INFS Final review
an example of raw data from a national chain of automobile stores would be
1 Toyota RAV4 sold March 3, 2008, in Louisville, Kentucky
Linux is
An example of open-source software
Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?
Decision Support System (DSS)
_________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance
Decision Support systems (DSS)
the term "blank divide" refers to large disparities in access to computers and internet among different social groups and different locations
Digital divide
The use of digital technology and the internet to execute the major business processes in the enterprise is called
E-business
Buying or selling goods over the intent is called
E-commerce
Which of the following provides a suite of integrated software modules and a common central database that allows data to be used by multiple functions and businesses processes?
ERP system
which of the following types of systems helps expedite the low of information between the firm and its supplier and customer?
Extranet
You would use an MIS to help decide whether to introduce a new product line
False
which type of software is created and updated by a worldwide community of programmers and available for free?
Open-Source software
_____ systems integrate supplier, manufacturer, distributor, and customer logistics processes
Supply-chain management (scm) systems
Which of the following is one of the support activities in a firm's value chain?
Technology
Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses
True
A networks that cover entire geographical regions is most commonly referred to as a(n):
Wide Area Network(WAN)
a _____ is a senior management who oversees the use of IT in the firm
a chief information officer (CIO)
A Trojan horse:
a type of malware that appears to be legitimate software but secretly performs malicious actions
A characteristic or quality that describes a particular database entity is called a(n)
attribute
Enterprise software is built around thousands of predefined business processes that reflect:
best practices
A distortion of information about the demand for a product as it passes form one entity to the next across the supply chain is called the ___ effect.
bullwhip effect
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs. This is am example of:
click fraud
Which of the following refers to all the methods, policies, and organizational procedures that ensures the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
controls
_____ creates confusion that hampers the creation of information systems that integrate data from different sources.
data inconsistency
Data ______ occurs when the same data is duplicated in multiple files of database
data redundancy
A(n)________ signal is a discrete, binary wavefront that transmits data coded into two discrete states: 1-bits and 0-bits.
digital signal
Client/server computing is a :
distributed computing model where processing is split between "clients" and "servers"
Suing numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) _____ attack.
distributed denial-of service DDoS Attack
_______ are designed to support organization-wide process coordination and integration
enterprise applications
which of the following is not one of the competitive forces?
external environment
Computer networks that's use packet switching are less efficient than telephone networks that use circuit switching
false
Disintermediation does not benefit the customer.
false
IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise
false
In a client/server network, the clients sets the rules of communication for the network.
false
Strong linkages to customers and suppliers decrease switching costs
false
The internet increases information asymmetry
false
a hotel reservations system is typical emplace of a management information system
false
a firm can exercise greater control over its suppliers by having
fewer suppliers
A common field that links two different tables and serves as a primary key to one of these tables is called the:
foreign key
Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:
grid computing
Compared to digital goods, traditional goods have:
higher marginal costs and lower initial production costs
intellectual property can best be described as
intangible property created by individuals or corporations
Which of the following dimensions of e-commerce technology involves engaging consumers in a dialogue that dynamically adjusts the experience to the individual?
interactivity
In a ______ strategy, components arrive exactly at the moment they are needed and finished goods are shopped as soon as they leave the assembly line.
just-in-time (JIT) strategy
______ is a spyware that logs and transmits everything a user types
keylogger
executive support systems are information systems that support the
long-range planning activities of senior managment
Compared to traditional goods, digital goods have:
lower marginal costs and higher initial production costs
What is the primary benefit to consumers of disintermediation?
lower prices
Evil twins are:
malicious wi-fi access points that mimic legitimate public wi-fi networks
The universal standards of the internet and e-commerce lower which of the following?
market entry costs
Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?
modem
European privacy protection is blank than in the united States
much more stringent
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization
when a cookie is created during a web site visit, it is stored
on the visitor's computer
in a business hierarchy, the level that is for monitoring the daily activities of the business is
operational management
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling at their destination?
packet switching
Most computer viruses deliver a:
payload
All of the following are unique features of e-commerce technology, except:
peer-to-peer networking
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
ransomware
A(n) ______ represent data as two-dimensional tables
relational database
In a relational database table for customers, the information about a single customer resides in a single:
row
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
security
A network or organizations and businesses processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n):
supply chain
A company having difficulty with timely delivery of parts to its manufacturing plants should implement a _______ system.
supply chain management (SCM) system
Which of the following is the last entity in the downstream portion of a supply chain ?
the customer
Which of the following best illustrates the relationship between entities and attributes?
the relationship between a record and the field in that record
What event marked the beginning of e-commerce?
the sale of the first product online
Output is
transfers processed information to the people who will use it or to the activities for which it will be used
A query is a request for data from a database.
true
Authentication refers to verifying that people are who they claim to be.
true
E-commerce refers to the use of the internet and te web to transact business
true
Encryption is a key feature of a blockchain database
true
Enterprise systems are built around a small number of predefined business processes.
true
In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks.
true
Organizations car rewrite enterprise system software to support their existing business processes.
true
The internet is the largest implementation of client/server computing.
true
developing a new product, fulfilling an order, and hiring a new employee are examples of business processes
true
in the value chain model, primary actives are most directly related to the production and distribution of the firms products and services that create value for the customer
true
privalry is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations
true
spyware is software that comes hidden downloaded applications and can track your online movements
true
the dimensions of information systems are management, organizations and technology
true
In the supply chain, components or parts are referred to as:
upstream materials
Sets of loosely coupled software components that exchange information with each other using standard web communications standards and languages are referred to as
web services
_______ systems are designed to help firms manage their relationship with their customer
CRM (Customer Relationship Management) systems
which of the following is not an example of the merging mobile computing platforms?
CRM( Customer Relationship Management)
Converting raw data into a more meaningful form is called
Processing
Which of the following industries has a low barrier to entry?
Retail, food trucks, freelancing, lawn, e-commerce
Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?
Router
Enabling management to make better decisions regarding organizing and scheduling sourcing production and distribution is a central feature of
SCMs (Supply Chain Management systems)
A set if self-contained services that communicate with each other to create a working software applications is called
SOA (Service-oriented architecture)