ISYS 363 Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a business benefit of collaboration?

Improved compliance with government regulations

A bank has reworked its mortgage application process so that several steps are handled by computer software, and some steps are combined to reduce bottlenecks in processing. The goal is to gradually improve its efficiency over time. This is an example of:

buisness process redesign

When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________.

bullwhip effect

A(n) ________ is a force in the environment that requires a company to address it.

business driver

Global communication and transportation technologies are an example of a(n) ________.

business driver

A(n) ________ includes interdependent networks of suppliers, distributors, and outsourcing firms.

business ecosystem

Some ERP vendors include in-memory-computing technology that provides ________ tools for ad hoc analysis, what-if scenario analysis, and machine learning that analyzes very large data sets.

business intelligence

The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.

Privacy Act of 1974

______ software helps organizations manage portfolios of projects and the dependencies among them.

Project portfolio management

____ are used to track movements of products through the supply chain.

RFIDs

____ is used to create a workable system in a very short amount of time.

Rapid application development

Which of the following is not one of the main benefits to implementing global systems?

Reduced hardware and software costs

________ is a method for encrypting network traffic on the web.

SSL

In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.

Sarbanes-Oxley

The data and software tools for organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions are referred to as ________ systems

business intelligence

Downloading a movie from the Internet is an example of _____

digital goods

MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted.

disaster recovery planning

An innovation that dramatically changes the business environment is called a(n) ________.

disruptive technology

A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the globe, with special time-keeping tools to synchronize the data and ensure the data are always consistent.

distributed

A ________ is a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual.

domain

The Domain Name System (DNS) converts ________ to ________.

domain names; IP addresses

A company that purposefully centralizes most business activities in its home country is said to utilize a(n) ________ strategy.

domestic exporter

Because Caterpillar centralizes corporate activities in the United States, it is said to have a(n) ________.

domestic exporter strategy

Business processes that cross many different functional areas and require coordination across departments are supported by ________ among the participants.

flows of material, information, and knowledge

TCP/IP was originally developed in the 1970s to support ________.

the department of defense

Regarding the decision-making process, ________ includes discovering and understanding problems occurring in the organization.

intelligence

The iPhone voice Siri is a type of ________.

intelligent agent

A(n) ________ is a major type of KM, which provides tools for discovering patterns and applying knowledge to discrete decisions.

intelligent technique

Examining the global environment represents the first dimension for a(n) ________.

international information systems architecture

The ________ is the world's most extensive, public communication system.

internet

The world's largest network is the ________.

internet

In the music industry, ________ are considered a newer substitute for CD-based music stores.

internet music services

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

internet service provider

A supply chain management system is considered a type of ________ system because it shares data across multiple organizations.

interorganizational

When managers represent their company in the outside world and perform symbolic duties, they are acting in their: Select one:

interpersonal role

Using Internet technology to create an internal system is called a(n) ________.

intranet

An Internet Protocol (IP) address ________.

is a 32-bit number assigned to every computer on the Internet

The technique of ________ accelerates the generation of information requirements through interactive sessions involving end users and information systems specialists.

joint application design

If someone loads a program that tracks everything you type, the specific spyware is a(n) ________.

key logger

A scientist who works to create information for organizations is considered a(n) ________ worker.

knowledge

To transform information into ________, a firm must expend additional resources to discover patterns, rules, and contexts.

knowledge

A(n) ________ system helps capture, manage, and apply the experience of the organization.

knowledge management (KM)

Functional information systems that operate independently of one another are becoming a thing of the past because ________.

they make sharing information across functional systems difficult

What analytical framework helps understand and evaluate the benefits and uses of collaboration tools?

time/space matrix

The first step of the systems analysis process is ________.

to define the problem

A unified threat management system does NOT include a(n) ________.

token

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

trade secret

Public key encryption uses ________ key(s).

two

Thompson Manufacturing implemented a decision support system (DSS) with the goal of ________.

understanding the impact on production schedules if sales were to double in a future month

_______ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

computer forensics

The technical approach to information systems includes ________.

computer science and management science

Coaxial cable is a(n) ________ for linking network components.

connection medium

Buying a silver coin from an individual on eBay is an example of ________ electronic commerce.

consumer-to-consumer (C2C)

A(n) ________ is an Internet business model in which information content is sold and distributed.

content provider

The final step in the business process management approach is the ________ phase.

continuous measurement

Telephone and computer networks are ________.

converging into a single network using shared Internet-based standards Correct Answer

A key word in social business is​ ________.

conversations

When developing a global system, bringing the opposition of local groups into the process of designing and implementing the solution without giving up control over the direction and nature of the change is called:

cooperation

Allowing each country unit the opportunity to develop an application first in its home country is a(n) ________ strategy.

cooptation

Companies that establish a competitive advantage by having the lowest prices in an industry are using a ________ approach.

cost-leadership

If an employee attempts to purposefully block the implementation of a new system, this is called ________.

counterimplementation

An example of ________ includes someone taking out a loan and then being sold a checking account as well.

cross-selling

According to the balanced scorecard framework, a firm's ________ strategic objectives include customer loyalty and customer retention.

customer

Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called ________.

customer lifetime value

Some say that a firm's most valuable asset is its ________.

customer relationships

Businesses that collaborate and use social business often see benefits in productivity, quality, innovation, sales growth, and ________.

customer service

The intangible benefits of information systems, such as ________ and ________, cannot be immediately quantified but may lead to quantifiable gains in the long run.

customer service; enhanced decision making

Customer relationship management includes ________.

customer support applications

A raw fact would be considered ________.

data

The millions of product bar codes scanned at supermarket checkout counters everyday are examples of ________.

data

______ businesses gather and sell personal information to businesses and government agencies.

data broker

Data cleansing, working to identify and fix incorrect data, is also called ________.

data scrubbing

A(n) ________, such as a clerk, uses data for things such as scheduling.

data worker

A(n) ________ is a collection of data organized to serve many applications efficiently.

database

A ________ is software that enables an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs.

database management system (DBMS)

SQL injection attacks are related to _____

databases

Regarding global strategy and systems configuration, multinational strategies system configuration is predominantly ________.

decentralized

A manager's ________ role includes handling disputes.

decisional

Transaction costs tend to ________ as a firm moves from a local to global system.

decrease

The Internet around the globe has dramatically ________ networking problems.

decreased

iTunes has dramatically ________ illegal music downloads.

decreased

A ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.

denial of service

Regarding the decision-making process, ________ includes examining alternatives to solve the problem.

design

The Internet has made intellectual property ________.

difficult to protect

A(n) ________ signal is a discrete, binary waveform

digital

________ are data files used to identify and protect online transactions using a trusted third party

digital cert

A display that presents graphs and charts of key performance indicators on a single screen for managing a company is called a ________.

digital dashboard

_______ represents an organization's business processes that are designed to create, store, transfer, and apply knowledge.

knowledge managment

A(n) ________ is a major type of KM, which includes specialized workstations that enable scientists, engineers, and other knowledge workers to create and discover new knowledge.

knowledge work systems

A job opening for someone who "has the ability to use analytical reasoning and relevant judgment to address customer service issues, as well as generate new ideas," would be best filled by a(n) ________.

knowledge workers

Which of the following people are responsible for designing products or services and creating new knowledge for the firm?

knowledge workers

Neural networks ________ to distinguish between valid and fraudulent credit purchases.

learn from patterns in data

A MOOC is:

learning machinee system

______ systems are used by both organizations and universities to manage, deliver, and assess learning and training content.

learning managment

_______ is defined as the extent to which your authority is accepted on grounds of competence, vision, or other qualities.

legitimacy

Gantt charts ________.

list project activities such as start and completion dates.

A small business that connects personal devices within a 500-meter radius is a(n) ________.

local area network

The process of converting software to operate in a second language is called software ________.

localization

The global positioning system (GPS) enables ________-based services for consumers via their smartphones.

location

________ is the study of how computers can potentially improve without human programming.

machine learning

The competitive rivalry force of the Internet is strong because it has ________.

made it easier for companies to compete on price alone

The typical computing configuration in 1960 was ________.

mainframe

Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed:

maintence

___ includes computer viruses, worms, and Trojan horses.

malware

The most common type of computer security incident is ________.

malware infection

Determining if you can convince local units to conform to international standards is part of the ________ dimension for developing an international information systems architecture.

management and business processes

________ deals with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by managers and employees.

management information systems (MIS)

In an enterprise system, the integrated software modules that focus on procurement and inventory management are related to ________.

manufacturing and production

Customer relationship management applications that track campaign data are related to the ________ aspect of customer relationships.

marketing

A broad term to describe extending a marketplace beyond traditional boundaries is called ________.

marketspace

All of the following are long-term strategic factors that should be considered in making the business case for a new information system except:

matching or exceeding competitor capabilities

Management information systems (MIS) provide ________.

middle managers with reports on the organization's current performance Correct Answer

Because Walmart has an efficient inventory replenishing system, they are able to reduce ________ costs.

overhead

Slicing digital messages into parcels is called ________.

packet switching

A router is a communication processor used to pass ________ through different networks. Option

packets of data

Regarding business intelligence and analytics capabilities, a(n) ________ could enable users to filter data and isolate impacts of variable changes.

parameterized report

The Children's Online Privacy Protection Act (COPPA) focuses on ________.

parental permissions

The most commonly used authentication technique for end users is ________.

password

A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years.

patent

In the context of data mining, the term associations refers to:

patterns that describe a group to which an item belongs.

Information systems project costs include hardware, software, and _______.

personnel

Although "Big Data" does not refer to a specific amount of data, it usually does involve ________.

petabytes

The systems development life cycle method for building an information system is a(n) ________ approach.

phased

The ________ is a conversion strategy where the implementation occurs over time. For instance, only part of a new payroll system is initially implemented.

phased strategy

If someone sends you an email trying to appear as a normal site that you commonly visit to obtain unauthorized information, the person is ________.

phishing

Microsoft's Azure ________ provides a set of development tools and IT services that enable users to build new applications and run them in the cloud on their data center infrastructure.

platform as a service (PaaS)

Determining all information systems projects and assets is central to a(n) ________ analysis.

portfolio

FedEx has been using ________ to develop models of how customers will respond to price changes and new services.

predictive analytics

Selling the same goods to different targeted groups at different prices is called:

price discrimination

According to the value chain model, sales and marketing is considered a ________ activity of the firm.

primary

All of the following are currently being used as human traits that can be profiled by biometric authentication except:

retinal images

The ________ of the web makes it possible to deliver messages with text, audio, and video simultaneously to large numbers of people.

richness

Another name for standard operating procedures for creating goods and services is (are) ________.

routines

A common term for projects that exceed original schedule and budget is ________.

runaway projects

Managers often maintain a(n) ________ as a buffer for uncertainty and unforeseen events.

saftey stock

Customer relationship management applications that track Web sales and retail store sales are related to the ________ aspect of customer relationships.

sales

In an enterprise system, the integrated software modules that focus on quotes and order processing are related to ________.

sales and marketing

If a new database is not part of a project, it is said to be outside the ________.

scope

A ________ is beneficial for selecting a project based on an organized set of criteria.

scoring model

Which of the following is not an example of the mobile digital platform?

sds devices

A decision where only part of the problem has an obvious answer is an example of a(n) ________ decision.

semistructured

On a client/server system, most of the powerful processing is handled by the ________.

server

Customer relationship management applications that track social networking data are related to the ________ aspect of customer relationships.

service

A ________ is a program that monitors information traveling over a network and ________.

sniffer; is never legitimately used

Incorporating applications that allow customers to chat with one another about company products is an example of ________.

social CRM

If a cookie company uses Facebook to help it "listen" to its customers' responses to new cookie recipes, they are embracing ________.

social business

According to the E-Commerce Presence Map, activities such as conversation and engagement are considered a(n) ________ type of presence.

social media

E-commerce has become more ________.

social, mobile, and local

The information systems approach to this textbook is the ________.

sociotechnical approach

In information systems, SaaS stands for ________.

software as a service

Google Apps are an example of ________.

software as a service (SaaS)

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:

software packages.

One major challenge in developing an international information system is to find a(n) ________ when there is so much cultural and lingual variation.

standardized global computing platform

A company that produces a new low-cost product based on improved decision making has likely achieved a(n) ________.

strategic business objective

A top-down chart showing each level of design, its relationship to other levels, and its place in the overall design structure is a ________.

structure chart

A(n) ________ methodology is process-oriented and develops in a step-by-step technique, with each step building on the previous one.

structured

Not allowing credit if an individual's credit score is below 600 is an example of a(n) ________ decision.

structured

"Training" a system by providing specific examples of desired inputs and outputs identified by humans in advance is called ________.

supervised learning

A ________ chain is a network of organizations for obtaining raw materials.

supply

According to the value chain model, employee recruiting, hiring, and training are considered a __________ activity of the firm.

support

According to the value chain model, technology is considered a ________ of the firm.

support activity

Regarding moral dimensions of the information age, ________ include(s) the issue of what standards should we demand to protect the safety of society.

system quality

In networked systems:

systems development and operations occur in an integrated and coordinated fashion across all units.

An international information systems architecture specifically includes ________.

systems required by organizations to coordinate worldwide

If an information system enables employees to handle transactions more quickly, the system achieves a(n) _________ productivity benefit.

tangible

The final consideration of an international information system architecture is the ________.

technology platform

T1 and T3 are international ________ standards for digital communication.

telephone

Regarding the systems development process, ________ addresses the question, "Is the system producing the desired results?"

testing

The "patent trial of the century" in 2011 was between ________ and ________ for violating patents for iPhones.

Apple; Samsung

Which of the following techniques stops data packets originating outside the organization, inspects them, and uses a proxy to pass packet information to the other side of an organization's firewall?

Application proxy filtering

_____ allows scientists the ability to create graphical renditions of DNA.

Augmented reality

Which of the following is NOT part of the analysis of a situation that presents an ethical issue?

Avoid actions with extremely low failure costs.

_______ services ensure that a firm's new infrastructure works with the firm's older systems and that all parts of the firm's infrastructure work together.

Software integration

SQL stands for ________.

Structured Query Language

The use of computers (hardware and software) to emulate human behavior is called ________.

AI

Microsoft's DBMS that includes built-in report generation and reporting is called ________.

Access

Which of the following enables a company's business processes to be a source of competitive strength?

Business processes that allow the company to innovate or execute better than its rivals

Using your handprint to access a safe deposit box is an example of ________ authentication.

biometric

A ________ is the smallest component in the computer system data hierarchy.

bit

Digital information transfer speeds are measured in ________.

bits per second

Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority?

blockchain

Cooptation is defined as ________.

bringing the opposition into designing and implementing a solution

Major challenges of international software application include ________.

building applications that work with multiple cultural, lingual, and organizational frameworks

In 2019, global spending on information technology and information technology services was nearly _______.

$3.8 Trillion

The size of a nanotube is about ________ thinner than a human hair.

10,000 times

Approximately how much revenue was generated by e-commerce sales worldwide in 2019?

3.6 trillion

According to small world theory, you are only ________ links away from any other person on earth.

6

Copyright protects creators (individuals) of intellectual property for ________.

70 years after the author's death

______ is the standard for wireless technologies.

802.11

Bluetooth is another name for the ________ wireless networking standard.

802.15

Copyright protects creators (corporate-owned) of intellectual property for ________.

95 years after the initial creation

________ include(s) the strategy and policies for using information technology within an organization.

IT governance

Which of the following statements about features of organizations is not true?

Organizational culture is a powerful restraint on technological change.

Which of the following options is NOT a unique feature of e-commerce technology?

Our geographic boundaries now determine our network experience

The right to ________ is a feature of the GDPR that allows individuals to request that organizations delete their personal data.

be forgotten

___ targeting techniques increase the effectiveness of banners, rich media, and video ads.

behavioral

Sending a copy of an airline boarding pass to your printer is an example of ________.

output

The primary benefit of disintermediation to the consumer is ________.

removing layers and reducing costs

A detailed list of questions submitted to package-software vendors is called a ________.

request for proposal

According to your text, Elemica's website for buying and selling chemicals is an example of ________ electronic commerce.

B2B

A large grocery chain has implemented a solution using superwide angle, low-light HD cameras that enable viewing and tracking products on the shelves in real time. Which of the following options BEST describes the effect of this technology on business?

Businesses are using information technology to achieve higher levels of operational efficiency.

How do information systems support the activities in a supply chain?

By reducing inventory levels

Which of the following is NOT a challenge to the implementation of an ERP?

Dramatic reductions in inventory costs and order to delivery time

Which of the following information systems supports a manager's role as a resource allocator?

C.Telepresence systems

____ allows for the automated creation of designs using advanced graphics software.

CAD

Another name for computer-aided systems engineering is ________.

CASE

_____ are one of several techniques used to measure the value of investing in long-term capital investment projects.

Capital budgeting models

____ are small text files loaded on a computer when a user visits websites.

Cookies

Which of the following options is a challenge to the sustainability of strategically implementing an information system?

Coping with competitors who retaliate and copy strategic systems

A(n) ________ is an excellent tool for representing a system's component processes and the flow of data among them.

DFD

What service converts natural language names to IP addresses?

DNS

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

DSL

Which of the following systems would BEST support managers who focus on unique problems for which the procedure to arrive at a solution may not be fully predefined in advance?

Decision-support

If almost all an organization's significant business relationships are digitally enabled, it would be called a(n) ________.

Digital Firm

_____ enables the computer-to-computer exchange between two organizations of standard transactions such as invoices, shipment schedules, or purchase orders.

EDI

Which of the following is NOT one of the challenges in developing global systems?

Encouraging local users to deliver fast results

________ help businesses become more efficient by integrating functional business processes into a single information system that spans all business areas.

Enterprise resource planning (ERP) systems

According to your readings, ________ was able to link external suppliers, which allowed it to obtain more than 70 percent of parts from outside the organization.

Ford

Mapping areas of a state with higher diabetes rates is an example of a ________.

GIS

Which of the following statements about machine learning is not true?

Genetic algorithms are a form of machine learning. idk

_______ is the world's largest search engine.

Google

________ was passed in 1996 to protect medical records.

HIPAA

The act that aims at protecting medical records is the ________.

HIPPA

Which of the following options is a page description language for generating web pages (e.g., text, dynamic links)?

HTML

_____ is the most popular NoSQL DBMS.

Hadoop

Which of the following is a question that might be answered by an MIS system?

How do actual sales for each quarter compare to projected sales?

The principal capital budgeting models for evaluating IT projects are the payback method, the accounting rate of return on investment (ROI), net present value, and ________.

IRR

________ includes hardware and software an organization needs to compete in the marketplace.

IT

________ includes components that collect, process, store, and distribute information to support decision making and control in a business.

Information Systems (IS)

Which of the following is NOT a strategic objective that drives business firms' investment in information systems?

Intellectual property management

Which of the following options has drastically reduced the costs of operating and transacting on a global scale?

Internet

What makes a Blockchain system possible and attractive to business firms?

Its encryption and authentication processes make it highly secure for storing many kinds of data.

The SQL ________ statement allows you to combine two different tables.

JOIN

Identifying ________ is a way for managers to determine how to measure the effectiveness of an organization.

KPI's

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's Categorical Imperative

Which of the following statements about knowledge is not true?

Knowledge involves knowing how to follow procedures.

How is a knowledge asset different from a physical one?

Knowledge is not subject to the law of diminishing returns as physical assets are.

What types of companies have been displaced by Voice over IP (VoIP)?

Long-distance telephone carriers

____ enable(s) fast delivery of applications with minimal hand-coding.

Low-code development

A massive online course available to the general public is called a ________.

MOOC

Which of the following options is NOT part of the competitive forces model for IT infrastructure investment?

Market supply of your firm's services

____ scans data and can help identify a man at a ticket counter who shares a phone number with a known terrorist.

NORA

An emerging non-relational database management system is called ________.

NoSQL

______ include two organizations sharing expertise.

Synergies

____ is the analysis of a problem that a firm tries to solve with an information system.

Systems analysis

______ establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent.

TCP

________ focuses on achieving quality as a primary goal of all individuals within an organization

TQM

Which of the following options increases the strength of the market entrant force?

The availability of a younger workforce with the necessary knowledge and skills at an advantageous cost

An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats.

audit

How do organizations identify core business processes?

They conduct a business process analysis.

A ________ is a software program that mimics another program and often causes damage.

Trojan horse

_______ increase(s) security by validating users through a multistep process.

Two-factor authentication

Which of the following is NOT an example of a company's transaction processing system?

Walmart's internal email system

Which of the following options is NOT typical of systems development projects that are mismanaged?

Widely adopted and used for its intended purpose

____ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used for transferring data.

XML

The most common cause of repetitive stress injury (RSI) is ________.

a computer keyboard

In most cases, a business ecosystem includes ________.

a few keystone firms

________ is used to ensure the person is who he/she claims to be.

authentication

A web interface that presents integrated personalized business content delivered to senior managers is ________.

a portal

While users are concerned about an information system delivering the information needed for work, designers might be concerned about:

accessing the data on iPhones and tablets.

Regarding moral dimensions of the information age, ________ include(s) the issue of who can and will be held liable for harm done to property rights.

accountability and control

The doubling of computing power every 18 months has raised questions about the ________.

accuracy and reliability of information systems

An extranet is a system that shares data ________.

across multiple organizations

Regarding business intelligence and analytics capabilities, a(n) ________ allows users to generate their own reports based on searches.

ad hoc query

Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.

administrative

Which of the following is not a mediating factor that impacts an organization's relationship with information technology?

agency costs

Breaking down large projects into smaller projects to be developed in less time is an example of ________.

agile development

Information systems enhance core competencies by:

allowing operational employees to interact with management

The Law of Mass Digital Storage suggests that the ________.

amount of digital information doubles each year

Competitor firms' IT services are ________ of the competitive forces model for IT infrastructure.

an external factor

A handheld scanner is used to capture bar codes on the tickets collected at a sports event. The scanning action is considered ________.

an input

Your firm's business strategy is ________ of the competitive forces model for IT infrastructure.

an internal factor

A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.

analog

Analytical CRM includes applications that ________.

analyze customer data for improving business performance

Organizational learning is the result of knowledge ________.

application

Enterprise applications have drawbacks mainly because they ________.

are very expensive to purchase and implement

Transaction processing systems (TPS) are information systems that are ________.

associated with the elementary activities and transactions of the organization.

Another name for a database field is a(n) ________.

attribute

The most common form of IT-enabled organizational change is(are) ________.

automation

From an information technology perspective, ________ includes the infrastructure for warehousing, integrating, reporting, and analyzing data from the business environment.

business intelligence (BI

A strong foundation in database technology is required for ________.

business intelligence and analytics

How a company produces, delivers, and sells its products and services in the marketplace is called a(n) ________.

business model

A collection of routines for producing goods and services is called a(n) ________.

business process

According to the balanced scorecard framework, a firm's ________ strategic objectives include accident ratios and equipment downtown.

business process

The logically related tasks and behaviors that companies carry out to achieve a specific outcome are called ________.

business processes

Barnes and Noble.com is an example of ________ electronic commerce.

business-to-consumer (B2C)

Based on your reading, information systems help businesses compete ________.

but do not guarantee a successful outcome

A ________ is a component in the computer system data hierarchy that represents an ASCII character like a letter, a number, or another symbol.

byte

A cloud ________.

can be private or public

One advantage of developing a prototype is that a system manager ________.

can go through several iterations

Viruses differ from worms because worms ______

can operate on their own without attaching to other computer program files

Customer relationship management primarily includes ________.

capturing and integrating customer data

Regarding global strategy and systems configuration, domestic exporter's system configuration is predominantly ________.

centralized

During the implementation process, the systems analyst is a(n) _________.

change agent

Information system building frequently fails due to a lack of attention to organizational __________.

change management

In many companies, the information systems department is headed by a(n) ________.

chief information officer (CIO)

The ________ model of management describes the five traditional functions of managers as planning, organizing, coordinating, deciding, and controlling.

classical

Structured projects have ________.

clear requirments

A company hires a third party to click on its competitor's online ads, with no intention of learning more about the advertiser or making a purchase. This is an example of ________.

click fraud

Computer processing work that is split between a desktop computer and a more powerful computer that processes and stores shared data, serves up web pages, or manages network activities is called ________ .

client/server

______ refers to a model of computing that provides access to a shared pool of computing resources over the Internet.

cloud

Working together as a team to align a competitive strategy with the company's goals is an example of ________.

collaboration

In the domain name "http://books.pearson.com", which element is the second-level domain?

com

A ________ is an informal social network of professionals and employees within and outside the firm who have similar work-related activities and interests.

community of practice

A(n) ________ is an Internet business model that provides an online meeting place where people with similar interests can communicate and share information.

community provider

Regarding business intelligence and analytics capabilities, a(n) ________ allows moving from a high-level summary to a micro-level view.

drill down

Regarding global strategy and systems configuration, franchiser strategies system configuration is predominantly ________.

duplicated

If a website changes its prices based on the demand characteristics (e.g., concert tickets), this would be an example of ________.

dynamic pricing

The fastest growing form of retail trade in the United States, Europe, and Asia is ________.

e-commerce

A(n) ________ is an Internet business model that provides an initial point of entry to the web along with specialized content and other services.

e-portal

A(n) ________ is an Internet business model that sells products directly to consumers or to individual businesses.

e-tailer

According to the E-Commerce Presence Map, activities including newsletters are a(n) ________ type of presence.

email

A(n) ________ makes values from a central database available for applications that support all an organization's internal business activities.

enterprise resource planning (ERP) system

SAP is an important vendor of ________.

enterprise software

A(n) ________ is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.

enterprise software application

A(n) ________ is a major type of KM that collects, stores, and disseminates digital content and knowledge

enterprise-wide KMS

A(n) ________ is the most popular method to model a database.

entity-relationship (ER) model

The interaction of people and machines in the work environment is the study of ________.

ergonomics

Predictive analytics is used for all of the following except:

establishing consumer credit scores.

_____ refers to the principles of right and wrong that individuals use to make choices.

ethics

The acronym ESS stands for ________.

executive support system

A(n) ________ is used by senior managers to make decisions.

executive support system (ESS)

A(n) ________ system is a decision-making tool that follows a series of IF-THEN-ELSE rules

expert

Firms use a(n) ________ to coordinate their activities with other firms.

extranet

Which of the following is a private corporate network extended to authorized users outside the organization?

extranet

According to Moore's Law (1965), the ratio of price to performance has ________.

fallen

A(n) ________ study is conducted as part of the systems analysis process to see if the project is even worth considering.

feasibility

A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A.

field

A ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.

file

In an enterprise system, the integrated software modules that focus on cash management and forecasting are related to ________.

finance and accounting

Financial components of the balanced scorecard framework include cash flow and return on equity.

financial

Information systems can ________ the organization by empowering lower-level employees.

flatten

In the systems development life cycle, each stage ________.

requires completion before the next stage begins

In data mining, which of the following involves using a series of existing values to determine what other future values will be?

forecasting

A ________ provides the link from one table to another table's primary key.

foriegn key

IS security firewalls are an example of a ________.

gatekeeper

________ algorithms were inspired by biological systems that examine optimal solutions for a given problem based on big data.

genetic

The power of the customer ________ if they have an easy time switching from one company (e.g., not having to pay an exit fee) to another. Option

grows

Someone who intends to gain unauthorized access to a computer system is called a ________.

hacker

An IT infrastructure includes ________.

hardware, software, and services

Information systems project costs include ________.

hardware, software, workspace, and human costs

The number of cycles per second that can be sent through a network medium is calculated in ________.

hertz

The ________ role is NOT one of the activities that managers are expected to perform in an organization.

high velocity

In an enterprise system, the integrated software modules that focus on payroll and benefits accounting are related to ________.

human resources

For companies practicing business process management, the ________ step is the critical phase where the question, "what business processes need improvement" is asked.

identify processes for change

For companies practicing business process management, the ________ step takes place when the new process and supporting systems are rolled out.

implement the new process

Regarding the decision-making process, ________ includes making the chosen solution work.

implementation

Downloading a Kindle e-book from Amazon, buying a computer online at Best Buy, and downloading a music track from Apple Music, are examples of how information systems help business processes by ________.

implementing entirely new business models

Ultimately, the quality of information systems projects comes down to ________.

improved organizational performance

Knowledge management ________ the ability of the organization to learn from its environment.

increases

Advances in data storage techniques and the rapidly declining costs of data storage threaten ________.

individual privacy

A raw fact shaped into a meaningful form is ________.

information

A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.

information policy

Regarding moral dimensions of the information age, ________ include(s) the issue of determining the data that individuals and organizations can protect.

information rights and obligations

Identifying the projects that deliver the most business value requires organizations to develop a(n) ________.

information systems plan

A(n) ________ is defined as the shared technology resources that provide the platform for the firm's specific information systems applications.

information technology infrastructure

A manager's ________ role includes obtaining the most up-to-date information.

informational

In Europe, before data is gathered, ________ must be given by customers with knowledge of all the facts needed to make a rational decision.

informed consent

Which of the following enables a company to tailor a particular aspect of enterprise software to the way a company does business?

middleware

A(n) ________ app is an Internet-enabled application with specific functionality.

mobile

The fastest growing type of B2C e-commerce is ________.

mobile

Behavioral models suggest that the actual actions of managers are ________ than previously believed.

more informal

_____ is another name for e-hubs.

net marketplaces

Regarding global strategy and systems configuration, transnational strategies system configuration is predominantly ________.

networked

A virtual company uses ________ to link people, assets, and ideas.

networks

A(n) ________ network learns from identifying patterns in large datasets.

neural

The formal process to remove data problems such as repeating groups is called ________.

normalization

Modeling that includes concepts of classes and inheritance is called ________ modeling.

object-oriented

According to the E-Commerce Presence Map, activities such as education and branding are considered a(n) ________ type of presence.

offline media

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

on demand

To reduce agency costs, the text recommends developing ________.

only a few core global systems that are vital for global operations

___ is free software produced by a community of several hundred thousand programmers around the world.

open source

Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of ________.

operating systems platforms

The observation that IT broadens the distribution of information, empowers lower-level employees, and increases management efficiency is an example of the _____________ effect of information technology on organizations.

organizational and behavioral

The assumption that an MIS professor knows more about normalization than a student is an example of ________.

organizational culture

The traditional focus on the financial and technical aspects of an information system tends to overlook costs from ________.

organizational disruptions and the time needed to oversee new system related changes

According to the value chain model, operations are considered a ________ of the firm.

primary activity

Another term for a key field is a ________.

primary key

The field that uniquely identifies a row in a relational database table is called a ________.

primary key

Global corporations generally use ________ to communicate sensitive data and ________ for communications that require less security.

private networks; virtual private networks

_____ describe the transformation occurring within the lowest level of the data flow diagrams.

process specifications

Infrastructure as a service (IaaS) provides ________.

processing, storage, and networking resources

The knowledge management value chain begins with the ________.

procurement of knowledge

Nike sells customized sneakers through NIKE BY YOU to establish ________.

product differentiation

Combining data from multiple sources to create digital dossiers of detailed information on individuals is called ________.

profiling

The acronym PERT stands for ________.

program evaluation and review techniques

A ________ is considered a planned activity to achieve a specific business objective.

project

____ include(s) the application of knowledge, skills, and tools to achieve a specific business objective

project management

Which of the following dimensions is characterized by the dollars spent, the time allocated for implementation, and the number of organizational units affected?

project size

Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital society.

property rights and obligations

Building an experimental system quickly to evaluate it as a possible system solution is called ________.

prototyping

Transaction brokers:

provide a digital environment where buyers and sellers can meet, display products, search for products, and establish prices.

Enterprise systems improve management decision making in all the following ways except:

providing up-to-the-minute data on sales, inventory, and production.

The behavioral approach to information systems includes ________.

psychology and sociology

A supply chain driven by actual customer orders is called a ________ model.

pull based

A supply chain management system using a(n) ________ model bases production schedules on actual customer orders.

pull-based

If a company produces a custom-made automobile only after a customer has placed an order, it is an example of a(n) ________ production model.

pull-based

A supply chain management system using a(n) ________ model bases production schedules on forecasts.

push- based

Regarding moral dimensions of the information age, ________ is the standard by which cultural values are evaluated and supported in a digital society.

quality of life

CryptoLocker is an example of which of the following?

ransomware/trojan

A positive regarding cloud computing includes ________.

rapid elasticity

Another term for a database row is a(n) ________. Option

record

As discussed in the chapter, which of the following is not one of the immediate consequences of inadequate software project management?

reduced workforce

A challenge for international networks are the ________ in countries like China, Iran, and Saudi Arabia.

regulatory constraints

Microsoft SQL Server is a ________ for large mainframes and midrange computers.

relational DBMS

A collaborative business culture is characterized by:

reliance on teams of employees to achieve and implement the results.

Information in folders, messages, memos, proposals, emails, graphics, electronic slide presentations, and even videos created in different formats and stored in many locations is considered ________ knowledge.

unstructured

Senior executives determining five-year goals is an example of a(n) ________ decision.

unstructured

A report showing an employee's age as a negative number is useless because it lacks ________.

validity

A ________ consists of a networked system that can synchronize the value chains of business partners ________. Option

value web; within an industry

A(n) ________ uses the Internet to create a secure network connection.

virtual private network (VPN)

Setting up a system so that it is not restricted by physical configuration or geographic location is an example of ________.

virtualization

A manager that is considered to be a "super user" ________.

wants to create their own reports and use more sophisticated analytics Correct Answer

Gipsi runs a manufacturing company. She recently invested in ________ computing devices because she wanted to improve productivity by delivering information to workers without requiring them to interrupt their tasks.

wearable

A data governance policy specifies all of the following except:

which type of business intelligence tool should be used.

A network that spans between Montana and Wyoming is a(n) ________.

wide area network

802.11 is also known as ________.

wifi

____ is the collective and individual experience applied to solving problems.

wisdom


Ensembles d'études connexes

10.1 - 10.5 System Implementation

View Set

Microeconomics Exam 1 (Multiple Choice Section)

View Set