IS 4410 Exam 1 (CH 1 - 6)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Your new boss lets you know that, if you choose to bring your personal laptop to work, you will be held responsible for any damage or information loss. This is an example of... A BYOD policy A closed-source project A native application An open-sourced project

A BYOD policy

Steven is a new database manager at ABC.com. He has no knowledge of database as he is a graduate with a mechanical engineering degree. (Let's not ask how he got the job). He needs to design a new customer database. You need to help him to know which of the following is true about an E-R diagram? (Database) -An entity is extraneous information that is not relevant to the user. -An attribute describes the characteristics of the entity. -A relationship connects one attribute to another. -An identifier is an attribute that identifies numerous instances.

An attribute describes the characteristics of the entity.

Which of the following statement is true about unsupervised data mining? -Data miners develop a model prior to the analysis and apply statistical techniques to data. -Analysts do not create a model or hypothesis before running the analysis. -Unsupervised data mining requires tools such as regression analysis. -Neural networks are a popular unsupervised data mining application.

Analysts do not create a model or hypothesis before running the analysis.

Pokémon Go is a mobile application that uses the camera and GPS system of a user's phone to digitally superimpose imaginary creatures on top of real-world scenery. This is an example of... BYOD Virtual reality Augmented reality Internet of Things

Augmented reality

__________ is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.

Big Data

Best Buy has an approach that involves greeting customers when they walk through the front doors, offering assistance when people begin browsing through their product offerings, assisting with payment through payment plans, and offering returns for products that didn't meet customer expectations. What is this approach known as? Business Process Public Relations Bargaining power of customers Cost Leader Strategy

Business Process

Mary wants to create a database to track her movie collection. Each character of data she enters into the database is represented as a ________. (Database) File. Byte. Field or Column Record.

Byte

_____ code is highly protected and only available to trusted employees and carefully vetted contractors. Open Source Public Source Private Source Closed Source

Closed Source

ABC.com (US based) is hoping to utilize cloud hosting to deliver data to its global customers. An employee discovered a resource that allows ABC.com to deliver content from servers placed around the world. What service is he referring to? (The Cloud) Local Area Network Content Delivery Network Virtual Private Network IaaS

Content Delivery Network (CDN)

ABC is an accounting firm and is struggling to manage its IT/IS services. They wish to join many other firms that utilize Cloud hosting. Which is one reason why ABC should NOT move to Cloud hosting and instead remain in-house? (The Cloud) Small capital requirements Scalability to growing or fluctuating demand Focus on core business, not infrastructure Control of data location No obsolescence

Control of data location

McDonald's chooses a division of labor where their staff is inexperienced and must be trained before they can serve the general public. Thus, they do not have to pay high salaries to their workers. What kind of strategy has McDonald's successfully employed? Product Differentiation Early Adopter industry-wide Cost Leadership

Cost Leadership

Which of the following refers to the type of entity-relationship diagram that designates a 1:N (one-to-many) relationship? (Database) normalization Bullwhip Diagram Crow's-Feet Update Query

Crow's-Feet

Garlicoin--which traded at a price as high as $2.11 per "coin" on January 29, 2018--is a digital only currency that was first developed as a bit of an online joke. It was able to gain real value because of its popularity- despite having no gold backing. What is Garlicoin an example of? Cryptocurrency Stock Digital reality Internet of Things

Cryptocurrency

Rick is a database administrator and is in the process of designing a database. Which of the following would Rick have to create before he begins designing? (Database) Data tunnel outlay Data application Query model Data aggregator Data model

Data model (Before building a database, a logical representation of database data called data model must be constructed.)

You are tasked with helping a startup company create a new database. However, you do not know much about database processing. You choose to hire a vendor such as IBM or Microsoft to help through this process. What is this type of program called? Database Management System Business Process Development Software Database Defined Querying Database Model

Database Management System (DBMS)

Many business students may question why a database is necessary for a business to track information. "Why not just use an Excel spreadsheet?" Which reason explains why database processing is a crucial feature for any business to utilize? Databases can keep track of multiple themes. Databases have an online component that spreadsheets do not. Not every machine has access to Excel. Databases are easier for entry-level employees to understand.

Databases can keep track of multiple themes.

You own a company that outsources the manufacture of its product. The larger your order, the lower average cost per unit. What benefit does your company have in common with the cloud? The Internet of Things Economies of Scale Product Differentiation Ethernet

Economies of Scale

What is an advantage of the cloud compared to in-house hosting? (The Cloud) Economies of scale Control over disaster preparedness capabilities Control of data location In-depth visibility of security

Economies of scale

Similar to home electricity use, the cloud allows organizations to dynamically increase and decrease programmatically so that they only pay for the resources that they actually use. This is because cloud use is ____. Static Elastic Inelastic Rigid

Elastic

A lawyer with high-profile clients is concerned with the security of their data and wishes to maintain complete control over their data location. Under these circumstances, it would make sense for this legal office to store their data in the cloud. T/F?

False

T/F: Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) foreign key. (Database)

False

T/F: Database normalization is the process of converting a data model into tables. (Database)

False

T/F: In cloud computing, resources are said to be "pooled" because organizations share the same online software. (The Cloud)

False

T/F: Joe is a marketing manager who needs to extract important marketing information from his company's customer database which is currently not easily available via the company's database applications. He cannot wait until the IT team adds that functionality. So Joe should build his own new database application. This is acceptable practice because there is no issue with security and data consistency that the company should be concerned with. (Database)

False

T/F: Kim works at Cisco, a networking hardware and telecommunications company, as an analyst. She wants to show how an increase in YouTube views will positively impact Cisco's profitability. This needs an ability to model components of a system to connect inputs and outputs into a sensible whole. This shows her problem-solving skills. (The Importance of MIS)

False

T/F: The basic plumbing of the Internet is governed by protocols. A protocol is a set of rules and data structures for organizing communication. Net Neutrality is a protocol used between browsers and web servers. (The Cloud)

False

You have just begun working at a company who is starting to restructure their database. They have asked you to review the data model that was once used to build the database that is in effect today. However, you realize that the data model has two entities that were never added into the real database. Since they are not part of the actual database, it is not necessary to question if they should be incorporated when you meet with the IS department after your review. T/F?

False ("As a corollary, when asked to review a data model, take that review seriously. Devote the time necessary to perform a thorough review. Any mistakes you miss will come back to haunt you, and by then the cost of correction may be very high with regard to both time and expense.")

T/F: FunText is a company that owns an app used for text messaging. It recently offered a membership extension of six months, without any additional charges, to its existing customers who had registered for a three-year membership. By doing this, Funtext implemented the strategy of product differentiation. (Strategy and IS)

False (Competitive advantage by locking in customers)

T/F: You open up a new business competing with craigslist.com. As part of hiring new developers, you listed Ubuntu as a required skill. Ubuntu is a open source Windows-like desktop operating system. You selected Ubuntu because open source is free and that will always keep your operating cost low. According to the textbook, this is always the correct strategic decision. (Hardware, Software and Mobile)

False (This is false as sometimes support and operating costs (of using open source software) is more than the initial licensing fee of conventional software.)

T/F: Horizontal-market application software provides capabilities common across all organizations and industries. An example of such is Dentrix, a dental practice management software, that is used specifically in dental offices. (Hardware, Software and Mobile)

False (Vertical-market application software)

T/F: Web applications are generally used to create difficult and complex native applications resulting in high performance code. (Hardware, Software, and Mobile)

False (Web applications typically are limited by the capabilities of the browser)

T/F: Fair exchange is the principle where all data on the Internet is treated equally. This implies that carriers should NOT be able to charge varying rates based on content, application, or the user requesting the data. So for example, Netflix's data should NOT be treated differently than regular users. (The Cloud)

False (correct answer is net neutrality)

You have been assigned the task of creating a data model for the organization you work for. You begin to research the various components of a data model and find that entities are the "verbs" of a model and attributes are the "nouns." T/F?

False (this is reversed)

Uber, a ride-sharing app, began offering their services much before other now popular ride-sharing apps such as Lyft and Juno. What strategy did Uber benefit from? First Mover Advantage High Switching Costs Establish Alliances Early Product Differentiation

First Mover Advantage

________ in databases are columns or attributes that reside in different tables and point to the primary keys of other tables thus creating relationships between tables. (Database) Primary Keys Forms Foreign Keys Queries

Foreign Keys

Your startup company has begun making sales across the nation. You want to find out exactly how well the sales of your company has been doing by city. However, your data analyst tells you that they only have a system that can determine total sales by state. What problem is occurring with your startup's data? Inconsistent Data Granularity Dirty data Too Many Data Points

Granularity

A computer's CPU controls the flow of data according to its instructions. CPU's depend on a group of microchips located on the motherboard to process information. What is the CPU an example of? Software Hardware Firmware A byte

Hardware

A criminal investigator is working on a case involving cybercrime. They've been able to trace the origin of the suspicious activity to a local public library. Which of the following made this discovery possible? TCP IP Address CDN PAN

IP Address

Which of the following is NOT an advantage for companies who allow employees to use their personal mobile systems at work (BYOD)? (Hardware, Software, and Mobile) Reduced Need for Training Increased Data Security Cost Savings to the Organization Reduced Support Costs

Increased Data Security

A virtual private network (VPN) uses _____ to create the appearance of private, secure connections. (The Cloud) Private Clouds Databases Database Management Systems (DBMS) Internet

Internet

_____________ specifies that the number of transistors per square inch on an integrated chip doubles every 18 months. (Importance of MIS) Bell's Law Metcalfe's Law Nielsen's Law Moore's Law

Moore's Law

iPhones come with a pre-downloaded application called "Weather-" in which information can be found on the current and predicted weather anywhere in the world. This application is only available to and compatible with iOS. What type of application is this an example of? Native application One-of-a-kind application Web application Thin-client application

Native application

When you begin entering data into the database you have created for your organization, you realize that information is poorly structured and will cause issues further down the road. Perhaps you should break up the information into more, well-structured tables. Which process should you most likely undergo to alleviate the database of future error? Database Redesign Database Integrity Normalization Database Process Remodel

Normalization

After a successful marketing campaign, your company has sold over 125,000 units of its automated flying car. However, you have no idea how you plan to ship all these huge cars. What primary activity is your issue derived from? Inbound Logistics Outbound Logistics Customer Service Operations/Manufacturing

Outbound Logistics

Apple's AirPods are able to utilize wireless network technology to connect to a user's cellular device and play high-quality audio. Which type of network is this an example of? PAN LAN WAN MAN

PAN (Personal area network)

BI systems have 5 standard components. These are hardware, software, data, procedures, and _______. People Programs Machines Policies

People

You run Salt Lake's most successful diamond and jewelry store. One morning, you hear the news that overnight, one of the mines that your gems are harvested from has been detonated with C4. According to Porter's 5 Forces model, which threat is your jewelry store facing? Power of Customers Threat of New Entrants Power of Suppliers Rivalry

Power of Suppliers

If you are asking questions such as, "How can we increase sales?" and, "How can we reduce food waste?" You are in the _________ task of Business Intelligence Systems. Problem Solving Informing Deciding Project Management

Problem Solving

(Push/Pull) publishing requires the user to request business intelligence (BI) results.

Pull publishing

At the end of each year, Spotify, a digital musical service, sends a report to each of their listeners explaining how much time they spent listening to music, their favorite artists, songs, and albums. This is an example of _____ publishing. Pull Push

Push

__________analysis is a way of analyzing and ranking customers according to their purchasing patterns.

RFM

Which of the following is an example of volatile memory? (Hardware, Software, and Mobile) Solid State Drive (SSD) Random Access Memory (RAM) Magnetic Disk Hard Disk Optical Disk

Random Access Memory (RAM) (Volatile means that content are lost when power is lost.)

Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the MOST disruptive to the organization? (The Importance of IS) -Revamping sales procedures and training to include the new states. -Buying and Installing New Computers in the New Outlets -Developing New CRM Software for the Existing and New Outlets -Relocating Existing Employees and Hiring New Employees

Relocating Existing Employees and Hiring New Employees

Which programming language do businesses utilize to code inside a database? Python SQL Java PHP

SQL

University of Utah employees utilize Office 365 and its cloud capabilities to store and collaborate on files from multiple devices. This is an example of... PaaS (Platform as a Service) Traditional On-Premises SaaS (Software as a Service) IaaS (Infrastructure as a Service)

SaaS (Software as a Service)

The University of Utah has legally obtained the right to install Microsoft Office software on all of the computers available to students for use at the Marriot Library. This is an example of a... Site License PC Virtualization Open Source Application Closed Source Application

Site License

With reference to the picture below on RFM Analysis, which customer has not ordered in recent times but when it did order its orders were of the highest frequency and monetary value? [Business Intelligence] Customer: RFM Score: Big 7 Sports 5 5 3 St. Louis Soccer Club 1 5 5 Miami Municipal 1 2 1 Central Colorado 3 3 3

St. Louis Soccer Club

Dave Yang is the IT director of MJ Healthcare, a HMO (Health Maintenance Organization) in the state of Michigan. Healthcare is highly regulated in Michigan. Dave is considering moving MJ's IT infrastructure to the cloud. This may not be feasible. Why? (Cloud) -The cloud provides best of breed security and disaster recovery. -The cloud provides great flexibility and scalability. -The cloud may not make sense for those organizations that are required by law or by industry standard practice to have physical control over their data. -The cloud resources are pooled so the sharing of resources reduces overall cost.

The cloud may not make sense for those organizations that are required by law or by industry standard practice to have physical control over their data.

What is true about BI applications? [Business Intelligence] -Placing business intelligence (BI) applications on operational servers can dramatically increase system performance. -BI applications typically do not use mass amounts of data daily. -The purpose of BI applications is to extract large amounts of data and make that data available to those who need it. -The boundaries of BI systems are clear and concise.

The purpose of BI applications is to extract large amounts of data and make that data available to those who need it.

Content Delivery Networks are able to decrease load-time, increase reliability, and reduce the workload on the origin server. Which of the following characteristics of CDNs contributes to these benefits? They utilize Transmission Control Protocol (TCP) They hold specialized information that is frequently updated They increase delivery costs They are geographically distributed

They are geographically distributed

The United States Military requires a high-security, one of a kind application to fit their unique needs. Which of the following is NOT true about a one of a kind application? They require maintenance They are relatively inexpensive to develop Only trusted programmers can make changes to the code They are typically closed source

They are relatively inexpensive to develop

You are developing a new scheduling application for your personal business. The project has a relatively small budget and you don't believe it will increase appointments- merely the convenience of scheduling them. What type of application best suits your needs? Native application Thin-client application Social application Thick-client application

Thin-client application

After a piece of mail is addressed, the Postal system puts a "registered mail" sticker on the package. This sticker guarantees the delivery of the package. Similarly, after a packet of information is addressed on the Internet to a specific IP, what guarantees the timely and accurate delivery of the information packet? Domain Name System (DNS) Transmission Control Protocol (TCP) IP Address Domain Name

Transmission Control Protocol (TCP)

Before companies actually start on building a database, they often start out with a data model to determine which components are required for the database to be effective. T/F?

True

Netflix accounts for more than 30 percent of all Internet traffic in North America between 9 PM and 12 AM. Video streaming requires a relatively high amount of bandwidth to process. For this reason, Netflix most likely supports Net Neutrality. T/F?

True

T/F: A database is a collection of tables, relationships among rows in those tables, and metadata. (Database)

True

T/F: ABC.com sells medical products online. It has a database to track all its products and sales. This database keeps product names in two tables: product table and the sales table. This is likely to lead to a problem known as a data integrity problem. (Database)

True

T/F: Amazon Prime Air is exploring using drones to deliver Amazon orders. Such innovation affects competitive strategies because they represent potential opportunities or threats, to Amazon's ability to generate revenue. (Hardware, Software and Mobile)

True

T/F: Before you can send your box of candy to your friend, you need to put a shipping address on the package (e.g. 1111 N 2000 S Salt Lake City, UT 84111). Similarly, every location on the Internet needs a unique address. This is known as the IP address. (The Cloud)

True

T/F: Big data is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety. [Business Intelligence]

True

T/F: In a value chain, the difference between the value that an activity generates and the cost of the activity is called the margin. (Strategy and IS)

True

T/F: Information is knowledge derived from data, where data is defined as recorded facts or figures. (Importance of MIS)

True

T/F: Julie is a pharmaceutical salesperson who uses just-in-time data when she accesses a mobile system to obtain the latest literature on a new drug while waiting to see the doctor, who is her customer. (Hardware, Software and Mobile)

True

T/F: Karen bought a copy of Microsoft Office from the Bookstore. She started making copies and share with her two best friends. Why is this illegal? When an individual buys a software program for his or her personal computer, he or she is only buying a software license to use that program. (Hardware, Software, and Mobile Systems)

True

T/F: Michael was recently hired as part of the procurement team at ABC construction. His team's responsibility includes finding vendors, setting up contractual arrangements, and negotiating prices. In the generic value chain, this is part of supporting activities. (Strategy and IS)

True

T/F: One of the ways Information Systems creates competitive advantage is by providing support to a product and by becoming a part of the product. (Strategy and IS)

True

T/F: Online analytical processing (OLAP) is a type of reporting application that provides the ability to sum, count, average, and perform other arithmetic operations. [Business Intelligence]

True

T/F: Peter and Mark were on ABC.com purchasing product A. When Peter moved Product A to his shopping cart, he saw that there were 2 units left of Product A. While Peter was momentarily away, Mark purchased both units of Product A. When Peter came back, he was upset that there was no more left of Product A. This is known as the lost-update problem. (Database)

True

T/F: Sam started working for a local bank in town. He was shocked to learn that the bank's BYOD (bring your own device) policy is "We'll check it out, reload software, then manage remotely". This implies that Sam has to turn his mobile device over to his employer. (Hardware, Software, and Mobile)

True

T/F: The data characteristic of "timely" refers to the fact that data needs to be available at any given instance for its intended use (The Importance of MIS).

True

T/F: The three primary activities in the business intelligence (BI) process are to acquire data, perform analysis, and publish results. (Business Intelligence)

True

You are the CFO of a large firm in Salt Lake City. You receive a report each quarter of all the data your Finance department has utilized for the past three months. It is likely that the data was obtained from a data mart. T/F?

True

Your boss wishes for you to find all customers who live out of state by using a SQL command within the database. This is something that is possible to achieve through SQL. T/F?

True

Each year, you become excited when the new Apple iPhone releases. In your eyes, you would pay $2,000 for the latest and greatest Apple technology. What concept does this demonstrate? Profit Cost Value Margin

Value

Your local dentist utilizes a complex application that specifically tracks the status of teeth and the progression of abnormalities, such as cavities. What type of application is being used? Horizontal market application Vertical market application Free application One-of-a-kind application

Vertical market application

You are a small vendor that operates an online store. You decide to use cloud technology to help process orders/online activity and to store data. Which of the following is NOT a benefit of this decision? Small capital requirements Visibility of security Speedy development Known cost structure

Visibility of security

Snapchat is a social media application that is free to download and to use. What is Snapchat's monetized product? Freemium services News/content Filters You are the product

You are the product

In the topic of data warehousing, a _____ is a data collection that addresses a particular functional area of the business such as marketing, accounting, etc. [Business Intelligence] data mart Data warehouse database data source DBMS

data mart

Problematic operational data is termed as ___________ .

dirty data

In the more than 100 cities around the world in which Uber operates and Hyatt hotels are located, an Uber button will now appear under the My Reservations section of the Hyatt app from the day of check-in to the end of the stay. It offers guests the option to use available Uber transportation options to go from their current location to their Hyatt hotel and provides an estimated wait time. What competitive advantage is this called? (Strategy and IS) -streamlining the products -differentiating the industry -locking in customers -establishing alliances

establishing alliances

Middle-age Father: I am amazed that I can use my Nest to control the temperature of our house through my phone. 8 year old son: Dad, this disruptive force that is now changing the world is known as _______________. (Hardware, Software and Mobile) -social capital -Moore's law -the cloud -internet of things (IoT)

internet of things (IoT)

After working closely with the operations team of your company, you notice that the value chain seems to be more integrated than ever. What concept from the textbook did your firm successfully utilize? activities linkages margin outputs

linkages

Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________. reduce costs create a new product establish alliances lock in customers raise barriers to market entry

lock in customers

A baking company uses eggs, sugar, flour, chocolate chips, and water to create cookies. This is the ______ activity of their value chain. outbound logistics marketing inbound logistics operations

operations

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________. key attribute foreign key functionally dependent record primary key

primary key

Mark, a newly hired IT member of Company ABC, is tasked with maintaining a private internet and designs applications that the company has recently created. Part of his job includes creating a farm of servers and managing those servers by enforcing elastic load balancing. Company ABC essentially wishes for him to manage a _____? -WSDL -private cloud -VPN -SOAP

private cloud

King Kong Construction implements DOMO Business Intelligence software to achieve optimal efficiency and cost in allocating workforce to construction projects. By doing this, King Kong has achieved competitive advantage by ___________________________________. raising barriers of entry reducing cost via process implementations enhancing its products or services creating a new product or service

reducing cost via process implementations


Ensembles d'études connexes

Chemistry Chapter 9 Semester Study

View Set

Dental Hygiene Board Review 2018

View Set

Ch.8 - Business Markets and Buying Behaviors

View Set

Chapter 19: International Diversification

View Set

8th Grade Social Studies Chapter 22 Study Quiz

View Set