K204 UMIS Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Nielsen's Law

Network connection speeds for high- end users will increase by 50 percent per year

Bell's Law

"a new computer class forms roughly each decade establishing a new industry."

sales and marketing, operations, manufacturing, customer service, human resources, accounting

Six workgroups include

To be considered a true ERP product must include

Supply chain, Manufacturing, CRM, Human resources, Accounting

IS issues within the executive staff and IT issues within the executive staff

The CIO is the representative for

high levels of rivalry

The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.

database

The centerpiece of an ERP application is the:

Moore's Law

The number of transistors per square inch on an integrated chip double

find an appropriate trade off between the risk of loss and the cost of implementing safeguards

The overall goal of IS Security is to:

loss of control

The primary risk of peer-to-peer support in the context of social media and customer service is ________.

dynamic

The process a company goes through to determine whether or not to invest in a new location is a ____________ process.

query

The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keywords (criteria) into a ________ to obtain the information that she wants.

Kryder's Law

The storage density on magnetic disks is increasing at an exponential rate.

hardening

The term for taking in-depth measures to reduce a system's vulnerability to harm caused by the public is...

reporting, data mining, and Big Data.

The three fundamental categories of BI analysis are

iteration and feedback

The two key characteristics of collaboration are:

Metcalfe's Law

The value of a network is equal to the square of the number of users connected to it.

cost

To effectively manage risk, organizations must proactively balance the trade-off between risk and ___.

manage outsourcing relationships, develop operate and maintain applications, plan the use of IS to accomplish organizational goals and strategy

Which is a major function of the information system's department?

training employees on the successful use of the new system

Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?

Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.

Which of the following is true for the relationship between business processes and information systems?

pay-per-click

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?

outbound logistics

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?

threat of new entrants

Which of these is one of Porter's 5 forces that determine industry structure?

relationship management

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products?

1:N

Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database?

procedure

You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the ________ component of an information system.

activities

________ are collections of related tasks that receive inputs and produce outputs.

gap identification

________ is a major task when implementing enterprise systems.

business intelligence

________ is defined as information containing patterns, relationships, and trends.

crowdsourcing

________ is the dynamic social media process of employing users to participate in product design or product redesign.

repository

a collection of something;

Neural network

a computing system modelled after the human brain that is used to predict values and make classifications.

business process management (BPM)

a cyclical process for systematically creating, assessing, and altering business processes

a corpus of knowledge

a large set of related data and texts.

Process effectiveness

a measure of how well a process achieves organizational strategy

Process efficiency

a measure of the ratio of process outputs to inputs

the five component framework

a model of the components of an information system: computer hardware, software, data, procedures, and people.

business process

a network of activities that generate value by transforming inputs into outputs.

value chain

a network of value-creating activities

Information Age

a period in history where the pro- duction, distribution, and control of information is the primary driver of the economy.

Online analytical processing (OLAP)

a second type of reporting application, is more generic than RFM. this provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The defining characteristic of these reports is that they are dynamic. The viewer of the report can change the report's format—hence the term online.

algorithm

a set of procedures used to solve a mathematical problem, that best fits our situation.

Enterprise Social Network (ESN)

a software platform that sues social media to facilitate cooperative work of people within an organization

key

a strying of bits used to encrypt data, called a key bc it unlocks a message

RFM analysis

a technique readily implemented with basic reporting operations, is used to analyze and rank customers according to their purchasing patterns.

Big Data

a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.

worm

a virus that self-propagates using the internet or other computer network, spread faster than viruses

Pay per click revenue model

advertisers display ads to potential customers for free and pay only when the customer clicks

information system (IS)

an assembly of hardware, software, data, procedures, and people that produces information.

ERP system

an information system based on ERP technology, include functions of CRM systems but also incorporate accounting, manufacturing, inventory and human resources applications

Inherent processes

are predesigned procedures for using the software products, saved organizations from the expense, delays and risks of business process reengineering

What five forces determine industry structure?

bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, rivalry among existing firms

virus

computer program that replicates itself

Content data

data and responses to data that are contributed by users

Structured data

data in the form of rows and columns.

trade off

A ________ is a balancing of three critical factors: requirements, cost, and time.

datamart

A ___________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.

data model

A _____________ is a logical representation of a database that describes the data and relationships that will be stored in the database.

push publishing

A low inventory report that is automatically generated when the number of items reaches a certain number is an example of___________.

systems thinking

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

N:M

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.

Enterprise Application Integration (EAI)

A suite of software applications that integrates existing systems by providing layers of software that connect applications together

Value of social capital

determined by the number of relationships in a social network, by the strength of those relationships and by the resources controlled by those related

asymmetric encryption

each sit has a public key for encoding messages and a private key for decoding

Workgroup Process

enable workgroups to fulfill the charter, purpose and goals of a particular group or department

packet filtering firewall

examines each part of a message and determines whether to let that part pass

Dynamic process

flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities

Structured processes

formally defined, standardized processes that involve day to day operations: accepting a return, placing an order, purchasing raw materials and so forth

firm infrastructure

general management, finance, accounting, legal, and government affairs.

technology

includes research and development, but it also includes other activities within the firm for developing new techniques, methods, and procedures.

Business intelligence (BI) systems

information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers.

Content management systems (CMS)

information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.

internal firewall

inside the organizational network

Information

knowledge derived from data, whereas data is defined as recorded facts or figures.

experimentation

making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have.

ransomware

malicious software that blocks access to a system or data until money is paid to the attacker

Operations

manages computing infrastructure, including individual computers, in house servers networks etc

Development

manages the process of creating new IS and maintain old ones

Customer life cycle

marketing, customer acquisition, relationship management and loss/churn

Conversion rate

measures the frequency that someone who clicks on an ad makes a purchase, likes a site, or takes some other action desired by the advertiser

Outsourcing relations

negotiate outsourcing agreements w other companies to provide equipment, applications and other services

Data administration

organization wide function that is in charge of developing data policies and enforcing data standards

encryption algorithms

procedures for encrypting data

spyware

programs installed on the user's computer without the user's knowledge or permission

human resources

recruiting, compensation, evaluation, and training of full-time and part-time employees.

Freemium

revenue model offers users a basic service for free and then charges a premium for upgrades or advanced features

symmetric encryption

same key is used to encode and decord

adware

similar to spyware in that it is installed without the user's permission and resides in the background and observes user behavior

perimeter firewall

sits outside the organizational network, first device that Internet traffic encounters

business analyst

someone who is well versed in Porter's models and in the organization's strategies and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies.

Enterprise information systems

support one or more enterprise processes, procedures are formalized and extensively documented; solutions to problems in these involve more than one work group or department

Workgroup information system

supports one or more processes within the workgroup

natural language processing (NLP)

the ability of a computer system to understand spoken human language

Artificial intelligence (AI)

the ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal.

Systems Thinking

the ability to model the components of the system to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.

Business process reengineering

the activity of altering existing and designing new business processes to take advantage of new information systems

value

the amount of money that a customer is willing to pay for a resource, product, or service.

Data mining

the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Digital Revolution

the conversion from mechanical and analog devices to digital devices

cost of the business process

the cost of the inputs plus the cost of the activities.

machine learning

the extraction of knowledge from data based on algorithms created from training data.

Human capital

the investment in human knowledge and skills for future profit'

Social capital

the investment in social relations with the expectation of returns in the marketplace

Capital

the investment of resources for future profit

MIS (management information systems)

the management and use of information systems that help organizations achieve their strategies.

business process design

the organizations should not automate or improve existing functional systems. Rather, they should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.

BI analysis

the process of creating business intelligence.

Knowledge management (KM)

the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital.

automation

the process of making systems operate without human intervention,

Data acquisition

the process of obtaining, cleaning, organizing, relating, and cataloging source data

Reporting analysis

the process of sorting, grouping, summing, filtering, and formatting structured data.

Encryption

the process of transforming clear text into coded, unintelligible text for secure storage or communication

information technology (IT)

the products, methods, inventions, and standards used for the purpose of producing information

Social media

the use of information technology to support the sharing of content among networks

margin of the business process

the value of the outputs minus the cost.

exception reports

these are produced when something out of predefined bounds occurs.

Interenterprise Processes

two or more independent organizations; supply chain management is the classic example of inter enterprise IS

ad blocking software

used to filter out advertising content and rarely see internet ads

sql injection attack

users enter a sql statement into a form in which they are supposed to enter a name or other data

Linkages

value intersections across activities

trojan horse

viruses that masquerade as useful programs or files

social capital

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

What Are Necessary Data Characteristics?

Accurate, Timely, Relevant, Just sufficient, Worth its cost

data warehouse

Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.

improve process quality, increase team strength

How does knowledge management (KM) benefit organizations?

Three aspects of RFM analysis include

How recently (R) a customer has ordered, how frequently (F) a customer ordered, how much money (M) the customer has spent.

entity

In a data model, a(n) ________ is something that a user wants to track.

Data

In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side?

Hardware

In the Five-Component Model, which component is the easiest to change?

define system

In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility?

technical safeguard

Malware protection can best be described as which of the following...

decrease

When a company tries to offer the same products at a lower cost they are trying to __________ a customer's buyer power.

location

Organizational structure may vary depending on all of the following except:

social media providers

Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are know as:

operations/manufacturing

Transforming inputs into the final products describes which primary activity?

Hacking

Unauthorized Data Disclosure; breaking into computers, servers or networks to steal data

Safeguard

Unauthorized Data Disclosure; measure that individuals or organizations take to block the threat from obtaining the asset

Pretexting

Unauthorized Data Disclosure; someone deceives by pretending to be someone else

Spoofing

Unauthorized Data Disclosure; someone pretending to be someone else

Wardrives

Unauthorized Data Disclosure; take computers with wireless connections through an area and search for unprotected wireless networks

Sniffing

Unauthorized Data Disclosure; technique for intercepting computer communications

Phising

Unauthorized Data Disclosure; uses pretexting via email

protect information assets, manage outsourcing relationships, develop operate and maintain applications

What are functions of the IS department?

human error, cyber terrorists, natural disasters

What are security threats?

starting, planning, doing, finalizing

What are the four phases of collaboration?

become informed, make decisions, solve problems, manage projects

What are the four primary purposes of collaborative teams?

protect databases and other organizational data

What do data safeguards do

to reduce risk

What is a reason for outsourcing

model processes; create components; implement processes; assess results

What is an accurate representation of the steps in the business process management cycle?

being able to give and receive critical feedback

What is the most important quality to have as a collaborator?

strategic

What type of decision requires the most collaboration?


Ensembles d'études connexes

Chapter 23: Question 61 + all true and false

View Set

Enrichment Activity 26; The Cost of War

View Set

conceptual questions physics exam 3

View Set

A&P 2: Chapter 19 (Cardiovascular System: Heart)

View Set