MIS 301 exam chapters 2-5
fulfillment processes
(1)customer purchase order (2)received by the sales department (create sales order, communicates data, tracks progress) (3)The warehouse prepares and sends shipment (4)accounting notified of shipment, creates an invoice & sends to customer (5) customer pays/accounting records
define phase
-BPI team documents existing "as is" process activities, resources, inputs and outputs (usually graphical process map/diagram) -also documents the customer and their requirements for process output, w/ description of problem to be addressed
measure phase
-BPI team identifies process metrics (time, cost) to generate one output (product/service) -collects data to understand how metrics evolve over time --Sometimes the data already exists (so extract from IS supporting the process) --usually: BPI team needs to combine operational process data already stored in the company's IS systems with other data sources (like customer and employee observations, interviews, surveys)
five key factors are contributing to the increasing vulnerability of organizational information resources, making it much more difficult to secure them:
1.Today's interconnected, interdependent, wirelessly networked business environment 2.Smaller, faster, cheaper computers and storage devices 3.Decreasing skills necessary to be a computer hacker 4.International organized crime taking over cybercrime 5.Lack of management support
_________ is a physical control. A company gate Encryption A firewall VPN
A company gate
distributed denial of service (DDoS) attack
A denial of service attack that sends a flood of data packets from many compromised computers simultaneously.
_________ is an access control. A company gate Encryption A firewall RFID
A firewall
data mart
A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department.
business process management
A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
authentication
A process that determines the identity of the person requiring access.
knowledge management (KM)
A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory and that typically reside within the organization in an unstructured manner.
master data management
A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core master data.
risk mitigation
A process whereby an organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.
business process reengineering
A radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a "clean sheet" (i.e., from scratch).
data warehouse
A repository of historical data that are organized by subject to support decision makers in the organization.
Microsoft ________ is a popular example of a relational database. Access Excel PowerPoint Word
Access
________ controls restrict unauthorized individuals from using information resources. Access Communications Physical Useful
Access
_________ controls restrict unauthorized individuals from using information resources. Access Communications Physical Useful
Access
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Additional management support Decreasing skills necessary to be a computer hacker International organized crime taking over cybercrime Smaller, faster, cheaper computers and storage devices Today's interconnected, interdependent, wirelessly networked business environment
Additional management support
data governance
An approach to managing information across an entire organization.
_________ is an example of efficiency. Automating order entry Increasing customer satisfaction Improving product quality Reducing employee turnover Answer: a
Automating order entry
Six Sigma is a popular _________ technique. BPC BPI BPM BPR
BPI
_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs. BPC BPI BPM BPR
BPI
analysis phase
BPI team examines "as is" process map & collected data to identify problems with the process (e.g., decreasing efficiency or effectiveness) & root causes -- team should benchmark process; (compare its performance w/ similar processes in other companies or other areas of org. organization. -can use statistical analysis software or simulation packages
improve phase
BPI team identifies possible solutions, maps resulting "to be" process alternatives, & selects/implements the most appropriate solution. Common improvements--eliminating process activities not adding value to output, rearranging activities to reduce delay/improve resource use cannot remove controls tho that guarantee the accuracy of its financial reporting, and ensure adherence to rules and regulations.
_________ integrates disparate BPI initiatives to ensure consistent strategy execution. BPC BPM BPR BPS
BPM
Many organizations find _________ too difficult, too radical, too lengthy, and too comprehensive. BPC BPI BPM BPR
BPR
issues with big data
Big Data Can Come from Untrusted Sources. Big Data Is Dirty- inaccurate, incomplete, incorrect, duplicate, or erroneous data. Big Data Changes, Especially in Data Streams.
alien software
Clandestine software that is installed on your computer through duplicitous methods.
_________ involves companies providing standard specifications for different consumer groups. Configured mass customization Consumer segmentation Mass customization Mass production
Consumer segmentation
_________ involves companies providing standard specifications for different consumer groups. Group of answer choices Configured mass customization Consumer segmentation Mass customization Mass production
Consumer segmentation
_________ is a challenge of BYOD. Control Cost Productivity Satisfaction
Control
access controls .
Controls that restrict unauthorized individuals from using information resources and are concerned with user identification
_________ is the result of optimizing operations and supplier processes. Cost reduction Differentiation Productivity Quality
Cost reduction
Which of the following is NOT an organizational response to business pressures? Creating a digital divide Developing strategic systems Focusing on customer wants Mass customization
Creating a digital divide
identity theft
Crime in which someone uses the personal information of others to create a false identity and then uses it fraudulently.
Which of the following has the strategy "I treat my customers better than you do"? Cost leader Customer oriented Differentiation Innovation Operational effectiveness
Customer oriented
_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires. Customer satisfaction Differentiation Productivity Quality
Customer satisfaction
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Cyberterrorism Espionage Identity theft
Cyberterrorism
_________ is the result of optimizing the manufacturing and logistics processes. Cost reduction Cycle and fulfillment time reduction Productivity Quality
Cycle and fulfillment time reduction
Hackers would use a botnet to perform a _________. DDoS a logic bomb a Trojan horse virus
DDoS
A(n) _________ is located between two firewalls. anti-malware system DMZ ERP spamware detector
DMZ
relational database model
Data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.
unstructured data
Data that do not reside in a traditional relational database.
which of the following has the strategy "I am better because I am different"? Cost leader Customer oriented Differentiation Innovation Operational effectiveness
Differentiation
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver. Authorization Blacklisting Encryption Firewalling
Encryption
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. Alien software Espionage Identity theft Information extortion
Espionage
_________ is the second step in the general framework for ethics. Act and reflect on the outcome of your decision Evaluate alternative actions Get the facts Recognize an ethical issue
Get the facts
social engineering
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.
_________ is NOT an example of a data aggregator. Acxiom ChoicePoint Google LexisNexis
Operational effectiveness strategy
Improve the manner in which a firm executes its internal business processes so that it performs these activities more effectively than its rivals. Such improvements increase quality, productivity, and employee and customer satisfaction while decreasing time to market.
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Increasing skills necessary to be a computer hacker International organized crime taking over cybercrime Lack of management support Smaller, faster, cheaper computers and storage devices Today's interconnected, interdependent, wirelessly networked business environment
Increasing skills necessary to be a computer hacker
_________ is a technology pressure. Globalization Information overload Protection against terrorist attacks Reducing the digital divide
Information overload
knowledge management systems (KMSs)
Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management.
Which of the following has the strategy "I'm doing something new and you can't catch up"? Cost leader Customer oriented Differentiation Innovation Operational effectiveness
Innovation
Which of the following reduces buyer power? Globalization Loyalty programs Intermediation Internet searching
Loyalty programs
malware
Malicious software such as viruses and worms.
_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers. Group of answer choices Configured mass customization Consumer segmentation Mass customization Mass production
Mass customization
_______ are a set of core data that span the enterprise information systems. Data governance Master data Master data management Transaction data
Master data
________ are a set of core data that span the enterprise information systems. Data governance Master data Master data management Transaction data
Master data
cross-functional processes
No single functional area is responsible for a process's execution.
Which of the following is NOT an example of excellent alignment? a- Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams. b- Organizations view their internal and external customers and their customer service function as supremely important. c- Organizations rotate business and IT professionals across departments and job functions. d- Organizations allow IT employees to develop overarching goals for the business. e- Organizations ensure that IT employees understand how the company makes or loses money. f- Organizations create a vibrant and inclusive company culture.
Organizations allow IT employees to develop overarching goals for the business.
basic characteristics of data warehouses and data marts
Organized by business dimension or subject. Use online analytical processing Integrated Time variant. Nonvolatile (users cant update/change the data) Multidimensional
_________ are the product or service created by the process. Employees Inputs Outputs Resources
Outputs
entry barrier
Product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete.
_________ is the result of optimizing each individuals' work processes. Cycle and fulfillment time reduction Differentiation Productivity Quality
Productivity
_________ is a societal pressure. Globalization Information overload Protection against terrorist attacks Technological innovation and obsolescence
Protection against terrorist attacks
_________ are people and equipment that perform process activities. Employees Inputs Outputs Resources
Resources
_________ means that you accept the consequences of your decisions and actions. Accountability Answerability Liability Responsibility
Responsibility
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack. alien software espionage SCADA virus
SCADA
_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith. Espionage Sabotage SCADA attacks Software attacks
Sabotage
_________ is an unintentional threat. Espionage Identity theft Social engineering Software attacks
Social engineering
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. Adware Marketware Spamware Spyware
Spamware
multidimensional structure
Storage of data in more than two dimensions; a common representation is the data cube.
tacit knowledge
The cumulative store of subjective or experiential learning, which is highly personal and hard to formalize.
explicit knowledge
The more objective, rational, and technical types of knowledge.
make-to-order
The strategy of producing customized products and services.
Which of the following is a property issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? How much should companies charge for permitting access to information in their databases? Under what circumstances can one use proprietary databases? What information about individuals should be kept in databases, and how secure is the information there?
Under what circumstances can one use proprietary databases?
Which of the following is a privacy issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? How much should companies charge for permitting access to information in their databases? Under what circumstances can one use proprietary databases? What information about individuals should be kept in databases, and how secure is the information there?
What information about individuals should be kept in databases, and how secure is the information there?
Careless Internet surfing is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional
a human error; unintentional
You don't lock your computer when you go to the restroom. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional
a human error; unintentional
You lose the company's USB with your sales spreadsheets on it. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional
a human error; unintentional
You never wipe the dust off your computer. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional
a human error; unintentional
You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional
a human error; unintentional
Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting _________ for your actions. accountability answerability liability responsibility
accountability
Procurement processes completed by
accounting, purchasing warehouse
When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the _________ phase of BPI. analysis control define improve measure
analysis
Sabotage and vandalism
are deliberate acts that involve defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith
Piracy costs businesses _________ of dollars per year. hundreds millions billions trillions
billions
Which of the following is an accurate representation of the data hierarchy from smallest to largest? bit, byte, field, record, file, database bit, byte, field, file, record, database byte, bit, field, record, file, database byte, bit, field, file, record, database
bit, byte, field, record, file, database
byod
bring your own device, employees using own devices for work related things
You live in a small town with only one large retailer. This means there is low ______. buyer power supplier power threat of new entrants threat of substitutes
buyer power
A ________ is a group of eight ________. bit; bytes byte; bits field; files file; fields
byte; bits
A _________ site is the least expensive option. cold hot medium warm
cold
A _________ site provides only rudimentary services and facilities. cold hot medium warm
cold
configured mass customization
companies offer features that allow each shopper to customize his or her product or service with a range of components
In the _________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable. analysis control define improve measure
control
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period. copyright patent trade secret trademark
copyright
Walmart's strategy is _________. cost leader customer oriented differentiation innovation
cost leader
KMS cycle
create knowledge capture knowledge refine knowledge store knowledge manage knowledge disseminate knowledge
In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs. analysis control define improve measure
define
The correct order of the BPI phases is ___________. analyze, control, define, measure, improve analyze, define, control, improve, and measure define, analyze, measure, control, improve define, measure, analyze, improve, and control
define, measure, analyze, improve, and control
BPI 5 Basic Phases
define, measure, analyze, improve, and control (DMAIC).
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. common good deontology fairness rights
deontology
Authorization
determines which actions, rights, or privileges the person has, based on his or her verified identity
If you have to speak into your phone to unlock it, this is an example of something the user _________. does has is knows
does
The threat of new competitors will enter your market is high when entry is _________ and low when there are _________ barriers to entry. easy; few easy; significant hard; few hard; significant
easy; significant
Two fundamental metrics that organizations employ in assessing their processes to evaluate how well they are executing these processes
efficiency and effectiveness
The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. exposure risk threat vulnerability
exposure
The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach. common good deontology fairness rights
fairness
A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks. anti-malware system DMZ ERP firewall
firewall
BPI- Business Process Improvement
focuses on reducing variation in the process outputs by searching for root causes of the variation in the process itself (e.g., a broken machine on an assembly line) or among the process inputs (e.g., a decline in the quality of raw materials purchased from a certain supplier).
The ________ creates links between two tables. alien foreign primary secondary
foreign
Organization's use Porter's competitive forces model to design _________ strategies; they use the value chain model to identify _________ activities to make the greatest impact. general; general general; specific specific; general specific; specific
general; specific
American companies can easily do business with Chinese companies. This is phenomenon is called ________. globalization information overload protection against terrorist attacks technological innovation and obsolescence
globalization
_________ is a market pressure. globalization information overload protection against terrorist attacks technological innovation and obsolescence
globalization
Buyer power is _________ when buyers have many choices from whom to buy and _________ when buyers have few choices. high; high high; low low; high low; low
high; low
The threat from rivalry is _________ when there is intense competition among many firms in an industry and _________ when competition is not as intense. high; high high; low low; high low; low
high; low
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. cold hot medium warm
hot
In the _________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution. analysis control define improve measure
improve
When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI. analysis control define improve measure
improve
Database systems minimize ________. inconsistency independence integrity security
inconsistency
_________ is an example of effectiveness. Automating order entry Increasing customer satisfaction Reducing production time by one day Using RFID to track products
increasing customer satisfaction
Intellectual property
is the property created by individuals or corporations that is protected under trade secret, patent, and copyright laws.
BPI is typically performed by ___________. clerical workers executives knowledge workers low-level managers
knowledge workers
Typing in your password to access a system is an example of something the user _________. does has is knows
knows
rights approach
maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
If there are _________ alternatives to an organization's products or services, then the threat of substitutes is high; if there are _________ alternatives, then the threat is low. few; few few; many many; few many; many
many; few
Ford's original strategy was _________. configured mass customization consumer segmentation mass customization mass production
mass production
In the _________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time. analysis control define improve measure
measure
Information extortion
occurs when an attacker either threatens to steal, or actually steals, information from a company
Espionage or trespass
occurs when an unauthorized individual attempts to gain illegal access to organizational information.
You decide to integrate your supply chain to cut down production time. This is an example of a(n) _________ strategy. cost leader customer oriented differentiation innovation operational effectiveness
operational effectiveness
The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. opt-in opt-out sign-up sign-out
opt-in
the _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. opt-in opt-out sign-up sign-out
opt-in
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. opt-in opt-out sign-up sign-out
opt-out
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control. access communication physical useful
physical
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. piracy; legal piracy; illegal social engineering; legal social engineering; illegal
piracy; illegal
The ________ key is an identifier field that uniquely identifies a record. alien foreign primary secondary
primary
Intellectual property is NOT protected under _________ laws. copyright patent privacy trade secret
privacy
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking. private; private private; public public; private public; public
public; private
Fulfillment processes are NOT completed by __________. accounting purchasing sales warehouse
purchasing
A ________ generally describes an entity. byte field file record
record
Procurement processes are NOT completed by _________. accounting purchasing sales warehouse
sales
The ________ key has some identifying information but does not identify the record with complete accuracy. alien foreign primary secondary
secondary
Compliance with government regulations is a _________ pressure. market societal technology nonexistent
societal
Your business manufactures motors. Based on prices and shipping, you only have one business as an option to buy bearings. This means there is high _________. buyer power supplier power threat of new entrants threat of substitutes
supplier power
control phase
team establishes process metrics and monitors improved process after the solution implemented to ensure the process performance remains stable
The BYOD phenomenon is a _________ pressure. market societal technology nonexistent
technology
A(n) _________ to an information resource is any danger to which a system may be exposed. exposure risk threat vulnerability
threat
The music and newspaper industries were hurt primarily by _________. buyer power supplier power threat of new entrants threat of substitutes
threat of substitutes
Auditing _________ the computer means auditors check inputs, outputs, and processing. around into through with
through
A _________ is an intellectual work that is not based on public information. copyright patent trade secret trademark
trade secret
A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization. trusted; trusted trusted; untrusted untrusted; trusted untrusted; untrusted
trusted; untrusted
The relational database model is based on the concept of ________-dimensional tables. one two three four
two
If humans are careless with laptops, this is an _________ error which could cause theft of equipment or information (an _________ error) . intentional; intentional intentional; unintentional unintentional; intentional unintentional; unintentional
unintentional; intentional
Minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a _________ approach. You Answered common good deontology rights utilitarian
utilitarian
The _________ approach states that an ethical action is the one that provides the most good or does the least harm. common good deontology fairness utilitarian
utilitarian
Big Data three distinct characteristics:
volume, velocity, and variety
An information resource's _________ is the possibility that the system will be harmed by a threat. exposure risk threat vulnerability
vulnerability
Auditing _________ the computer means using a combination of client data, auditor software, and client and auditor hardware. around into through with
with
Big Data
•Exhibit variety; •Include structured, unstructured, and semi-structured data; •Are generated at high velocity with an uncertain pattern; •Do not fit neatly into traditional, structured, relational databases; and •Can be captured, processed, transformed, and analyzed in a reasonable amount of time only by sophisticated information systems.
Big Data generally consists of the following:
•Traditional enterprise data—examples are customer information from customer relationship management systems, transactional enterprise resource planning data, web store transactions, operations data, and general ledger data. •Machine-generated/sensor data—examples are smart meters; manufacturing sensors; sensors integrated into smartphones, automobiles, airplane engines, and industrial machines; equipment logs; and trading systems data. •Social data—examples are customer feedback comments; microblogging sites such as Twitter; and social media sites such as Facebook, YouTube, and LinkedIn. •Images captured by billions of devices located throughout the world, from digital cameras and camera phones to medical scanners and security cameras.