Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.

Warm sites

Many graphical and traditional text based HTML editors exist and range from the unsophisticated text editors to feature rich graphical WYSIWIG (What You See Is What You Get) interfaces. Modern popular examples include Adobe's Dreamweaver and Microsoft's Visual Studio.

Web design tools

A more powerful system used by individuals in order to run more resource-intensive applications.

Workstation

a threat or attack that exploits known or unknown vulnerabilities in software. Software developers quickly patch vulnerabilities once known, though identifying these vulnerabilities takes time. Once found and fixed, developers must send patches to all affected or potentially affected users, which, unfortunately, does not occur consistently. In other cases, the public release of patches is used as a tool for malware authors to reverse engineer and easily attack those who have not updated their systems in time.

Zero Day Attack

The evolution of software has produced the ability to manage large databases of information, known as

database management systems (DBMS)


Ensembles d'études connexes

Primary, Secondary, Tertiary prevention and health promotion. Mental_Health_2020

View Set

C14 Tort Law, Products Liability and Consumer Law study guide

View Set

CompTIA A+ Certification Core 1 (220-1101)

View Set