MIS 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In 2014, approximately ________ Americans shopped online.

196 Million

Officially, E-Commerce began in _____

1995

According to Panorama Consulting Solutions, the average cost of an ERP project is approximately ________.

2.8 million dollars

Bluetooth is another name for the _____ wireless networking standard

802.15

Microsoft's DBMS that includes built-in report generation and reporting is called _____

Access

Apple Pay for the iPhone __________.

Allows user to charge to their credit cards

Amazon is one of the first to provide cloud computing relational databases. This effort is called _____

Amazon Relational Database Service

Enterprise applications have drawbacks mainly because they _____

Are expensive

An information system's _____ examines a firm's overall security environment and determines if the organization is properly prepared.

Audit

_____ is used to ensure a person is who they claim to be

Authentication

________ targeting techniques include banners, rich media, and video ads.

Behavioral

Using your handprint to access a safe is _____ authentication

Biometric

When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________

Bullwhip Effect

_____ in enterprise applications provides features for managers to obtain meaningful info from massive amounts of sources

Business Intelligence

BarnesandNoble.com is an example of ________ electronic commerce

Business to Consumer (B2C)

According to your text, ChemConnect's Web site for buying and selling chemicals is an example of ________ electronic commerce.

Business to business (B2B)

viruses differ from worms because worms _____

Can operate on their own without attaching to other files

Customer relationship management primarily includes _____

Capturing and integrating customer data

A(n) ________ is an Internet business model that provides an online meeting place where people with similar interests can communicate and share information.

Community Provider

Buying a silver coin from an individual on eBay is an example of ________ electronic commerce.

Consumer-to-consumer (C2C)

An example of _____ includes someone taking out a loan and then being sold a checking account as well.

Cross-selling

For DBSM's that do NOT include a reports generator, _____ is a popular option for large corporate DBMS

Crystal Reports

Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called ________.

Customer Lifetime Value

A ______ is a collection of data organized to serve many applications efficiently.

Database

SQL injection attacks are related to _____

Databases

iTunes has dramatically ________ illegal music downloads.

Decreased

Regarding IS Security, DoS represents _____

Denial of Service

_____ are data files used to protect and identify online transactions using a trusted third party

Digital Certificates

Downloading a movie to watch is an example of acquiring a ________.

Digital Good

_____ improved gold-mining operations by adding _____

Dundee Precious Metals;RFID

If a Web site changes its prices based on the demand characteristics (e.g., concert tickets), this is called _____

Dynamic Pricing

________ enables the computer-to-computer exchange between two organizations

EDI

According to the E-Commerce Presence Map, activities including newsletters are a(n) ________ type of presence.

Email

_____ help businesses become more productive by integrating processes focusing on management services such as sales, marketing, and accounting.

Enterprise Resource Planning (ERP) systems

SAP is the best selling

Enterprise Software

SAP is the best-selling _____

Enterprise Software

A(n) _____is the most popular method to model a database

Entity-relationship (ER) model

A _____ is a component in the computer system data hierarchy that includes content such as student ID 100, Course IS 101, and Grade A.

Field

In an enterprise system, the integrated software modules that focus on customer credit are related to ________.

Finance and Accounting

IS security firewalls are an example of a _____

Gatekeeper

If a supply chain includes organizations from the US and China, it is a(n) _____

Global Supply Chain

_____ was passed in 1996 to protect medical records

HIPAA

What is the most popular NoSQL DBMS?

Hadoop

An intrusion detection system (IDS)

Helps protect a system using full-time monitoring tools

In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to _____

Human Resources

A(n) _____ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.

Information Policy

_____ deals with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by management and employees.

Information Systems (IS)

The _____ is the most extensive public communication system

Internet

The world's largest network is the _____

Internet

A spyware program that tracks every key you type is a _____

Key Logger

_____ includes computer viruses, worms, and Trojan Horses

Malware

In an enterprise system, the integrated software modules that focus on production capacity are related to _____

Manufacturing and Production

Customer relationship management apps that track campaign data are related to the _____ aspect of customer relationships.

Marketing

A broad term to describe extending a marketplace beyond traditional boundaries is called ________.

Marketspace

The fastest growing type of B2C e-commerce is ________.

Mobile

________ is another name for e-hubs.

Net Marketplaces

The beginning of e-commerce occurred when ________ accepted the first ads from major corporations.

Netscape

An emerging non-relational database management system is called _____

NoSQL

The formal process to remove data problems such as repeating groups is called _____

Normalization

According to the E-Commerce Presence Map, activities such as education and branding are considered a(n) ________ type of presence.

Offline Media

More advanced CRM apps include _____ and _____.

Partener Relationship Management (PRM); Employee Relationship Management (ERM)

Someone sending you an email to appear as a site you commonly visit, they are _____

Phishing

_____ is the fastest growing website in history

Pinterest

A(n) ________ is an Internet business model that creates a destination site and is provided by companies such as Yahoo, Bing, and Google.

Portal

Another name for a key field is a _____

Primary Key

The field that uniquely identifies a row in a relational database table is called a _____

Primary Key

A supply chain management system using a(n) _____ model bases production schedules on actual customer orders.

Pull-based

A supply chain management system using a(n) ________ model bases production schedules on forecasts.

Push-based

_____ are used to track movements of products though the supply chain

RFIDs

The primary benefit of disintermediation to the consumer is ________.

Removing layers and reducing cost

_____ is a method for encrypting network traffic on the web

SSL

Customer relationship management applications that track Web sales and retail store sales are related to the ________ aspect of customer relationships.

Sales

In an enterprise system, the integrated software modules that focus on return requests are related to ________.

Sales and Marketing

In 2002, the _____ act was passed to help protect investors with new financial statement reforms

Sarbanes-Oxley

On a client/server system, most of the powerful processing is handled by the _____

Server

Customer relationship management apps that track social networking data are related to the _____ aspect of customer relationships.

Service

In information systems, SaaS stands for ________.

Software as a Service

A ________ is a network of organizations for obtaining raw materials.

Supply Chain

A _____ is a software program that mimics another to cause damage

Trojan Horse

Public key encryption uses _____ keys.

Two

802.11 Is also known as _____

Wi-Fi

A(n) _____ outlines acceptable uses of information system assets

acceptable use policy

A(n) _____ signal is represented by a continuous wave form that passes through a communication device

analog

Another name for a database field is a(n) _____

attribute

A _____ is the smallest component in the computer system data hierarchy

bit

Digital information transfer speeds are measured in _____

bits per second

A _____ is a component in the computer system data hierarchy that represents an ASCII character.

byte

A(n) ________ is an Internet business model which includes companies such as iTunes and WSJ.com

content provider

Data Cleansing, working to identify and fix correct data, is also called _____

data scrubbing

Software that allows an organization to manage and provide access to data is a _____

database management system (DBMS)

MasterCard having a duplicate computer center in multiple cities is an example of _____

disaster recovery planning

The Domain Name System (DNS) converts _____ to _____

domain names;IP addresses

A(n) ________ is an Internet business model that sells products directly to consumers

e-tailer

The number of cycles per second that can be sent through a network medium is calculated in _____

hertz

An internet protocol address (IP) address ______

is a 32 bit number assigned to every computer on the internet

Slicing digital messages into parcels is called _____

packet switching

The most commonly used authentication technique used for end users is a(n) _____

password

Although "Big Data" doesn't refer to a specific amount of data, it usually does involve _____

petabytes

If a computer is sending a file, and a packet being sent is damaged, the ____ computer asks the ____ computer to retransmit it.

receiving;sending

A network that spans between Montana and Washington is a(n) _____

wide area network


Ensembles d'études connexes

Algorithms Exam 2 Review: Dynamic Programming, Greedy Algorithms, & Amortized Analysis

View Set

APUSH Chapter 10 Learning Curve Study Guide

View Set

Ch 1 - A Closer Look: The Food Environment and Food Choices - Attempt 1

View Set

ATI RN Mental Health Nursing Modules Ch. 10 Notes

View Set

PEDS: Ch. 16 Nursing Care of the Child With an Alteration in Intracranial Regulation/Neurologic Disorder

View Set

Ch 27: Seedless Plants-questions

View Set

Chapter 23: The Great Depression

View Set

WGU C963 American politics and US Constitution

View Set