MIS 3 - Spring

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

data warehouse

A repository of historical data that are organized by subject to support decision makers in the organization.

The secondary key is a field that identifies a record with complete uniqueness.

Answer: False

Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.

Answer: True

The best way to capture the data in an organized format is to use a database.

Answer: True

You would be an instance of your university's STUDENT class.

Answer: True

Expert systems do what?

Apply reasoning, knowledge, and expertise within a specific domain.

Because AI mimics human intelligence, it has the capability to be creative. True False

False

Computers typically work in isolation in modern organizations due to information security concerns. True False

False

Customers that are using software-as-a-service are not using cloud computing. True False

False

Cybersquatting refers to the tampering of existing Web sites and selling unrelated products.

False

Decision-support systems support only lower- and middle-level managers. True False

False

Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity. True False

False

Electronic commerce makes national and international markets less accessible. True False

False

Employees who telecommute have generally found that the experience enhances their careers. True False

False

In batch processing, the data are collected from transactions as they occur and placed in groups or batches that are processed as they occur.

False

In order to be considered as an e-commerce Web site, the site must sell some tangible good. True False

False

In the fulfillment process, instance-level information indicates the status of a particular vendor purchase order. True False

False

In the implementation phase of the decision-making process, managers set criteria for the evaluation of alternative potential solutions. True False

False

Independent data stores or data silos are an efficient way to store proprietary data because they deny access to unauthorized parties.

False

Independent data stores or data silos are an efficient way to store proprietary data because they deny access to unauthorized parties. True False

False

Information technology and information systems are the same thing.

False

Internet marketing typically is one-way and impersonal.

False

Mainframe computers are no longer being used. True False

False

T/F A browser is used to prevent web surfing.

False

T/F Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.

False

T/F Digital signals have two parameters, amplitude and frequency.

False

T/F Microwave transmissions are broadcast, where as satellite transmissions are point-to-point.

False

T/F Social commerce involves paying for services such as online dating.

False

T/F The 20-80 rule refers to the fact that 20% of the feedback on social media is typically negative.

False

T/F The IT department is solely responsible for the quality of the data in the data warehouse.

False

T/F Voice and data communication networks are becoming more expensive.

False

Which of the following statements is false?

Business activity monitoring is a type of scheduled reporting.

T/F eBay uses a reverse auction.

False

Two strategies that a company can use to gain a competitive advantage are?

Customer-Orientation and Operational Effective Strategy.

Concentrate on making customers happy:

Customer-orientation Strategy

It is very difficult to manage data for which of the following reasons?

Data are scattered throughout organizations.

clickstream data

Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a Web site.

Data subject to constraints is an example of:

Data integrity

________ occurs when the same data are stored in many places.

Data redundancy

Which of the following represents the core drives of the information age?

Data, Information, Business Intelligence, Knowledge

A(n) _____________ is a computer program designed to support a specific task or business process.

Database

The Internet is managed by a central agency which bears all the cost and responsibility. True False

False

The right of privacy is absolute. True False

False

The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores.

False

The stock market is the only area of business that has experienced fraud on the Internet. True False

False

Trademark owners in the US are not allowed to sue for damages in cases of cybersquatting. True False

False

Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities.

False

Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities. True False

False

Entering data and programs from user departments to the mainframe was called remote data entry. T or F?

False!

Information systems for accounting and finance incorporate the following functions: (check all that apply)

Financial planning and forecasting Budgeting Auditing

The area of the earth reached by a satellite's transmission is referred to as its _____.

Footprint

HR information systems, POM information systems, CRM information systems, and marketing information systems are usually classified as:

Functional Area Information Systems

HR information systems, POM information systems, CRM information systems, and marketing information systems are usually classified as:

Functional area information systems

How does IT affect society?

Employees have greater flexibility in terms of work hours and locations.

Enterprise resource management is an enterprise wide effort intended primarily to acquire and retain customers.

FALSE

Functional information systems support the entire enterprise or major portions of it.

FALSE

Generating revenue from social networking sites is easy to do.

FALSE

Geo-tagging refers to tagging information on tour sites.

FALSE

In order to be considered as an e-commerce Web site, the site must sell some tangible good.

FALSE

Internet marketing typically is one-way and impersonal.

FALSE

One can trust the content of blogs.

FALSE

People making online posts know that they are providing market research data.

FALSE

Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.

FALSE

Refer to IT's About Business 3.3 - Your Privacy on Facebook: Which of the following is false about Facebook's privacy polices?

Facebook uses an Opt-in Model

A browser is used to prevent web surfing. True False

False

Which of the following statements concerning tagging is false? a)Tags fall into categories. b)Users can pick their own tags. c)Tags can be given to any piece of information or file. d)Tags can be used to retrieve Web content. e)Each user designs a personal set of tagging rules.

Tags fall into categories.

primary key

The identifier field or attribute that uniquely identities a record.

Which of the following are key data in a packing list?

Order and ship quantity Date the order was shipped Unit weight

The cloud service in which customers rent servers and operating systems over the Internet is called:

Platform as a service

structured query language (SQL)

Popular relational database language that enables users to perform complicated searches with relatively simple instructions.

_____ typically are used for unplanned B2B purchases, and the amount per purchase generally is limited ($1,000 to $2,000)

Purchasing Cards

Downloading a book on an Amazon Kindle is an example of:

Pure E-commerce

Downloading a book on an Amazon Kindle is an example of:

Pure e-commerce

When you buy a book from Amazon for your Kindle, you are conducting:

Pure-play EC

____ is a communications processor that routes messages from a LAN to the Internet, across several connected LANs, or across a wide area network such as the Internet.

Router

Sales and marketing professionals use IT for which functions?

Site Analysis and Promotion Anaylsis

Twisted Wire Pair

Slowest, most used, inexpensive, easy to work with

An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:

Social Engineering

Rank-and-file employees tend to make more _________ decisions. a)Structured b)Unstructured c)Undocumented d)Semistructured e)Procedural

Structured

A standard language used to manipulate data in a database is ___.

Structured Query Language

Broadband refers to a network with a high transmission capacity.

TRUE

Collaborative consumption allows strangers to make connections through peer-to-peer sharing.

TRUE

Companies monitor blogs for mention of their products.

TRUE

Companies use CRM systems to recreate the intimate personal relationship that once existed between them and their customers.

TRUE

Knowledge management systems (KMS) are used by organizations to capture, store, and disseminate knowledge within the organization.

TRUE

Many employees have organized work groups usually social networking sites because their companies don't offer similar tools.

TRUE

More and more organizations are using social media for training sessions.

TRUE

Online analytical processing involves the analysis of accumulated data by end users.

TRUE

distribution portals

corporate portals that automate the business processes involved in selling or distributing products from a single supplier to multiple buyers

Ergonomics with affect employees by

eliminating some of the physical stresses experienced on the job.

The primary goal of extranets is to do which of the following?

foster collaboration between and among business partners

With which type of satellite is there a propagation delay?

geostationary

With _____, every call opens up a dedicated circuit for the duration of the call.

plain old telephone service

A(n) _____ is automatically launched by some trigger and appears in front of the active window.

pop-up ad

pop-under ad

pop-up ad you do not see until you close your current browser window

Which of the following is an example of explicit knowledge?

procedural guides

An organization's IT components include all of the following except:

procedures

Which of the following are typical business processes?

procurement

In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.

protocols

The technology that uses radio waves to identify individual items is:

radio-frequency identification

Blogs and wikis fundamentally differ in terms of

Their ability of users to post content

Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

Trojan Horse

A benefit of the summary reports that an enterprise system offers is the ability to drill-down into more specific details for a given report. True False

True

Business process management includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.

True

Companies monitor blogs for mention of their products. True False

True

Despite the success of E-Mealz, Jane Delaney did not originally plan to create a large enterprise.

True

Distributed computing refers to the distribution of computing tasks among one or more computers.

True

Messages transmitted across the Internet are first divided into packets. True False

True

Sales force automation is a customer-facing application.

True

Server farms are designed to provide redundancy and fault tolerance. True False

True

Servers are typically more powerful than client machines. True False

True

Social media Web sites can use feeds to help market their products and services. True False

True

T/F Networks enable organizations to meet rapidly changing business conditions.

True

T/F NoSQL databases can process both structured and unstructured data.

True

T/F One of the attributes in a record must be a primary key.

True

T/F Organizational databases access one record at a time, where data warehouses access groups of related records.

True

T/F Rogue access points can be set up by employees.

True

T/F Servers are typically more powerful than client machines.

True

T/F The OnStar system from General Motors is an example of telemetry.

True

T/F The key mechanisms in the sell-side marketplace are customized electronic catalogs and forward auctions.

True

T/F Wireless computing can increase speed and improve customer service.

True

The Internet can both reduce and increase the bargaining power of suppliers, depending on the specific circumstances

True

The Internet can both reduce and increase the bargaining power of suppliers, depending on the specific circumstances.

True

The Internet reduces the barriers of entry for new competitors in an established industry.

True

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. True False

True

The data processed by transaction processing systems provide the inputs for other organizational information systems.

True

_____ refers to online word-of-mouth marketing. a)Permission marketing b)One-to-one marketing c) Personalized marketing d)Viral marketing e)Direct mail

Viral marketing

Which of the following is not a basic function of transmission control protocol?

analyzing the packets for size

functional area information systems

a cross organizational level information system designed to support a specific functional area

customer touch point

any interaction between a customer and an organization

A(n) _____________ is a computer program designed to support a specific task or business process.

application

Facebook is a _________.

social networking site

Facebook is a _________. blog wiki social networking site mash up

social networking site

Precisely targeted attacks, usually in the form of personal messages from a known social contact, are referred to as:

spear phishing. (spam, malware, social engineering)

The set of computer programs used to manage hardware resources is called:

systems software

The amount and type of memory that a computer possesses affects all the following except:

the speed of data entry

Wireless

telecommunications in which electromagnetic waves carry the signal between communicating devices. **makes use of time previously wasted and increases work flexibility**

Managing information systems in a modern organization is challenging because:

the systems are very expensive to acquire, operate, and maintain; and the systems are critical to the organization's operations.

electronic storefront

the web site of a single company, with its own internet address, at which orders can be placed

Companies use blogs for the following purposes: a)Marketing and social commerce b)Connecting with their customers/clients c)Influencing customers and market forces d) All of these

All of these

open-source CRM systems

CRM software whose source code is available to developers and users

Analytical CRM systems

CRM system that analyzes customer behavior and perceptions in order to provide actionable business intelligence

Exception reports show a greater level of detail than is included in routine reports.

False

T/F A free software package is called a browser.

False

T/F A group of related fields is generally called a data file.

False

T/F A relational database typically consists of one large two-dimensional table.

False

T/F A virtual group is one that works in the same room, but uses digital technologies to accomplish its goals.

False

T/F All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews.

False

T/F In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores.

False

T/F In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores.

False

T/F Internet marketing typically is one-way and impersonal.

False

T/F Managing data is difficult because data is stored in one place in an organization, its database.

False

T/F Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.

False

T/F One of the advantages of e-learning is that it is easy to assess students' work.

False

T/F Process and procedures are important but not critical to the effective use of computer based information systems.

False

T/F Social computing forces companies to deal with customers reactively as opposed to proactively.

False

T/F Social data is not a form of big data.

False

T/F Stored-value money cards contain chips with personal data.

False

T/F TCP/IP is a common LAN protocol.

False

T/F The Internet is managed by a central agency which bears all the cost and responsibility.

False

T/F The MIS department is solely responsible for the organization's ER diagrams.

False

T/F The terms, wireless and mobile, mean the same thing.

False

T/F The use of electronic commerce requires companies to hire additional employees.

False

T/F When two companies fight over a domain name the company that has been in business the longest is automatically considered the owner of the domain.

False

T/F Wireless broadband (WiMAX) is most useful for bringing Internet access to individuals in large cities.

False

T/F Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations.

False

The "safe harbor" framework details how the European Union exports data about U.S. citizens.

False

The configure-to-order strategy is commonly used by high-volume, low-cost operations, such as grocery stores, office supply stores, or fashion retailers. True False

False

The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores. True False

False

The sell-from-stock strategy is commonly used by low-volume, high-cost industries that require specialized products. True False

False

The use of electronic commerce requires companies to hire additional employees. True False

False

The user interface is the most sophisticated on enterprise operating systems and the least sophisticated on desktop operating systems. True False

False

Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions.

False

Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions. True False

False

Voice and data communication networks are becoming more expensive. True False

False

When requesting production in a highly automated enterprise system, an employee would need to manually create a planned order when inventory levels drop below a predetermined level. (T/F)

False

When two companies fight over a domain name the company that has been in business the longest is automatically considered the owner of the domain. True False

False

Wireless jamming introduces noise in the environment to stop people from eavesdropping on private conversations. True False

False

[Chapter 12] In the choice phase of the decision-making process, managers construct a model that simplifies the problem. True False

False

[Chapter 5] It is important for applications and data to be dependent on each other. True False

False

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):

Fiber optic cables offer higher security

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct): • Fiber optic cables have very high bandwidth. • Fiber optic cables are less difficult to tap. • Fiber optic cables offer higher security. • Fiber optic cables are susceptible to interference.

Fiber optic cables offer higher security

Fiber-optic cables are preferred over co-axial and twisted pair cables because

Fiber optic cables offer higher security. And Fiber optic cables have very high bandwidth.

Which wireline communication has the highest security?

Fiber-optic Cable

Which wireline communication has the highest security?

Fiber-optic cable

Which of the following are typical functional areas in a business?

Finance and Accounting

An "evil twin" is associated with which type of threat to wireless networks? a)Rogue access points b)War driving c)Eavesdropping d)RF jamming

Rogue access points

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization.

True

A company stores their products in a warehouse until customers place an order. Once an order has been placed, the company sends their shipments. This company is using a make-to-stock strategy. (T/F)

True

A digital signal consists of a stream of digital bits. True False

True

IT is enabling more and more people to communicate, collaborate, and compete, thereby leveling the digital playing field.

True

In an automated system you would be able to check the status of an order and any other related data by searching for the order number in the system. True False

True

In general, informed users tend to get more value from whatever technologies they use.

True

In most cases, cookies track your path through Web sites and are therefore invasions of your privacy. True False

True

In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.

True

In the production process, instance-level information is concerned with a single planned order and its progress through the production process. (T/F)

True

In the production process, process-level information is concerned with the production process as a whole, across multiple instances and over time. (T/F)

True

T/F An electronic marketplace is a central, virtual market space on the Web where many buyers and many sellers conduct e-commerce and e-business activities.

True

T/F Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.

True

T/F Workflow is the movement of information as it progresses through a sequence of steps that make up an organizations' work procedures.

True

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

True

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security. True False

True

The sell-from-stock strategy is commonly used by high-volume, low-cost operations, such as grocery stores, office supply stores, or fashion retailers. True False

True

Trojan horses are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. True False

True

Web 2.0 sites tend to be more interactive and collaborative than Web 1.0 sites. True False

True

When you interview for a job at a company, it is likely that the company will Google you and search social networking sites for information on you.

True

When you interview for a job at a company, it is likely that the company will Google your name and search social networking sites for information on you. True False

True

Wireless computing can increase speed and improve customer service.

True

You do not have to work in the IT department to benefit from learning about IT.

True

[Tech Guide 4] An expert system has a knowledge base and an inference engine. True False

True

Extranets offer limited accessibility to the intranets of participating companies.

True!

Functional area information systems summarize data and prepare reports, and provide the major support for middle-level managers. T or F?

True!

If your computer loses its power supply, you will lose the contents of your random access memory, because it is volatile. T or F?

True!

In a service-oriented architecture (SOA) is web services can be reused across an organization in other applications. T or F?

True!

In addition to traditional IT jobs such as programmers and designers, many new jobs are available in areas such as e-commerce and network security. T or F?

True!

There are six (6) characteristics of effective Business-IT Alignment. T or F?

True!

Utility computing is also called on-demand computing. T or F?

True!

Web services description language (WSDL) is used to create XML documents.

True!

XML is a more powerful language than HTML.

True!

Which of the following statements concerning blogging is false? a) Anyone can blog. b) A reader can believe all of the details in a blog. c) A company can maintain an internal blog site. d) Blogging can be used in marketing. e) Tweets are replacing blogging.

Tweets are replacing blogging.

Businesses and organizations set up Web sites to:

all - Sell goods and services. - Induce people to visit a physical location. - Reduce operational and transaction costs. Enhance their reputation.

Payment terms are declared by the seller at what step?

quotation

Here is an alternative format: Whereas phishing attacks are ____ , denial of service attacks are ____.

remote attacks requiring user action, remote attacks requiring no user action (remote attacks requiring no user action, attacks by a programmer developing a system ; remote attacks requiring no user action, remote attacks requiring user action ; Distributed remote attacks requiring user action, attacks by a programmer developing a system )

The key mechanisms in the ____ marketplace are customized electronic catalogs and forward auctions.

sell-side

electronic retailing

selling goods and services to ultimate customers over the internet

A company's annual employee evaluation best fits which type of decision? a)unstructured b)structured c)semistructured d)confrontational e)wisdom

semistructured

Blogs and wikis fundamentally differ in terms of

their ability of users to post content

Manufacturers or retailers sell directly to customers in which of the following business models?

online direct marketing

Low Earth Orbit (LEO)

--Satellites move rapidly relative to point on earth. --Large number needed for global coverage. --Requires only low-power transmitters. --Negligible transmission delay. --LEAST expensive to build and launch. --Shortest orbital life (as low as 5 years).

Identify six major categories of network applications:

1-Discovery 2-Communications 3-Collaboration 4-E-learning 5-Virtual Universities 6-Telecommunicating

Variable-length records contain: A. both a variable number of fields and variable field lengths. B. both a variable number of fields and fixed field lengths. C. both a fixed number of fields and variable field lengths. D. both a fixed number of fields and fixed field lengths.

A

Wireless local area network (WLAN)

A computer network in a limited geographical area that uses wireless transmission for communication.

Personal area network

A computer network used for communication among computer devices close to one person.

_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.

A computer-based information system

Data Warehouse

A data warehouse is a repository of historical data that are organized by subject to help support an organizations decision making. They are also relatively expensive so they are used more so by larger corporations. They use online data processing where business transactions are processed online as soon as they occur. Collects data from multiple systems and integrates it together. They also store data for a long time, years even.

Although the incident in the case resulted from a quality assurance error, the attack most closely resembled

A denial of service attack (A worm attack. A virus attack. A spam attack. )

bundling

A form of versioning: offering several products as a package at a single price.

file

A grouping of logically related records.

It is very difficult to manage data for which of the following reasons? A. Data are scattered throughout organizations. B. Data security is easy to maintain. C. Data are stored in the same format throughout organizations. D. The amount of data stays about the same over time. E. The decreasing amount of external data needs to be considered.

A. Data are scattered throughout organizations.

Organizations are using social computing in which of the following functions?

All of these

Increasing amounts of external data need to be considered in making organizational decisions.

Answer: True

Online analytical processing (OLAP) involves the analysis of accumulated data by end users.

Answer: True

Database management packages based on the _______________ model can link data elements from various tables to provide information to users. A. object-oriented B. relational C. network D. hierarchical

B

A(n) _____ is a logical grouping of related fields. A. database B. record C. byte D. field E. file

B. record

With _____, phone calls are treated as just another kind of data. A. chat rooms B. voice over IP C. plain old telephone service D. internet relay chat E. teleconference

B. voice over IP

Differentiate between the terms business process reengineering and business process management.

BPR is a radical redesign of an organizations business processes that is intended to improve the efficiency and effectiveness of these processes. The key to BPR is for enterprises to examine their business processes from a "clean sheet" perspective and then determine for they could best reconstruct those processes to improve their business functions. B/c BPR proved difficult to implement, organizations have turned to BPM. BPM is a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.

A high-speed network that connects a firm's LANs and WANS is:

Backbone network

A(n) _______________ is an integrated collection of logically related data elements. A. master file B. program base C. database D. integrated file

C

Which database structure works effectively with complex data types, such as video clips, audio segments, and other subsets of Web pages, and is considered one of the key technologies of Web-based applications? A. Hierarchical B. Network C. Object-oriented D. Relational

C

Cybercriminals can obtain the information they need in order to assume another person's identity by: A. Infiltrating an organization that stores large amounts of personal information. B. Phishing. C. Hacking into a corporate database. D. Stealing mail. E. All of the above are strategies to obtain information to assume another person's identity.

C.Hacking into corporate database

What is _____ is not necessarily _____. A. Illegal, unethical B. Ethical, illegal C. Unethical, illegal D. Unethical, legal E. Ethical, legal

C.Unethical, legal

___ is a type of EC where sellers and buyers are individuals.

C2C

The executive in charge of the IS field is the:

CIO

Which of the following statements concerning CRM is not true?

CRM is designed for companies to interact with their customers as a group.

____ and ____ are the two major challenges for the sellers in e-commerce. a)Order fulfillment, large orders b)Channel conflict, advertising c)Advertising, large orders d)Channel conflict, order fulfillment

Channel conflict, order fulfillment

____ and ____ are the two major challenges for the sellers in e-commerce.

Channel conflict; Order fullfillment

__________ are high speed central networks to which multiple smaller networks connect

Corporate backbone networks

Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?

Cost Leadership

Boolean logic deals with three logical operators: A. AND, OR, and BUT B. AND, NOT, and BUT C. OR, BUT, and NOT D. AND, OR, and NOT

D

In all information systems, data resources must be organized and structured in some logical manner, so that they can be: A. Easily accessed B. Processed efficiently C. Retrieved quickly D. All of the choices are correct.

D

In the relational database model, all data elements within the database are viewed as being stored in the form of simple two-dimensional tables, sometimes referred to as _______________. A. records B. rows C. columns D. relations

D

Object technology allows designers to do all of the following except: A. Develop product designs B. Replicate product designs and then modify them to create new product designs C. Save designs as objects in an object-oriented database D. Substantially reduce the file size of designs

D

_______________ are used to model the relationships among the many entities involved in business processes. A. Entity-relationship diagrams B. Data-flow diagrams C. Schema diagrams D. Subschema diagrams

D

_______________ databases have become the most popular structure for analytical databases that support online analytical process (OLAP) applications, in which fast answers to complex queries are expected. A. Relational B. Object-oriented C. Inter-relational D. Multidimensional

D

Operational data that are constantly updated are stored in:

Databases

The process of profiling

Decreases individual privacy

____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing.

Digital Wallets

_____ appears in 3 major forms: stored-value money cards, smart cards, and person to person payments.

E-Cash

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability

E.Liability

Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?

EIS, DSS, TPS

attribute

Each characteristic or quality describing a particular entity.

Which of the following statements is false?

Each functional area within an organization has only one application.

_____ refers to efforts by unauthorized users to access data traveling over wireless networks.

Eavesdropping

_____ refers to efforts by unauthorized users to access data traveling over wireless networks. a)RF jamming b)War driving c)Eavesdropping d)Telemetry e)Installing rogue access devices

Eavesdropping

What could a manager use to measure the success of an MIS project?

Effectiveness MIS metrics, efficiency MIS metrics

Which type of electronic payment is typically favored in B2B?

Electronic Checks

____, which is a broader concept than ___, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization.

Electronic business, Electronic Commerce

Which type of electronic payment is typically favored in B2B

Electronic checks

Discuss at least one main advantage of relational databases.

Enable people to compare information quickly by row or column. Users can retrieve items by finding the point of intersection of a particular row and column.

Human Resources departments only use social computing for external tasks.

FALSE

In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores.

FALSE

In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores.

FALSE

In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores. True False

False

Internet marketing typically is one-way and impersonal. True False

False

Knowledge is data that have been organized to convey accumulated learning.

False

Mainframe computers are no longer being used. True False

False

Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading. True False

False

Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading. True False

False

Niche applications are broad in their scope and run independently of a company's ES. True False

False

T/F A database must be associated with only one computer program or information system.

False

T/F An Intranet is a scaled-up version of the Internet that uses similar technologies.

False

Smart phones

In addition to being small enough to easy carry or wear, have sufficient computing power to perform productive tasks, and can communicate wirelessly with the Internet, they often have: --cellular telephony --bluetooth --wi-fi --digital camera --gps --an organizer/scheduler/address book/calculator --access to e-mail and sms messaging --mp3 music player --video player DOWNSIDE: people can use them to copy and pass confidential information.

Information Systems for production and operations management (POM) incorporate the following functions: (check all that apply)

Inventory and quality management

Collecting sales tax is an example of a(n):

Marketing Business Process

Producing identical items in large quantities is called:

Mass Production

Wi-Fi networks are typically classified as _______ wireless networks.

Medium-Range

A(n) _____ is a logical grouping of related fields.

Record

Each ___ in a relational database is a record.

Row

DNS are a convenient alternative to the difficult-to-remember IP naming system for computers.

TRUE

Data updates in a data warehouse are performed by the MIS department, not the users.

TRUE

Distributed computing refers to the distribution of computing tasks among one or more computers.

TRUE

Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.

TRUE

Financial management, operations management, and human resource management are core ERP modules.

TRUE

Governance of a data warehouse must be a collaboration between business users and IT personnel.

TRUE

In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.

TRUE

Information is the major component of the e-commerce offerings of service industries.

TRUE

Explain how the web has an impact on the bargaining power of customers (buyers):

The web provides customers with incredible amounts of choices for products, as well as information about those choices. As a result, the Web increases buyer power. However, companies can implement loyalty programs in which they use the web to monitor the activities of millions of customers. Such programs reduce buyer power.

Refer to IT's About Business 4.3 - The Stuxnet Worm: Which of the following statements is true?

The worm specifically targeted nuclear facilities

Which of the following statements about companies that provide proactive protection of your information assets is not correct?

These companies operate independently of the three major credit reporting agencies. ( These companies allow their customers to lock their credit files. These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files. When customers sign up with these companies, merchants and banks must obtain their verbal or written permission before opening new lines of credit in their names. These companies will proactively monitor their clients' credit files at the three credit reporting agencies. )

Which of the following is not a limitation of barcodes?

They identify the manufacturer, product, and item

Broadband refers to a network with a high transmission capacity.

True

Tacit knowledge has which of the following characteristics?

Unstructured because it isn't recorded and is through experience

What types of business decisions would an EIS use AI for?

Unstructured decisions

Grid computing utilizes _____ to form a virtual supercomputer. a)Unused processing b)Unused computers c)Geographically dispersed servers d) None of these

Unused processing

Various organizations that promote fair and responsible use of information systems often develop ____.

a code of ethics

WIRELESS FIDELITY

a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area

SATELLITE RADIO

a form of digital radio that receives broadcast signals via communications satellite

order fulfillment process

a highly integrated process, often requiring persons from multiple companies and multiple functions to come together and coordinate to create customer satisfaction at a given place and time

WEB 2.0

a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet

A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database

a) Byte

Ratings, reviews, and recommendations

b) Are an aspect of social shopping.

In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File.

b) Bit.

The comments of consumers in the blogosphere concerning a company's products are called ____________________.

b) Consumer-generated media.

24) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports

b) Corporate databases

Organizations are turning to data governance for which of the following reasons? a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization's databases. e) Data across their organizations are generally consistent.

b) They are responding to federal regulations

The most important benefit of knowledge management systems is: a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient.

b) They make best practices available to employees.

Buying a Vehicle Takes Work: Cars.com integrates different types of data from different sources and presents it to customers. Which of the following is false about its Web 2.0 efforts?

b) Users need to join Cars.com in order to obtain pricing quotes from dealerships.

The process of moving data from various sources into the data warehouse is called: a) uploading. b) extracting, transforming, and loading. c) online transaction processing. d) master data management. e) online analytical processing.

b) extracting, transforming, and loading.

In a relational database, every row represents a(n) _____. a) file b) record c) attribute d) primary key e) secondary key

b) record

The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________.

b) social intelligence

Network protocols describe a)The number of nodes in the network. b)The rules for communication within the network. c)The connections between the nodes in the network. d)The number of nodes in the network and the connections between them.

b)The rules for communication within the network.

Data Hierarchy

bit, byte, field, record, file, database

A(n) _____ is a collection of related activities that produce a product or a service of value to an organization.

business process

In the _____ marketplace model, the reverse auction is typically used.

buy-side

The data in a data warehouse: a) are updated constantly in real time. b) are updated in batch mode, approximately once per day. c) are not updated. d) are purged constantly as new data enter. e) are available for MIS analysts, but not users

c) are not updated.

A database management system is primarily a(n) _____. a) file-handling program b) data-modeling program c) interface between applications and a database d) interface between data and a database e) interface between queries and a database

c) interface between applications and a database

When data are normalized, attributes in the table depend only on the _____. a) secondary key b) common attribute c) primary key d) common row e) common record

c) primary key

With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.

convenience instant connectivity

strategies for competitive advantage

cost leadership differentiation innovation operational effectiveness customer-orientation

Compared to data warehouses, data marts have which one of the following characteristics?

cost less

Rank the following in terms of dollar value of the crime, from highest to lowest.

cybercrime - white collar crime - robbery

_____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart

d) Data governance

In a database, the primary key field is used to _____. a) specify an entity b) create linked lists c) identify duplicated data d) uniquely identify a record e) uniquely identify an attribute

d) uniquely identify a record

All of the following are used to provide online market research except

d)Emails

Which type of remote software attack does not require user action? virus worm phishing attack denial-of service attack

denial of service attack

HR departments use social computing applications to assist them in which of the following activities:

e) All of the above a) Recruiting b) Training c) Regrouping teams d) Managing downsizing

Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Both "They enable faster program development." and "They make it easier to modify data and information." e) All of these

e) All of these

Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time.

e) All of these are reasons why managing data is difficult over time.

on-demand CRM systems

hosted by an external vendor in the vendor's data center; lower costs and a need for employees to know only how to access and utilize the software

The threats to information security are _____, and the greatest threat is _____. • increasing, technological • decreasing, technological • staying about the same, software • decreasing, human • increasing, human

increasing, technological ??

An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.

information technology infrastructure

The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?

innovation

Which type of satellite has the shortest orbital life?

low earth orbit

Which type of satellite requires the highest number of satellites to cover the earth?

low earth orbit

Secondary Storage

nonvolatile more cost effective than primary storage slower than primary storage

A _____ is automatically launched by some trigger and appears behind the active window. a)keyword banner b) random banner c) pop-up ad d)pop-under ad e)text box

pop-under ad

The _____ is known as make-to-stock.

push model

Which of the following are key data in a purchase order when the order is first created?

quantity of material ordered purchase order number price of the material ordered requested delivery date

Which of the following are variations of the basic fulfillment process

quote to cash inquiry to cash

Knowledge management systems (KMSs)

refer to the use of information technologies to systematize, enhance, and expedite intrafirm and interfirm knowledge management.

Whereas phishing attacks are ____ , denial of service attacks are ____.

remote attacks requiring user action, remote attacks requiring no user action

Brick and Mortar

retailers who sell goods within an actual store

A _____ sends messages through several connected LANs or to a wide-area network.

router

Geostationary Earth Orbit (GEO)

satellites orbit 22,300 miles directly above the equator. These satellites maintain a fixed position above the earth's surface because of their altitude, their orbital period matches the 24-hour period of the earth. For this reason, receivers on the earth do not have to track GEO satellites. GEO satellites are excellent for sending television programs to cable operators and broadcasting directly to homes. --Satellites remain stationary relative to point on earth --Few satellites needed for global coverage. --Transmission delay (approx .25 sec.) --Most expensive to build and launch --Longest orbital life (many years)

Porter's Five Forces

threat of entry of new competitors bargaining power of suppliers bargaining power of customers threat of substitute products rivalry among existing firms in an industry

Mainframe

type of server

The development of mobile commerce is driven by the following factors:

-Bandwidth Improvement -widespread availability of mobile devices

The use of databases enables organizations to (choose all that apply):

-Minimize data inconsistency -Minimize data security risks -Minimize data isolation NOT -Eliminate data redundancy -Eliminate data integrity

The development of mobile commerce is driven by the following factors (choose all that apply)

-widespread availability of mobile devices -bandwidth improvement

Negative societal effects of the increased use of information technology:

1-Can cause health problems for individuals 2-Place employees on constant call 3-Potentially misinform patients about their health problems

IPv6 will allow for ___ unique IP addresses.

2128

Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.

802.11g

A _______________ is an overall logical view of the relationships among the data elements in a database. A. schema B. subschema C. logical data model D. conceptual design

A

bit

A binary digit; that is, a 0 or a 1.

Pervasive Computing (ubiquitous computing)

A computer environment in which virtually every object has processing power with wireless or wired connections to a global network.

A quotation in the fulfillment process is a response to: A sales order A customer invoice A customer inquiry A vendor invoice

A customer inquiry

byte

A group of eight bits that represents a single character.

data mart

A low-cost, scaled-down version of a data warehouse designed for the end-user needs in a small organization, or in a strategic business unit (SBU) or department in a large organization.

normalization

A method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance.

The same data are stored in many places.

Data Redundancy

In the fulfillment process, instance-level information indicates the status of which of the following? A particular customer order A particular quotation A particular goods receipt A particular purchase order

A particular customer order

instance

A particular entity within an entity class.

entity

A person, place, thing, or event about which information is maintained in a record.

Mobile Computing

A real-time wireless connection between a mobile device and other computing environments, such as the Internet or an intranet.

viral marketing

A strategy to get consumers to share a marketer's message, often through e-mail or online video, in a way that spreads dramatically and quickly

EC

A system formed by the interaction of a community of organisms with their physical environment

omputer integrated manufacturing

A system of manufacturing that uses computers to integrate the process of production, business, and manufacturing in order to create more efficient product lines

Really simple syndication is:

A system that allows you to receive information from sites you identify without having to go to the individual Web sites.

Define the term computer network:

A system that connects computers via communications media so that data and information can be transmitted among them.

Satellite radio (Digital radio)

A wireless system that offers uninterrupted, near CD-quality music that is beamed to your radio from satellites.

Microwave transmission

A wireless system that uses microwaves for high-volume, long-distance, point-to-point communication. **Negative: interference**

Global Positioning System (GPS)

A wireless system that uses satellites to enable users to determine their position anywhere on earth.

Satellite Transmission

A wireless transmission system that uses sttelites for broadcast communications.

When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.

A. Buy-side marketplace.

Organizations typically face issues related to e-tailing including A. Companies face issues in both of these areas B. Channel conflict C. Order fulfillment D. Companies do not face issues in either of these areas

A. Companies face issues in both of these areas

A data model is the diagrammatic representation of a database that clearly defines a database's ___ , ____ and ____. A. Entities, attributes, relationships. B. Entity classes, hierarchy, files. C. Data hierarchy, data attributes, data files. D. Entity classes, entity attributes, entity files.

A. Entities, attributes, relationships.

Which of the following is not a reason why software currently comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s? A. Hardware costs have increased. B. Hardware performance has increased C. Software has become increasingly complex. D. Building software applications remains slow, complex, and error-prone. E. None of these

A. Hardware costs have increased

____ is the cumulative store of subjective or experiential learning. A. Tacit knowledge B. Explicit knowledge C. Intellectual capital D. None of these

A. Tacit Knowledge

For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply): A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. C. The ability to eliminate advertising. D. The ability to offer lower prices to customers.

A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. D. The ability to offer lower prices to customers.

A tenet of ethics that refers to determining who is responsible for actions that were taken:

Accountability

Which of the following is not an ethical issue related to IT?

Accountability

______________ determines who is responsible for the actions taken.

Accountability

Radio

Advantages: a.) High bandwidth b.) Signals pass through walls c.) Inexpensive and easy to install Disadvantages: a.) Creates electrical interference problems b.) Susceptible to snooping unless encrypted.

Infrared

Advantages: a.) Low to medium bandwidth b.) Used only for short distances Disadvantages: a.) Must have unobstructed line of sight

Microwave

Advantages: a.) High bandwidth b.) Relatively inexpensive Disadvantages: a.) Must have unobstructed line of sight b.) Susceptible to environmental interference

_____ portals support communities such as hobby groups or a political party.

Affinity

Activities such as an availability check on inventory can be automated in an enterprise system because of which of the following?

An ES integrates functional areas and stores data in a common database.

Wireless Access Point

An antenna connecting a mobile device to a wired local area network.

data governance

An approach to managing information across an entire organization.

identifier

An attribute that identifies an entity instance.

secondary key

An identifier field or attribute that has some identifying information, but typically does not identify the file with complete accuracy.

_____ systems analyze customer data for designing and executing targeted marketing campaigns.

Analytical CRM

An organization's data warehouse generally maintains its operational data.

Answer: False

Data rot refers to the quality of the data itself.

Answer: False

In a data warehouse, existing data are constantly purged as new data come in.

Answer: False

Which of the following statements is not correct?

As with normal first-class mail, employers cannot read employee e-mail.

AJAX

Asynchronous Javascript and XML

In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n):

Attribute

What is the viewing of the physical world with computer-generated layers of information added to it?

Augmented Reality

Access controls involve _____ before _____.

Authentication; Authorization

A DBMS query language is designed to: A. Support information systems professionals in the development of complex application software B. Support end users who wish to obtain ad hoc reports C. Provide efficient batch mode processing of the database D. Specify the content, relationships, and structure of a database

B

With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices.

B and C

____ accounts for the majority of e-commerce transactions. A. B2C B. B2B C. C2C D. B2E E. G2C

B. B2B

Workflow, groupware, and telepresence systems are examples of which network application? A. Web services B. Collaboration C. Communications D. None of these E. Discovery

B. Collaboration

Which transmission technology utilizes existing telephone lines? A. T-carrier systems B. DSL C. ATM D. SONET

B. DSL

The following can be considered as broadband technologies (choose all that are correct): A. Dial-up B. DSL C. Cable D. All of these

B. DSL C. Cable

Which type of electronic payment is typically favored in B2B A. Electronic credit cards B. Electronic checks C. Smart cards D. Electronic cash

B. Electronic checks

An Intranet that allows limited access to its partners, suppliers, and customers is called a(n): A. Secure Intranet B. Extranet C. Corporate Web site D. Portal

B. Extranet

Which of the following is a flow of the supply chain? A. Virtual flows B. Information flows C. Report flows D. Human resources flows

B. Information Flows

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that is part of the organization's memory and typically resides inside the organization in an unstructured manner. A. Discovery B. Knowledge management C. Decision support D. Data mining

B. Knowledge Management

A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users. A. Supercomputer B. Mainframe C. Midrange computer D. Microcomputer E. Laptop computer

B. Mainframe

_____________is(are) the part of primary storage that holds a software program (or a portion of it) and small amounts of data when they are brought from secondary storage. A. Read-only memory B. Random access memory C. Cache memory D. Registers E. Flash memory

B. Random Access Memory

If broadband is not available in your area, which of the following Internet connection methods would allow you to connect to the Internet? A. You would able to connect using any of these methods B. Satellite C. Cable Modem D. DSL

B. Satellite

The term "data rot" refers to A. Data that no longer serve a purpose. B. The deterioration of the medium on which the data are stored. C. Data that are irrelevant or contain errors. D. All of these.

B. The deterioration of the medium on which the data are stored.

The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by: A. Neither party; PayPal is a free service. B. The payer. C. The payee. D. Both the payee and the payer.

B. The payer.

Network protocols describe A. The number of nodes in the network. B. The rules for communication within the network. C. The connections between the nodes in the network. D. The number of nodes in the network and the connections between them.

B. The rules for communication within the network.

The least expensive cable medium is: A. Fiber-optic cable B. Twisted-pair wire C. Coaxial cable

B. Twisted-pair wire

In an e-credit card transaction, the clearinghouse plays the following role: A. Initiates the transfer of money B. Validates and verifies the seller's payment information C. Transfers funds between the seller's bank and the buyer's bank D. All of these

B. Validates and verifies the seller's payment information

Where in a domain name do you find the top-level domain (TLD)? A. all the way to the left B. all the way to the right C. a TLD is not found within the domain name

B. all the way to the right

Which of the following is not a basic function of transmission control protocol? A. sequencing the transfer of packets B. analyzing the packets for size C. acknowledging that packets have been transferred D. managing the movements of packets between computers

B. analyzing the packets for size

Compared to data warehouses, data marts have which one of the following characteristics? A. contain more information B. cost less C. are harder to navigate D. have longer lead time for implementation E. have central rather than local control

B. cost less

____ accounts for the majority of e-commerce transactions.

B2B

You are given the following list of components: Touchscreen Panel (1), Flash Storage chip (1), Microprocessor (1), Aluminum Case (1). Which of the following documents would contain this information? -Production order -Planned order -Bill of materials -Purchase order

Bill of materials

A ___ is a personal Web site, open to the public, in which the creator expresses his or her opinions chronologically.

Blog

Which of the following are examples of instance-level information in the production process? -Stock requirement list from a particular planned order -Production date of a specific production order -Neither of these are examples of instance-level information. -Both A and B

Both A and B

A modem can perform which of the following operations?

Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only

Which of the following is not a component of a local area network?

Bridge

While information systems, such as transaction processing systems, generate more information for managers to process, other information systems, such as ___, help them analyze this information to make better-informed decisions.

Business intelligence applications

Business-IT alignment refers to the synchronization of a company's IT operations with its:

Business objectives

B2B

Business to Business

B2C

Business to Consumer

According to the textbook case, the innovation of the open-source product Hadoop is _______________. A. that it has not been sued by Google B. that it actually works C. that it has no proprietary predecessor D. its algorithms run contrary to contemporary mathematics

C

All of the following contribute to problems when using a file management approach except: A. Data redundancy B. Lack of integration of data C. Data independence D. Lack of data integrity

C

Early mainframe DBMS packages used the _______________ structure, in which all records are dependent and arranged in multilevel structures, consisting of one root record and any number of subordinate levels. A. network B. relational C. hierarchical D. object-oriented

C

Many end users have trouble correctly phrasing database language search queries, so most end-user DBMS packages now offer _______________ methods. A. speech recognition B. command line C. GUI D. All of the choices are correct.

C

The _______________ database structure is considered one of the key technologies of a new generation of Web-based applications. A. hierarchical B. relational C. object-oriented D. multidimensional

C

IPv6 will allow for ___ unique IP addresses. A. 128 B. 32 C. 2128 D. 232

C. 2128

Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using: A. The users of the search engine. B. Dedicated employees. C. Automated webcrawlers. D. A combination of all of these.

C. Automated webcrawlers

A modem can perform which of the following operations? A. Convert analog signals to digital signals only B. Convert digital signals to analog signals only C. Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only D. Modems do not convert signals

C. Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only

Workflow, groupware, and telepresence systems are examples of which network application? A. Discovery B. Communications C. Collaboration D. None of these

C. Collaboration

Which of the following is not a benefit of employing server virtualization? A. Cost savings in space B. Cost savings in energy C. Cost savings in customer service D. Cost savings in maintenance E. Cost savings in personnel

C. Cost savings in customer service

Arrange the hierarchy of terms to describe memory capacity in the correct sequence, from smallest to largest: A. Megabyte - kilobyte - gigabyte - terabyte - exabyte - petabyte B. Exabyte - petabyte - terabyte - gigabyte - megabyte - kilobyte C. Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte D. Petabyte - exabyte - kilobyte - gigabyte - kilobyte - terabyte E. Kilobyte - gigabyte - megabyte - exabyte - petabyte - terabyte

C. Kilobyte - megabyte - gigabyte - terabyte - petabyte - exabyte

Place the different types of computer networks in size order, ranging from smallest to largest. A. LAN-PAN-MAN-WAN B. PAN-MAN-WAN-LAN C. PAN-LAN-MAN-WAN D. PAN-MAN-LAN-WAN

C. PAN-LAN-MAN-WAN

A standardized language used to manipulate data is _____. A. MS-Access B. Oracle C. Query-by-example language D. None of these

C. Query-by-example language

Which of the following factors does not affect decisions about hardware? A. Power B. Appropriateness for the task C. Size D. Cost E. Speed

C. Size

Which of the following items is an IT component of information systems? A. Procedures B. End users C. Software D. Management

C. Software

Which of the following is not a reason why managing information systems is a complex task? A. Information systems have strategic value to the organizations. B. Information systems are very expensive to acquire, operate, and maintain. C. The IS department "owns" the computing resources in a company. D. End users share the responsibility for the information systems with the IS department.

C. The IS department "owns" the computing resources in a company.

A(n) _____ is automatically launched by some trigger and appears in front of the active window. A. keyword banner B. random banner C. pop-up ad D. pop-under ad E. text box

C. pop-up ad

A standardized language used to manipulate data is _____. A. Oracle B. query-by-example language C. structured query language D. data manipulation language E. MS-Access

C. structured query language

A _____ is intellectual work that is known only to a company and is not based on public information. A. copyright B. patent C. trade secret D. knowledge base E. private property

C.Trade secret

_____ is a system that connects computers and other devices via communications media so that data and information can be transmitted among them.

Computer Network

Tranion Processing System (TPS)

Continuous 'real-time' data collection Efficiently handle high volumes of data and large variations isactn those volumes Avoid errors and downtime

electronic CRM

Customer relationship management conducted electronically.

Which of the following are examples of master data? Vendors, customers, dates, and quantities Dates, vendors, and locations Dates, quantities, times, and locations Customers, vendors, products, and employees

Customers, vendors, products, and employees

____ involves conducting various banking activities from home, at a place of business, or on the road instead of at a physical bank location.

Cyberbanking

A record represents a collection of _______________ that describe an entity. A. characters B. fields C. files D. attributes

D

Networks enable which of the following application A. Discovery B. Communications C. Collaboration D. All of these

D. All of these

Which of the following is not a benefit of grid computing? A. It enables efficient use of computing resources. B. It enables applications to run faster. C. There is no single point of failure. D. It reduces the number of applications that are installed on computers E. It makes it easier to scale up or down.

D. It reduces the number of applications that are installed on computers

Which of the following is the correct hierarchy from the lowest level to the highest level?

Data / Information / Knowledge

Various versions of the data do not agree.

Data Inconsistency

In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n): A. entity B. object C. relation D. attribute E. primary key

D. attribute

In the _____ marketplace model, the reverse auction is typically used. A. desktop purchasing B. group purchasing C. electronic exchange D. buy-side E. sell-side

D. buy-side

Human Resource Planning and Management

Developing a comprehensive strategy for meeting future human resource needs.

Describe the most common methods for accessing the Internet:

Dial-up DSL Cable Modem Satellite Wireless Fiber to the home

Efforts by unauthorized users to access data traveling over a wireless network is called:

Eavesdropping

The principles of right and wrong that individuals use to make choices to guide their behaviors:

Ethics

_____ reports summarize the performance of critical activities.

Exception

Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby's tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering?

Feedback

Global outsourcing helps an organization to:

Find the best person for the job. Find more economical resources. Implement spatial and temporal flexibility. All of these.*

Microwave transmission systems are used for _____ volume, _____ distance, _____ communications.

High, long, line-of-sight

eBay employs the ___ auction mechanism.

Forward

eBay employs the ___ auction mechanism. a)Forward b) Reverse c) Dutch d)Proprietary eBay

Forward

eBay uses a ___ auction.

Forward

Porter's competitive forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____.

General Strategies, Activities

What activity is performed when a shipment arrives from a vendor?

Goods receipt

Direct payment of Social Security benefits is an example of _____ e-commerce.

Government-to-citizen

Computer programs like CAPTCHA are used to counter

Hackers using key loggers

Data redundancy refers to:

Having copies of the same data in multiple locations.

Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.

High, repetitive, difficult

_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.

IT Components

IT personnel use _____ to produce _____.

IT components, IT services

Explain how the web has an impact on the rivalry among existing firms in the industry:

In the past, proprietary information systems provided strategic advantage for firms in highly competitive industries. The visibility of Internet applications on the Web makes strategic advantage more short lived.

_____ is (are) data that have been organized to have meaning and value to a recipient.

Information

How does the text recommend that a company operate if it wants to be successful in the information age?

Interdependently between departments

What does a systems analyst do?

Interfaces between end users and programmers

The benefits of open-source CRM include all of the following except:

It has more functionality than in-house CRM systems.

The workforce in developed countries is exhibiting all of the following trends except:

It includes fewer persons with disabilities

The major types of wireless media are:

Microwave, satellite, radio, and infrared.

The most overlooked people in information security are:

Janitors and Guards

Compare and contrast blogs and wikis.

Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites Section Reference 1: 9.1 Web 2.0

Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________.

Location based advertising

List a business pressure and describe an IT response to it;

Market Pressures: An example of a market pressure is powerful customers. Customer relationship management is an effective IT response that helps companies achieve customer intimacy.

The blogosphere is defined as:

Millions of blogs on the Web.

Which of the following is not a type of Big Data?

None of the above; all are types of Big Data

A method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance.

Normalization

Explicit knowledge has which of the following characteristics?

Objective

The sales, marketing, and service functions are part of:

Operational CRM

_____ systems support the front-office business processes, which directly interact with customers.

Operational CRM

Once production has been authorized with an enterprise system, what would be needed to obtain the raw materials from the warehouse to begin production? -Planned order -Invoice -Order number -Material withdrawal slip

Order number

What is a characteristic of effective business - IT alignment?

Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams

When data are normalized, attributes in the table depend only on the _____.

Primary Key

___ is the right to be left alone and to be free of unreasonable personal intrusions.

Privacy

Which of the following are examples of intra-company processes? -Procurement, fulfillment, and production -Procurement, fulfillment, and CRM -Fulfillment, CRM, and SCM -None of the above are examples of intra-company processes.

Procurement, fulfillment, and production

Social networking Web sites:

Provide an easy, interactive tool for communicating and collaborating with other people on the Web.

Data dictionaries perform all of the following functions except:

Providing information on each record

All of the following statements regarding QR codes are true except:

QR codes can only store information that is comprised of numbers or text.

What is the key piece of data needed to begin the pick and pack step of the fulfillment process?

Sales order number

____ are other fields that have some identifying information but typically do not identify the file with complete accuracy.

Secondary Keys

Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?

Spamware

The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by:

The Payer

Which of the following is not an example of business - IT alignment?

The company views IT as a way to support the business but not as a way to create new revenue streams.

operational CRM systems

The component of CRM that supports the front-office business processes that directly interact with customers

Medium-range wireless networks

The familiar wireless local area networks (WLANs). The most common type is Wireless Fidelity or Wi-Fi.

multidimensional structure

The manner in which data are structured in a data warehouse so that they can be analyzed by different views or perspectives, which are called dimensions.

explicit knowledge

The more objective, rational, and technical types of knowledge.

best practices

The most effective and eff cient ways to do things.

Which of the following is not a reason that managers need IT support?

The number of alternatives is decreasing.

The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by:

The payer.

Identify 3 places that store personal data and the threat of privacy to these.

The privacy threat in Internet bulletin boards, newsgroups, and social networking sites is that you might post too much personal information that many unknown people can see.

Auction

The public sale of something to the highest bidder

etwork protocols describe • The number of nodes in the network. • The rules for communication within the network. • The connections between the nodes in the network. • The number of nodes in the network and the connections between them.

The rules for communication within the network.

database management system (DBMS)

The software program (or group of programs) that provides access to a database.

What is the biggest concern with collaborative consumption?

Trust

Blogs and wikis fundamentally differ in terms of • their size • their potential to be shared with the public • their ability of users to post content • their use of AJAX

Their ability of users to post content

Which of the following are true regarding fixed order quantities? -They maximize costs and reduce inventories -They minimize costs and reduce inventories -They minimize costs but lead to accumulation of inventories -They maximize costs but lead to accumulation of inventories

They minimize costs but lead to accumulation of inventories

Which of the following is not a characteristic of DSS?

They support all phases of the decision-making process.

Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?

This software reduces your vulnerability to distributed denial-of-service attacks.

Many organizations have implemented corporate portals to...

To cut costs To free up time for busy managers To improve profitability To offer customers self-service opportunities

A supply chain management system would need to connect to a supplier relationship management system in order to do which of the following?

To transfer raw materials requirements to be matched against current supplier information

The rightmost segment of a domain name is:

Top-level domain

The difference between a customer purchase order (in fulfillment) and a purchase order (in procurement) is that the customer purchase order data reflects the customer's perspective rather than the company's perspective. True False

True

Wireless Mesh Networks

Use multiple Wi-Fi access points to create a wide area network that can be quite large. Ex: spending $ for more wireless access points in streetlights and and power poles in Augusta, Georgia.

Web 2.0 sites include:

User participation. Collaboration. Social interaction. All of these.*

Third Generation (3G)

Uses digital signals and can transmit voice and data up to 384 Kbps when the device is moving at a walking pace, 128 Kbps when moving in a car, and 2 Mbps when the device is in a fixed locations. Supports video, Web browsing, and instant messaging.

What are the minimum pieces of information required to create a purchase requisition?

Vendor

Which of the following are examples of process-level information relevant to procurement process?

What is the average time between sending a purchase order and receiving the shipment? Which materials are purchased most frequently? Which suppliers are prompt and which suppliers are habitually late in delivering the materials ordered?

The main problem with radio transmission is which of the following?

When you travel too far from the source, the signal fades.

Which of the following are examples of process-level information relevant to the fulfillment process?

Which customers are prompt and which ones are habitually late in sending the payment? What is the average time between creating a sales order and sending the shipment? Which materials are sold most frequently?

Wireless Fidelity

Wi-Fi A set of standards for wireless local area networks based on IEEE 802.11 standard.

Which of the following is not a benefit of being an informed user of IT?

Working in the IT side of the organization

Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program)

Worm

If you are an employee of a large organization and your Facebook account is hacked, the attackers can obtain access to:

Your personal information and photographs on Facebook. Your personal financial information. Information of all your Facebook friends. Your company's data and resources. All of these.

The complete data set on a customer is called:

a 360-degree view

customer interaction center (CIC)

a CRM operation where organizational representatives use multiple communication channels to interact with customers in functions such as inbound teleservice and outbound telesales

Ergonomics

a science that deals with designing and arranging things so that people can use them easily and safely

electronic marketplace

a virtual market space on the web where many buyers and many sellers conduct electronic business activities

Business intelligence applications include:

a) Microsoft Excel spreadsheets b) Data warehouses c) Special purpose analytic packages

Knowledge workers

advise middle managers

Knowledge workers:

advise middle managers

Query by Example (QBE)

allows users to fill out a grid or template to construct a sample or description of the data he or she wants

Structured Query Language (SQL)

allows users to perform complicated searches by using relatively simple statements or keywords.

Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence

b) Data integrity.

The part of a network that handles the major traffic is the ________.

backbone

A company does not have sufficient inventory of materials ordered by a customer. So, it ships what it has now and will ship the remaining at a later date when more materials are available. Which of the following best describes the above scenario?

backorder

virtual banks

banking institutions dedicated solely to internet transactions.

Cyber Banking

banking through online services; allow people to check balances, pay bills, etc. online

what are the types of data needed to create an invoice?

billing date billing document type outbound delivery number

LinkedIn is a _______________________ social networking site that makes money from advertising and services.

c) Business-oriented

Refer to Closing Case - Can Anyone Succeed with Local, Online Advertising?

c) Competition from Google and Facebook

_____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence

c) Data consistency

A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________.

c) Enterprise Social Networks

When customers access a Web site and make purchases, they generate _____.

clickstream data

Tacit knowledge

cumulative store of subjective or experiential learning. Examples: experiences, insights, expertise, know-how, trade secrets, understanding, skill sets, and learning

What information is needed to convert a quotation to a sales order?

customer purchase order date customer purchase order number quotation number

Searching for valuable business information in a database, data warehouse, or data mart refers to _____.

data mining

A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____.

data, information

A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________.

data, information

Which of the following is the correct hierarchy from the lowest level to the highest level?

data, information, knowledge

Gordon Moore (with Moore's Law) predicted that microprocessor complexity would do which of the following?

double every two years

A Web site that combines content from other Web sites to form new content is called a(n) ______.

e) Mashup

Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a)tacit b)explicit c)managerial d)geographical e)cultural

explicit

Organizational transactions are typically _____ volume, _____, and therefore _____ to computerize.

high, repetitive, Easy

The list of all your purchases from Amazon (books bought, price paid, dates) is defined as ___________.

information

Primary key

is a field that uniquely identifies a record

Database

is a group of logically related files

When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____. a) keyloggers, screen scrapers b) screen scrapers, uninstallers c) keyloggers, spam d) screen scrapers, keyloggers e) spam, keyloggers

keyloggers, screen scrapers

Using your cell phone to purchase a Coke from a vending machine is an example of:

micropayment

When e-commerce is done in a wireless environment, this is called:

mobile commerce

Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics?

mobility, broad reach

The two major characteristics that differentiate mobile computing from other forms of computing are _______ and _________.

mobility, broad reach

Explicit knowledge has which of the following characteristics?

objective

The _____ is known as make-to-order.

pull model

The advantages of RFID tags to Staples include all of the following except:

reduced transaction costs at checkout

routine reports

reports produced at scheduled intervals

comparative reports

reports that compare performances of different business units or time periods

drill-down reports

reports that show a greater level of detail than is included in routine reports

cross selling

selling additional products or services to a customer

mobile commerce

the ability to purchase goods and services through a wireless Internet-enabled device

In a database, the primary key field is used to _____. a)specify an entity b)create linked lists c)identify duplicated data d) uniquely identify a record e)uniquely identify an attribute

uniquely identify a record

The ___________ is comprised of a company's suppliers, suppliers' suppliers, and the processes for managing them.

upstream segment of the supply chain

The development of mobile commerce is driven by the following factors (choose all that apply)

widespread availability of mobile devices bandwidth improvement

The development of mobile commerce is driven by the following factors (choose all that apply)

widespread availability of mobile devices -bandwidth improvement

An organization's e-mail policy has the least impact on which of the following software attacks?

zero-day

A company receives an order for multiple items, however, only some of the items can be shipped and the remainder will be shipped later. This is an example of a stock out. True False

False

A company that utilizes software-as-a-service (SaaS) must physically install the ES at their facility. True False

False

A free software package is called a browser.

False

A free software package is called a browser. True False

False

A relational database typically consists of one large two-dimensional table. True False

False

All business processes must be owned by one and only one functional area in any organization.

False

All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews. True/False

False

An ERP system is an inter-organizational information system.

False

An Intranet is a scaled-up version of the Internet that uses similar technologies. True False

False

An individual or organization faced with an ethical decision is basically considering whether to break the law

False

BI refers to only those technologies that obtain data from warehouses. True False

False

Backup and recovery procedures are recommended only to safeguard against hardware/software failures. F

False

Bluetooth devices can be used to establish NFC for mobile commerce.

False

Both transactional data and master data are connected to a specific process or process step within an organization. True False

False

Computer code is generally efficient, well designed, and contains very few errors. True False

False

Computer hardware and software are designed to be general purpose True False

False

Cybersquatting refers to the tampering of existing Web sites and selling unrelated products. True False

False

Cybersquatting refers to the tampering of existing Web sites and selling unrelated products. True False

False

Digital signals have two parameters, amplitude and frequency. True False

False

Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity.

False

Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity. True False

False

Dumpster diving is always illegal because it involves trespassing on private property. True False

False

Electronic data interchange does not help much in reducing paper.

False

End-user computer refers to a group of end users working together to manage their interactions with a computer.

False

Enterprise resource planning systems do not support intercompany processes. True False

False

Grid computing supports all applications that run on traditional servers. True False

False

Human Resource departments only use social computing applications for recruiting purposes. True/False

False

IT personnel use the IT infrastructure to develop information systems.

False

In a client-server environment, each component layer runs on a single computer. True False

False

In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores. True False

False

In general, employees have high legal protection against surveillance by employers.

False

In general, employees have high legal protection against surveillance by employers. True False

False

In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores. True False

False

In order to be considered as an e-commerce Web site, the site must sell some tangible good.

False

In order to be considered as an e-commerce Web site, the site must sell some tangible good. True False

False

Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.

False

Once a shipment has been sent, the customer purchase order must be updated. True False

False

Organizational servers typically function at 80-90 percent of their actually capacity, which provides a high level of efficiency. True False

False

Over the years, improved security software has made it progressively more difficult for hackers to get access to potential victim's computers F

False

Packaged applications are designed specifically for one firm. True False

False

Packing is the process of retrieving the needed material from the warehouse and requires a packing list to be completed. True False

False

RSS allows content publishers to get their content across to a large group of interested as well as uninterested consumers on a regular basis. True False

False

Server farms store vast amounts of data at a very low cost. True False

False

Stored-value money cards contain chips with personal data. True False

False

Supply chain visibility is the time between the receipt of incoming goods and the dispatch of finished, outbound products.

False

T/F A data warehouse is a low-cost, scaled-down version of a data mart designed for the end-user needs in a department in a large organization.

False

T/F B2B EC is more complex than B2C EC.

False

T/F Big Data is the same thing as huge amounts of structured data in organizational databases.

False

T/F Bluetooth devices can be used to establish NFC for mobile commerce.

False

T/F Computers typically work in isolation in modern organizations due to information security concerns.

False

T/F Electronic commerce makes national and international markets less accessible.

False

T/F Enterprise social networks and social networks are the same thing.

False

T/F Human Resource Departments use social computing applications only in the area of training.

False

T/F Human Resource departments only use social computing applications for recruiting purposes.

False

T/F In order to be considered as an e-commerce Web site, the site must sell some tangible good.

False

T/F The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.

False

T/F The only risk companies face when using social commerce is that customers may post negative feedback.

False

T/F The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores.

False

T/F The stock market is the only area of business that has experienced fraud on the Internet.

False

T/F Trademark owners in the US are not allowed to sue for damages in cases of cybersquatting.

False

T/F Transferring data from the organization's operational databases into its data warehouse is called data reconciliation.

False

T/F Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities.

False

T/F Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions.

False

T/F Voice-over-IP transmits voice over the Internet in the form of analog waves.

False

T/F When various copies of the data agree, this is an example of data integrity.

False

T/F Wi-Fi is a wireless standard that enables temporary, short-range connections between mobile devices.

False

The individual's right of privacy supersedes the public's right to know.

False

The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.

False

The main purpose of location-based applications is to broadcast your current location coordinates to local businesses. True False

False

The only target for cyber criminals are organizations with valuable information such as customer credit card information. F

False

The relational database model is based on the concept of three-dimensional tables. True False

False

The right of privacy is absolute.

False

The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores. True False

False

Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities. True False

False

When you start a job, you are given an employee handbook which contains the company's tacit knowledge. True False

False

Wikipedia can always be considered a reliable and undisputable source of information. True False

False

[Chapter 7] eBay is a good example of business-to-consumer electronic commerce. True False

False

[Chapter 8] Pervasive computing and virtual reality are just different names for the same thing. True False

False

[Chapter 9] RSS stands for Real Simple Subscription. True False

False

[Tech Guide 3] MIS departments embraced the arrival of personal computers in the work place. True False

False

Supplier relationship management focuses only upon a company and a single supplier. (T/F)

False - SRM focuses on the entire relationship between a company and its suppliers.

A source-to-settle process occurs between a company and its customers. (T/F)

False - occurs between a company and it's suppliers.

ERP and TPS systems have separate systems for each department. T or F?

False!

Functional area information systems are those that integrate all areas of the company. T or F?

False!

Master data are generated and captured by operational systems.

False!

Server farms can be located just about anywhere. T or F?

False!

The pricing model for infrastructure-as-a-service model offered by cloud computing providers is usually a per user fee. T or F?

False!

Information technology collects, processes, stores, analyzes, and disseminates information for a specific purpose. T or F?

False. That is Information Systems.

In batch processing, the data are collected from transactions as they occur and placed in groups or batches that are processed as they occur.

Fasle

Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.

Fasle

Tacit knowledge is the more objective, rational, and technical types of knowledge. True False

Fasle

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):

Fiber optic cables have very high bandwidth.-Fiber optic cables offer higher security.

Data dictionaries perform all of the following functions except: A. Providing information on each record B. Defining the format necessary to enter data into the database C. Providing information on why attributes are needed in the database D. Providing information on how often attributes should be updated E. Providing information on name of attributes

A. Providing information on each record.

Which of the following are advantages of computer networks? A. They enable organizations to be more flexible. B. They enable companies to share hardware, computer applications, and data. C. They enable geographically dispersed employees to work together. D. They provide a critical link between businesses and their customers. E. All of the above

All of the above

Enterprise systems allow for which of the following?

All of the above - The division of business processes traditionally performed inside a company to outside partners -Providing collaboration among networks of partner companies -Providing cost savings by capitalizing on individual company strengths in a group partnership

Organizations are using social computing in which of the following functions? •Marketing. •Cust. Relationship Manag •Human Resource Management •All of these

All of these

The popularity of online classes and online universities can be attributed to which of the following network applications?

All of these

The popularity of online classes and online universities can be attributed to which of the following network applications? Discovery Communications Collaboration All of these

All of these

Which of the following statements concerning social media Web sites like Twitter and Facebook are true? a)They collect vast amounts of data about and from their users. b)Data collected from users can be used without their explicit consent. c)They connect individuals with similar interests. d)They are useful in recording the lives of famous people and ordinary people. e)All of these

All of these

Methods you should use to protect your portable devices and information include all of the following except: a) Using two-factor authentication. b) Making certain not to leave your portable devices in plain view in a car. c) Keeping your portable devices in an inconspicuous container. d) Encrypting the hard drive of your laptop. e) All of these are legitimate protection methods.

All of these are legitimate protection methods.

Where in a domain name do you find the top-level domain (TLD)?

All the way to the right

Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.

Answer: False

Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.

Answer: False

The database maintenance process is accomplished via: A. Hierarchical database systems that provide flexibility and network databases B. Transaction processing systems and other end user applications, with the support of the DBMS C. Graphical query languages correctly phrasing SQL D. File processing systems with the support of 4GLs

B

The tables in a relational database are flat files which have rows and columns. Each row represents a _______________ in the file. A. field B. record C. file D. relation

B

When independent of any other files related to it, a single table is referred to as a(n): A. Independent file B. Flat file C. Hierarchical file D. Non-variable file

B

Which database model allows many-to-many relationships among records so that a data element can be accessed by following one of several paths? A. Hierarchical B. Network C. Object-oriented D. Relational

B

Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.

Back Door Also called a Trap Door

An information system that uses computer technology to perform some or all of its intended tasks:

Computer based information system (CBIS)

eBay is an example of which type of e-commerce?

C2C

Which of the following are examples of inter-company processes? -Procurement, fulfillment, and production -Procurement, fulfillment, and CRM -CRM and SCM -None of the above are examples of inter-company processes.

CRM and SCM

When customers access a Web site and make purchases, they generate _____.

Clickstream data

Porter's _____ help(s) companies identify general strategies, whereas his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact.

Competitive force model; Value chain model

An application that is isolated to one process or part of a process and has evolved from a departmental application is a: Niche application Best-of-breed application Mashup Composite Application

Composite Application

The computing skills necessary to be a hacker are decreasing for which of the following reasons?

Computer attack programs, called scripts, are available for download from the Internet.

____ accounts for the majority of e-commerce transactions. a)B2C b)B2B c)C2C d)B2E e)G2C

B2B

n mainframe and server computer systems, the database management system controls the _______________ of the databases of computer-using organizations. A. maintenance B. development C. use D. All of the choices are correct.

D

_____ are similar to regular paper checks. They are used mostly in B2B.

E-Checks

Cards allow customers to charge online payments to their credit card account. These are used primarily in B2C and in shopping by small to medium enterprises.

E-Credit

_____ portals support communities such as hobby groups or a political party. A. Corporate B. Commercial C. Industrywide D. Personal E. Affinity

E. Affinity

Businesses and organizations set up Web sites to: A. Sell goods and services. B. Induce people to visit a physical location. C. Reduce operational and transaction costs. D. Enhance their reputation. E. All of the above.

E. All of the above

Many organizations have implemented corporate portals for which of the following reasons? A. to cut costs B. to free up time for busy managers C. to improve profitability D. to offer customers self-service opportunities E. all of the above

E. All of the above

Which of the following are advantages of computer networks? A. They enable organizations to be more flexible. B. They enable companies to share hardware, computer applications, and data. C. They enable geographically dispersed employees to work together. D. They provide a critical link between businesses and their customers. E. All of the above.

E. All of the above

The concept of _____ refers to competing computing products working together. A. Open-source software B. Software-as-a-Service C. Object-oriented software D. Application software packages E. Open systems

E. Open systems

The data in a data warehouse have which of the following characteristics? A. They are organized in a hierarchical structure. B. They are updated in real time. C. They are typically retained for a defined, but limited, period of time. D. They are coded in different formats. E. They are organized by subject.

E. They are organized by subject.

Electronic business includes which of the following? A. buying and selling B. servicing customers C. collaborating with business partners D. conducting electronic transactions within an organization E. all of the above

E. all of the above

In a database, the primary key field is used to _____. A. identify duplicated data B. uniquely identify an attribute C. specify an entity D. create linked lists E. uniquely identify a record

E. uniquely identify a record

Which of the following is not a consequence of poor information security practices? A. Stolen information B. Stolen identities C. Financial loss D. Loss of service E. All of the above are consequences of poor information security practices.

E.All of the above are consequences of poor information security practices.

A(n) ___ can consist of one or more ____ . a)LAN, WANs b)WAN, enterprise networks c)LAN, enterprise networks d)Enterprise network, LANs

Enterprise network, LANs

Two information systems that support the entire organization are:

Enterprise resource planning systems; Transaction processing systems

Social commerce involves paying for services such as online dating.

FALSE

Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a)Low, long, broadcast b)Low, short, line-of-sight c)High, long, broadcast d)High, short, broadcast e)High, long, line-of-sight

High, long, line-of-sight

A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.

Hotspot

A major category of unintentional threats is:

Human Error

______________ provides cloud services based on security requirements.

Hybrid Cloud Computing

The IT infrastructure is comprised of _______ and ________.

IT Components and IT Services

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.

Localization of products and services

Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________.

Location-based advertising

New technologies can produce new products very _____, which _____ the threat from substitute products.

Quickly; Increases

In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.

RF jamming

Organizational Responses to business pressures

Mass Customization, Strategic sytems

_____ provide(s) companies with a single version of the truth for their data.

Master Data Management

Wi-Fi networks are typically classified as _______ wireless networks

Medium Range

Wi-Fi networks are typically classified as _______ wireless networks

Medium-range

Wi-Fi networks are typically classified as _______ wireless networks a)Short-range b)Medium-range c)Wide-range d)None of these

Medium-range

If broadband is not available in your area, which fo the following Internet connection methods would allow you to connect to the Internet?

Satellite

If broadband is not available in your area, which for the following Internet connection methods would allow you to connect to the Internet?

Satellite

Which of the following is not a characteristic of twisted-pair wire? A. Inexpensive B. Easy to work with C. Subject to interference from other electrical sources D. Secure transmissions pg 180 E. None of the above

Secure transmissions

Businesses and organizations set up Web sites to:

Sell goods and services. Induce people to visit a physical location. Reduce operational and transaction costs. Enhance their reputation.

In the ____ marketplace model, organizations attempt to sell their products or services to other organizations electronically.

Sell-side

____ host sales for their members that last just a few days and often feature luxury brands.

Shopping clubs

PERSONAL AREA NETWORK

Short range network between a computer and a mobile phone or similar portable device.

When shoppers visit a brick-and-mortar store, examine a product in person, and use digital technology to buy from an online rival, often at a lower price, this is called:

Showrooming

Short-Range wireless networks

Simplify the task of connecting one device to another, eliminating wires and enabling users to move around while they use the device. Typically connects with range of 100 feet or less.

Which of the following is a useful, cost-effective, hands-on, and safe teaching tool in the medical field?

Simulation environments

____ contain a chip that can store information and can be used for several purposes.

Smart Cards

BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time.

Swarming

____ is an interface standard designed to carry large volumes of traffic over relatively long distances using fiber optic lines.

Synchronous Optical Network (SONET)

A call center is a type of customer interaction center.

TRUE

File sharing is a type of peer-to-peer processing.

TRUE

Social computing empowers customers to act.

TRUE

The OnStar system from General Motors is an example of telemetry.

TRUE

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

TRUE

The major objective of ERP Systems is to integrate an organization's various functional areas to facilitate the seamless flow of information.

TRUE

War driving is the act of locating wireless networks while driving around a certain area.

TRUE

Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.

TRUE

____ is the cumulative store of subjective or experiential learning.

Tacit knowledge

Which of the following statements about neural networks is incorrect? a)Neural networks are adept at recognizing subtle, hidden, and newly emerging patterns within complex data. b)Neural networks are able to interpret incomplete inputs. c)Neural networks can assist users in solving a wide range of problems. d)Neural networks attempt to mimic human experts by applying expertise in a specific domain.

Neural networks attempt to mimic human experts by applying expertise in a specific domain.

Explain how the web has an impact on the threat of substitute products or services:

New technologies create substitute products very rapidly, and the web makes information about these products available almost instantly. As a result, industries (particularly information based industries) are in great danger from substitutes (music, books, newspapers, magazines, software) However, the web can also enable a company to build in switching costs, so that it will cost customers time and or money to switch from your company to a competitor.

T/F Information is the major component of the e-commerce offerings of service industries.

True

T/F Social computing fosters close customer relationships

True

T/F The primary key is a field that uniquely and completely identifies a record.

True

T/F The relationship between Student and Parking Permit is mandatory 1:1 because each student may have only one parking permit.

True

The Platform for Privacy Preferences automatically communicates privacy policies between a commerce Web site and its visitors.

True

The computing skills necessary to be a hacker are decreasing. True False

True

The configure-to-order strategy is commonly used by low-volume, high-cost industries that require specialized products. True False

True

The description of the layout of a factory as well as the location of the factory are examples of organizational data. True False

True

The flow of information among countries is called intraborder data flows.

True

The goal of SCM systems is to reduce friction along the supply chain.

True

The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet. True False

True

The key mechanisms in the sell-side marketplace are customized electronic catalogs and forward auctions. True False

True

The operating system supervises the overall operation of the computer. True False

True

The opt-out model of informed consent allows a company to collect personal information until the customers specifically requests otherwise.

True

The primary characteristic of auctions is that prices are determined dynamically by competitive bidding.

True

The primary characteristic of auctions is that prices are determined dynamically by competitive bidding. True False

True

The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.

Utilitarian

What is the purpose of entering the pick quantity for each material on the order?

Verification that the quantity of materials in the shipment match the quantity on the order

_____ is the standard that enables wireless devices to access Web-based information and services.

Wireless Application Protocol

_____ is the standard that enables wireless devices to access Web-based information and services.

Wireless Application protocol.

_____ collect data from many points over an extended space.

Wireless Sensor Networks

Parking meters that you can pay via your mobile telephone are an example of _________.

Wireless electronic payment

If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________.

Wireless electronic payment system

_____ networks collect data from many points over an extended space.

Wireless sensor

_____ collect data from many points over an extended space.

Wireless sensor networks

Demonstrate how to interpret relationships depicted in an entity-relationship diagram.

YES

Demonstrate the use of a multidimensional model to store and analyze data.

YES

pull model

a business model in which the production process begins with a customer order and companies make only what customers want, a process closely aligned with mass customization

According to the closing case, the consequences of customizing an ERP system to accurately reflect a company's business process can include:

a) Increased maintenance expenses b) The inability to incorporate the latest technological developments c) The failure to sustain a competitive advantage

_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge

a) Knowledge, information

_____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields

a) Primary keys

The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time. d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure.

a) They are organized by subject.

Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate

a) They cost less

In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): a) attribute. b) entity. c) primary key. d) object. e) file.

a) attribute.

Electronic business includes which of the following?

all of the above* -buying and selling-servicing customers-collaborating with business partners-conducting electronic transactions within an organization

Many organizations have implemented corporate portals for which of the following reasons?

all of the above* to cut costs-to free up time for busy managers -to offer customers self-service opportunities

An organization's information technology architecture:

all of these

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining

b) Knowledge management

_____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis

b) Normalization

_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys

b) Secondary keys

Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit b) explicit c) managerial d) geographical e) cultural

b) explicit

A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners.

extranet

Network neutrality is a policy whereby Internet service providers charge customers different rates for their Internet use based on the type of content they are downloading.

f -- Are an aspect of social shopping.

Enabling groups to work together in ways that were not available previously is called

facilitating collaboration

Customers using social commerce benefit from _____________.

faster responses from vendors

Customers using social commerce benefit from _____________. • greater privacy • faster responses from vendors • unbiased opinions on products • none of the choices is correct

faster responses from vendors

Office automation systems

include report generators

Office automation systems

include report generators.

customer-facing CRM

includes those areas where customers directly interact with the company.

According to Michael Porter, the Web ______ competition, which generally _________ a firm's profitability.

increases; decreases

IT affects middle managers by:

increasing their productivity

The threats to information security are _____, and the greatest threat is _____.

increasing, technological

Bit

is a binary digit, or a "0" or a "1".

Byte

is eight bits and represents a single character (e.g., a letter, number or symbol).

The main system control program is the _____.

operating system

clicks and mortar organization

organizations that do business in both the physical and digital dimensions

Which of the following are documents associated with the fulfillment process?

packing list picking list customer invoice

Which of the following is not a function of functional area information systems?

providing data from business events to the corporate database

What are the minimum pieces of information required to create a quotation?

quantity material valid to date sold to party

A(n) _____ allows unauthorized entry into a wireless network.

rogue access point

What information is required to record a goods receipt?

store location quantity

Which of the following are key skills necessary for a knowledge worker?

strategic thinking

The type of decision that can be made by following a definite procedure is called a(n) ______ decision.

structured

The type of decision that can be made by following a definite procedure is called a(n) ______ decision. a)structured b)unstructured c)undocumented d)semistructured e)procedural

structured

A standardized language used to manipulate data is _____.

structured query language

For the following entity-relationship diagram, the attributes you would NOT expect to see in the Computer entity are a)memory size. b)disk size. c)student's dorm room. d)type (laptop or desktop). e)manufacturer.

student's dorm room.

production process

the activities, equipment, and resources needed to manufacture a product

The most important benefit of knowledge management systems is:

they make best practices available to employees.

Information-based industries are most susceptible to which one of Porter's five forces?

threat of substitute products

Which of the following is not a goal of supply chain management?

to increase cycle time

online transaction processing

transaction processing mode in which transactions entered online are immediately processed by the computer.

Which of the following is not a mobile application in financial services?

transaction processing systems

Buying health insurance is an example of risk ____, whereas going without is an example of risk _____.

transference, acceptance

Buying health insurance is an example of risk ____, whereas going without is an example of risk _____.

transference, acceptance ( transference, limitation limitation, acceptance limitation, transference )

Wireless transmission media (broadcast media)

transmits signals without wires over the air or in space. Ex: microwave, satellite, radio, and infrared.

When using an ES, much of the data needed to create a customer invoice is automatically obtained from data previously stored in the system.

true

Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. b) Decisions about software. c) Decisions about data. d) Both "decisions about hardware" and "decisions about software." e) All of these have an equal impact.

c) Decisions about data.

Groupon is an example of ________________

c) Group shopping

Pinterest: Pinterest is:

c) a shareable online bulletin board.

One of the problems that HR departments have with using social computing to recruit is

c) they receive many more applications than they can process.

Tacit knowledge has which of the following characteristics? a) codified b) objective c) unstructured d) rational e) technical

c) unstructured

The short-range wireless network best suited for touchless credit card transactions is:

Near-field communications

Which of the following statements about IT's role in society is false?

Robots can handle unfamiliar situations.

A(n) _____ allows unauthorized entry into a wireless network.

Rogue Access Point

An "evil twin" is associated with which type of threat to wireless networks?

Rogue Access Points

In an integrated process, production begins after which of the following processes takes place?

A check of inventory reveals that there are no finished products in stock

A(n) _____ allows unauthorized entry into a wireless network.

Rogue access point

In an integrated process, production begins after which of the following processes takes place? -A customer submits a purchase order -A check of inventory reveals that there are no finished products in stock -A vendor invoice is sent -A check of inventory reveals that there are no raw materials in stock

A check of inventory reveals that there are no finished products in stock

An "evil twin" is associated with which type of threat to wireless networks?

Rogue access points

A single point of entry to an entire community of common interests is:

Affinity portal

The IT infrastructure is comprised of _______ and ________.

) IT components, IT services

Advantages of Data Warehouses

- Organized by dimension or subject: Data are organized by subject. This arrangement is different from transactional systems where data are organized by business process, such as order entry, inventory control or accounts receivable. This is beneficial because it allows it to remain organized and easily accessible to businesses and allows them to make informed decisions. - Using online analytical processing: Business transactions are processed online as soon as they happen. This allows for speed and efficiency which is critical to internet-based business operations. - Integrated: Data collected from multiple sources are organized by subject to remain easily accessible and easy to understand and interpret. This allows businesses to turn them into strategies easier. - Nonvolatile: No one can change or update the data. This allows for unbiasedness in the data and a sure-fire way to make sure that no one is tampering with the data so it is all true.

What is the hierarchy of small to large for bytes, bits, records, fields?

-Bit -Byte -Field -Record -File -Database

Describe Buy-side for B2B EC:

-A model in which organizations attempt to buy needed products or services from other organizations electronically.

Networks enable what applications?

-Discovery -Communications -Collaboration -Web Services

The term _____ refers to clandestine software that is installed on your PC through duplicitous channels but is not particularly malicious.

Alien Software

Threats to privacy include:

-Advances in Information Technologies -Electronic Surveillance -Personal information in databases -Internet Bulletin boards -Newsgroups -Social Networking sites

Describe Microwave transmission systems and one advantage and disadvantage:

-Are used for high-volume, long-distance, line-of-sight communication. -Advantage: The high volume. -Disadvantage: Susceptible to environmental interference during severe weather such as heavy rain or snowstorms.

What would be the best use of RFID in a business?

Supply chain management

Customer relationship management systems include which of the following?

Create demand for products through marketing and transform demand into sales opportunities

The following can be considered as broadband technologies (choose all that are correct):

-DSL -Cable

What are the 4 types of electronic payments?

-E-Checks -E-Credit -Purchasing Cards -E-Cash

Describe Public Exchanges:

-E-marketplaces in which there are many sellers and many buyers, or just exchanges. -Public Exchanges are open to all business organizations. -They are frequently owned and operated by a 3rd party. -Their are 3 basic types of public exchanges: Vertical, Horizontal, and Functional

The goals of business process reengineering are to:

-Increase productivity. -Optimize operations. -Increase customer satisfaction. -Reduce waste.

What are the advantages of computer networks?

-Enable organizations to be more flexible -Enable companies to share hardware, computer applications, and data. -Enable geographically dispersed employees to work together. -Provide a critical link between businesses and their customers.

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct):

-Fiber optic cables have very high bandwidth. -Fiber optic cables offer higher security.

Global outsourcing helps an organization to:

-Find the best person for the job. -Find more economical resources. -Implement spatial and temporal flexibility

In recent years, companies such as Walmart and Amazon.com have offered streaming videos for rent on their Web sites. This is another example of how new technology has:

-Increased the threat of new entrants. -Increased the threat of substitute products

By upgrading their IT systems and investing in mobile computing devices for its employees, Home Depot is able to:

-Improve customer service. -Give employees immediate access to up-to-date inventory information. -Improve the efficiency of the stocking process.

Provide an example of Discovery, and explain how that network application supports business functions.

-Involves browsing and information retrieval, and provides users the ability to view information in databases, download it, and/or process it. Tools include search engines, directories, and portals. -Discovery tools enable business users to efficiently find needed information.

Describe Infrared light and one advantage and disadvantage:

-Is red light that usually is not visible to human eyes. Common applications are in remote control units for televisions, VCRs, DVDs, and CD players. -Advantage: Does not penetrate walls and so does not interfere with other devices in adjoining rooms. -Disadvantage: Signals can be easily blocked by furniture.

Coaxial Cable consists of copper wire. Discuss the main advantages and disadvantages.

-It is much less susceptible to electrical interference than is twisted-pair wire, and it can carry much more data. -Is more expensive and more difficult to work with than twisted-pair wire. Also somewhat inflexible.

A supply chain management system can do which of the following? -Use demand forecasts to create a demand plan over a given period of time -Match demand with future production capacity -Create a material plan to match the expected amount of finished goods to be produced -All of the above

All of the above

An enterprise resources planning system could interconnect which of the following? SCM, PLM, CRM SRM, procurement, production planning Sales order management, Operations, human recourses All of the above

All of the above

Grid computing combines processing resources to form a virtual supercomputer. True False

True

For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply):

-The ability to offer lower prices to customers. -The ability to reach a wider customer base. -The ability to offer a larger selection of products.

Human errors are a major cause of the security-related problems in many organizations. True False

True

Provide examples of Business Processes in the functional area of an organization:

-Managing accounts payable -Managing accounts recieveable -managing post sale customer follow up -managing bills of materials -Managing manufacturing change orders -Applying disabilities policies -Hiring employees -Training staff and computer users -Applying internet use policy

Compare and contrast the 2 major types of networks:

-LANs encompass a limited geographic area and usually are composed of one communications medium. -WANs encompass a broad geographical area and usually are composed of multiple communications media.

Provide an example of Communications, and explain how that network application supports business functions.

-Networks provide fast, inexpensive communications via e-mail, call centers, chat rooms, voice communications, and blogs. -Communication tools provide business users with a seamless interface among team members, colleagues, business partners, and customers.

Why is marketing so valuable on social media?

-Marketers can assess markets in real time. -We often buy products that friends recommend. -We provide information voluntarily and for free. -All of the choices are correct.*

Organizations are using social computing in which of the following functions?

-Marketing. -Customer Relationship Management. -Human Resource Management. -All of these.*

Describe one way organizations can address the challenges with managing data using data governance.

-Master data management provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the companies core master data. Master data management consistently manages data gathered from across an organization, data from multiple sources, and data across business processes in an organization.

The 4 main types of wireless transmission media:

-Microwave -Satellite -Radio -Infrared

The use of databases enables organizations to:

-Minimize data inconsistency -Minimize data security risks -Minimize data isolation

Provide an example of Virtual Universities, and explain how that network application supports business functions.

-Online universities in which students take classes from home or at an off-site location, via the Internet. -Make it possible for students to obtain degrees while working full time, thus increasing their value to their firms.

Describe Sell-side and provide a specific example in terms of B2B EC.

-Organizations attempt to sell their products or services to other organizations electronically from their own private e-marketplace web site and/or from a third-party web site. -Sellers such as Dell computer use sell-side auctions extensively. In addition to auctions from their own Web sites, organizations can use third-party auction sites, such as eBay, to liquidate items.

Provide an example of Collaboration, and explain how that network application supports business functions.

-Refers to mutual efforts by 2 or more entities (individuals, groups, or companies) who work together to accomplish tasks. Collaboration is enabled by workflow systems. -Collaboration tools enable business users to collaborate with colleagues, business partners, and customers.

Which of the following is true of data in a data warehouse? A. Data in operational databases is ever changing; data in data warehouses is static B. Data in operational databases is static; data in data warehouses is ever changing C. Data in operational databases can be cataloged; data in data warehouses cannot D. None of the choices are correct.

A

Provide an example of Telecommunicating, and explain how that network application supports business functions.

-Process where knowledge workers are able to work anywhere and anytime. -Provides flexibility for employees, with many benefits and some drawbacks.

The core capabilities of computer-based information systems include (check all that apply):

-Quick access to information -High-speed calculations -Staging and processing of large amounts of data

The core capabilities of computer-based information systems include:

-Quick access to information. -Staging and processing of large amounts of data. -High-speed calculations.

The goals of business process reengineering are to (check all that apply):

-Reduce waste. -Increase customer satisfaction. -Increase productivity. -Optimize operations.

Which of the following are ways for companies to leverage big data to gain value? (check all that apply)

-Segmenting a population to customize actions -Providing automated algorithms to support decision making -Creating transparencies

What are the 3 business models for business-to-business electronic commerce?

-Sell-side -Buy-side -Public Exchanges

Fiber-optic cables consist of thousands of very thin filaments of glass fibers that transmit information via light pulses generated by lasers. Discuss the main advantages and disadvantages.

-Significantly smaller and lighter than traditional cable media. Can transmit far more data, and they provide greater security from interference and tapping. -Fiber-optic cable often is used as the backbone for a network, whereas twisted-pair wire and coaxial cable connect the backbone to individual devices on the network.

QR codes can:

-Store more information than bar codes. -Are more resistant to damage than bar codes. -Can be read from any direction or angle.

Differentiate between the Internet and the World Wide Web:

-The internet is a global network of computer networks, using a common communications protocol, TCP/IP. -The World Wide Web is a system that stores, retrieves, formats, and displays information accessible through a browser. *The Internet functions as a transport mechanism, whereas the World Wide Web is an application that uses those transport functions.

Describe Satellite transmission systems and one advantage and disadvantage:

-Sytems make use of communication satellites, and they receive and transmit data via line-of-sight. -Advantage: Their enormous footprint- the area of the earth's surface reached by a satellite's transmission- overcomes the limitations of microwave data relay stations. -Disadvantage: susceptible to environmental interference during severe weather.

The opening case illustrates how e-commerce has increased (choose all that apply):

-The volume of business transactions. -The speed at which we do business.

Which of the following are advantages of computer networks?

-They enable organizations to be more flexible. -They enable companies to share hardware, computer applications, and data. -They enable geographically dispersed employees to work together. -They provide a critical link between businesses and their customers. -All of the above.*

Describe Radio Transmission and one advantage and disadvantage:

-Uses radio-wave frequencies to send data directly between transmitters and receivers. -Advantage: Radio waves travel easily through normal office walls. -Disadvantage: Radio transmissions are susceptible to snooping by anyone who has similar equipment that operates on the same frequency.

A relational database typically consists of one large two-dimensional table.

FALSE

Define Risk Acceptance and provide an example in the context of owning a home.

-Where the organization accepts the potential risk, continues operating with no controls, and absorbs any damages that occur. -If you own a home you may decide not to insure it. Thus, you are practicing risk acceptance, clearly this is a bad idea.

Define Risk Limitation and provide an example in the context of owning a home.

-Where the organization limits the risk by implementing controls that minimize the impact of threats. -As a homeowner, you practice risk limitation by putting in an alarm system or cutting down weak trees near your house.

Define Risk Transference and provide an example in the context of owning a home.

-Where the organization transfers the risk by using other means to compensate for the loss, such as by purchasing insurance. -The vast majority of homeowners practice risk transference by purchasing insurance on their houses and other possessions.

Enterprise systems allow for which of the following? -The division of business processes traditionally performed inside a company to outside partners -Providing collaboration among networks of partner companies -Providing cost savings by capitalizing on individual company strengths in a group partnership -All of the above

All of the above

Electronic business includes which of the following?

-buying and selling -servicing customers -collaborating with business partners -conducting electronic transactions within an organization -all of the above*

Mobile applications in financial services include which of the following?

-mobile banking -wireless electronic payment systems -micropayments -brokerage services -all of the these*

The advantages of RFID tags to Staples include:

-movement history of each item through the store to moment of sale -labor savings -accurate inventory -precise location of each item in stores

An organization's information technology architecture:

-provides a guide for current operations. -provides a blueprint for future directions. - integrates the information requirements of the organization and all users. - is analogous to the architecture of a house.

For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include:

-reach a wider customer base. -offer lower prices to customers. -offer a larger selection of products

Many organizations have implemented corporate portals for which of the following reasons?

-to cut costs -to free up time for busy managers -to improve profitability -to offer customers self-service opportunities

Many organizations have implemented corporate portals for which of the following reasons?

-to cut costs -to free up time for busy managers -to improve profitability -to offer customers self-service opportunities -all of the above*

. All of the following are used to provide online market research except a)Reviews b)Recommendations c)Voting d)Emails e)Blogs

...

a)Reviews

...

Describe the 6 common types of electronic commerce.

1-(B2C) : The sellers are organizations, and the buyers are individuals. 2-(B2B) : The sellers and the buyers are business. 3-(C2C) : An individual sells products or services to other individuals. 4-(B2E) : An organizations uses EC internally to provide information and services to its employees. 5-(E-government) : is the use of Internet technology in general and e-commerce in particular to deliver information and public services to citizens (G2C EC), and business partners and suppliers (G2B EC). 6-(Mobile Commerce) : Refers to e-commerce that is conducted entirely in a wireless environment.

What are the 5 strategies that organizations typically adopt to counter the 5 competitive forces and achieve competitive advantage?

1-Cost Leadership 2-Differentiation 3-Innovation 4-Operational Effectiveness 5-Customer-orientation

Name 6 problems that can be minimized by using the database approach.

1-Data Redundancy 2-Data Isolation 3-Data Inconsistency 4-Data Security 5-Data Integrity 6-Data Independence

All of Friedman's flattners

1. Fall of Berlin Wall 2. Netscape switched from PC-based to Internet-based 3. Work-flow software 4. Uploading 5. Outsourcing 6. Offshoring 7. Supply-Chaining 8. Insourcing 9. In-forming 10. The steroids - virtual, digital, personal, mobile.

Types of Orbits

1. Propagation delay 2. Geostationary earth orbit (GEO) 3. Medium earth orbit (MEO) 4. Low earth orbit (LEO)

Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?

All of the above

IPv6 will allow for ___ unique IP addresses.

2^128

IPv6 will allow for ___ unique IP addresses. 128 32 2^128 232

2^128

A data warehouse contains data that have been processed in all the following ways except: A. Separated B. Cleaned C. Transformed D. Cataloged

A

According to the textbook case, on cars: A. Cars are a goldmine of consumer information B. Gathering consumer information from cars is not technologically feasible C. Gathering consumer information from cars is not legal by federal right-to-privacy standards D. Gathering consumer information from cars is not feasible from a financial perspective

A

Database development involves defining and organizing the _______________ of the data needed to build a database. A. structure B. content C. relationships D. All of the choices are correct.

A

Databases contain data elements that describe both entities and the _______________ among entities. A. relationships B. disparities C. subsets D. applications

A

collaborative CRM system

A CRM system where communications between the organization and its customers are integrated across all aspects of marketing, sales, and customer support processes

Three-tier architecture systems provide which of the following? Greater mobility for the user Greater scalability Cost savings All of the above

All of the above

A wiki is:

A Web site on which anyone can post material and make changes to already posted material.

What are some limitations of mainframe systems? Poor scalability High cost The need for a custom design All of the above

All of the above

A tag is the way a developer describes a piece of information.

FALSE

BLOG

A Web log, or blog, is an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on news and popular culture.

A wiki is a collection of blogs.

FALSE

transaction

A business activity that changes assets, liabilities, or owner's equity

In an integrated process, procurement begins after which of the following processes takes place?

A check of inventory reveals that an insufficient number of raw materials are available

In an integrated process, procurement begins after which of the following processes takes place? -A planned order is created -A customer purchase order is received -A customer inquiry is received -A check of inventory reveals that an insufficient number of raw materials are available

A check of inventory reveals that an insufficient number of raw materials are available

database

A group of logically related files that stores data and the associations among them.

entity classes

A grouping of entities of a given type.

field

A grouping of logically related characters into a word, a small group of words, or a complete number.

record

A grouping of logically related fields.

The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as:

AJAX

The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as: AJAX RSS Tagging Web 2.0

AJAX

___ Restrict unauthorized individuals from using information resources. These controls involve 2 major functions: Authentication and Authorization.

Access Controls

_____ issues involve who may obtain information and how much they should pay for this information.

Accessibility

batch processing

Accumulating source documents for a period of time and then processing them all at once such as once a day, week, or month.

What is the relationship between advances in information technology and the practice of profiling?

Advances in IT make it easier to profile individuals.

Satellite

Advantages: High bandwidth, large coverage area Disadvantages: a.) Expensive b.) Must have unobstructed line of sight c.) Signals experience propagation delay d.) Must use encryption for security.

Activities such as an availability check on inventory can be automated in an enterprise system because of which of the following? -An ES integrates functional areas and stores data in a common database. -An ES integrates functional areas and eliminates the need for paper documents. -An ES eliminates the need for paper documents and stores data in a common database. -None of the above are reasons an ES can automate activities.

An ES integrates functional areas and stores data in a common database.

Ads cannot appear as YouTube videos.

FALSE

Which of the following is not a component of a local area network? A. File server B. Client computers C. Bridge D. Network interface cards E. All of the above

Bridge

A company's production process consists of taking a frame, wheels, a chain, and other such pieces and combining them to produce a bicycle. This process most accurately describes which of the following? -Manufacturing -Assembling -Procurement -Fulfillment

Assembling

Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? A. Digital subscriber line B. Asynchronous transfer mode pg ??? C. Synchronous optical network D. T-carrier system E. ISDN

Asynchronous transfer mode

_____ can transmit up to 2.5 gigabits (billions of bits) per second. However it requires fiber-optic cable and is 21% more expensive than DSL.

Asynchronous transfer mode (ATM)

Bluetooth devices can be used to establish NFC for mobile commerce.

FALSE

The _______________ stage of database development translates the conceptual models into the data model of a DBMS. A. data planning B. requirements specification C. conceptual design D. logical design

D

A modem can perform which of the following operations? • Convert analog signals to digital signals only • Convert digital signals to analog signals only • Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only • Modems do not convert signals

Both of the following are correct: Convert analog signals to digital signals only; and convert digital signals to analog signals only

Which wireline communication has the highest security? A. Coaxial cable B. Fiber-optic cable C. All of the wireline communications channels listed have good security and are difficult to tap. D. Twisted-pair wire

B. Fiber-optic cable

_____ is a method for analyzing and reducing a relational database to its most streamlined form. A. Structured query B. Normalization C. Query-by-example D. Relational analysis

B. Normalization

Which of the following is not a component of hardware? A. primary and secondary storage B. the operating system C. input and output technologies D. central processing unit E. communication technologies

B. Operating System

When organizations come to a company's Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.

B. Sell-side marketplace.

Which of the following electronic payments is ideal for micropayments? A. Purchasing cards B. Smart cards C. Electronic checks D. None of the methods listed is suited to micropayments

B. Smart cards

Why has LinkedIn become so important to recruiters?

Because LinkedIn enables recruiters to precisely target their searches

Which of the following is the most appropriate wireless networking standard for creating personal area networks?

Bluetooth

___ is an ongoing collection of related activities that create a product or a service of value to the organization, its business partners, and/or its customers.

Business Process

B2E

Business to Employee

The tight integration of the IT function with the strategy, mission, and goals of the organization:

Business-information technology alignment

In this type of e-commerce, the sellers and buyers are organizations.

Business-to-Business

Which type of electronic commerce is the largest by volume?

Business-to-Business

Difficulties in order fulfillment are most closely associated with which of the following?

Business-to-Consumer EC

____ e-commerce is also known as e-tailing.

Business-to-consumer

In this type of e-commerce, buyers and sellers are individuals. A. business-to-consumer B. business-to-business C. consumer-to-consumer D. government-to-citizen E. consumer-to-business

C. consumer-to-consumer

In _____, needed services such as temporary help or extra space are traded on an as-needed basis. A. buy-side marketplaces B. horizontal exchanges C. functional exchanges D. sell-side marketplaces E. vertical exchanges

C. functional exchanges

Businesses do not use social commerce for new products.

FALSE

Buying a book online at Amazon is an example of social commerce.

FALSE

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct): A. Fiber optic cables are less difficult to tap. B. Fiber optic cables are susceptible to interference. C. Fiber optic cables have very high bandwidth. D. Fiber optic cables offer higher security.

C. Fiber optic cables have very high bandwidth. D. Fiber optic cables offer higher security.

The _____ allows users to exert direct control of icons on the computer screen. A. Systems software B. Application software C. Graphical user interface D. Plug-and-play E. Operating system

C. Graphical user interface

Data redundancy refers to: A. Storing data in a single central location. B. Sharing data with others. C. Having copies of the same data in multiple locations. D. All of these.

C. Having copies of the same data in multiple locations.

Which of the following is not considered a major capability of information systems? A. They provide fast, accurate communication and collaborations within and among organizations. B. They interpret vast amounts of data quickly and efficiently. C. They automate manual tasks but not semiautomatic business processes. D. They perform high-speed, high-volume, numerical computations.

C. They automate manual tasks but not semiautomatic business processes.

All of the following are cloud computing security issues except A. sensitive data access B. malicious insiders C. users technical ability D. privacy

C. Users Technical Ability

Which type of electronic exchange connect buyers with sellers within a specific industry? A. Functional exchanges B. Public exchanges C. Vertical exchanges D. Horizontal exchanges

C. Vertical exchanges

The management of data across the entire organization is most accurately defined as: A. Data integration. B. Data control. C. Data governance. D. Data administration

C. Data Governance

Operational data that are constantly updated are stored in: A. Data warehouses. B. Data marts. C. Databases. D. All of these.

C. Databases

Over the past 20 years, hardware costs have _____, while software costs have _____. A. Increased, increased B. Decreased, decreased C. Decreased, increased D. Increased, decreased E. Increased, remained level

C. Decreased, increased

Which of the following factors is preventing mobile wallets from being widely adopted in the United States? a)Lack of consumer interest b)Conflicts among the credit card companies, mobile carriers, and technology companies c)The poor quality of the existing technology d)All of these

Conflicts among the credit card companies, mobile carriers, and technology companies

Horizontal Exchanges:

Connect buyers and sellers across many industries.

Vertical Public Exchanges:

Connect buyers and sellers in a given industry.

enterprise application integration system (EAI)

Connects the plans, methods, and tools aimed at integrating separate enterprise systems

Customer relationship management systems include which of the following? -Convert sales quotations into sales orders and manage the procurement of raw materials -Create demand for products through marketing and transform demand into sales opportunities -Document the historical background of a product and transform demand into sales opportunities -Convert sales opportunities into sales quotations and manage all product purchases

Create demand for products through marketing and transform demand into sales opportunities

Knowledge Management System Cycle

Create, Capture, Refine, Store, Manage, Disseminate

Communication marketing is using social media sites to get feedback.

FALSE

The set of computer programs used to manage hardware resources is called: A. Microsoft Office Suite. B. Application software. C. General software. D. Systems software. E. Personal application software.

D. Systems software

Craigslist is an example of a shopping community.

FALSE

Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes or ceases to function.

Denial of Service Attack

A data warehouse is a low-cost, scaled-down version of a data mart designed for the end-user needs in a department in a large organization.

FALSE

data model

Definition of the way that data in a DBMS are conceptually structured.

Analytic CRM systems can be used for the following purposes except:

Delivering future product information to customers

A database must be associated with only one computer program or information system.

FALSE

Primary storage stores which of the following for very brief periods of time? A. Data to be processed by the CPU B. Instructions for the CPU as to how to process the data C. Operating system programs that manage various aspects of the computer's operations D. All of these

D. All of these

The popularity of online classes and online universities can be attributed to which of the following network applications? A. Discovery B. Communications C. Collaboration D. All of these

D. All of these

____ and ____ are the two major challenges for the sellers in e-commerce. A. Order fulfillment, large orders B. Channel conflict, advertising C. Advertising, large orders D. Channel conflict, order fulfillment

D. Channel conflict, order fulfillment

When customers access a Web site and make purchases, they generate _____. A. Web data B. information C. hyperlink data D. clickstream data E. tracking cookies

D. Clickstream data

__________ are high speed central networks to which multiple smaller networks connect A. Network servers B. Local area networks C. Routers D. Corporate backbone networks

D. Corporate backbone networks

All of the following are strategies for competitive advantage except: A. Differentiation. B. Innovation. C. Operational effectiveness. D. Customer leadership.

D. Customer leadership

A(n) ___ can consist of one or more ____ . A. LAN, WANs B. WAN, enterprise networks C. LAN, enterprise networks D. Enterprise network, LANs

D. Enterprise network, LANs

______________ determines who is responsible for the actions taken. A. Privacy B. Responsibility C. Transferability D. Accountability E. Liability

D.Accountability

What is the relationship between advances in information technology and the practice of profiling? A. Advances in IT make it more difficult to profile individuals. B. Advances in IT have no impact on profiling. C. Advances in IT make it more expensive to profile individuals. D. Advances in IT make it easier to profile individuals.

D.Advances in IT make it easier to profile individuals

Which transmission technology utilizes existing telephone lines?

DSL

The following can be considered as broadband technologies (choose all that are correct):

DSL -Cable

The following can be considered as broadband technologies

DSL and Cable

The management of data across the entire organization is most accurately defined as:

Data Governance

No alphabetic characters in a Social Security Number field is an example of _____:

Data Integrity

An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots- which form a bonnet- to deliver a coordinated stream of information requests to a target computer, causing it to crash.

Distributed Denial of Service Attack

_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers.

Distribution

Product life cycle management systems incorporate which of the following so that everyone in the process has access to the historical background of a product?

Document and knowledge management capabilities

entity-relationship (ER) diagram

Document that shows data entities and attributes and relationships among them.

The major problem with RFID has been _______.

Expense

The major problem with RFID has been:

Expense

Explicit knowledge vs Tactical knowledge

Explicit knowledge deals with more technical, objective and rational knowledge. a few examples are procedural guidelines, policies, reports, guidelines and the IT infrastructure. It is knowledge that can be documented in a form that can be distributed to others or turned into a strategy. Tactic knowledge is a cumulative store of subjective or experiential learning. It is never usually recorded and it is super personal to the salesperson or employee. Examples include an organization's insights, experiences, expertise and trade secrets. It also includes organizational culture. It is generally imprecise and costly to transfer.

The process of moving data from various sources into the data warehouse is called:

Extracting, transforming, and loading

An Intranet that allows limited access to its partners, suppliers, and customers is called a(n):

Extranet

An Intranet that allows limited access to its partners, suppliers, and customers is called a(n): a)Secure Intranet b)Extranet c) Corporate Web site d)Portal

Extranet

One field that uniquely identifies an entity or a record is:

File

A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.

First-party

A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.

First-party ( Tracking Monitoring Second-party Third-party)

Information technology deals with the planning, development, management, and use of management information tools to help people perform all the tasks related to information processing and management.

Flase

Managing the IS function within an organization is the exclusive responsibility of the IS department

Flase

_____ is(are) a branch of mathematics that deals with uncertainties by simulating the process of human reasoning. a)Fuzzy logic b)Boolean logic c)Neural networks d)Genetic algorithms

Fuzzy logic

Explain how the web has an impact on the threat of entry of new competitors:

For most firms, the web increases the threat that new competitors will enter the market by reducing traditional barriers to entry. Frequently, competitors need only to set up a Web site to enter a market. The web can also increase barriers to entry, as when customers come to expect a nontrivial capability from their suppliers.

______ are auctions that sellers use as a channel to many potential buyers. Usually, sellers place items at sites for auction, and buyers bid continuously for them.

Forward Auction

Two major conflicting issues related to privacy are ___ and ___.

Freedom of Speech; National Security

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.

Freedom of Speech; Privacy

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other.

Freedom of speech, privacy

___________ include B2B and B2C.

Functional area information systems

This type of satellite has the largest footprint:

GEO

The most important reason that social computing is so valuable is:

Information is not anonymous

knowledge management systems (KMSs)

Information technologies used to systematize, enhance, and expedite intra- and inter- firm knowledge management.

The most common wireless technology for TV and DVD remote control devices is _______.

Infrared

The most common wireless technology for TV and DVD remote control devices is _______. a)Bluetooth b)Ultra-wideband c)Near-field communications d)WiMAX e)Infrared

Infrared

The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?

Innovation

Which strategy for competitive advantage involves introducing new products and putting new features in existing products

Innovation

Introduce new products and services, put new features in existing products and services, or develop new ways to produce them:

Innovation Strategy

Which of the following is not a communications channel? a)Fiber-optic cable b)Satellite transmission c)Twisted-pair wire d) Integrated circuits e)Cellular radio

Integrated circuits

Packaging, assembly, or manufacturing take place in the __________ segment of the supply chain.

Internal

Micro-browsers

Internet browsers with a small fire size that can work within the low-memory constraints of wireless devices and the low bandwidths of wireless networks.

Folksonomies are:

Keywords that describe a piece of information.

Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning and expertise as they apply to a current problem or activity:

Knowledge

If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____.

Knowledge

_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem

Knowledge

A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n):

LAN

A network that connects computing devices within the same building is:

LAN

Which type of satellite requires the highest number of satellites to cover the earth?

Low earth orbit

GPS are supported by ___ satellites

MEO

GPS are supported by ___ satellites a)LEO b)MEO c)GEO

MEO

GPS are supported by ___ satellites.

MEO

This type of satellite is used for the global positioning system:

MEO

The most important benefit of knowledge management systems is:

Make best practices available to employees.

Which of the following statements concerning the management of information resources is not true?

Managing mainframes has become more difficult

A company's production process consists of taking sand and refining it into silicon to be used in microchip production. This process most accurately describes which of the following? -Manufacturing -Assembling -Procurement -Fulfillment

Manufacturing

Which strategy for competitive advantage involves improving the manner in which an organization executes its internal business processes?

Operational Effectiveness

Improve the manner in which internal business processes are executed so that the firm performs similar activities better than its rivals:

Operational Effectiveness Strategy

Privacy advocates prefer which model of informed consent

Opt-in

Privacy advocates prefer which model of informed consent?

Opt-in

In the fulfillment process, instance-level information would include: Order date, FOB, order number Average date from order to shipping Average date from order to shipping and order number Order date and products sold to customer over the past year

Order date, FOB, order number

Data in an ES is classified into what three types? Information, knowledge, and transactional Organizational, master, and knowledge Organizational, master, and transactional Enterprise, master, and transactional

Organizational, master, and transactional

Our most expensive, yet underutilized asset is:

Our cars

Place the different types of computer networks in size order, ranging from smallest to largest.

PAN-LAN-MAN-WAN

Which of the below represents procurement as part of the support value activities in a value chain analysis?

Purchases inputs such as raw materials, resources, equipment and supplies.

The B2B equivalent of electronic credit cards is ______. Unlike credit cards, where credit is provided for 30 to 60 days (for free) before payment is made to the merchant, payments made with these are settled within a week.

Purchasing Cards

Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT

Privacy

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli's client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved?

Privacy

What are the 4 categories of ethical issues related to IT?

Privacy, Accuracy, Property, Accessibility

Content-filtering software performs all of the following functions except:

Proactively monitoring computers to protect against malware attacks.

Which of the following is an example of explicit knowledge?

Procedural guides

An organization's IT components include all of the following except:

Procedures

Cooking a patty and putting the ingredients together are included in which category of making a hamburger?

Process

cross departmental process

Processes that cross the boundaries of departments.

Which of the following problems do organizations face when managing data?

Processing and analyzing the data that are being stored Collecting the vast amounts of data that are being generated Storing the data that are being collected

The greatest problem with GEO satellites is which of the following?

Propagation delay

A group of logically related fields is a(n):

Record

You decide to start a landscaping business called Trim Grass. You created a Web site , but it doesn't seem to be attracting any clients. So, you decide to explore advertising on the . Which of the following advertising methods probably would not be beneficial?

Spamming

Which type of alien software uses your computer to send emails that look like they came from you to all the people in your address book? spamware cookies adware spyware

Spamware

Target large groups of people. In these attacks perpetrators find out as much information as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information.

Spear Phishing Attack

Fourth Generation (4G)

Still under development and does not fall under one defined technology or standard. "A network that operates on Internet technology, combines this technology with other applications and technologies such as Wi-Fi and WiMax, and operates at speeds ranging from 100 Mbps in cell-phone networks to 1 Gbps in local Wi-Fi networks.

____ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary.

Stored-value money cards

List a business pressure and describe an IT response to it;

Technology Pressures: An example of a technology pressure is information overload. Search engines and business intelligence applications enable managers to access, navigate, and utilize vast amounts of information.

What pressure do businesses face today?

Technology pressures such as information overload.

_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.

Telematics

The wireless transmission and receipt of data gathered from remote sensors.

Telemetry

_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.

Telemetry

Business intelligence applications are used for gathering, storing, accessing, and analyzing data to help business users make better decisions. True False

True

The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by:

The Seller

For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply):

The ability to offer a larger selection of products. The ability to offer lower prices to customers. The ability to reach a wider customer base.

For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply):

The ability to offer lower prices to customers. -The ability to reach a wider customer base.-The ability to offer a larger selection of products.

tacit knowledge

The cumulative store of subjective or experiential learning; it is highly personal and hard to formalize.

Explain how the web has an impact on the bargaining power of suppliers:

The web enables buyers to find alternative suppliers and to compare prices more easily, thereby reducing suppliers' bargaining power. From a different perspective, as companies use the web to integrate their supply chains, participating suppliers can lock in customers, thereby increasing suppliers' bargaining power.

The term "data rot" refers to

The deterioration of the medium on which the data are stored.

Which development led to the dramatic growth of the use of enterprise systems? The development of client-server architecture The development of service oriented architecture The development of mainframe systems The development of databases

The development of databases

Friedman's Flattner's include

The development of work-flow software

Netcasting is:

The distribution of audio files and video files.

Which of the following is not a characteristic of a structured decision? a)It is routine. b) It is repetitive. c)Human intuition is not involved. d)The first three phases of the decision-making process need not occur in any particular sequence. e)Standard solutions exist.

The first three phases of the decision-making process need not occur in any particular sequence.

Computer technologies become obsolete faster than other technologies in the organization. True False

True

Which of the following is not inhibiting faster Wi-Fi expansion?

The growth of WiMAX

Which of the following is not inhibiting faster Wi-Fi expansion?

The growth of WiMax

DNS are a convenient alternative to the difficult-to-remember IP naming system for computers. True False

True

Why would a company find it advantageous to have access to reports based off of process-level information in the fulfillment process? To identify the FOB of a particular order The amount of supplies purchased from a vendor in a given month The number of shipments that were on-time versus delayed All of the above are advantageous for a company in the fulfillment process

The number of shipments that were on-time versus delayed

Propagation Delay

The one-quarter second transmission delay in communication to and from GEO satellites.

Which of the following statements is false? a) Social networks can be used to achieve strategic objectives. b)The only downside of social networks is the required bandwidth. c)Social networks can be implemented on a secure platform. d)Social networks take the place of traditional employee directories. e)Social networks can offer personal pages as well as business pages.

The only downside of social networks is the required bandwidth.

customer relationship management

The overall process of building and maintaining profitable customer relationships by delivering superior customer value and satisfaction

DNS are a convenient alternative to the difficult-to-remember IP naming system for computers. True False

True

entity-relationship (ER) modeling

The process of designing a database by organizing data entities to be used and identifying the relationships among them.

Supplier relationship management systems include which of the following?

The purchasing process, analyzing potential and existing suppliers, procuring nonproduction materials

Supplier relationship management systems include which of the following? -Determining the most viable end products for development, the purchasing process, procuring nonproduction materials -Create demand for products, requesting quotations for complex products, procuring nonproduction materials -The purchasing process, analyzing potential and existing suppliers, procuring nonproduction materials -Match demand to future production capacity, requesting quotations for complex products, the purchasing process

The purchasing process, analyzing potential and existing suppliers, procuring nonproduction materials

Network protocols describe

The rules for communication within the network.

Network protocols describe:

The rules for communication within the network.

Which of the following statements about your future role as a manager is false?

The size of my team will likely be smaller than teams of today.

A stock out occurs when: A company has excess inventory of a product Information is incorrectly copied to the packing list A delivery is made to the incorrect location There are insufficient products in inventory to meet demand

There are insufficient products in inventory to meet demand

Which of the following statements about companies that provide proactive protection of your information assets is not correct?

These companies operate independently of the three major credit reporting agencies.

The data in a data warehouse have which of the following characteristics?

They are organized by subject.

All of the following statements concerning wide-area networks are true except:

They are provided by individual companies.

Of the following, which is the major problem with smart phones?

They can be used to compromise security.

When a sales order is created in the fulfillment process, much data from prior steps in the process is copied over. Which of the following is a benefit of this redundancy? It reduces the likelihood of errors in the process. This process can be automated in a manual environment. This redundancy does not waste time and resources. This ensures a clear understanding of the transaction details for both parties.

This ensures a clear understanding of the transaction details for both parties.

Sales orders have two primary purposes. These are: To standardize data across all customer purchase orders and consolidate customer inquiries To standardize data across all customer purchase orders and create an internal record for tracking purposes To identify where items are stored in the warehouse and create an internal record for tracking purposes Agree to purchase the stated material, for the stated price, under the stated terms

To standardize data across all customer purchase orders and create an internal record for tracking purposes

Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols. True False

True

A _____ is any danger to which an information resource may be exposed.

Threat

Business intelligence applications are used for gathering, storing, accessing, and analyzing data to help business users make better decisions.

True

Sense networks track users via all of the following technologies except _______.

Traffic cameras

Which of the following is not a concern or risk of cloud computing?

Training

Which of the following is not a mobile application in financial services?

Transaction Proccessing Systems

In the preceding example, "Robert Jones" is an example of:

Transaction data

Which of the following is not a mobile application in financial services?

Transaction processing systems

Which type of data in ES changes constantly? Transactional data Master data Organizational data Layer data

Transactional data

A code of ethics is a collection of principles that are intended to guide decision making by members of the organization. True False

True

A combination of your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be considered information

True

A university registrar who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores, would be applying her knowledge in your application process.

True

AJAX is a Web development technique that enables portions of Web pages to reload with fresh data instead of requiring the entire Web page to reload. True False

True

According to McKinsey & Co, the root cause of companies' inability to align their IT and their business goals is the lack of knowledge and communication.

True

An attribute is any characteristic or quality that describes a particular entity. True False

True

An auditing manager focuses on the ethical and legal use of information systems.

True

An electronic storefront is a Web site on the Internet that represents a single store. True False

True

A service-oriented architecture is an IT architecture that makes it possible to build business applications using Web services.

True!

An organization's supply chain starts at the supplier and ends at the customer. T or F?

True!

Cost Leadership Strategy is one strategy to gain a competitive advantage. T or F?

True!

Data marts are designed for the end-user needs in a strategic business unit or department.

True!

Which of the following statements about Wi-Fi is not correct? a)Wi-Fi provides simple Internet access. b)Laptop PC scans contain chips that can send and receive Wi-Fi signals. c)Many companies offer free Wi-Fi access in their stores. d)Wi-Fi requires encryption for secure transmissions. e)Wi-Fi is expensive to set up.

Wi-Fi is expensive to set up

Which of the following statements about Wi-Fi is not correct?

Wi-Fi is expensive to set up.

___ enables peer-to-peer wireless communications without the need to go through a central wireless access point.

WiFi Direct

The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.

WiMAX

A Web site on which anyone can post material and make changes to other material is a(n) ______.

Wiki

A ___ is a Web site made up entirely of content posted by users.

Wiki

A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n):

Wireless Access Point

Which of the following statements is not correct? a) You should use credit cards with your picture on them. b) You may use virtual credit cards for additional security. c) You should use debit cards whenever possible for additional security. d) You cannot use virtual credit cards for in-store purchases. e) Signatures on credit cards are often impossible to read.

You should use debit cards whenever possible for additional security.

You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen? a) When you sign up, you will need to download print templates. b) You won't be able to search RSS content. c) You will be able to choose only one topic area. d) You will be notified of updates in the content areas you selected. e) You will get content sent to you via e-mail.

You will be notified of updates in the content areas you selected.

Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.

Zero, the amount in your bank account

Your liability with credit cards is typically _____, where your liability with debit cards is _____.

Zero, the amount in your bank account ( The amount in your bank account, your credit limit Your credit limit, the amount in your bank account The amount in your bank account, zero Your credit limit, zero)

Which of the following attacks is most closely associated with downloading and installing patches immediately?

Zero-day attack

Which of the following can be used for reading utility meters without a person having to get out of a truck?

ZigBee

metadata

Data about data.

An evil twin attack is a type of:

Rogue access point

Master data are generated and captured by operational systems.

Answer: False

Tacit knowledge is the more objective, rational, and technical types of knowledge.

Answer: False

The relational database model is based on the concept of three-dimensional tables.

Answer: False

When data are normalized, attributes in the table depend on the primary key and any secondary keys.

Answer: False

smart cards

Sometimes called "electronic wallets," look like ATM cards; however, they also include a microchip.

______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a)Electronic checks b)Stored-value money cards c)Purchasing cards d)Smart cards e) Person-to-person payments

Stored-value money cards

Systems that help an organization gain a competitive advantage by supporting its strategic goals and/or increasing performance and productivity.

Strategic Information Systems (SISs)

Michael Porter defined the Five Forces Model and the potential pressures that can hurt sales. Which of the following is not one of the potential pressures that can hurt sales?

Suppliers can drive down profits by charging more for supplies

Which of the following is not a limitation of barcodes?

They identify the manufacturer, product, and item.

Distributed computing refers to the distribution of computing tasks among one or more computers. True False

True

E-commerce systems are a type of inter-organizational information systems.

True

Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.

True

Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols. True False

True

File sharing is a type of peer-to-peer processing. True False

True

T/F A/B experiments are so-named because there are only two possible outcomes for each experiment.

True

Medium Earth Orbit (MEO)

--Satellites move relative to point on earth. --Moderate number needed for global coverage. --Requires medium-powered transmitters. --Negligible (very small) transmission delay. --Less expensive to build and launch. --Moderate orbital life (6-12 years).

Benefits of e-commerce:

-Benefits organizations by making national and international markets more accessible and by lowering the costs of processing, distributing and retrieving information. -Customers benefit by being able to access a vast number of products and services, around the clock. -Major benefit to society is the ability to easily and conveniently deliver information services, and products to people in cities, rural areas, and developing countries.

Twisted-pair wire, the most prevalent form of communications wiring, consists of strands of copper wire twisted in pairs. Discuss the main advantages and disadvantages.

-It is relatively inexpensive to purchase, widely available, and easy to work with. -It is relatively slow for transmitting data, it is subject to interference from other electrical sources, and it can easily be tapped by unintended receivers.

Provide an example of E-learning, and explain how that network application supports business functions.

-Refers to learning supported by the Web. Distance learning refers to any learning situation in which teachers and students do not meet face-to-face. -E-learning provides tools for business users to enable their lifelong learning.

Identify three common challenges in managing data:

1-Data are scattered throughout organizations and are collected by many individuals using various methods and devices. These data are frequently stored in numerous servers and locations and in different computing systems, databases, formats, and human and computer languages. 2-Data come from multiple sources. 3-Information systems that support particular business processes impose unique requirements on data, which results in repetition and conflicts across an organization.

What are the Deliberate Threats to Information Systems?

1-Espionage or Trespass 2-Information Extortion 3-Sabotage and Vandalism 4-Theft of equipment and information 5-Identity Theft 6-Protecting intellectual property 7-Software attacks 8-Alien Software 9-Supervisory control and data acquisition (SCADA) 10-Cyberterrorism and Cyber warfare

Give examples that go with the 5 factors that contributed to the increasing vulnerability of information resources.

1-Internet 2-Netbooks, Thumb drives, iPads 3-Information system hacking programs circulating the Internet 4-Organized crime has formed transnational cybercrime cartels. Because it is difficult to know exactly where cyber attacks originate, these cartels are extremely hard to bring to justice. 5-Suppose that your company spent $10 million on information security countermeasures last year and experienced no successful attacks on information resources. Short-sighted management might conclude that the company could spend less during the next year and obtain the same results. Bad Idea.

What are the 6 characteristics of effective alignment for BIT?

1-Organizations view IT as an engine of innovation that continually transforms the business. 2-Organizations view customers and customer service as supremely important. 3-Organizations rotate business and IT professionals across departments and job functions. 4-Organizations provide clear, overarching goals for all employees. 5-Organizations ensure that IT employees understand how the company makes (or loses) money. 6-Organizations create a vibrant and inclusive company culture.

Positive societal effects from the increased use of information technology:

1-Provide opportunities for people with disabilities 2-Provide people with flexibility in their work (anywhere/anytime) 3-Robots will take over mundane chores 4-Enable improvements in health care

Identify the 5 competitive forces described by Porter:

1-Threat of entry of new competitors 2-Bargaining power of Suppliers 3-Bargaining power of customers(buyers) 4-Threat of substitute products or services 5-Rivalry among existing firms in the industry

Identify the 5 factors that contribute to the increasing vulnerability of information resources.

1-Today's interconnected, interdependent, wirelessly networked business environment. 2-Smaller, faster, cheaper computers and storage devices 3-Decreasing skills necessary to be a computer hacker 4-International organized crime taking over cybercrime 5-Lack of management support

What are the 9 types of deliberate attacks?

1-Virus 2-Worm 3-Phishing Attack 4-Spear Phishing attack 5-Denial of service attack 6-Distributed denial of service attack 7-Trojan Horse 8-Back Door 9-Logic Bomb

From a logical point of view, a(n) _______________ is the smallest data element that can be observed and manipulated. A. character B. bit C. attribute D. byte

A

In a(n) _______________ database structure, all of the relationships among records are one-to-many, because each data element is related to only one element above it. A. hierarchical B. relational C. network D. object-oriented

A

Large organizations usually place control of enterprise-wide database development in the hands of _______________. A. Database administrators (DBAs) B. Automated CASE tools C. End users D. All of the choices are correct.

A

The object-oriented database model supports _______________. That is, new objects can be automatically created by replicating some or all of the characteristics of one or more parent objects. A. inheritance B. morphing C. duplication D. cloning

A

The primary challenge of a distributed database is: A. Data accuracy B. Data transmission speed C. Storage costs D. Data security

A

The tables in a relational database are flat files which have rows and columns. Each column represents a _______________ in the file. A. field B. record C. file D. relation

A

Using a relational database, a user can temporarily combine two or more tables so that he/she can see relevant data in a form that looks like it is in one big table. This is the _______________ operation. A. join B. link C. merge D. select

A

The integrated process begins when which of the following occurs:

A customer submits an inquiry

The integrated process begins when which of the following occurs: -A planned order is issued -An invoice is sent to the vendor -A customer sends a purchase order -A customer submits an inquiry

A customer submits an inquiry

Wireless Network Interface card (WNIC)

A device that has a built-in radio an antenna and is essential to enable a computer to have wireless communication capabilities.

table

A grouping of logically related records.

Ultra-Wideband (UWB)

A high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. The high speed makes it good for streaming multimedia for, say, tv or personal computers.

Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?

A hot site needs to be located close to the organization's offices.

A company creates a web service that consists of a Google Map that is connected to a list of customer addresses. This would be an example of A mainframe A mashup A Wiki A hardware layer

A mashup

knowledge management (KM)

A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory and that typically reside within the organization in an unstructured manner.

master data management

A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core master data.

Which of the following would be true in a highly automated enterprise system in the production process? -The system could be configured to automatically approve all vendor purchase orders. -A production controller could configure the system to automatically approve planned orders under certain conditions. -The system could be configured to automatically send invoices to customers. -None of these are possible in a highly automated enterprise system.

A production controller could configure the system to automatically approve planned orders under certain conditions.

Short message service (SMS)

A service provided by digital cell phones that can send and receive short text messages (up to 160 characters in length).

master data

A set of core data, such as customer, product, employee, vendor, geographic location, and so on that span the enterprise information systems.

Hotspot

A small geographical perimeter within which a wireless access point provides service to a number of users.

GLOBAL POSITIONING SYSTEM

A system that determines the precise position of something on Earth through a series of satellites, tracking stations, and receivers.

Which of the following problems do organizations face when managing data? A. All of these B. Collecting the vast amounts of data that are being generated C. Processing and analyzing the data that are being stored D. Storing the data that are being collected

A. All of these

Which of the following are ways for companies to leverage big data to gain value? (check all that apply) A. Creating transparencies B. Segmenting a population to customize actions C. Analyzing less data D. Reducing spending on technical initiatives E. Providing automated algorithms to support decision making

A. Creating transparencies B. Segmenting a population to customize actions E. Providing automated algorithms to support decision making

eBay employs the ___ auction mechanism. A. Forward B. Reverse C. Dutch D. Proprietary eBay

A. Forward

The ___ is the transport mechanism, while the ___ is the application that uses the transport mechanism. A. Internet, WWW B. WWW, intranet C. WWW, Internet

A. Internet, WWW

A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n): A. LAN. B. Network server. C. WAN. D. All of these.

A. LAN

The use of databases enables organizations to (choose all that apply): Entry field with correct answer A. Minimize data security risks. B. Minimize data isolation. C. Eliminate data redundancy. D. Eliminate data integrity. E. Minimize data inconsistency.

A. Minimize data security risks B. Minimize data isolation E. Minimize data inconsistency

Downloading a book on an Amazon Kindle is an example of: A. Pure e-commerce. B. Partial e-commerce. C. Both of these are correct. D. Neither of these are correct.

A. Pure e-commerce.

The opening case illustrates how e-commerce has increased (choose all that apply): A. The volume of business transactions. B. The skill with which computers are able to handle unexpected situations. C. The occurrence of human errors. D. The speed at which we do business.

A. The volume of business transactions. D. The speed at which we do business.

With _____, phone calls are treated as just another kind of data. A. Voice over Internet Protocol B. Chat rooms C. Teleconference D. All of these

A. Voice over Internet Protocol

Place the following members of the data hierarchy in the correct order: A. bit - byte - field - record - file - database B. bit - record - field - byte - file - database C. byte - bit - record - field - database D. bit - byte - field - record - database - file E. bit - field - byte - record - file - database

A. bit - byte - field - record - file - database

eBay is an example of which type of e-commerce? A. consumer-to-consumer B. consumer-to-business C. business-to-consumer D. business-to-business E. government-to-citizen

A. consumer-to-consumer

When e-commerce is done in a wireless environment, this is called: A. mobile commerce B. wireless commerce C. pervasive computing D. location commerce E. consumer commerce

A. mobile commerce

Explicit knowledge has which of the following characteristics? A. objective B. slow C. costly to transfer D. personal E. ambiguous

A. objective

Manufacturers or retailers sell directly to customers in which of the following business models? A. online direct marketing B. affiliate marketing C. find-the-best-price D. name-your-own-price E. electronic tendering system

A. online direct marketing

_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources. A. Access B. Physical C. Data security D. Administrative E. Input

A.Access

Biometrics are an example of: A. something the user is. B. something the user wants. C. something the user has. D. something the user knows. E. something the user does.

A.Something the user is

A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, dsfsf commission to the partner. This scenario illustrates which business model?

Affiliate marketing

Which of the following are examples of process-level information in the production process? -The average time to complete production of a product -The percent of planned orders are currently in the Final Inspection stage -How many orders were delayed in January and why -All of the above

All of the above

Conversational marketing can take place in which of the following forums?

All of the above -- a) Blogs b) Wikis c) Online forums - d) Social networking sites

A supply chain management system can do which of the following?

All of the above -Use demand forecasts to create a demand plan over a given period of time -Match demand with future production capacity -Create a material plan to match the expected amount of finished goods to be produced

Which of the following is not a consequence of poor information security practices?

All of the above are consequences of poor information security practices.

Cybercriminals can obtain the information they need in order to assume another person's identity by:

All of the above are strategies to obtain information to assume another person's identity.

Businesses and organizations set up Web sites to: a)Sell goods and services. b)Induce people to visit a physical location. c)Reduce operational and transaction costs. d)Enhance their reputation. e)All of the above.

All of the above.

Which of the following is not a step in ethical decision making? A. Recognize the ethical issue. B. Get the facts. C. Evaluate alternative actions. D. Make a decision and test it. E. All of these are steps in ethical decision making.

All of these are steps in ethical decision making.

A server is a network device that allows users to share a)Software programs. b)Files. c)Network resources. d)All of these.

All of these.

The "cloud" in cloud computing is comprised of a)Computers and servers. b)Software. c)Network connections. d) All of these.

All of these.

BI refers to only those technologies that obtain data from warehouses.

False

It is easy to manage all the data coming into an organization.

Answer: False

It is important for applications and data to be dependent on each other.

Answer: False

A negative value for a student's grade point average is an example of a data integrity problem.

Answer: True

An attribute is any characteristic or quality that describes a particular entity.

Answer: True

An entity is a person, place, thing, or event about which information is maintained.

Answer: True

Data marts are designed for the end-user needs in a strategic business unit or department.

Answer: True

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

Answer: True

Ratings, reviews, and recommendations a) Are always provided by businesses on their Web site. b) Are posted by experts. c) Are posted without compensation. d) Are an aspect of social shopping. e) Are not beneficial to the business

Are an aspect of social shopping.

Which of the following statements is not correct? A. Employees have limited protection against surveillance by employers. B. The large majority of organizations monitor employee Internet usage. C. The large majority of organizations use URL filtering. D. As with normal first-class mail, employers cannot read employee e-mail. E. Employees should be aware that surveillance is legal.

As with normal first-class mail, employers cannot read employee e-mail.

______ allows users to access almost unlimited bandwidth on demand. Provides support for data, video, and voice transmissions on a single communications line.

Asynchronous transfer mode (ATM)

Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using:

Automated Webcrawlers

Most Internet search engines maintain an index of billions of Web pages. These indexes are updated using:

Automated webcrawlers.

The system which provides overall control and monitoring functions of a specific process or application. Generally consists of a network of computers, controllers, and I/O modules.

Automation Systems

In the fulfillment process, process-level information would include: Order date, FOB, order number Average date from order to shipping Average date from order to shipping and order number Order date and products sold to customer over the past year

Average date from order to shipping

A _______________ is an overall logical view of the relationships needed to support specific end-user application programs that will access the database. A. schema B. subschema C. logical data model D. conceptual design

B

A central source of data that have been cleaned, transformed, and cataloged so that they can be used for business analysis, market research, and decision support is called a _______________. A. data mart B. data warehouse C. transaction processing mart D. data repository

B

A database with a(n) _______________ data structure can easily handle a many-to-many data relationship. A. hierarchical B. network C. relational D. object-oriented

B

According to one database pioneer, the future development of databases and data warehouses will depend on _______________. A. rows B. columns C. transaction D. All of the choices are correct.

B

According to the text, most data warehouses will run _______________ in a column format. A. 20 times faster B. 50 times faster C. 50 times slower D. None of the choices are correct.

B

All of the following are major functions of a database management system except: A. Creating new databases and database applications B. Identifying insufficient data processing or storage needs C. Maintaining the quality of the data in an organization's databases D. Using the databases of an organization to provide the information needed by its end users

B

All the fields used to describe the attributes of an entity are grouped to form a(n) _______________. A. field B. record C. file D. database

B

Which of the following is true of data marts? A. They hold data from many different data warehouses. B. They are a subset of a data warehouse. C. They focus on many generalized aspects of a company. D. None of the choices are correct.

B

_______________ is the most commonly used database application for the PC. A. Oracle 10g B. Microsoft Access C. DB2 D. SQL Server

B

Which of the following is an example of explicit knowledge? A. skill sets B. procedural guides C. experiences D. expertise E. insights

B. procedural guides

_____ refers to the range of frequencies available in any communications channel.

Bandwidth

What are the two types of account data needed to process a payment?

Bank Account Vendor Account

What are the types of data needed to post an incoming payment?

Bank account customer account invoice amount

The short-range wireless network best suited for eliminating the wires connecting keyboard, mouse, monitor, and computer in your office is:

Bluetooth

_____ is a wireless standard that enables temporary, short-range connection between mobile devices.

Bluetooth

_____ is a wireless standard that enables temporary, short-range connection between mobile devices. a)Bluetooth b)Wireless application protocol c)Short message service d)Wi-Fi e)Global positioning system

Bluetooth

With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.

Both of the following are correct: convenience and instant connectivity

Managing information systems in a modern organization is challenging because:

Both of the following are correct: the systems are very expensive to acquire, operate, and maintain; and the systems are critical to the organization's operations.

The term "digital divide" refers to the gap between:

Both of the following: Individuals who have access to information and communication technologies and those who do not; and the IT staff and the other employees who are not IT savvy.

When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n):

Buy-side marketplace

When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n):

Buy-side marketplace.

When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): a)Buy-side marketplace. b)Sell-side marketplace. c)Electronic exchange. d)None of these.

Buy-side marketplace.

A(n) _____ represents a single character, such as a letter, number, or symbol.

Byte

A database with a(n) _______________ data structure can easily handle ad hoc requests for information. A. hierarchical B. network C. relational D. object-oriented

C

A group of related records is a data file, or a _______________. A. field B. record C. table D. database

C

The _______________ model is the most widely used database structure today. A. network B. object-oriented C. relational D. hierarchical

C

The _______________ operation is used to create a subset of the columns contained in the temporary tables created by the select and join operations. A. link B. relate C. project D. merge

C

The basic form of a SQL query is: A. SELECT ¼ AND ¼ OR B. SELECT ¼ WHERE ¼ FROM ¼ C. SELECT ¼ FROM ¼ WHERE ¼ D. AND ¼ OR ¼ NOT ¼

C

The physical design stage of database development: A. Develops a model of business processes B. Translates conceptual models into the data models C. Determines the data storage structures and access methods D. Defines the information needs of end users in a business process

C

What type of databases are employees using when they access online data banks, whether those data banks are free or paid for through subscriptions? A. Common databases B. Distributed databases C. External databases D. Local databases

C

Which of the following statements concerning the replication and duplication process for updating distributed databases is correct? A. The two terms are interchangeable because the processes work the same way B. Duplication is the more complicated process because it has to identify one database as a master and prevent changes being made to any database other than the master C. Replication is the more complicated process because it must find changes in each distributed database and make appropriate changes to make each database identical D. None of the choices are correct.

C

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security

C.Freedom of speech, privacy

The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the

CIO

E-Business

Carrying out the goals of business through utilization of the internet.

_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.

Cell phones

First Generation (1G)

Cellular used analog signals and had low bandwidth (capacity).

Disintermediation

Channel conflict that arises when a channel member bypasses another member and sells or buys products direct

____ and ____ are the two major challenges for the sellers in e-commerce.

Channel conflict, order fulfillment

Bluetooth

Chip technology that enables short-range connection (date and voice) between wireless devices.

A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______.

Client/server

Travis is the VP of Operations for a company that owns and operates six ski areas around the world. Which of the following might be a good source of computing for the company? a)Server farm b)Grid computing c)Cloud computing d)Utility computing e)Virtualization

Cloud computing

Making and distributing information goods to which you do not own the ___ is referred to as ____.

Copyright; Piracy

__________ are high speed central networks to which multiple smaller networks connect.

Corporate backbone networks

____ is(are) involved with monitoring and managing an organization's performance according to the organization's key performance indicators.

Corporate performance management

procurement portals

Corporate portals that automate the business processes involved in purchasing or procuring products between a single buyer and multiple suppliers.

The capabilities of smart phones include all of the following except _________.

Corporate transaction processing

Produce products and/or services at the lowest cost in the industry:

Cost Leadership Strategy

Compared to data warehouses, data marts have which one of the following characteristics?

Cost Less

When customers access a Web site and make purchases, they generate ____.

Clickstream data.

Compared to data warehouses, data marts:

Cost less

Various organizations that promote fair and responsible use of information systems often develop a _____.

Code of ethics

Workflow, groupware, and telepresence systems are examples of which network application?

Collaboration

Aggregators are primarily designed to a)Collect information from different information sources. b)Disseminate information to potential consumers. c)Store information for later reference. d)None of these

Collect information from different information sources.

data dictionary

Collection of definitions of data elements, data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use the data elements.

transaction processing systems-

Collects and stores information about transactions; control some aspects of transaction

In the relational database model, related tables can be joined when they contain common _____.

Columns

____ Secure the movement of data across networks. These controls consist of firewalls, anti-malware systems, whitelisting and blacklisting, encryption, virtual private networking, secure socket layer, and vulnerability management systems.

Communications Controls

Organizations typically face issues related to e-tailing including

Companies face issues in both of these areas

An advantage over competitors in some measure such as cost, quality, or speed; leads to control of a market and to larger-than-average profits.

Competitive Advantage

The computing skills necessary to be a hacker are decreasing for which of the following reasons? a) More information systems and computer science departments are teaching courses on hacking so that their graduates can recognize attacks on information assets. b) Computer attack programs, called scripts, are available for download from the Internet. c) International organized crime is training hackers. d) Cybercrime is much more lucrative than regular white-collar crime. e) Almost anyone can buy or access a computer today.

Computer attack programs, called scripts, are available for download from the Internet.

Which of the following would be an example of a SCADA attack? • Email accounts are hacked and kinky messages are sent to all of the user's contacts. • Bank accounts are hacked into after Internet purchases • Social Security numbers are deleted from a company's database. • Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.

Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.

Wide-Area Wireless Networks

Connects users to the Internet over geographically dispersed territory. Typically operate in a licensed spectrum. They are either "cellular radio" or "broadband."

C2C

Consumer to Consumer

In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as:

Conversational marketing

A modem can perform which of the following operations?

Convert analog signals to digital signals and Convert digital signals to analog signals

A modem can perform which of the following operations?

Convert analog signals to digital signals only; and convert digital signals to analog signals only.

CSF's and KPI's are two core metrics used to evaluate results and measure the progress of a project for a business. Which of the below represents the acronyms for CSF and KPI?

Critical success factors and key performance indicators

When Amazon welcomes you by name back to its website on your second visit this is an example of which strategy for competitive advantage?

Customer Orientation

Information Systems for marketing incorporate the following functions: (check all that apply)

Customer Relationship Management

Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________.

Customer intimacy

Data aggregators sell digital dossiers to companies that want to know their customers better. This practice is called ________. A. Customer relationships B. Customer profiling C. Customer intimacy D. Customer knowledge E. Spying

Customer profiling

Information Systems for marketing incorporate the following functions: (check all that apply)

Customer relationship management

According to the textbook case, file processing in Hadoop is not halted by hardware failures because _______________. A. Hadoop is a software product B. Open-source products are not affected by hardware failures C. Hadoop is an Internet product and does not need hardware D. Hadoop keeps three (3) copies of all data

D

Database administrators and database design analysts work with end users and systems analysts to do all of the following except: A. Model business processes and the data they require B. Determine what data definitions should be included in the database C. Determine what structure or relationships should exist among the data elements D. Enter live data into the system until it has proven to be reliable

D

Database management involves the use of database management software to control how databases are _______________. A. created B. interrogated C. maintained D. All of the choices are correct.

D

Fixed-length records contain: A. both a variable number of fields and variable field lengths. B. both a variable number of fields and fixed field lengths. C. both a fixed number of fields and variable field lengths. D. both a fixed number of fields and fixed field lengths.

D

Operational databases store the detailed data needed to support the business processes and operations of a company. They are also called _______________. A. Subject area databases B. Transaction databases C. Production databases D. All of the choices are correct.

D

Which of the following is a legitimate use for data mining? A. Performing "market-basket analysis" to identify new product bundles B. Profiling customers C. Finding the root cause of a quality or manufacturing problem D. All of the choices are correct.

D

_____ occurs when the same data are stored in many places.

Data Redundancy

Which of the following statements regarding informed users of IS and IT is true? A. Informed users almost invariably work for the IT department. B. Being an informed user is less important today than in the past because IT providers offer extensive help and support. C. Most employees who have experience surfing the Web or working with computers qualify as informed users. D. Informed users enhance an organization by providing feedback regarding the applications and technologies used by the organization.

D. Informed users enhance an organization by providing feedback regarding the applications and technologies used by the organization.

_____ is a method for analyzing and reducing a relational database to its most streamlined form. A. Structured query B. Joining C. Relational analysis D. Normalization E. Query by example

D. Normalization

The most important benefit of knowledge management systems is: A. improved morale. B. retention of scarce knowledge if employees retire. C. more efficient product development. D. they make best practices available to employees. E. improved customer service.

D. they make best practices available to employees

You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management?

Data Inconsistency

______ Occurs when applications cannot access data associated with other applications.

Data Isolation

The management of data across the entire organization is most accurately defined as:

Data governance

relational database model

Data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.

_____ occurs when the same data are stored in many places. a)Data isolation b)Data integrity c)Data consistency d)Data redundancy c) Application/Data dependence

Data redundancy

query by example (QBE)

Database language that enables the user to fill out a grid (form) to construct a sample or description of the data wanted.

The software program (or group of programs) that provides access to a database.

Database management system

CoStar faced pushback from the real estate community in the Washington area, and eventually in every city in which the company began operations, because commercial real estate brokers did not want the buying or selling process to be transparent. This situation is clearly illustrates how CoStar's database system produced information and business intelligence that changed the real estate market in terms of:

Decreased suppliers bargaining power

Product life cycle management includes which of the following?

Determine the most viable end products to produce and collaborate internally and externally to develop products

Product life cycle management includes which of the following? -Determine the most viable end products to produce and collaborate internally and procure nonproduction materials -Determine the most viable end products to produce and collaborate internally and externally to develop products -Transform demand into sales opportunities and externally to develop products -Enabling the source-to-settle and idea-to-market processes

Determine the most viable end products to produce and collaborate internally and externally to develop products

Which of the following statements is correct?

Determining and enforcing privacy regulations can be difficult.

Offer different products, services, or product features:

Differentiation Strategy

The network application, ___, enables users to access information located in databases all over the world.

Discovery

Networks enable which of the following applications?

Discovery Communications Collaboration

Networks enable which of the following applications?

Discovery Communications Collaboration All of these*

The popularity of online classes and online universities can be attributed to which of the following network applications?

Discovery Communications Collaboration All of these*

six network applications

Discovery - how computers are able to find other computers or devices on the network and if they can see it back. Communications - A set of nodes connected by communication links that allow for the transfer of information between users around the world. E-Learning - Education via the Internet by the use of applications and processes to learn. Virtual University - Provides higher education through online schooling allowing people to take classes from home to obtain a degree. Telecommuting - The Internet allows workers to save their commute and work from home, transmitting files and data from their own personal computers to the company.

Product life cycle management systems incorporate which of the following so that everyone in the process has access to the historical background of a product? -Document and knowledge management capabilities -Document and supply chain management capabilities -Knowledge and customer relationship management capabilities -Supply chain and supplier relationship management capabilities

Document and knowledge management capabilities

An employee is examining that status of all delayed orders via the company's enterprise system. One particular order is noticeably delayed. The employee performs which task in the enterprise system to learn more about this particular order number? -Stock out -Drill down -Backlogging -Product routing

Drill down

The amount and type of memory that a computer possesses affects which of the following? A. The type of program the computer can run B. The speed of the computer C. The cost of the computer D. The cost of processing data E. All of these

E. All of these

In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was:

Employee Negligence

Internet over Satellite (IoS)

Enables users to access the Internet via GEO satellites from a dish mounted on the side of their homes (often in regions of the world where it's the only option for Internet). Downside: GEO satellite transmissions entail a propagation delay, and they can be disrupted by environmental influences such as thunderstorms.

Protocol

Engagement

A(n) ___ can consist of one or more ____ .

Enterprise Network; LANs

Information systems that correct a lack of communication among the functional area IS's by tightly integrating the functional area IS's via a common database:

Enterprise Resource Planning (ERP) Systems

Two information systems that support the entire organization are:

Enterprise Resource Planning system (ERP) and Transaction Processing System (TPS)

The use of network standards to connect different types of computer networks resulted in ____. a)Local area networks b)Enterprise computing c) Cloud computing d)Mobile computing

Enterprise computing

A(n) ___ can consist of one or more ___.

Enterprise network, LANs

A(n) ___ can consist of one or more ____ .

Enterprise network, LANs

____ integrate the planning, management, and use of all of an organization's resources and are designed to tightly integrate the functional areas of the organization.

Enterprise resource planning systems

___ systems are designed to correct a lack of communications among ___.

Enterprise resource planning; Functional area information systems

A data model is the diagrammatic representation of a database that clearly defines a database's ___ , ____ and ____.

Entities, attributes, relationships.

A data model is the diagrammatic representation of a database that clearly defines a database's ___ , ____ and ____. a)Entities, attributes, relationships. b)Entity classes, hierarchy, files. c)Data hierarchy, data attributes, data files. d)Entity classes, entity attributes, entity files.

Entities, attributes, relationships.

Which of the following is not a role that information systems play in businesses processes?

Establish Standards

The most distinguishing characteristic of geographical information systems is:

Every record or digital object has an identified geographical location.

Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.

Evil twin

An Intranet that allows limited access to its partners, suppliers, and customers is called a(n):

Extranet - Customer profiling

A browser is used to prevent web surfing.

FALSE

A free software package is called a browser.

FALSE

A group of related fields is generally called a data file.

FALSE

All of the rating, reviews and recommendations available through social networking are unbiased and reviewers are never paid for their reviews.

FALSE

An Intranet is a scaled-up version of the Internet that uses similar technologies.

FALSE

CRM systems are designed to focus companies' marketing efforts on a large and broad group of people.

FALSE

Data in a data warehouse are organized by business process, where data in corporate databases are organized by subject.

FALSE

Digital signals have two parameters, amplitude and frequency.

FALSE

Human Resource Departments use social computing applications only in the area of training.

FALSE

Human Resource departments only use social computing applications for recruiting purposes.

FALSE

Process and procedures are important but not critical to the effective use of computer based information systems.

FALSE

Recruiters only use social computing to find people who are unemployed.

FALSE

Small companies do not have to worry about CRM as it is only essential for large organizations..

FALSE

Social computing increases the need for customer service.

FALSE

Social computing sites are not utilized by passive job seekers.

FALSE

Social data is not a form of big data.

FALSE

The IT department is solely responsible for the quality of the data in the data warehouse.

FALSE

The Internet is managed by a central agency which bears all the cost and responsibility.

FALSE

The basic idea behind CRM is to treat all customers in exactly the same way and give them the same great service.

FALSE

The main purpose of location-based applications is to broadcast your current location coordinates to local businesses.

FALSE

The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores.

FALSE

The three common cross functional business processes supported by an ERP system are procurement, production and reporting.

FALSE

A public cloud is a data center that integrates servers, storage, networks, data, and applications as a set of services that users inside a company share. True False

False

An organization's IT platform consists of the IT components and IT services.

False

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. A. The public, the individual B. The public, ethics C. Freedom of speech, privacy D. The individual, freedom of speech E. Ethics, security

Freedom of speech, privacy

Michaela runs a dog-walking business. She has three employees, and she prides herself in maintaining a high level of customer service. She gets about half of her business from last-minute requests. When she receives such a request, she needs to know where her employees are so that she can identify the nearest one who might be able to do the walk. Significantly, she needs this information before she can confirm the walk with the client. Which of the following technologies will help her obtain this information? a)Radio transmission b)Internet over Satellite c)LEO constellation d)GPS e)Microwave

GPS

The ability to precisely specify the geographic location of pictures is referred to as: a)Locating b)Tagging c)Geo-tagging d)None of these

Geo-tagging

Which type of satellite has the largest footprint?

Geostationary

With which type of satellite is there a propagation delay?

Geostationary

) If your identity is stolen, what is the first thing you should do?

Get a lawyer

Which of the following is not a step in ethical decision making?

Get the facts. Evaluate alternative actions. Make a decision and test it.

Telepresence systems can help make ___________ a more popular choice for small and medium enterprises.

Global outsourcing

_____ is a satellite-based tracking system that enables users to determine a person's position.

Global positioning system

At the end of a semester, a student knows that she must score at least an 81 on the final exam to receive an A in the course. She decided that she can make the 81 by studying the material only the night before the exam. She has just performed what kind of analysis?

Goal-seeking

At the end of a semester, a student knows that she must score at least an 81 on the final exam to receive an A in the course. She decided that she can make the 81 by studying the material only the night before the exam. She has just performed what kind of analysis? a)What-if b)Statistical c)Sensitivity d)Goal-seeking e)Simulation

Goal-seeking

Refer to Opening Case- What to Do About WikiLeaks?: Which of the following is false about WikiLeaks?

Governments and companies are using network forensics to identify intruders who break into systems.

____ offers major discounts or special deals during a short time frame.

Group shopping

Compare and contrast human mistakes and social engineering, providing an example for each.

HUMAN MISTAKES are unintentional errors. However, employees can also make unintentional mistakes as a result of actions by an attacker, such as social engineering. SOCIAL ENGINEERING is an attack where the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information. -An example of a human mistake is tailgating. An example of social engineering is when an attacker calls an employee on the phone and impersonates a superior in the company.

Computer programs like CAPTCHA are used to counter • Hackers using key loggers. • Malware. • Hackers using screen scrappers. • Websites leaving cookies on the local machine.

Hackers using key loggers

Computer programs like CAPTCHA are used to counter

Hackers using key loggers. ( Malware. Hackers using screen scrappers. Websites leaving cookies on the local machine )

The components of an Enterprise System include: Data, information, knowledge Hardware, software, a database Hardware, software, information Clients, applications, data management

Hardware, software, a database

A company that has recently experienced tremendous growth and needs to increase their capacity for users on their enterprise systems would benefit from system that: Has low scalability Is a stand-alone mainframe system Has high scalability Is based on a punch card system

Has high scalability

Which of the following statements about the potential impact of IT on non-managerial workers is true?

IT could cause employees to experience a loss of identity.

Which of the following statements is false?

IT decreases the number of promotional opportunities

In recent years, companies such as Walmart and Amazon.com have offered streaming videos for rent on their Web sites. This is another example of how new technology has (check all that apply):

Increased the threat of new entrants. - Increased the threat of substitute products. - Increased the supplier's bargaining power. - Decreased the buyer's bargaining power.

Which of the below offers a disadvantage for working virtually?

Increases in feeling of seclusion

For most companies, the Web ___ the threat that new competitors will enter the market by ___ traditional barriers to entry.

Increases, decreasing

The development of mobile commerce is driven by all of the following factors except:

Increasing prices.

IT changes a middle manager's job in which of the following ways?

Increased number of employees reporting to a single manager and increased productivity

Collects, processes, analyzes, stores, and disseminetes information for a specific purpose:

Information Systems

Relates to any computer based tool that people use to work with information and support the information and information processing needs of an organization:

Information Technology (IT)

The age we live in has infinite quantities of facts that are widely available to anyone who can use a computer. What age is this statement referring to?

Information age

Which of the following statements about blogs is NOT true: a)In the blogosphere, news travels at a much faster pace than in the mainstream media. b)Blogs are changing the way information and news are consumed. c)Information available on blogs consists of personal opinions that don't have an impact on readers. d)Blogs are a vehicle for companies to engage with their customers.

Information available on blogs consists of personal opinions that don't have an impact on readers.

The ___ is the transport mechanism, while the ___ is the application that uses the transport mechanism.

Internet, WWW

just-in-time inventory systems

Inventory system in which companies manufacture or purchase goods just in time for use.

In which of the following documents is the price of the materials relevant?

Invoice Purchase Order

Which of the following are key data in an invoice?

Invoice date FOB Prices of the material ordered

Give three examples of how YouTube is redefining the entertainment business. Comment on the success or limitations of their efforts.

Learning Objective: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business

Benefits of grid computing

It makes it easier to scale up or down. It enables efficient use of computing resources. It enables applications to run faster. There is no single point of failure.

Content-filtering software performs all of the following functions except:

It proactively monitors computers against malware attacks ( It blocks access to undesirable Web sites. It records all Web sites that users have visited. It records both sides of chat conversations. It enables users to selectively filter content. )

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.

Knowledge Management

______ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.

Knowledge Management

Which of the following is not an expert system activity? a)Knowledge acquisition b)Knowledge domain c)Knowledge inferencing d)Knowledge representation e)Knowledge transfer

Knowledge domain

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that is part of the organization's memory and typically resides inside the organization in an unstructured manner.

Knowledge management

_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem.

Knowledge; Information

A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n): LAN. Network server. WAN. All of these.

LAN

A collection of the following devices two desktop computers, three laptops, two smart phones and a printer — can be described as a(n):

LAN

A collection of the following devices: two desktop computers, three laptops, two smart phones and a printer, can be described as a(n):

LAN

A collection of the following devices = two desktop computers, three laptops, two smart phones and a printer can be described as a(n):

LAN.

A collection of the following devices ? two desktop computers, three laptops, two smart phones and a printer ? can be described as a(n): a) LAN. b)Network server. c)WAN. d)All of these.

LAN.

Which of the following factors that make information resources more vulnerable to attack can be most easily remedied?

Lack of management control ( Interconnected/dependent business environments; Larger and cheaper storage; Organized cyber crime; Decrease skill level of hackers; None - all factors are exogenous )

Discuss at least one main disadvantage of relational databases.

Large-scale relational databases can be composed of many interrelated tables, making the overall design complex with slow search and access times.

Discuss the efforts that Wikipedia takes to improve the reliability of its content. Why do many colleges continue to disallow Wikipedia as a cite for scholarly work?

Learning Objective 1: LO 9.1 Describe Web 2.0, and the two major types of Web 2.0 sites. Section Reference 1: 9.1 Web 2.0

Explain how a corporate social networking site would differ (on as many aspects as you can think of) from the personal one that so many of us belongs to.

Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business

Identify and analyze the risks and benefits associated with social networking sites.

Learning Objective 1: LO 9.2 Describe the benefits and risks of social commerce to companies. Section Reference 1: 9.2 Fundamentals of Social Computing in Business

Explain social intelligence and give some examples.

Learning Objective: LO 9.4 Discuss innovative ways to use social networking sites for advertising and market research Section Reference 1: 9.4 Social Computing in Business: Marketing

How does social computing improve the customer experience? What benefits do the customers derive from using social computing?

Learning Objective: LO 9.5 Describe how social computing improves customer service Section Reference 1: 9.5 Social Computing in Business: Customer Relationship Management

Social computing is making it easier for recruiters to find good candidates and making it harder. Explain this statement.

Learning Objective: LO 9.6 Discuss different ways in which human resource managers make use of social computing Section Reference 1: 9.6 Social Computing in Business: Human Resource Management

A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations or systems:

Liability

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Liability

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a) Ubiquity b) Convenience c) Instant connectivity d) Personalization e) Localization of products and services

Localization of products and services

Segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.

Logic Bomb

master vs transaction data

Master data includes data that is important to business applications that make up the IS, while transaction data are data that describes events that occur within the business. Master data is not volatile while transaction data is highly volatile. Master data is always involved with transaction data.

Once production has been authorized in a manual environment, which document would be presented to the warehouse in order to obtain the raw materials to begin production? -Vendor invoice -Planned order -Goods receipt document -Material withdrawal slip

Material withdrawal slip

Groupon's social commerce revenue model is based on the following: a)Merchants get free advertising b)Merchants are guaranteed additional business and potential new customers c)Groupon is paid a fixed amount for advertising d)All of these

Merchants are guaranteed additional business and potential new customers

_____ networks use multiple Wi-Fi access points to create a wide area network.

Mesh

_____ use multiple Wi-Fi access points to create a wide area network.

Mesh Networks

_____ use multiple Wi-Fi access points to create a wide area network.

Mesh networks

___ is a portable wireless device that provides users with a WiFi hotspot wherever they go.

MiFi

Using your cell phone to purchase a Coke from a vending machine is an example of:

Micropayment

Smart cards, a form of e-cash, are ideal for ____ which are small payments of a few dollars or less.

Micropayments

Which of the following technologies is wireless but not mobile?

Microwave towers

The major types of wireless media are: a)Satellite, radio, microwave, and television. b)Cellular, television, radio, and microwave. c)Microwave, satellite, radio, and infrared. d)Smart phones, satellite, television, and radio.

Microwave, satellite, radio, and infrared.

The use of databases enables organizations to (choose all that apply):

Minimize data inconsistency -Minimize data security risks -Minimize data isolation NOT -Eliminate data redundancy -Eliminate data integrity

____ is a CRM system that enables organizations to conduct communications related to customer management through portable media.

Mobile CRM

The data processed by transaction processing systems provide the inputs for other organizational information systems.

TRUE

Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics?

Mobility, broad reach

The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.

Mobility, broad reach

The function of _____ is to convert digital signals to analog signals and vice-versa. a)Modems b)Multiplexers c) Front-end processors d) Servers e)Clients

Modems

Fuzzy logic could be used to define which of the following terms: a)Gender b)Moderate income c)Age d)Address e) Income

Moderate income

_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.

Monitoring

Which of the following statements is not true?

Most companies do not find it necessary to closely monitor social media.

MIS is a business function. Which of the following does MIS perform to help aid the company in decision making and problem solving?

Moves information about people. Moves processes across the company to improve systems. Moves information about products

A process in which a company integrates its online and offline channels.

Multichanneling

Consider this domain name, www.business.gsu.edu. The "business" is the ________.

Name of the specific computer

Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.

Public; Private

What is not a government regulation that puts pressure on businesses?

National Technology Act

_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.

Near-field communications

Functional Exchanges:

Needed service such as temporary help or extra office space are traded on an "as-needed" basis.

Ethernet, packet switching, HTTP, and TCP/IP are all examples of:

Network Protocols

Internet service providers connect to one another through _____.

Network access points

A _____ allows a device to physically connect to a local area network's communications medium.

Network interface card

Which of the following factors is associated specifically with corporate performance management for online businesses?

Network traffic

_____ is a method for analyzing and reducing a relational database to its most streamlined form.

Normalization

A three-way match involves which of the following documents?

Purchase Order Goods Receipt Document Invoice

bullwhip effect

Occurs when distorted product demand information ripples from one partner to the next throughout the supply chain

e-wallets

Offer a secure, convenient and portable tool for online shopping

_____ is a CRM system that is hosted by an external vendor in the vendor's data center.

On-demand CRM

The most common method for storing data in a data warehouse is:

One central data warehouse

exception reports

Reports that include only information that exceeds certain threshold standards

The transmission technology that breaks up blocks of text into packets.

Packet Switching

Which of the following statements concerning packet switching is not true? A. Packets contain a sequence number. B. Packets are routed through different paths. C. Packets require dedicated circuits. pg 182 D. Packets use TCP/IP to carry their data. E. Packets contain destination addressing.

Packets require dedicated circuits.

With Web 1.0 sites, users ______________, whereas with Web 2.0 sites, users _________________. a) Use HTML, use CCS b) Passively receive information, participate with the site. c) Use wired connections, use wireless connections. d) Have to know the address of the site, can use search engines to find a site e) Did not have to login to find information, have to login in to find information.

Passively receive information, participate with the site.

_____ can be used to create strong passwords that are easy to remember.

Passphrases ( Mnemonics Birthdates Numbers )

peer-to-peer vs client/server

Peer-To-Peer processing has no central server and should be installed in homes and small businesses where people use them regularly. The point of it is to be inexpensive for those who only need it for a small use. Client/server computing can become as large as it needs to be without sacrificing any of its performance and it has a centralized security server that protects it.

Wireless Devices

People like them because they can make productive use of formerly wasted, their work places are become more flexible because they can take them with them, and because wireless technology enables us to allocate our working time around personal and professional obligations.

To effectively manage by exception (i.e., use exception reports), the company must first create:

Performance standards

_____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. a)Viral marketing b)Personalized marketing c)Permission marketing d)Paper catalogs e)Direct mail

Permission marketing

___ can be used for a variety of purposes, such as sending money to students at college, paying for an item purchased at an online auction, or sending a gift to a family member.

Person to Person payments

A(n) ___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.

Personal firewall

____ use deception to acquire sensitive personal information by masquerading as official looking emails or instant messages.

Phishing Attack

Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly.

Phones, digital cameras

___ Prevent unauthorized individuals from gaining access to a companies facilities. Common controls include walls, doors, fencing, gates, locks, badges, guards, and alarm systems. More sophisticated controls include pressure sensors, temperature sensors, and motion detectors.

Physical Controls

Identify the 3 major types of controls that organizations can use to protect their information resources:

Physical, Access, Communications

What is a negative societal effect of IT?

Places employees on constant call

_____ portals automate the business processes involved in purchasing products between a single buyer and multiple suppliers.

Procurement

According to Porter's Value Chain Model, what are considered support activities?

Product and Technology Development Procurement

Which of the following are examples of extended intercompany processes? -Asset management, supply chain management, supplier relationship management -Human capital management, supply chain management, supplier relationship management -Product life cycle management, supply chain management, supplier relationship management -Product life cycle management, asset management, customer relationship management

Product life cycle management (PLM), supply chain management (SCM), supplier relationship management (SRM), and also customer relationship management (CRM)

Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can't use it. Her decision reflects which ethical issue related to IT?

Property (such as intellectual property)

In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.

Protocols

A(n) _____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.

Proxy Server

Which of the following documents are associated with the fulfillment process? Purchase order, picking document, packing list Customer inquiry, quotation, customer invoice Quotation, packing list, vendor invoice Bill of materials, quotation, vendor invoice

Purchase order, picking document, packing list

A standardized language used to manipulate data is _____.

Query-by-example language

The core capabilities of computer-based information systems include (check all that apply):

Quick access to information -High-speed calculations -Staging and processing of large amounts of data

The technology that uses radio waves to identify individual items is:

Radio frequency identification

Which of the following is not an advantage of radio?

Radio waves do not create electrical interference problems.

The technology that uses radio waves to identify individual items is

Radio-Frequency Identification

The generic term for technologies that use radio waves to automatically identify individual items is __________.

Radio-frequency identification

key indicator reports

Reports that provide a summary of critical information on a recurring schedule

Which of the following statements concerning the difficulties in protecting information resources is not correct? a) Computing resources are typically decentralized. b) Computer crimes often remain undetected for a long period of time. c) Rapid technological changes ensure that controls are effective for years. d) Employees typically do not follow security procedures when the procedures are inconvenient. e) Computer networks can be located outside the organization.

Rapid technological changes ensure that controls are effective for years.

Which of the following are key data in a goods receipt?

Receipt date Order and Received quantity

Which of the following is the correct order of the Fulfillment Process?

Receive Customer Inquiry, Receive Customer Purchase Order, Create Sales Order, Prepare and Send Shipment, Create and Send Invoice, Receive Payment

Which of the following begins the fulfillment process? Receive customer inquiry Create & send quotation Create requisition Request production

Receive customer inquiry

A(n) _____ is a logical grouping of related fields. a)Byte b)Field c)Record d)File e)Database

Record

In the relational database model, related tables can be joined when they contain common ____.

Records

The goals of the IT overhaul at BP focused primarily on:

Reducing and reorganizing their IT spending.

Mobile Commerce (M-Commerce)

Refers to e-commerce (EC) transactions that are conducted in a wireless environment, especially via the Internet.

adhoc reports

Reports that are used to pull specific information from CHCS

Which of the following are key data in a purchase requisition when the requisition is first created?

Requested delivery date quantity of material requested

When faced with negative feedback, companies should:

Respond constructively and appropriately

A tenet of ethics in which you accept the consequences of your decisions and actions:

Responsibility

What are the three fundamental tenants of ethics?

Responsibility, Accountability, and Liability

Which of the following statements regarding the relationship between electronic commerce and search is not correct?

Retailers will provide fewer product details to avoid information overload for customers.

In ______ auctions, there is one buyer who wants to buy a product. Suppliers submit bids and the lowest bid wins.

Reverse

An auction in which one buyer, usually an organization, seeks to buy a product or service, and suppliers submit bids; the lowest bidder wins.

Reverse Auction

The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.

Rights

What are the 3 risk mitigation strategies?

Risk Acceptance, Risk Limitation, Risk Transference

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of

Risk Mitigation

In ___, the organization purchases insurance as a means to compensate for any loss.

Risk Transference

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of

Risk mitigation

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of Risk mitigation. Risk acknowledgement. Risk acceptance. All of these.

Risk mitigation

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of

Risk mitigation. ( Risk acknowledgement. Risk acceptance. All of these.)

What statement about IT's role in society is false?

Robots can handle unfamiliar situations

Businesses and organizations set up Web sites to:

Sell goods and services. Induce people to visit a physical location. Reduce operational and transaction costs. Enhance their reputation. All of the above.*

When organizations come to a company's Web site for procurement, such business is classified as a(n):

Sell-side Marketplace

When organizations come to a company's Web site for procurement, such business is classified as a(n):

Sell-side marketplace.

When organizations come to a company's Web site for procurement, such business is classified as a(n): a)Buy-side marketplace. b)Sell-side marketplace. c)Electronic exchange. d)None of these.

Sell-side marketplace.

Which of the following steps in the procurement process have a financial impact on the company that is buying the materials

Send payment to vendor Receives shipment from vendor

____________ act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.

Social marketplaces

Cards that contain a chip containing a large amount of information are:

Smart cards

Which of the following electronic payments is ideal for micropayments?

Smart cards

An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as: Trespass. Social engineering. Identity theft. Information extortion.

Social Engineering

_____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

Social Engineering

. Which of the following is false about social advertising? a) Social network sites have turned to advertising as a way to make revenue. b) Viral marketing is effective with social networking c) Social advertising removes peer pressure from the buying decision. d) Social advertisements are placed in paid-for media space by companies. e) Social apps support social interactions and are managed by a company to promote its brand.

Social advertisements are placed in paid-for media space by companies.

The number of connections you have within and between social networks is your:

Social capital

When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true?

Social computing generates faster and cheaper results.

When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true? • Social computing generates faster results but is more expensive. • Social computing generates faster and cheaper results. • Social computing takes longer but is less expensive. • Participation by customers is more limited when using social computing.

Social computing generates faster and cheaper results.

In a(n) ___ attack, the perpetrator tricks an employee into divulging confidential information.

Social engineering

In a(n) ___ attack, the perpetrator tricks an employee into divulging confidential information. Password Shoulder surfing Social engineering Tailgating

Social engineering

An unintentional attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information is known as:

Social engineering. ( Trespass. ; Social engineering. ; Identity theft. ; Information extortion.)

The monitoring, collection, and analysis of social generated data and the resultant strategic decisions is called:

Social intelligence

The primary key is a field that uniquely and completely identifies a record.

TRUE

____________ act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services. • Group shopping sites • Shopping Communities • Social marketplaces • Peer-to-peer shopping models

Social marketplaces

In today's business environment, it is rare for a company not to have a significant Web presence. This trend can be attributed primarily to:

Social responsibility. Technological pressures. Government regulations. ---->None of these.

List a business pressure and describe an IT response to it;

Societal/Political/Legal Pressures: An example is social responsibility, such as the state of the physical environment. Green IT is one response that is intended to improve the environment.

What are 2 IT components in CBIS?

Software and Database

BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. A. Leeching B. Collaboration C. Packet switching D. Torrents E. Swarming

Swarming

____ defines optical line rates, known as optical carrier (OC) signals. The base rate is 51.84 Mbps (OC-1), and higher rates are direct multiples of the base rate. For example OC-3 runs at 155.52 Mbps, or 3 times the rate of )C-1.

Synchronous Optical Network (SONET)

Radio FREQUENCY IDENTIFICATION TECHNOLOGY

System of tags which contain data that can be read from a distance using radio waves.

What is a way of monitoring the entire system in a company, by viewing the multiple inputs being processed to produce outputs?

Systems thinking

These circuits include: T1: (1.544 Mbps, equivalent to 24 channels) T2: (6.312 Mbps, equivalent to 96 channels) T3: (44.736 Mbps, equivalent to 672 channels) T4: (274.176 Mbps, equivalent to 4,032 channels)

T-Carrier System

____ is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call.

T-Carrier System

TAG

TAG is a DOS-based bulletin board system (BBS) software program, released from 1986 to 2000.

A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.

TRUE

A successfully implemented enterprise system should reduce errors, initiate processes more quickly, and execute processes more quickly. (T/F)

TRUE

Asset management is primarily concerned with machinery and computers in the company. (T/F)

TRUE

Competitive intelligence is legal, where industrial espionage is illegal.

TRUE

In the downstream segment of the supply chain, managers coordinate the receipt of orders from customers, develop a network of warehouses, select carriers to deliver their products to customers, and develop invoicing systems to receive payments from customers.

TRUE

NoSQL databases can process both structured and unstructured data.

TRUE

Normalization is a method for eliminating redundant data elements.

TRUE

One impact of IT will be to decrease the numbers of managers employed in organizations.

TRUE

One of the attributes in a record must be a primary key.

TRUE

One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications.

TRUE

Organizational databases access one record at a time, where data warehouses access groups of related records.

TRUE

Rogue access points can be set up by employees.

TRUE

Social ads are placed in paid-for media space on social networking Web sites.

TRUE

Social apps are online apps that promote social interaction

TRUE

Social computing fosters close customer relationships

TRUE

Social networks are helping marketing professionals understand who their customers are.

TRUE

The amount of data is increasing exponentially over time.

TRUE

The data dictionary defines the format necessary to enter data into a database.

TRUE

The opening case illustrates how e-commerce has increased (choose all that apply):

The volume of business transactions. The speed at which we do business.

The opening case illustrates how e-commerce has increased (choose all that apply):

The volume of business transactions.-The speed at which we do business.

Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. The Web site for the store is www.GalsTunes.net. Which of the following is true? a)Gal must be hosting his Web site on his own desktop computer based on its URL. b)The point-of-sale terminal cannot connect to the Internet. c)Gal must not be selling on his Web site because the top-level domain is "net" and not "com." d)The desktop computer must also be able to connect to the Internet in order for the notebook to access data from it. e) All of these are true.

The point-of-sale terminal cannot connect to the Internet.

Once a shipment has been sent, which document should be updated? The customer purchase order The sales order The quotation The packing list

The sales order

Near-Field Communications (NFC)

The smallest of the short-range wireless networks that is designed to be embedded in mobile devices such as cell phones and credit cards.

Wireless Application Protocol (WAP)

The standard that enables wireless devices with tiny display screens, low-bandwidth connections, and minimal memory to access Web-based information and services.

All of the following statements concerning wide-area networks are true except: A. They are provided by individual companies. B. They have large capacity. C. They cover large geographical areas. D. They combine multiple communications channels. E. The Internet is an example of a wide-area network.

They are provided by individual companies.

What is the benefit for companies that develop packaged applications? Spreading development cost across many customers They can be modified to suit specific needs They are more expensive to purchase None of the above

They can be modified to suit specific needs

Which of the following statements about wireless devices is not true?

They have strong security feature that make them impossible to hack.

Which of the following statements about wireless devices is not true? a)They are small enough to easily carry or wear. b)They have sufficient computing power to perform productive tasks. c)They have strong security feature that make them impossible to hack. d)They can communicate wirelessly with the Internet and other devices.

They have strong security feature that make them impossible to hack.

Fiber-optic cables are preferred over co-axial and twisted pair cables because:

They have very high bandwidth and offer higher security.

Personal firewalls perform all of the following functions except:

They should seek out the origin of malware in an attempt to block it in the future.

Which of the following is not a characteristic of DSS? a)They support only lower and middle-level managers. b)They are easy to use and construct. c)They can be adapted to changing conditions. d)They typically utilize quantitative models. e)They support all phases of the decision-making process.

They support all phases of the decision-making process.

Which of the following is not a characteristic of strong passwords? a) They are difficult to guess. b) They contain special characters. c) They are not a recognizable word. d) They are not a recognizable string of numbers e) They tend to be short so they are easy to remember.

They tend to be short so they are easy to remember.

A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.

Third-pary

A supply chain management system would need to connect to a supplier relationship management system in order to do which of the following? -To determine the most viable ideas for end development -To transfer raw materials requirements to be matched against current supplier information -To create demand for products -To create a wide base of interest in a product

To transfer raw materials requirements to be matched against current supplier information

Radio Transmission

Transmission that uses radio-wave frequencies to send data directly between transmitters and receivers. --Travel easily through normal office walls. --Fairly inexpensive and easy to install. --Can transmit data at high speeds

A list of football scores with the names of the teams that played the games would be considered information.

True

A manufacturing facility can produce 200 cellular phones in any given day. This would represent the facilities production capacity. (T/F)

True

A search engine that utilizes other search engines and integrates the results is a metasearch engine. True False

True

A student's decision to drop one course and add another would be considered a transaction to the university's information system but not to its accounting system.

True

A successfully implemented enterprise system should reduce errors, initiate processes more quickly, and execute processes more quickly. (T/F)

True

A supercomputer is the term given to the latest technology. True False

True

A systems analyst focuses on designing specifications for new technology.

True

An information system collects, processes, stores, analyzes, and disseminates information for a specific purpose using a computer

True

An informed user of IT can enhance his or her organization's competitive position.

True

An organization's supply chain starts at the supplier and ends at the customer.

True

Assembling is the process of taking a number of component materials and putting them together to produce the desired finished product. (T/F)

True

Asset management is primarily concerned with machinery and computers in the company. (T/F)

True

At the point when payment is received in the fulfillment process, accounts receivable experiences a decrease and there is an increase in cash. True False

True

Broadband refers to a network with a high transmission capacity. True False

True

Broadband refers to a network with a high transmission capacity. True False

True

Broadband refers to a network with a high transmission capacity:

True

Chapter 6 An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization. True or False?

True

Client/server computing relies heavily on network infrastructures such as LANs True False

True

Competitive intelligence is legal, where industrial espionage is illegal. True/False

True

Digital dashboards are special information systems that that support all managers of the organization

True

Distributed computing refers to the distribution of computing tasks among one or more computers. True False

True

Information is data that have been organized to provide value.

True

Information is the major component of the e-commerce offerings of service industries. True False

True

Information is the major component of the e-commerce offerings of service industries. True False

True

Information technology refers to computer-based tools used to support the needs of an organization

True

Neural networks are used to detect fraud in credit card transactions and insurance claims, to fight crime, and to gauge customer satisfaction. True False

True

One impact of IT will be to decrease the numbers of managers employed in organizations.

True

One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications.

True

One of the drawbacks of telecommuting is that telecommuting employees have a lower chance at being promoted than employees who work in the office. True False

True

Online analytical processing (OLAP) involves the analysis of accumulated data by end users. True False

True

Organizations depend on IT to facilitate their transition to the globalization of their operations.

True

Packing is the act of preparing the material for shipment in a suitable container. A packing list is created when the order is packed for shipment. True False

True

Service-oriented architecture allows companies to integrate multiple client-server systems together and make the result accessible via the internet. True False

True

Social computing fosters close customer relationships True/False

True

T/F A data warehouse is a repository of historical data that are organized by subject to support decision makers in the organization.

True

T/F A digital signal consists of a stream of digital bits.

True

T/F A search engine that utilizes other search engines and integrates the results is a metasearch engine.

True

T/F As we have progressed through the generations of cellular phones, their transmissions have evolved from analog to digital; their transmission speeds (bandwidth) have increased; and they transmit voice and data.

True

T/F Broadband refers to a network with a high transmission capacity.

True

T/F Claiming an Internet domain for five days at no cost and filling that site with ads is called domain tasting.

True

T/F Collaborative consumption allows strangers to make connections through peer-to-peer sharing.

True

T/F Companies often have to clean up the data before it can be imported into the data warehouse.

True

T/F DNS are a convenient alternative to the difficult-to-remember IP naming system for computers.

True

T/F Data updates in a data warehouse are performed by the MIS department, not the users.

True

T/F Distributed computing refers to the distribution of computing tasks among one or more computers.

True

T/F ER diagrams consist of entities, attributes, and relationships.

True

T/F Electronic commerce can be problematic in developing countries due to a lack of bandwidth and expense in accessing the Web.

True

T/F Electronic commerce gives customers access to a wider array of products and services than brick-and-mortar stores.

True

T/F Electronic commerce transactions conducted in a wireless environment, especially via the Internet, is called mobile commerce.

True

T/F Ethernet, packet switching, HTTP, and TCP/IP are all examples of network protocols.

True

T/F File sharing is a type of peer-to-peer processing.

True

T/F Governance of a data warehouse must be a collaboration between business users and IT personnel.

True

T/F In an ER diagram, relationships are expressed as diamonds and entities are expressed as boxes.

True

T/F In the United States, federal law requires companies to store, evaluate, and disclose financial data for fixed periods of time, even if the company no longer has any use for the data.

True

T/F In the sell-side marketplace, organizations sell their products or services to other organizations electronically from their private e-marketplace and/or from third-party Web site.

True

T/F Invisible "everywhere" computing embedded in objects is called pervasive computing.

True

T/F Knowledge management systems (KMS) are used by organizations to capture, store, and disseminate knowledge within the organization.

True

T/F Many employees have organized work groups usually social networking sites because their companies don't offer similar tools.

True

T/F Messages transmitted across the Internet are first divided into packets.

True

T/F NoSQL databases can manage more different types of data than a traditional relational database.

True

T/F Normalization is a method for eliminating redundant data elements.

True

T/F One impact of IT will be to decrease the numbers of managers employed in organizations.

True

T/F One of the big advantages of being an informed user and consumer of IT is that it enables you to anticipate future innovations and their potential applications.

True

T/F One of the drawbacks of telecommuting is that telecommuting employees have a lower chance at being promoted than employees who work in the office.

True

T/F Online analytical processing involves the analysis of accumulated data by end users.

True

T/F RFID tags and QR (quick response) codes designed to replace bar codes.

True

T/F Registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else is called cybersquatting.

True

T/F Satellite radio offers uninterrupted, near-CD quality music that is beamed to your radio from satellites.

True

T/F The ETL process is now typically called data integration.

True

T/F The amount of data is increasing exponentially over time.

True

T/F The buy-side marketplace is concerned with procurement.

True

T/F The data dictionary defines the format necessary to enter data into a database.

True

T/F The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

True

T/F The most common source system for a company's data warehouse is its corporate operational databases.

True

T/F The primary characteristic of auctions is that prices are determined dynamically by competitive bidding.

True

T/F The wireless transmission and receipt of data gathered from remote sensors is called telemetry.

True

T/F Thin clients depend on the network to be able to run applications.

True

T/F Unified communications simplifies and integrates all forms of communications on a common hardware and software platform.

True

T/F War driving is the act of locating wireless networks while driving around a certain area.

True

Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. Which type of media does he likely use to connect the point-of-sale terminal to the desktop?

Twisted pair-wire

The least expensive cable medium is:

Twisted-pair wire

Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c)URL address d) ISO/OSI identifier e)World Wide Web address

URL address

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments?

Ultra wideband

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments?

Ultra-wideband

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a)Wi-Fi b)Microwave c)Ultra-wideband d)Infrared e)Bluetooth

Ultra-wideband

What is _____ is not necessarily _____.

Unethical; Illegal

Are acts performed without malicious intent that nevertheless represent a serious threat to information security.

Unintentional Threats

In a database, the primary key field is used to ____.

Uniquely identify a record.

Tacit knowledge has which of the following characteristics?

Unstructured

Cellular telephones

Use radio waves to provide two-way communication. ****Communicates with radio antennas (towers) placed with adjacent geographic areas called "cells."***

Which of the following actions should you take to protect your portable devices and information?

Use two-factor authentication. Do not leave your portable devices in plain view in a car. Keep your portable devices in an inconspicuous container. Encrypt the hard drive of your laptop All of these

Second Generation (2G)

Uses digital signals for voice communication; it provides data communication up to 10 Kbps. 2.5G uses digital signals and provides voice and data communication up to 144 Kbps.

The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. A. Common good B. Fairness C. Rights D. Utilitarian E. Well-being

Utilitarian

In ____ a service provider makes resources and infrastructure management available to a customer as needed. a)Server farms b)Utility computing c)Grid computing d)None of these

Utility computing

In an e-credit card transaction, the clearinghouse plays the following role:

Validates and verifies the seller's payment information

In an e-credit card transaction, the clearinghouse plays the following role: a)Initiates the transfer of money b) Validates and verifies the seller's payment information c) Transfers funds between the seller's bank and the buyer's bank d)All of these.

Validates and verifies the seller's payment information

With _____, phone calls are treated as just another kind of data.

Voice over IP

___ exchanges connect buyers and sellers in one industry.

Vertical

Which type of electronic exchange connect buyers with sellers within a specific industry?

Vertical exchanges

Infrared Transmission

Very fast, large bandwidth; most common for tv/dvd remote controls; not visible to human eyes.

____ refers to online word-of-mouth marketing.

Viral Marketing

A _____ offers you the option of shopping online with a disposable credit card number.

Virtual credit card

A _____ offers you the option of shopping online with a disposable credit card number.

Virtual credit card (Credit card Debit card Driver's license Bank card )

Cards that can be used only once, with a different, random card number every time you shop online are:

Virtual credit cards

Segment of computer code that performs malicious actions by attaching to another computer program.

Virus

With _____, phone calls are treated as just another kind of data.

Voice over Internet Protocol

With _____, phone calls are treated as just another kind of data. a)Voice over Internet Protocol b)Chat rooms c)Teleconference d)All of these

Voice over Internet Protocol

With _____, phone calls are treated as just another kind of data.

Voice over internet protocol

An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.

Vulnerability, threat, exposure

An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks. • Vulnerability, threat, exposure • Vulnerability, security, threat • Threat, vulnerability, liability • Threat, vulnerability, exposure

Vulnerability, threat, exposure

An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks.

Vulnerability, threat, exposure (Vulnerability, security, threat; Threat, vulnerability, liability; Threat, vulnerability, exposure)

For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.

WPA2, WEP

Which of the following demonstrates a company that has implemented a low cost, broad market strategy?

Walmart

The act of locating wireless local area networks while moving around a city is called ____.

War driving

Which of the following are examples of instance level information relevant to the procurement process?

Was the invoice paid? If so when? How long did it take to receive the shipment after creating a purchase order? What was the total of the invoice?

Which of the following are examples of instance-level information relevant to the fulfillment process?

Was the invoice paid? If so, when? How long did it take to send the shipment after creating a sales order? What was the total of the sales order?

_____ are applications, delivered over the Internet, that use shared protocols to interoperate without human intervention.

Web Services

_____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence

a) Data isolation

Which of the following technologies is(are) used by analytic CRM systems?

a) Data warehouses and data mining b) Decision support systems c) Transaction processing systems

The popularity of online classes and online universities can be attributed to which of the following network applications?

a) Discovery b) Communications c) Collaboration

Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated.

a) Providing information on each record.

Refer to Opening Case #1 - Facebook Commerce: Which of the following is true about Facebook commerce?

a) Shoppers can make purchases without leaving Facebook.

Refer to Opening Case - Big Data. Which of the following is not a problem created by "Big Data"? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can't handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated.

a) The data is not reliable.

_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases

a) Transaction data, master data

Key features of transaction processing systems include:

a) dependability b) reliability c) processing capacity

As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. a) instance b) individual c) representative d) entity e) relationship

a) instance

Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services.

a) intermediaries

Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous

a) objective

Networks enable which of the following applications?

all - Discovery - Communications - Collaboration

The popularity of online classes and online universities can be attributed to which of the following network applications?

all - Discovery - Communications - Collaboration

Global outsourcing helps an organization to:

all - Find the best person for the job.- Find more economical resources. - Implement spatial and temporal flexibility.

Refer to IT's About Business 5.3 - Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. b) to provide a complete view of the customer. c) to enhance its marketing campaigns d) to provide business users access to business-wide data. e) to determine where to place its slot machines.

a) to process transactions faster.

Fiber-optic cables are preferred over co-axial and twisted pair cables because (choose all that are correct): a) Fiber optic cables offer higher security. b) Fiber optic cables are less difficult to tap. c)Fiber optic cables are susceptible to interference. d)Fiber optic cables have very high bandwidth.

a)Fiber optic cables offer higher security. d)Fiber optic cables have very high bandwidth.

Which of the following can be classified as unintentional threats to information systems caused by human errors?

a. Selecting a weak password (b. Revealing your password ; c. Leaking company data to others ; d. Both (a) and (b); e. None of these )

_____ issues involve who may obtain information and how much they should pay for this information.

accessibility

Where in a domain name do you find the top-level domain (TLD)?

all the way to the right

customer touching CRM applications

applications where customers interact directly with these technologies and applications

Master data

are a set of core data that span all of an enterprise's information systems.

The data in a data warehouse:

are not updated.

The data in a data warehouse have which of the following characteristics?

are organized by subject

Secondary keys

are other field that have some identifying information but typically do not identify the file with complete accuracy

Best practices

are the most effective and efficient ways of doing things

A business strategy achieves a specific set of goals which include _________.

attracting new customers, developing new products or services

Access controls consist of ____, which confirms user identity, and ____, which determines user access levels.

authentication, authorization ( access, privileges authorization, privileges passwords, privileges )

You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence

b) Data inconsistency

A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File e) Database

b) Field

Place the following members of the data hierarchy in the correct order:

bit - byte - field - record - file - database

Lisa Kelling is able to use her business's Facebook page to do the following:

c) Let customers place orders online

A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database

c) Record

The monitoring, collection, and analysis of socially generated data is called

c) Social intelligence

Workflow, groupware, and telepresence systems are examples of which network application? Discovery Communications Collaboration None of these

collaboration

Fiber-Optic Cable

consists of thousands of very thin filaments of glass fibers that transmit information via light pulses generated by lasers. The fiber-optic cable is surrounded by cladding, a coating that prevents the light from leaking out of the fiber. Smaller, lighter, most expensive, fastest, used for the backbone while others are used for individual devices.

In this type of e-commerce, buyers and sellers are individuals.

consumer-to-consumer

eBay is an example of which type of e-commerce?

consumer-to-consumer

With regard to mobile computing, _____ mean(s) that it is easy and fast to access the Web and other mobile devices.

convenience and instant connectivity

Making and distributing information goods to which you do not own the ___ is referred to as ____.

copyright, piracy ( intellectual property, piracy; copyright, appropriation; intellectual property, theft)

Rank the following in terms of dollar value of the crime, from highest to lowest. a) robbery - white collar crime - cybercrime b) white collar crime - extortion - robbery c) cybercrime - white collar crime - robbery d) cybercrime - robbery - white collar crime e) white collar crime - burglary - robbery

cybercrime - white collar crime - robbery

Place the following members of the data hierarchy in their correct order: a) Bit - byte - field - record - database - file b) Bit - field - byte - record - file - database c) Byte - bit - record - field - database d) Bit - byte - field - record - file - database e) Bit - record - field - byte - file -- database

d) Bit - byte - field - record - file - database

_____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence

d) Data redundancy

A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File e) Database

d) File

The reliability of the content in Wikipedia, the online encyclopedia, is questionable because

d) It is difficult to test the authenticity of the content due to the fact that anyone can contribute content.

_____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts c) Databases d) Master data management e) Enterprise information management

d) Master data management

A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) query-by-example language d) structured query language e) data-manipulation language

d) structured query language

In the relational database model, related tables can be joined when they contain common _____. a) primary keys b) rows c) records d) columns e) files

d) columns

At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one b) one-to-many c) many-to-one d) many-to-many e) some-to-many

d) many-to-many

Data Hierarchy

data, information, knowledge, wisdom

A(n) _____ provides rapid access to timely information and direct access to management reports.

decision support system

Key features of transaction processing systems include:

dependability reliability processing capacity

Refer to Closing Case - CoStar Group. The target audience for CoStar's aggregated commercial real estate data was a) banks. b) building owners. c) real estate agents. d) builders. e) All these

e) All these

Refer to IT's About Business 5.2 - Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. b) data for some cell phones are inaccurate. c) very few Mexicans can afford cell phones. d) All of these e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."

e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."

In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart's sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week

e) Product, store, and week

Building relationships, anticipating needs, and providing special deals for the community's members is a function of which category of Web 2.0 applications?

e) Social commerce

So You Want to Find a Job: Which of the following is a benefit of searching for a job online?

e) Social networking can help personalize the search.

Many companies are using ________ to capture updated product features and specifications.

e) Wikis

Which of the following is not a disadvantage of telecommuting for employees?

fewer opportunities for housebound people

Which of the following accounts are affected by a shipment of goods to a customer?

finished goods inventory accounts receivable cost of goods sold

In _____, needed services such as temporary help or extra space are traded on an as-needed basis.

functional exchanges

An important trend is the combination of geographical information systems with _____ to form geospatial technologies.

global positioning systems

campaign management system

guides users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis

Coaxial Cable

insulated copper wire, less susceptible to electrical interference, carries more data, used for cable, more expensive, somewhat inflexible.

enterprise resource planning

integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprisewide information on all business operations

mobile CRM systems

interactive systems where communications related to sales, marketing, and customer service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers

A database management system is primarily a(n) _____.

interface between application and a database

The _____ is a global wide-area network that connects approximately 1 million organizational computer networks.

internet

_____ are Internet access points that are located in public places, such as libraries and airports.

internet kiosks

ERP II systems

interorganizational ERP systems that provide Web-enabled links between a company's key business systems (such as inventory and production) and its customers, suppliers, distributors, and others

Which of the manager's roles do modern information systems support?

interpersonal roles, informational roles, and decisional roles

Data model

is a diagram that represents the entities in the database and their relationships

SOCIAL ADVERTISING

is a form of online advertising that uses social media channels to deliver targeted commercial messages to potential customers.

Field

is a group of logically related characters (e.g., a word, small group of words, or identification number).

Record

is a group of logically related fields (e.g., student in a university database).

File (or table)

is a group of logically related records

Normalization

is a method for analyzing and reducing a relational database to its most streamlined form for Minimum redundancy, Maximum data integrity, Best processing performance

Attribute

is a particular characteristic or quality of a particular entity

Entity

is a person, place, thing, or event about which information is maintained. A record generally describes an entity.

Knowledge management (KM)

is a process that helps organizations manipulate important knowledge that is part of the organization's memory, usually in an unstructured format.

Master data management

is a process that spans all of an organization's business processes and applications.

procurement process

is a series of steps that a COMPANY takes to obtain or acquire necessary materials from WAREHOUSE:

Database management system (DBMS)

is a set of programs that provide users with tools to add, delete, access, and analyze data stored in one location.

Data governance

is an approach to managing information across an entire organization.

Relational database model

is based on the concept of two-dimensional tables.Allows or faster searches

If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____.

knowledge

You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using _____ to select your class schedule.

knowledge

Which of the following factors is not increasing the threats to information security? a) smaller computing devices b) downstream liability c) the Internet d) limited storage capacity on portable devices e) due diligence

limited storage capacity on portable devices

Explicit knowledge

objective, rational, technical knowledge that has been documented. Examples: policies, procedural guides, reports, products, strategies, goals, core competencies

Business environment pressures can come from

political changes Social factors Economic factors Legal factors

When data are normalized, attributes in the table depend only on the _____. a)secondary key b)common attribute c)primary key d)common row e)common record

primary key

A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service.

smart phone

Facebook is a__________.

social networking site

The digital divide is an example of which type of societal pressure?

social responsibility

In a database, the primary key field is used to _____.

uniquely identify a record

When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be: a)undocumented b)structured c)unstructured d)semistructured e)documented

unstructured

Enterprise resource planning systems

use a common data base for all functional areas

Enterprise resource planning systems

use a common database for all functional areas.

What is the purpose of entering the amount from the invoice?

verification that the amount invoiced matches the amount ordered and received

The type of cloud used to build cloud infrastructure and applications for different businesses is called a ________ cloud.

vertical

With _____, phone calls are treated as just another kind of data.

voice over IP

Random access memory is _____ and _____.

volatile; temporary

A transmitter with an antenna that connects a mobile device to a wired local area network is called a(n):

wireless access point

An organization's e-mail policy has the least impact on which of the following software attacks? a) virus b) worm c) phishing d) zero-day e) spear phishing

zero-day

Data warehouses and Data Marts

• A data warehouse is a repository of historical data organized by subject to support • Organized by business dimension or subject • Multidimensional • Historical data in data warehouses can be used for identifying trends, forecasting, and making comparisons over time • Use online analytical processing (OLAP) involves the analysis of accumulated data by end users (usually in a data warehouse).

Difficulties in managing data:

• Amount of data increasing exponentially • Data are scattered throughout organizations and collected by many individuals using various methods and devices. • Data come from many sources. • Data security, quality, and integrity are critical.

Database management system (DBMS) minimize the following problems:

• Data redundancy The same data are stored in many places • Data isolation Applications cannot access data associated with other applications. • Data inconsistency Various copies of the data do not agree • Data security: Keeping the organization's data safe from theft, modification, and/or destruction. • Data integrity: Data must meet constraints (e.g., student grade point averages cannot be negative). • Data independence: Applications and data are independent of one another.

entity-relationship (ER) modeling.

• ER diagrams: consists of entities, attributes and relationships. • Entity: classes are groups of entities of a certain type • Instance: of an entity class is the representation of a particular entity • Identifiers: are attributes that are unique to that entity instance

Benefits of Data Warehousing

• End users can access data quickly and easily via Web browsers because they are located in one place. • End users can conduct extensive analysis with data in ways that may not have been possible before. • End users have a consolidated view of organizational data.


Ensembles d'études connexes

Business Law~ Chapter 4: Constitutional Law

View Set

Physiology: The Muscular System Extra Info

View Set

Ch 22 - Psychotherapeutic Agents

View Set