MIS 180 Judge Quizzes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

(Quiz 3) Which of the following represents a brick-and-mortar business?

T.J. Maxx

(Quiz 3) What are the two basic functions that social networking sites provide?

The ability to create and maintain a profile that is your online identity and create connections between other people within the network

(Quiz 2) Which of the following examples indicates when the time is right to initiate a business process change?

The market being served makes a distinctive shift. The company is following industry benchmarks on its core processes. The company strategically passes or leapfrogs the competition on key decisions to regain competitive advantage.

(Quiz 1) Steve Jobs and Apple created a big advantage in the technology industry with the introduction of the iPod, iPhone, and iPad. What are these all examples of?

-Competitive advantage -Competitive intelligence -First-mover advantage ---> All of the above <---

(Quiz 1) Which of the following represents a reason why competitive advantages are typically temporary?

-The competitor will hire away your key employees. -The competitor quickly seeks ways to duplicate your business operations. -The competitor will purchase new technology. --->All of the above.<---

Models help managers to:

-calculate risks -understand uncertainty -change variables -manipulate time to make decisions

Information Resource- Quality Attributes

-timelines -location -form -validity

(Quiz 7) Which domain is reserved for U.S. government agencies?

.gov

(Quiz 2) How does a DSS typically differ from an EIS?

An EIS requires data from external sources to support unstructured decisions, where a DSS typically uses internal sources to support semistructured decisions.

(Quiz 7) Which of the following is not a major ISP in the United States?

Apple

(Quiz 4) Which area of information security focuses on preventing identity theft, phishing, and farming scams?

Authentication and authorization

(Quiz 4) Where do organizations typically place firewalls?

Between the server and the Internet

(Quiz 4) The best and most effective way to manage authentication is through:

Biometrics

(Quiz 3) Which of the following identifies Business 2.0 communication and collaboration tools?

Blogs, wikis, mashup

(Quiz 7) What are the five elements that are needed to create a connected world or a network?

Categories, providers, access technologies, protocols, and convergence

(Quiz 7) A wireless WAN (WWAN) is a wide area network that uses radio signals to transmit and receive data and can be divided into which two categories?

Cellular and satellite communication systems

(Quiz 4) Charles Mott works for a company called VeriSign that acts as a trusted third party to verify information. One of Charles' largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online and having a third party validating the reviews is critical to CheckMd's success. What type of authentication technique is VeriSign providing for CheckMD?

Certificate authority

(Quiz 7) What are the two most prevalent types of broadband access?

Digital subscriber line and cable connection

(Quiz 2) Market share measures a firm's external performance relative to that of its competitors. Which of the following represents how a firm measures market share?

Dividing the firm's sales by the total market sales for the entire industry

(Quiz 3) Both individuals and organizations have embraced business to do which of the following?

Enhance productivity, maximize convenience, and improve communication

(Quiz 4) Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason or personal networks are two areas that should be addressed by managers in which of the following company policies?

Information security policies

IPO w/feedback

Input, Process, Output

(Quiz 4) Which of the following is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic that attempts to access files and data?

Intrusion detection software (IDS)

(Quiz 7) LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the following are the most important network differentiating dimensions?

Performance and cost

(Quiz 4) Which of the following would you find in a typical internet use policy?

User ramifications if the policy is violated, User responsibility for properly handling offensive material, User responsibility for protecting the company's good name

(Quiz 2) Bob Silver loves playing a game called World of Warcraft, where he has the capability to create his own character and even his own life-like environment. Which AI system would you use to categorize World of Warcraft?

Virtual reality

(Quiz 7) Which of the following is a measure being considered to address privacy concerns with RFIDs and LBSs?

A. Clearly labeled RFID tags on products B. Kill codes C. RSA Blocker Tags

(Quiz 7) What is VoIP?

All of these.

(Quiz 2) Which of the following is included as part of a benchmark?

Benchmarks help assess how an MIS project performs over time. When measured against MIS projects, benchmarks can provide feedback so managers can control the system. Benchmarks help to establish baseline values the system seeks to attain.

(Quiz 3) Which of the following represents the categories for ebusiness models?

B2B, B2C, C2C, C2B

(Quiz 3) Which of the following represents the primary forms of ebusiness?

Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers

(Quiz 3) Which of the following is not an example of a social bookmarking website?

Facebook

(Quiz 7) What is a disadvantage of networking or performing business in a connected world?

Increases security threats

(Quiz 2) What must managers be able to do to compete in today's global marketplace?

Make decisions to gain competitive advantages. Make decision that can help forecast future business needs. Make decision that can help forecast future business requirements.

(Quiz 2) Which of the following is not a feature of a neural network?

Neural networks can analyze linear relationships only.

(Quiz 1) Which of the following is similar to focused strategy versus broad strategy?

Niche market vs. large market

(Quiz 2) When evaluating the six-step decision making process, what occurs during the solution test step?

None of these

(Quiz 4) Which of the following would not be found in a typical acceptable use policy?

Not posting commercial messages to groups where the employee has received user content

(Quiz 2) Online transaction processing (OLTP) and online analytical processing (OLAP) are similar MIS strategies used to help with business decision making. What is the primary difference between OLTP and OLAP?

OLTP is used at the operational level; OLAP is used at the managerial level. OLTP is used to capture transactional and event data; OLAP is used to manipulate information. OLTP is used to support structured decisions; OLAP is used to support semistructured decisions.

(Quiz 3) Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to

Organize it for future navigation, filtering, and search

(Quiz 4) Which quadrant in the cost of downtime includes equipment rental, overtime costs, and travel expenses?

Other expenses

(Quiz 4) Which of the following is not considered a form of biometrics?

Password

(Quiz 3) eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and it is called

Reputation system

(Quiz 2) Which of the following represents the four main steps in the business process reengineering?

Set project scope, study competition, create new processes, and implement solution

(Quiz 3) All of the following are forms of ebusiness except

Subscription fee

(Quiz 1) Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's 5 Forces Model. Which of the following represents buyer power in the music industry? Wal-Mart, Target, Itunes

Walmart, Target, iTunes

(Quiz 1) Which of the following provides an example of data?

What is costumer number 12345XX?

(Quiz 1) Which of the following provides an example of information?

What is my worst selling product?

(Quiz 7) Which of the following statements is not accurate in reference to mobile and wireless computing?

Wireless technology is any type of operation accomplished with the use of a hard-wired connection.

(Quiz 1) Greg Provenzo owns and runs a Blockbuster video store. Greg is implementing a drive-thru rental process that is the same as you would find at a fast-food restaurant. Customers can pick up and drop off their videos without leaving their cars. Greg's new system has become so popular that Videos Plus, a competitor down the street, is attempting to re-create Greg's video drive-thru rental process. Greg's system is an example of a

first-mover advantage


Ensembles d'études connexes

Managing People and Work Exam 1 Mr. Chen

View Set

VHLCENTRAL FRE 111: 3 - ComplétezFill in the blanks Activity InstructionsFill in the blanks with the missing numbers to complete each equation. Write out the numbers in words and follow the model.

View Set

Sherpath: Informatics in Nursing Practice

View Set