MANG 3300 FINAL QUESTIONS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a database? Why is it a better system of information organization compared to a file processing system?

A database is an integrated collection of information that is logically related and stored in such a way as to minimize duplication and facilitate rapid retrieval. Compared to a file processing system, it is more accurate and consistent. In addition, it also provides benefits such as reduced redundancy, improved information integrity, higher adaptability to changes, improved performance and scalability, and increased security. Therefore, it is preferred to a file processing system.

Which of the following is an example of typosquatting?

A person registers the domain name "currentaffairs.net" to take advantage of the huge popularity of the e-newspaper currentaffairs.org to divert traffic to his webpage and make money by selling advertising space.

What is a proxy server? What function does it serve?

A proxy is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations. Any network connection requires a handshake between the device and the server, so that the device's IP address, along with its location, is exposed. Hiding that information usually requires handing off the transmission to a proxy. The transmission then appears to come from the proxy, not the actual sender. A drawback to using the proxy server to ensure anonymity is the need to rely on the company that operates the proxy and its promise to protect its customers' identities. Another approach depends instead on a distributed network of servers. The encrypted transmission is relayed from one server to the next, and no single server has access to all the addresses that relayed any particular message.

What is a disadvantage to the Big Bang method of ERP implementation?

All employees are subject to higher stress levels at the same time.

Which of the following demonstrates a downside of crowdsourcing?

An international funding organization for welfare programs in underdeveloped regions removes data from Wikipedia which described some of the allegations of corruption against the organization.

Which of the following organizations face higher switching costs?

An organization that buys an information system to manage its own records

Discuss the pros and cons of anonymity in the online world.

Anonymity in the online world has several advantages. First, it is crucial for corporate whistleblowers, police tipsters, news sources, and political activists in oppressive regimes. Second, it protects people who participate in online support groups where they reveal personal details without fear of disclosure. However, anonymity also protects criminals and spammers, as well as vengeful posters who can do considerable damage to innocent victims.

Which of the following web browsers is the dominant browser for Macintosh computers?

Apple Safari

Which of the following is true regarding customer retention?

Attracting new customers is often more difficult and expensive than retaining existing ones.

Which of the following is an example of a peer-to-peer network?

BitTorrent

What is Bluetooth?

Bluetooth is a wireless technology for exchanging information over short distances, which also uses radio waves in the same range as wifi. Devices equipped with Bluetooth adapters, such as a printer and computer, or a cell phone and earpiece, can detect one another and communicate.

________ focuses on designing, optimizing, and streamlining business processes throughout the organization, taking into account the human element.

Business process management

Which of the following laws prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal recourse on their own?

CAN-SPAM Act

________ is a metric used to assess the impact of an online ad.

Click-through rate

Software products such as Microsoft Office, Adobe Premiere, and Quicken are also called ________.

Commercial off-the-shelf software

What impact does the ecosystem have on businesses?

Companies are embedded in a complex ecosystem, an economic community that includes the related industries making complementary products and services, the competitors, the suppliers, and the consumers. Events in one arena, particularly a disruptive innovation, ripple through the whole community, affecting all the players and the five forces for the industries involved.

________ makes it more difficult for a hacker to break into passwords.

Creating passwords with symbols, mixed cases, and characters

_____ is the management of the customer interface, including all aspects of order processing and fulfillment.

Customer Management

________ specifies the characteristics of a field, such as the type of data it will hold.

Data definition

________ uses statistical techniques to explore a data warehouse and hunt for hidden patterns and relationships that are undetectable in routine reports.

Data mining

What are the functions of database management software (DBMS)? Name some common database management software.

Database management software (DBMS) is used to create and manage the database. It provides tools for ensuring security, replication, retrieval, and other administrative and housekeeping tasks. The DBMS serves as a kind of gateway to the database itself and as a manager for handling creation, performance tuning, transaction processing, general maintenance, access rights, deletion, and backups. Microsoft Access, Microsoft SQL Server, Oracle, and MySQL are some commonly used DBMS.

Describe, with the help of an example, how a company can reduce its operating costs by omitting middlemen.

Dell reduced its operating costs by bypassing the distributors and retailers in its supply chain. At dell.com, the customer selects a computer online, customizes it, clicks the Buy button, and then tracks the order until it arrives at the front door, shipped directly from the manufacturer. The monitor, shipped in a separate box, may come from a different manufacturer, but Dell synchronizes the delivery so all the hardware arrives at the same time. This low-cost strategy helped Dell dominate the PC market for a while.

What are the strengths of ERP systems?

Despite implementation hurdles, the ERP, at least to integrate finance and human resources, is becoming a near necessity for most organizations. Once in place, it can dramatically enhance operational efficiencies and reduce costs. A key ingredient, of course, is that the organization's employees actually change the way they work to take best advantage of the integrated back-end and paperless workflows. If used properly, ERP systems can standardize and streamline business processes across the whole enterprise, eliminating the waste and redundancy that creep in when everyone's work is so focused on a single department. An ERP helps people appreciate the full process, spanning departments, not just the part that touches their unit.

What is digital rights management? Explain some challenges faced while using DRM schemes.

Digital rights management (DRM) refers to technologies that software developers, publishers, media companies, and other intellectual property owners use to control access to their digital content. However, cumbersome DRM schemes tend to thwart legitimate users more than pirates. DRM often interferes with screen readers, frustrating the visually impaired who use them to turn on-screen text into speech. As the technologies mature, however, IP holders will be offered technological protection for their products without inconveniencing their customers.

________ is the hierarchical naming system that maps a more memorable URL to the actual IP address.

Domain name system

Which of the following is true regarding the use of electronic data interchange (EDI) between partner companies in a supply chain?

EDI often relies on private networks and proprietary software

The ecosystem in which a company is embedded is a(n) ________.

Economic community that includes related industries

Which of the following is true of an ecosystem?

Events in one arena of an ecosystem can affect an entire community.

________ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities.

Exception reporting

How does exception reporting differ from compliance reporting?

Exception reports can help identify events that fall outside accepted ranges. Financial systems generate exception reports that automatically tag unusual events-ones that human beings must review. Such reports are used to spot mistakes and fraud. For example, average losses per incident may not be huge, but if the same mistake or fraud is repeated over and over, major losses can add-up. For example, if sales reps exaggerate mileage for trips, or travelers submit receipts twice, exception reports would spot the fraud.

A drawback of the centralized document library in a shared workspace is that it creates confusion and duplication when team members send revised versions back and forth over email.

False

A low-cost leadership strategy means offering a highly differentiated product at a price that is lower than the market price.

False

A marketing representative who wants to put a positive spin on a tally of recent orders chooses to include orders that have been canceled in his report. This report exemplifies high-quality data.

False

A microblog is an example of photo software with which large photos can be reduced in size without blurring their resolution.

False

Addictinggames.com is a website that offers casual amusement such as shooting games and celebrity spoofs. The games are free, but the site's ads target the likely players based on their demographic information. The primary web goal of this organization is to sell products or services.

False

Compared to older information systems, privacy breaches in modern information systems involve less risk and affect fewer people.

False

Compliance reports can help identify events that fall outside accepted ranges

False

Compliance reports can help identify events that fall outside accepted ranges.

False

Creative destruction refers to an innovation that fails miserably and leads to huge losses within the industry.

False

Database developers should use meaningful information for primary keys.

False

Differentiating the product or service for a particular market niche is called a product differentiation strategy.

False

E-commerce involves the buying and selling of goods and services over the Internet or other networks, encompassing financial transactions between all entities except governments.

False

Group decision support systems were designed to get rid of anonymity.

False

In a table, a field can contain either numeric data or text but not a combination of both.

False

Instant messaging is an open system in which anyone can send messages to anyone else regardless of which IM software they both are using.

False

Lower-end interactive video chat systems create a greater sense of telepresence than higher-end ones.

False

Overall spending for online ad campaigns worldwide is lower than for television.

False

SaaS ERP solutions are "instant on" products, which require minimal training and reengineering of workflows compared to on-premise versions.

False

Shards or slices of a database should be accessed from the same computer for improved performance.

False

The drive to rebrand some familiar services as "cloud computing" is solely about building a brand new architecture rather than about the marketing hype created.

False

The primary function of a context indicator is to display the exact geographical location of a user to his or her contacts through the GPS navigation system.

False

The simple interfaces used in virtual worlds enable quick customer visits.

False

The thin, flexible shape of coaxial cables allows them to wind easily through ceilings, walls, and cubicles.

False

The website of an international human rights organization stores a large database of information and provides search functionality to make it easier for their visitors to locate desired information. However, this approach fails to be effective since the search functionality is limited to the website rather than the whole web.

False

True or False: Planning is the first step when it comes to Supply Chain Management.

False

While creating a relational database for an organization, "Employees" would constitute one attribute with employee ID number, last name, first name, birth date, email address, and phone number as entities.

False

Which of the following is used by web developers to add rich media interactivity to websites?

Flash

In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key, department ID. In the student table, department ID is a ________.

Foreign key

Which of the following is a web-based email service that was built from the ground up to work within browsers rather than with client software installed on computers?

Gmail

An operational database is not a good candidate for high-level management reporting because it is not equipped to ________.

Handle complex queries for strategic planning

List the components of human capital management systems.

Human capital management (HCM) encompasses all the activities and information systems that support effective management of an organization's human capital. The HCM information system includes a growing suite of applications with the employee record as the central element. Together, these applications support recruitment, hiring, payroll, benefits, taxes, career development, training programs, employment histories, employee self-service, and more. The components of human capital management systems include workforce management applications, talent management applications, service delivery applications, and core human resources management application.

The original language used to create web pages is called ________.

Hypertext markup language

Though every device connected to the net has an IP address, the Internet's designers added the Domain Name System (DNS) because ________.

IP addresses are numerical and cannot be easily remembered by users

In an ERP suite that includes modules specialized for higher education, which of the following would be used to track donations, pledges, gifts, and manage contacts and donor relationships?

Institutional advancement

How does integration of components in a financial management system lead to paperless workflows?

Integration among the modules involves linking the various financial modules; for instance, the details from accounts receivable and accounts payable transactions should automatically update the general ledger. Such integration of the various components of the financial system allows all the staff to have real-time access to the same underlying information. For example, an employee can use online shopping carts to generate procurements from established vendors and route their requests to supervisors for approval, after which the electronic order goes directly to the supplier. The software builds online, interactive forms so staff can make corrections along the way, with customized workflow tables that determine the routes. This results in a streamlined and paperless workflow in an organization.

Which of the following results in decreased market profitability?

Intense rivalry among competitors, based on price

________ help(s) in determining the cause of a security threat in an incidence response plan.

Investigating system logs

What is the purpose of the "presence awareness" feature on instant messaging software?

It allows users to display their current status to their contacts, colleagues, or buddy list

Which of the following is a characteristic of structured information?

It can be broken down into component parts and organized in hierarchies.

Which of the following is true of a blog?

It encourages cross-linking.

Which of the following is true of the European Union's Data Protection Directive?

It establishes privacy as a fundamental human right for EU citizens.

Which of the following is an accurate description of the Privacy Act of 1974?

It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies.

How did online markets affect the dynamics between buyers and suppliers?

It granted more power to the buyers.

Which of the following is a drawback of Wikipedia?

It has an open structure which allows scope for inaccuracy and bias.

Which of the following best describes a business process?

It is a set of activities designed to achieve a task.

Which of the following is a shortcoming of the extended value chain?

It is difficult to allocate responsibility in the event of a mishap.

What is an advantage to the Big Bang method of ERP implementation?

It is highly efficient, because redundant customizing is avoided

Which of the following is true of IMAP?

It maintains mail on a server instead of on a single machine.

What is the main drawback of using unstructured information?

It makes retrieving data very difficult.

Which of the following statements is true about user-generated content?

It makes up most of the information in systems such as eBay, Craigslist, and Wikipedia.

Which of the following best describes support activities?

It refers to processes including administration and management, human resources, procurement, and technology assistance.

Which of the following statements is true of e-government?

It saves people the time spent in commuting to and waiting at government offices.

A drawback of the hierarchical database was that ________.

It was ineffective at handling many-to-many relationships

Which of the following statements is true of ICT architectures in the 1960s?

Mainframe computers formed the foundation of the ICT architecture.

Discuss how malware and botnets threaten the security of intellectual property.

Malware refers to malicious software designed to attack computer systems. Botnets refer to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system. Criminal gangs activate their botnets to capture user IDs, passwords, credit card numbers, Social Security numbers, and other sensitive information. It gives them access to transfer funds, steal identities, and purchase products, or they might just sell the information to other criminals. They also rent out their zombie armies to various customers, such as spammers who use them to relay the millions of unsolicited messages that now comprise the vast majority of Internet email traffic. Malware often gets installed when an innocent user downloads a screen saver or other seemingly benign freebie. Without the user's knowledge, the infected computer becomes a zombie added to the gang's growing botnet.

How are policies enforced in information systems?

Managers develop policies that are enforced by the information systems.

What is utilitarianism and how is it different from natural laws and rights?

Natural laws and rights judge the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences. Right to a free press is an example of natural laws and rights. A second framework, called utilitarianism, considers the consequences of an action, weighing its good effects against its harmful ones. First, do no harm is an example of utilitarianism, and as such, it is a precept of medical ethics ensuring physicians will heavily weigh the possible harmful consequences of each remedy. In many situations, both ethical approaches will lead people to the same conclusion about the proper action. But ethical dilemmas tend to arise when the application of different systems leads to different judgments about what is the ethical thing to do.

Which of the following classes of computers is widely distributed in developing countries and typically used as a cost-effective means of wirelessly connecting to the Internet?

Netbooks

________ is a process that refines entities and their relationships to help minimize duplication of information in tables.

Normalization

In the context of Porter's five forces, what impact will patents have on a business?

Patents will reduce the threat of new entrants in an industry.

Which of the following precautions need to be taken in order to create a secure password?

Personal information should not be used in passwords.

Which of the following is a social networking site that allows users to post updates, adding commentary, links, or images about current happenings?

Pinterest

Explain Porter's value chain model and the types of activities involved in it.

Porter's value chain model describes the activities a company performs to create value as it brings in raw resources from suppliers, transforms them in some way, and then markets the product or service to buyers. In the model, the company performs primary activities directly related to the process by which products and services are created, marketed, sold, and delivered. Support activities encompass all the other processes and offices the company needs, including administration and management, human resources, procurement, and technology support.

A field or a group of fields that make a record unique in a table is called a(n) ________.

Primary Key

________ is a technology placed on tags that consist of small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history.

RFID

What are the three things you should know about your customer?

Recency, Frequency, and Monetary Value

In a relational database, information is organized into tables in which each row represents a(n) ________.

Record

What are the relationships that the relational database is named for?

Relationships between entities

Which one of these is NOT a part of the sales process?

Rescind Offer

________ is one way of recovering systems in an incidence response plan.

Restoring from media known to be good

In a table for customers, the information about a single customer would reside in a single:

Row

The most prominent data manipulation language today is

SQL

Which of the following is an example of a free IM software client?

Skype

Discuss social engineering and explain why humans are soft targets for social engineers.

Social engineering is the art of manipulating people into breaking normal security procedures or divulging confidential information. Humans are tempting targets for those with malicious intent who understand such behavior. One weak spot is the human desire to help others. People routinely pass virus-laden hoaxes along to friends and neighbors, trying to be helpful. Respect for authority is another common human tendency that intruders exploit, relying on uniforms, titles, or just verbal hints that the company president wants something done. Humans are certainly not immune to greed, and scammers tap this human frailty routinely to persuade people to turn over confidential information or money. Ironically, another highly effective bit of social engineering relies on the human desire to avoid malware.

List some of the common metrics used in HCM systems.

Some common HCM metrics include: 1. Turnover: The percentage of workers who left and were replaced during a time period 2. Turnover costs: The total of termination costs, hiring costs, training costs, and other costs related to replacing a worker 3. Cost per hire: Average advertising costs + agency fees + recruiter's salary and benefits + relocation expenses for new employees 4. Human capital return on investment: The return on investment produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for human talent 5. Employee satisfaction: Measures of job satisfaction, usually assessed through employee surveys or exit interviews

Which of the following provisions does the Gramm-Leach-Bliley Act make?

Stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies

________ are the costs that customers incur when they change suppliers.

Switching costs

________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how personal data is collected.

TRUSTe

_____ planning such as sales and operations planning seeks to identify and target customer demands for aggregate product families and to establish the inventory and capacity plans needed to satisfy these overall demands.

Tactical

Which one of these is NOT a closing strategy in sales?

The "beg" close

The keyboard layout evolved from the typewriter. Why did this turn out to be a disadvantage?

The QWERTY layout popularly used in typewriters was originally designed to slow down data entry to prevent collisions of the hammers striking the paper. Since the first keyboard layouts were based on the QWERTY layout used in typewriters, they were not designed to maximize typing speed. Attempts to introduce a better design failed because many people already knew the QWERTY layout.

Which of the following statements is true of information systems (IS)?

The ability to provide companies with competitive advantage makes IS a core feature of a company's strategic vision.

What is the bullwhip effect in the context of supply chain management?

The bullwhip effect describes the distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer to the distributor and manufacturer. Small fluctuations in retail sales trigger large swings in inventory levels, as the retailer sends orders to the distributor to replenish the stock, and the distributor follows up with orders to the manufacturer. As orders are filled and products shipped, inventory builds up in some places but shortages occur in others.

Which of the following actions of a sugar manufacturing company is an extension of its value chain beyond its own primary and support activities?

The company buys a large sugarcane plantation in another country.

________ is responsible for identifying, assessing, and addressing threats to an organization from unforeseen circumstances.

The crisis management team

Describe performance tuning and the trade-offs associated with it.

The database needs tuning for optimal performance, and the tuning process takes into account the way the end users access the data. For example, fields that end users use to search for records should be indexed for maximum performance. Although the DBA might be tempted to index everything, that would slow the system down when records are added, so a balance is needed. DBAs make trade-offs to add speed to certain activities while slowing down others, yet always stay attentive to the needs of the employees, customers, and other stakeholders. Optimizing performance for speedy retrieval of information, for example, may require slowing down other tasks, such as data entry or editing.

Explain various competitive strategies in business, with examples.

The low-cost leadership strategy means offering a similar product at a lower price compared to competitors. A relentless search for ways to reduce operating expenses and achieve efficiencies pervades this strategy. An example is Walmart. Another approach is product differentiation, adding special features or unique add-ons for which customers are willing to pay more. The strategy tends to reduce threats from substitute products and also erects barriers to new entrants. An example is Apple. Differentiating the product or service for a particular market niche is called a focused niche strategy. Research in Motion (RIM), for example, positions its Blackberry smartphone for the business and government segment, with its conservative looks and business-oriented features.

Why do nonprofit organizations stand to gain from using information systems, just like business?

The operational requirements to run nonprofits are similar to the operational requirements for businesses.

Which of the following administrative control actions helps enforce approved authorizations for access to systems in an organization?

The organization defines the information to be encrypted or stored offline in a secure location.

Carbon Automotive manufactures engines for different cars. The company supplies its products to leading car manufacturers in Europe and America. Which of the following statements indicates that Carbon has high bargaining power?

The selling point of many cars is that they contain Carbon engines.

Describe the field of management information systems. List some of the areas that attract much of the interest in this field.

The study of information systems, how people, technology, processes, and data work together, is a lively discipline involving university faculty, private-sector analysts, government agencies, and more. Many refer to the field as management information systems (MIS), and academic departments in colleges and universities often bear that name. The field draws researchers and practitioners from business, computer science, psychology, sociology, public administration, and many other subjects, all of whom have an interest in learning more about how the systems that can be created to help organizations do more with less, make companies more competitive, increase productivity, and improve the lot of people around the world.

Cadmia University is planning to start an online course called "Cultural diversities". The university wants to develop an information system to support virtual, collaborative education. Which of the following factors should be taken into account when developing the new system?

The way students interact in an actual classroom setting

Why is the wireless spectrum compared to oceanfront property?

The wireless spectrum is regulated by governments since it is a limited public good. Most of the spectrum usable for wireless transmission is already reserved for TV, cell phones, radio, law enforcement, emergency services, defense, and various government agencies. Some of the remaining bandwidth is left unlicensed and available for any devices to use, such as the bandwidth used for wifi. Since no carrier has control, no fees are charged to use that bandwidth, though some router owners, such as hotels, might want some payment for using their Internet connection. Thus the spectrum, short in supply and high in demand, is available for sale like oceanfront property.

Which of the following is an advantage of using twisted pair wires for transmission?

Their thin, flexible shape lets them wind easily through ceilings, walls, and cubicles.

Explain how information systems can help in improving personal productivity

There are a wide range of information system tools that help people improve their own productivity on the job and in life such as smartphones that combine voice calls with web browsing, contact databases, email, music, and games, to the many software applications that eliminate tedious work. Even word processing has transformed work in every organization, and it offers numerous tools and add-ons that many people don't know about that can further improve individual productivity. Students, for example, can automatically create and properly format their term paper references by integrating a bibliographic manager such as EndNote or RefNote. Online libraries and reference databases offer links to export the citation in any format, so typing is unnecessary. To improve productivity at work, people can choose from a wide variety of computer software and electronic devices.

Which of the following statements is true of data, information, and knowledge?

They blend together and form a continuum.

Which of the following is true of iCalendars?

They flag events that stretch over months or years.

Which of the following is a characteristic of best-of-breed suites?

They match user requirements closely

Which of the following is a provision of the State Security Breach Notification Laws?

They require organizations to inform state residents if sensitive data are released.

Describe, with examples, the characteristics that make information valuable.

Three characteristics that contribute to making information valuable are: timeliness, accuracy, and completeness. Timeliness matters a great deal in some settings, and near real-time information often costs more. For example, people pay monthly subscription fees to financial service companies to get up-to-the minute stock prices, rather than the delayed price reports shown on free stock tickers one can add to their browser. Accuracy may seem like an obvious attribute for valuable information, but there actually are degrees of accuracy. The more accurate the information required, the longer it may take to obtain, making extreme accuracy a trade-off to timeliness. A CEO who wants to know how much competitors charge for a rival product, for example, would have to wait quite a while for staff to scour all the distribution channels and assemble the data. An approximate but timely answer is more valuable. Completeness adds considerable value, particularly as a means to avoid bias or spin. A marketing survey that polls customers as they enter a store will completely miss those who shop online, for example. The survey results would be incomplete without taking greater care to assess the interests of all the customers. Striving for complete information, however, may also introduce delays that affect timeliness.

People pay a monthly subscription fee to financial service companies to get current stock prices. Which of the following characteristics of information does this highlight?

Timeliness

A blog with a title, subtitle, content with date of creation, and a few images exemplifies semi-structured information.

True

A high volume of posting is an important characteristic of popular and influential blogs, but it tends to create a lot of junk.

True

A wireless router has a wired connection to the network and sends radio signals from the antennae.

True

E-discovery is one of the methods used to uncover corporate scandals.

True

Fuel prices affect supply chains

True

Government action can influence how Porter's five forces operate in industries.

True

Implementing ERPs very often result in dismal success rates and runaway costs

True

Java is often used to provide instructions for set-top cable boxes and webcams.

True

Shadow systems are managed by individuals or departments and not by the central IT staff in an organization.

True

The binary code for SOS is information and the word "HELP!!!" is knowledge.

True

To assess the usability of a site, the designers of the site can ask visitors to perform a sequence of tasks and observe the problems they encounter.

True

True or False: There are two types of Shrinkage - Malicious and Non-Malicious.

True

While IT consumes a significant amount of the funds required for running a business, the funds for growing an organization are closely tied to strategy, innovation, and competitive advantage.

True

Which of the following would NOT improve a website's accessibility?

Using fixed text sizes

SQL links tables together by ________.

Using primary keys and foreign keys

________ describes what people experience when some of their sensory input is not from the real world, but from a computer-generated one.

Virtual reality

Which of the following is an example of a browser-based software tool that allows web conferences and webinars?

WebEx

One of the decisions that must be made relating to information management for the supply chain is:

Who is information shared with

________ help commercial shippers to read the barcodes on packages during transit and upload tracking number, date, time, and place to servers.

Wireless scanners

Which of the following is an example of a blogging tool?

Wordpress

The ________ is an international body that establishes and publishes standards for programming languages used to create software for the web.

World Wide Web Consortium (W3C)

Which database architecture is especially used for managing web content and web-based resources?

XML database

Which of the following is an example of a consumer-to-business (C2B) e-marketplace?

a blog featuring a link to a product sold by an e-commerce firm, added by the blogger, who gets paid by the firm when a visitor to the blog clicks on the link and buys the product

InfoTech Horizons, an IT company, is seeking to hire an experienced IT professional to assist the Chief Information Officer in his role. The new hire will be groomed to take on the role of the Chief Information Officer. Which of the following candidates, all of whom have good technical skills, will prove to be the best choice?

a computer professional with good knowledge of business

Laid-off workers, who are hired back due to their positive attitude and networking capabilities when businesses recover, are called ________.

boomerangs

Which of the following pairs of products are complementary to each other?

computer and software

Which of the following is calculated by adding the average advertising costs for job postings, agency fees, recruiter's salary and benefits, and relocation expenses for new employees?

cost per hire

Which of the following factors would improve the web accessibility of a site?

creating text-only alternative versions for devices such as PDA

Raw facts that are available in different formats and sizes are called ________.

data

Retrieval is very fast through data cubes because ________.

data cubes group data in logical dimensions, such as sales by product, city, region, and country

In enterprise information management, data ownership issues arise because ________.

data is shared by all the stakeholders in the organization

A central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning is called a ________.

data warehouse

A company maintains a centralized repository of information from internal sources, competitor information, census reports, and metadata from documents and multimedia. This is known as a ________.

data warehouse

A data model that graphically shows the tables, attributes, keys, and logical relationships for a database is called a ________.

database schema

Optical scanners are used to ________.

decipher barcodes and other symbols

In an information systems department, the enterprise systems subunit is responsible for ________.

developing, installing, maintaining, and overseeing the organization's mission-critical software applications

Demand forecast accuracy is important because overestimating demand leads to ________.

discount blowouts

A website that facilitates transactions by bringing together buyers and sellers from all over the world is called a(n) ________.

e-marketplace

A separate file processing system leads to the creation of redundant information because ________.

each set of computer programs operates on its own records

Which of the following approaches for integrating ERP modules has high switching costs?

engineered suite

Which of the following terms describes a roadmap created by an organization to describe its current situation and where it should head to achieve its mission, focusing especially on business strategy and the technology infrastructure required to achieve it?

enterprise architecture

Which of the following is a disadvantage of best-of-breed suites?

error-prone synchronization between systems

What does the Family Educational Rights and Privacy Act (FERPA) stipulate?

establishing privacy rights over educational records

Modules such as budget planning, debt management, travel and expense management, and contracts management are typically included in a ________ management system.

financial

A ________ is a technical control that inspects a network's incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes.

firewall

Which of the following devices receives signals from orbiting satellites that transmit time and location data?

global positioning systems device

Which of the following software is used to ensure compliance for cross-border transactions for importers and exporters?

global trade management software

A database schema is used to ________.

graphically document a data model

Which of the following factors makes VoIP technology preferable to customers over circuit-switched network?

greater range of supplementary services

A ________ is a microblogging tool in which posts on a similar topic are indicated by a keyword prefixed by a certain special character on microblogging websites.

hashtag

Which of the following database architectures works well for one-to-many relationships, but is not effective with many-to-many relationships?

hierarchical database

The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.

honeypots

The monetary gains produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for employee talent is called ________.

human capital return on investment

The .ics extension indicates that a plain text file contains ________ code.

iCalender

Which of the following is the operating system developed by Apple for mobile devices?

iOS

The ad for a bakery is placed next to an article on the rising rate of diabetes in American youth, in an e-magazine. This is an example of ________.

inappropriate product placement

Organizations use a(n) ________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.

incidence response plan

The risk of privacy breaches in information systems has increased because ________.

information systems have become more powerful and interconnected

The multitude of servers in Google's windowless data centers serves as an example that represents ________.

information technology

A network which connects computers, printers, scanners, and other devices in a single building or home is called a ________.

local area network

Demand forecast accuracy is important because underestimating demand leads to ________.

lost sales

Vendors are providing software-as-a-service (SaaS) products because of the need to ________.

lower implementation costs

Which of the following is a change brought about by virtualization?

lowered electricity consumption and hardware expenses

Which of the following classes of computers is still used for massive bulk processing tasks and financial transactions that require high reliability?

mainframe computers

An approach that attempts to achieve consistent and uniform definitions for entities and their attributes across all business units is called ________.

master data management

Which of the following elements of website usability refers to the effort it takes to regain the same level of proficiency when a user returns to a website after a period of time?

memorability

The term ________ refers to a set of formats that rely on the XML family of standards to represent metadata in HTML code.

microformat

Which of the following architectures refers to a client-server network in which any particular request by a client involves one or more servers?

n-tier

Which of the following is an early database approach that allowed flexible links to support many-to-many relationships?

network database

Orange, an online-gaming site, has millions of users. The site has many games which pit users against each other. The relative standing of each user is presented in the form of an elaborate ranking system for each game. Users pride themselves on gaining the highest points and the highest rank possible. This rise in user participation has increased the value of Orange significantly. This is an example of ________.

network effects

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called? (hint: was often used during the conversion from spreadsheets to databases).

normalization

Which of the following is the best way to handle complex relationships, such as the data for a company where employees can be assigned to more than one project, and each project can have more than one employee assigned to it?

normalizing the relationship between "employees" records and "projects" records

Roman Jade, an interior decorations company, stores employee details in its employee information system. The birth date of each employee is stored along with other details, including employee names. The relationship between the employee names and employee birth dates is a ________.

one-to-one relationship

Which of the following is a key attribute of the low-cost leadership strategy?

optimizing the value chain by eliminating unwanted expenditures

Field identified in a table as holding the unique identifier of the table's records is called the:

primary key

The function of which of the following components of an information system is to oversee if every data transaction made by an employee is logged in the information system?

process

The first targets of process improvements through integration of modules and creation of workflows in companies were ________.

procurement and accounts payable

After a discussion with his investors, the owner of a newly launched online video site decides that entertaining his audience will be the primary web goal of the website. Which of the following actions will best support his decision?

providing free access to quality content and selling advertising space on the website

A single sign-on is implemented by organizations for the purpose of ________.

reducing the cognitive load associated with multiple passwords

Aban Constructions Limited, a construction company, maintains data in the form of records within tables, and the tables are interconnected by linking matching fields. Which type of database architecture does Aban Constructions Limited use?

relational database

Which type of database architecture does Oracle use?

relational database

Which of the following is a reason why humans are soft targets for social engineering?

respect for authority

Which of the following will typically have a major impact on global supply chain costs?

restrictions on carbon emissions

A(n) ________ lists out and rates the vulnerabilities of an organization.

risk matrix

Which of the following is a function of the telecommunications component?

routing traffic to different locations

To collate innovative ideas for an important business project, a manager creates a database which is not integrated into the enterprise database. The new database is an example of a(n) ________.

shadow system

In comparison with primary storage, hard drives are ________.

slower in processing information

In which of the following approaches for integrating ERP modules does the vendor provide middleware to connect systems that may be running on different platforms?

suite with synchronized modules

Which type of software controls basic operations such as file management, disk storage, and hardware interfaces?

system software

A mobile device with a large touchscreen and virtual keyboard, which is smaller and thinner than a laptop but larger than a smartphone, is known as a ________.

tablet

A disadvantage of electronic data interchange (EDI) is that it ________.

tends to lock partners into their relationship

Which of the following laws establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies?

the Privacy Act of 1974

It is important to appreciate the ethical issues involved in the development and use of information systems because ________.

the data they contain is vast and personal

An information system is used to centralize information related to voting behavior in Texas. One of the indicators measured by the system is the average waiting time to vote. The time people spend waiting in line to vote at each polling booth is aggregated for each region. This is then used to create a graph that depicts the average waiting times by location. According to this scenario, which of the following refers to information?

the graph with average waiting times

Which of the following poses a hindrance to the adoption of information systems in nonprofit organizations and government?

the lack of dedicated funding

A person clicks on an ad of a fitness club in a blog on nutrition. The person conducts a search on yoga and moves to another webpage, which is also a network client. The stored information about the person is retrieved, and he sees more ads about health clubs and gyms. Which of the following web advertising tools is being used in this example?

third-party cookies

For which of the following reasons are companies most likely to use social networking sites?

to connect with customers and announce new products

When building a warehouse, the process of reformatting data so that it conforms to set standards is called ________.

transformation

A packet-switched network differs from a circuit-switched network in that a packet-switched network ________.

travels different routes

The percentage of workers who left an organization and were replaced during a time period is called employee ________.

turnover

The unique global address for a web page or other resource on the Internet is called the ________.

uniform resource locator (URL)

A ________ provides quick access to context indicators, email, secure instant messaging, voice and video calling, conference calling, corporate RSS feeds, and more.

universal dashboard

eBay's customers enrich the website by reviewing products that they purchase. These reviews are used by buyers to evaluate sellers on eBay. eBay also provides special privileges to sellers who have higher ratings. This is an example of ________.

value chain extension

A graphical, often 3D environment in which users can immerse themselves, interacting with virtual objects and one another using avatars is known as a(n) ________.

virtual world

E-marketing information systems provide extensive tracking capabilities by embedding a _____________ in the HTML email.

web beacon

A ________ is a software application that retrieves, interprets, and displays web resources.

web browser

When does a computer become a zombie?

when it is infected by malware


Ensembles d'études connexes

Chapter 25 the reproductive system

View Set

Chapter 2 biomechanics questions

View Set

Earth Science Exogenic Processes

View Set

PrepU: Chapter 15: Postpartum Adaptations

View Set

Genetic Disorders [Robbins and Cotran Review of Pathology (4E) CH5/Rubins Illustrated Pathology Review (2E) CH6]

View Set

Strategy week 5 (strategic innovation, industry context)

View Set