MIS 309 Posey Ole Miss Test 1 Excel Terms + CH 1-6, MIS 309 posey test 2, MIS 309 Posey Chapters 10-12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

business analyst

A __________________ is a person who is well versed in organizational strategy and system alignment theory, and who also understands the proper role for technology.

Technical writer

A __________________ prepares program documentation, help-text, procedures, job descriptions, and training materials.

phisher

A __________________ pretends to be a legitimate company and sends an email requesting confidential data, such as account number Social Security numbers, account passwords, and so forth.

Gantt Chart

A __________________ shows the tasks, start and finish dates, and dependencies for the tasks of a project.

system analyst

A __________________ work with users to determine system requirements, designs and develop job descriptions and procedures, and helps determine test plans

worm

A(n) __________________is a type of virus that propagates using the Internet or other computer networks.

Which of the following is an example of IaaS?

Amazon EC2

documents the current situation of a business process

An as-is model

Repository

An inventory or a database is an example of a(n) _____________ which is defined as a collection of something

Which of the following is true of unsupervised data mining?

Analysts do not create a model or hypothesis before running the analysis.

Which of the following is a mobile operating system licensed by Google?

Android

"FIle"

Anything you can do with a file

________ is a wireless protocol designed for transmitting data over short distances, replacing cables.

Bluetooth

Andrea, the floor supervisor at a call center, calls Bryan, a call attendant, to her office. She reports observing a few critical omissions in his calls, a finding supported by recent customer surveys. Bryan feels that Andrea is just throwing her weight around. Which of the following is a valid observation of this scenario?

Bryan needs to learn to receive feedback.

________ is the activity of altering and designing business processes to take advantage of new information systems.

Business process reengineering

Which of the following is the smallest data element in a database?

Byte

Bits are grouped into 8-bit chunks called

Bytes

A student team, which is assigned a term project, meets and divides the work into sections and then team members work independently on their individual pieces. An hour before the project is due the team members meet again to assemble their independent pieces into a whole. Which of the following is lacking in this activity?

Collaboration

________ is the activity of two or more people working together to achieve a common goal, result, or work product.

Collaboration

________ occurs when a group of people working together to achieve a common goal via a process of feedback and iteration.

Collaboration

________ is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service.

Customer relationship management

Which of the following statements is true about data marts?

Data marts address only a particular component or functional area of a business.

A(n) ________ is a self-describing collection of integrated records.

Database

________ is the process of converting a data model into tables, relationships, and data constraints.

Database design

information systems

Developing, operating, and maintaining an organization's computing infrastructure is a major function of the __________________ department.

Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.

Development

Which of the following data elements is placed higher than records in the data hierarchy?

File

The tables that appear in a database are known as ________.

Files

) Project teams should document project results and learnings. Which of the following is the project management phase in which the teams perform this function?

Finalizing

Which of the following is an open source browser?

Firefox

________ is installed in special, read-only memory in devices like printers or communication devices.

Firmware

Which of the following statements is true of good information?

Good information should be based on correct and complete data.

The world's best-known indexing engine is operated by ________.

Google

Who pioneered Web 2.0 advertising?

Google

Which of the following statements is true about working with Google Docs?

Google tracks document revisions, with brief summaries of changes made.

________ is the most common language for defining the structure and layout of Web pages.

HTML

A(n) ________ is a notation used to define a data element, for display or other purposes, in Web pages.

HTML tag

Which of the following protocols is concerned with the application layer of TCP/IP Protocol architecture?

HTTP

Which of the following protocols guarantees secure data transmission?

HTTPS

Amazon S3 (Simple Storage Service) is an example of ________.

IaaS

Which of the following is the most basic cloud offering?

IaaS

Which of the following is a valid observation of MySQL?

It is license-free for most applications.

Which of the following statements is true about reporting applications?

Two important reporting applications are RFM analysis and OLAP.

Which of the following statements is true about IEEE 802.3?

It is the protocol for wired LAN connections.

Which of the following is the operating system designed by Apple?

Mac OS

Physical security procedures

Maintaining the computers that run a DBMS in a locked room is a part of ___________________.

Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.

Managerial

Project leaders have to take decisions on the allocation and utilization of materials and labor. Such decisions are called ________ decisions.

Managerial

Which of the following is a key difference between strategic decisions and managerial decisions?

Managerial decisions concern allocation and utilization of resources, whereas strategic decisions concern organizational issues

Identify a key difference between managerial decisions and operational decisions.

Managerial decisions concern the allocation of resources, whereas operational decisions concern day-to-day activities

honeypots

Many companies create ___________________ , which are false targets for computer criminals to attack.

Which of the following is a valid guideline for maintaining good password etiquette?

Never ask someone else for their password.

Which of the following is an example of a dynamic process?

Nike uses Facebook and Twitter to generate buzz about its new line of running shoes.

brute force

Nonword passwords are vulnerable to a __________________ attack, in which the password cracker tries every possible combination of characters.

________ is the process of converting a poorly- structured table into two or more well-structured tables.

Normalization

Which of the following best represents the value of social capital?

Number of Relationships * Relationship Strength * Entity Resources

An ________ and an OLAP report are the same thing.

OLAP cube

Which of the following observations about RFM and OLAP reports is true?

OLAP reports are more dynamic than RFM reports

system conversion

Once a system has passed integrated testing, the organization installs the new system. Which term is used to refer to this activity?

assess feasibility

Once we have defined a project's goal and scope, the next step is to __________________.

cap an organization's financial exposure

One of the reason outsourcing is undertaken is to __________________.

Which of the following statements is true of closed source projects?

Only trusted programmers are allowed to make changes to a closed source project.

Kyra, a plant supervisor, orders 500 units of Type-2 steel beams for the coming month. In doing so, she has made a(n) ________ decision.

Operational

The database administrator of an organization constantly manages the processing rights and responsibilities of employees. This is an example of a(n) ________ task.

Operational

________ decisions are decisions that support day-to-day activities.

Operational

________ decisions are the most structured and have very little need for collaboration.

Operational

You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action

The information that your secretary gave will be considered as good information.

________ is a standard for subscribing to content sources.

Real Simple Syndication (RSS)

U.S. Steel Corp. is a well known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?

SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

________ is an example of an interenterprise information system.

SCM

________ are the companies that operate the SM sites.

SM application providers

A(n) ________ is an IS that supports the sharing of content among networks of users.

SMIS

Which of the following TCP/IP application-layer protocols is used for e-mail transmission?

SMTP

Which of the following is an international standard language for processing a database?

SQL

Which of the following is an example of an enterprise DBMS?

SQL Server

Which of the following questions is best answered through unstructured decision making?

Should we continue to outsource our bookkeeping processes?

________ is an add-on to browsers that was developed by Microsoft and provides animation, movies, and other advanced graphics inside a browser.

Silverlight

Web storefronts

Sites like Amazon.com provide __________________ for product vendors and distributors who choose not to develop ther own online presence.

Which of the following is a characteristic of dynamic processes?

They are adaptive processes that change structure rapidly and readily.

Which of the following observations concerning expert systems is true?

They are difficult and expensive to develop.

Which of the following statements about enterprise information systems is true?

They are very difficult to change

Which of the following is true of N:M relationships?

They can have more than one entity on each side of the relationship.

Which of the following is a reason why discussion forums are better than emails in asynchronous communication?

They keep the discussion from getting off track.

Which of the following is true about cable modems?

They rely on high-capacity optical fiber cables and use their own protocols for data transmission.

Which of the following statements is true of defenders-of-belief communities?

They seek conformity and want to convince others of the wisdom of their belief.

Which of the following statements is true regarding departmental information systems?

They support 10 to 100 users.

Which of the following TCP/IP application-layer protocols is used to move files over the Internet and to maintain Web sites?

FTP

Free data communications and data storage will make collaboration systems cheaper and easier to use by 2022. Which of the following is the most likely consequence of this development?

Face-to-face (F2F) meetings will become very rare

In which of the following situations would the bargaining power of suppliers be highest? A) a single vendor providing raw materials to many department stores B) a fashion outlet catering to a niche market C) a bank liquidating during a fire sale D) a large retailer buying goods from many small suppliers

a single vendor providing raw materials to many department stores

model processes, create components, model processes; assess results

Which of the following is an accurate representation of the steps in a business process management cycle?

Salesforce.com

Which of the following is an example of a company that offers SaaS?

adware

Which of the following is an example of a sniffing technique?

deciding what customer data from the order-entry system will be shared with other organizations

Which of the following is an example of a system specific security policy?

firewalls

Which of the following is an example of a technical safeguard?

A loss of customer goodwill due to an outage

Which of the following is an example of an intangible consequence?

licensed software

Which of the following is an outsourcing alternative that provides hosted applications and data storage?

hacking of information systems

Which of the following is considered a computer crime?

An employee inadvertently installs and old database on top of the current one.

Which of the following is considered a threat caused by human error?

consumer financial data stored by financial institutions

Which of the following is covered by the Gramm-Leach-Bliley Act of 1999?

following security and backup procedures

Which of the following is generally a responsibility of user of information systems?

an unexplained reduction in your account balance

Which of the following is most likely to be the result of hacking?

assess the threat and vulnerabilities

Which of the following is the first step in risk management?

It involves fixing problems or adapting existing systems to support new features.

Which of the following is true abou the "maintenance" of information systems?

It saves both direct and indirect management time

Which of the following is true about outsourcing?

Changing IS infrastructure is expensive and time-consuming

Which of the following is true about the IS infrastructure?

Fewer applications will be developed in-house and software customization will become easier.

Which of the following is true about the changes and developments foreseen for 2022?

They must learn standard techniques and procedures for the applications they use.

Which of the following is true about users of information systems?

Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.

Which of the following is true for the relationship between business processes and information systems?

Business processes in these organizations are service-oriented.

Which of the following is true of business processes in nonprofit and government organizations?

Database data for information systems is provided in-house.

Which of the following is true of information systems?

facial features

Which of the following is used for biometric authentication?

It is a useful hybrid of symmetric and asymmetric encryption techniques.

Which of the following observations concerning Secure Socket Layer (SSL) is true?

It requires customers to install and manage systems themselves

Which of the following observations is true of a cold site?

Users' computer accounts should give users the least possible privilege necessary to perform their jobs.

Which of the following statements about human safeguards for employees is true?

Its meetings are conducted by the IS department

Which of the following statements is true about the steering committee of an IS department?

It often faces resistance from users for its invasive nature.

Which of the following statements is true for biometric identification?

It monitors the user experience and responds to user problems

Which of the following statements is true of the operations group in an organization's IS department?

backing up system databases

Which of the following systems procedures is specifically the responsibility of operations personnel?

A hacker floods a Web server with millions of bogus service requests.

Which of the following usually happens in a malicious denial-of-service attack?

HIPAA

Which of the following was passed to give individuals the right to access their own health data created by doctors and other health care providers?

Enterprise application integration is ________.

a suite of software applications that links existing systems by providing layers of software that connect applications together

Most SM applications earn revenue through ________.

a type of advertising model

Beacons

__________________ , tiny files that gather demographic information, use a single code to identify users by age, gender, location, likely income, and online activity.

Cookies

__________________ are small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in everytime.

Trojan horses

__________________ are viruses that masquerade as useful programs or files.

Systems analysts

__________________ integrate the work of programmers, testers, and users.

Buying off-the-shelf software.

__________________ is a form of outsourcing.

Sniffing

__________________ is a technique fro intercepting computer communications, either through a physical connection to a network or, in the case of wireless networks, with no physical connection.

Outsourcing

__________________ is the process of hiring another organization to perform a service.

Encryption

__________________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

Malware

__________________ is the term used to denote viruses, worms, Trojans horses, spyware and adware.

Incorrect data modification.

__________________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

Hacking

__________________ occurs when a person breaks into a network to steal data such as customer lists, product inventory, employee data, and other proprietary and confidential data

Usurpation

__________________ occurs when computer criminals invade a computer system and replace legitimate programs with their own, unauthorized ones that shut down legit applications and substitute their own processing to spy, steal manipulate data, or other purposes.

Pretexting

__________________ occurs when someone deceives by pretending to be someone else.

Natural disasters

__________________ present the largest risk for an organization's infrastructure loss.

Uncertainty; risk

__________________ refers to thing we do not know, while __________________ is the likelihood of an adverse occurrence.

Drive-by sniffers

__________________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.

Hardening

___________________ a site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system, and eliminating operating systems features and functions that are not required by the application.

passwords

___________________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.

Business Process Modeling Notation

___________________ is a standard set of terms and graphical notations for document business processes.

Focused differentiation occurs when ________. A) a better product is provided within an industry segment B) there is limited competition in an industry C) the customers are highly price sensitive D) product quality improves across an entire industry

a better product is provided within an industry segment

________ is a hierarchical arrangement of criteria that predict a classification or a value.

a decision tree

Which of the following is a low-tech information system?

a file of email addresses stored in an email program

According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? A) a used car dealership in New York B) a convenience store that sells retail products C) a firm that sells the only drug for a disease D) corner latte shops in Atlanta

a firm that sells the only drug for a disease

Workbook

a group of sheets comprise the workbook

"range"

a selected number of cells

Which of the following is a primary purpose of collaboration?

becoming informed

) Identify the least important characteristic for an effective collaborator.

being an experienced businessperson

sheets tab

bottom left of the page

________ is defined as information containing patterns, relationships, and trends.

business intelligence

A(n) ________ is a network of activities that generate value by transforming inputs into outputs. A) business process B) competitive strategy C) linkage D) information system

business process

________ argues that firms should create new, more efficient business processes that integrate the activities of all departments involved in a value chain. A) Internal supply chain design B) Product differentiation model C) Market differentiation model D) Business process design

business process design

Porter defined value as the ________. A) amount of money that a customer is willing to pay for an offering B) extent of after-sale service provided to customers C) perceived satisfaction of the customers and sellers after a transaction D) actual money exchanged in return of a product/service

amount of money that a customer is willing to pay for an offering

"Dialog Box Launcher"

button on the lower right of of each tab that allows you to see the all options under that category

Which of the following is an input hardware device?

bar code scanner

A group of grain farmers in a surplus year will have reduced ________. A) bargaining power B) threat of substitutes C) risk of rivalry D) threat of new entrants

bargaining power

Which among the following is the most appropriate technique for creating memorable, strong passwords?

base your password on the first letters of the words in a phrase

PowerCruise, a holiday cruise firm, recently offered its existing customers an extension of six months to their membership without any additional charges. By doing this, which competitive strategy did PowerCruise implement? A) creation of a new service B) product differentiation C) locking in of customers D) locking in of suppliers

locking in customers

Which of the following principles of competitive advantage is related to process implementations? A) creating new products B) enhancing products C) locking in suppliers D) differentiating products

locking in suppliers

A data model is a ________.

logical representation of database data

The primary risk of peer-to-peer support is ________.

loss of control

Which of the following is a significant risk of using social media for inbound and outbound logistics?

loss of privacy

In which phase of the customer life cycle do processes categorize customers according to value and attempt to win back high-value customers?

loss/churn

Which of the following refers to the problem that exists in database applications when two users update the same data item, but only one of those changes is recorded?

lost-update problem

A new drug that has shown promise in curing lung cancer has been discovered by a famous chemical laboratory. This is the only drug effective for treatment of this disease. The laboratory obtains a patent for the product and decides to sell it. This situation is characterized by ________. A) low threat of substitutions B) high bargaining power of customers C) high threat of new entrants D) low bargaining power of suppliers

low threat of substitutions

To run a program or process data, the computer first transfers the program or data from disk to the ________.

main memory

Which of the following devices is used during the processing stage of computing?

main memory

Abstract reasoning is the ability to ________.

make and manipulate models

Information silos are also referred to as ________.

islands of automation

Which of the following describes a dimension in an OLAP report?

it is a characteristic of a measure

Information is considered to be bad if ________.

it is irrelevant to the subject

A customer relationship management (CRM) system contains the names and phone numbers of customers. Such things stored in a CRM system are part of the ________

data

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.

data

The words that you type in an MS Word document is an example of ________.

data

You have a spreadsheet that provides the airfares to different cities from New York. If this is used to make a decision, it will be considered as ________.

data

Which of the following is the least critical aspect of good information?

data abundance

Which of the following is an operational cost of an information system?

data acquisition costs

A data integrity problem will occur only if ________.

data are duplicated

Instructions are moved from main memory to the CPU via the ________.

data channel

Which of the following is a development cost of an information system?

data conversion costs

________ forms are used to read, insert, modify, and delete data.

data entry

In a database, when data items disagree with one another, this leads to a(n) ________.

data integrity problem

Which of the following is a fundamental category of BI analysis?

data mining

________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

data mining

A ________ describes the data and relationships that will be stored in a database.

data model

An administrator should create a(n) ________ before developing a database design.

data model

Metadata are ________.

data that describe data

A ________ takes data from the data manufacturers, cleans and processes the data, and then stores it.

data warehouse

Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.

data warehouse

A ________ is a collection of forms, reports, queries, and programs that process a database.

database application

When implementing new enterprise systems, usually the only solution for resolving process issues and providing enterprise process management is ________.

developing committees and steering groups

One of the procedures of a collaboration project is task status reporting. This is performed in the ________ phase of the project.

doing

A ________ is a worldwide-unique name that is affiliated with a public IP address.

domain name

The remarkable characteristic of OLAP reports is that they are ________ , as they are online and the viewer of the report can change their format.

dynamic

A sales report that is current, as of the time the user accessed it on a Web server, is an example of a(n) ________.

dynamic report

Which of the following is a common description of information?

knowledge derived from data

Which of the following terms is used as a synonym for data mining?

knowledge discovery in databases

________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.

knowledge management

Formula Bar

large bar under ribbon -select cells, clink "enter" will do the math for you

To enable the seamless flow of data across the networks that comprise an internet, an elaborate scheme called a(n) ________ is used.

layered protocol

Which of the following business processes is related to sales and marketing?

lead tracking

Edwin leads a team of fifteen programmers. He constantly changes the procedures that he uses to monitor, evaluate, and control the way his subordinates function. This shows his ability to ________.

experiment

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

extensions

The columns in a database are called ________.

fields

If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.

leave it

When you buy an operating system for your personal computer, you are actually buying a software ________.

license

In market-basket terminology, the ratio of confidence to the base probability of buying an item is called the ________.

lift

According to Porter's model of business activities, interactions across value activities are called ________. A) support activities B) models C) linkages D) cross-functionalities

linkages

In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.

links

Which of the following business processes is related to operations?

finished-goods inventory management

"Select all button"

located between the columns and rows

View Buttons

located on the status bar "view, zoom, page break"

July Networks provides digital television services across the country. They have a cutting-edge technology that provides high-resolution visuals. Customers are required to pay an up-front fee to cover the first two years of the subscription, when registering with July Networks. By doing this, which competitive strategy is July Networks implementing? A) differentiating the product B) enhancing the product C) locking in customers D) standardizing the product

locking in customers

According to Hackman, which of the following is a primary criterion for judging team success?

growth in team capability

The storage disk in your computer is an example of the ________ component of information systems.

hardware

Which of the following components in the five-component model of information systems is considered an actor?

hardware

Which of the following components of an information system is the easiest to change and causes the least amount of organizational disruption when changed?

hardware

Which of the following components constitute the computer side of information systems?

hardware and software

ABC Motors is the largest manufacturer of cars. The company purchases raw materials from many small-sized sellers across the globe. In this case, ABC Motors ________. A) faces very low threat of substitute products B) has high bargaining power over its suppliers C) faces very low threat of new entrants to market D) has very high bargaining power over its customers

has high bargaining power over its suppliers

The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________. A) low threat of substitutions B) high bargaining power of suppliers C) high levels of rivalry D) low bargaining power of customers

high levels of rivalry

A spreadsheet program is an example of a(n) ________.

horizontal-market application

The attribute for a hyperlink is ________, whose value indicates which Web page is to be displayed when a user clicks on a link.

href

A student invests money and time in taking a business administration course. In this example, the student invests in ________.

human capital

The process of automation is a process of moving work from ________.

human side to computer side

A(n) ________ organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.

hyper-social

A(n) ________ contains the URL of the Web page to find when a user clicks on it.

hyperlink

Each entity in a database has a unique attribute called a(n) ________.

identifier

Bargaining power of customers is likely to be the highest for markets involving ________. A) public transportation B) industrial products C) patented drugs D) luxury goods

industrial products

Porter's five forces model is used to assess ________. A) industry structure B) market share C) internal competition D) lifecycles of products

industry structure

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.

industry-specific solutions

An automobile company decides to improve the quality of all its products and bring more variety into its product line. The company has decided to adopt ________. A) focused cost-leadership B) industry-wide differentiation C) industry-wide cost leadership D) focused differentiation

industry-wide differentiation

Which of the following conditions exists when data are isolated in separated information systems?

information silo

A stored procedure is a ________.

computer program stored in a database that is used to enforce business rules

Your company uses a software tool to manage its supply chain. This software tool is a(n) ________ of your company's information system.

instruction on the computer side

The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n) ________.

interenterprise information system

Organizations can lock in suppliers by making it difficult to switch to another organization or by ________. A) making it easy for the customers to switch products B) reducing investments in their supply chain C) making it easy to work with the organization D) reducing the bargaining power of consumers

making it easy to work with the organization

Which of the following database administration tasks is related to adaptation?

managing configuration changes in systems

The difference between the value that an activity generates and the cost of the activity is called the ________. A) margin B) turnover C) revenue D) value-addition

margin

Which of the following is used to show the products that customers tend to buy together?

market-basket analysis

In which phase of the customer life cycle are messages sent to the target market to attract customer prospects?

marketing

A data ________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.

mart

Web 2.0 encourages ________, which occur(s) when the output from two or more Web sites is combined into a single user experience.

mashups

Who is most likely to use asynchronous communication?

members of a team who work in different time zones

If there is not enough memory for a newly requested program, the operating system will remove something to place the just-requested program into the vacated space. This process is called ________.

memory swapping

BI servers use ________ to determine what results to send to which users and on which schedule.

metadata

________ records the source, format, assumptions and constraints, and other facts about the data.

metadata

Which of the following major companies is a traditional software vendor?

microsoft

In which of the following would rivalry be considered as a weak force affecting the market? A) military services B) used car dealers C) book sellers D) packaged food manufacturers

military services

Compared to in-house hosting, cloud-based hosting ________.

minimizes the risk of investing in technology than will soon become obsolete

) Constraints on the number of entities in a relationship are called ________ cardinalities.

minimum

A(n) ________ converts an analog signal to a digital one during data transmission.

modem

The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the details of each invoice drawn up in the previous quarter. This information is not good because it is ________.

more than what is required

"Home"

most frequently done things with excel

Which of the following statements is true of business process designs? A) Most process designs require people to work in new ways. B) Business process designs do not involve change in procedures. C) Business process designs should be accompanied by a change in management. D) Process designs attract very little employee resistance.

most process designs require people to work in new ways

Which of the following activities would seekers of the truth facilitate?

operations

Which of the following value chain activities involves transforming raw materials into a finished product or service? A) operations B) inbound logistics C) marketing D) maintenance

operations

Which of the following devices is an example of a storage hardware device?

optical disk

Which of the following is a nonvolatile memory device?

optical memory device

According to the five-component model of information systems, the ________ component functions as instructions for the people who use information systems.

procedure

You follow certain steps to access the supplementary readings for a course when using your organization's library management system. These steps that you follow are examples of the ________ component of an information system.

procedure

It is generally more difficult to make changes to the ________ of an information system than to the databases itself.

procedures

The inherent processes defined in an ERP solution are known as ________.

process blueprints

Users employ servers for ________.

processing shared databases

When you modify or delete data present in a database, you are ________.

processing the database

Short cut menu

right click, must frequently done things whatever you click on

"mini tool bar"

right click, the small bar that appears full of tools

A(n) ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol.

router

) In a manufacturing business, the ________ process transforms finished goods into cash. A) inbound operations B) operations C) sales D) inbound logistics

sales

Defenders-of-belief communities facilitate activities like ________.

sales and marketing

Which of the following value chain activities involves inducing buyers to get a product and providing a means for them to do so? A) inbound logistics B) operations C) sales and marketing D) outbound logistics

sales and marketing

An OLAP report has measures and dimensions. Which of the following is an example of a dimension?

sales region

According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.

seekers of the truth

In most cases, a business manager has no role in the specification of a ________.

server computer's hardware

Which of the following terms refers to a collection of servers?

server farm

Which of the following is a design philosophy in which activities are organized into modules of functionality that are requested and delivered over the Internet using standards?

service-oriented architecture

The fundamental purpose of the starting phase of a project is ________.

setting the ground rules for the collaboration

Which of the following is a support activity in the value chain? A) receiving inputs to operationalize the production B) distributing the products to retailers or buyers directly C) assisting customers in using the product or service D) setting up contractual arrangements for procurement

setting up contractual arrangements for procurement

According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of ________.

signals

Which of the following is the distinguishing feature of a LAN as compared to a WAN?

single location

Every table in a normalized database has a(n) ________.

single theme

Which of the following formations on a line in an E-R diagram means that the relationship need not have an entity of that type?

small oval

When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.

social

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

social capital

Being linked to a network of highly regarded contacts is a form of ________.

social credential

The first step that any hyper-organization should take is to develop and publicize a(n) ________ policy.

social media

________ is the use of information technology to support the sharing of content among networks of users.

social media

Adobe Acrobat is an application that allows users to create and edit digital documents. Adobe Acrobat is an example of a ________.

software

An operating system like Windows or Linux is an example of the ________ component of an information system.

software

Traditional software vendors depend on ________.

software license fees

According to Porter's five forces model, which of the following would be most affected by the threat of substitutes? A) Microsoft Windows OS B) Boeing jets C) Southwest Airlines' services D) Google Adwords

southwest airlines services

Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.

sponsors

An organization defines the rules that govern a project that it needs to undertake and the people who should perform the tasks. The project is in the ________ phase of project management.

starting

The decision about team members' roles and authorities is made during the ________ phase of a project.

starting

ERP training falls into two broad categories, one of which is training on how to use the ERP application software. Which of the following activities is a part of this category?

steps for using the ERP applications to accomplish the activities in processes

Which of the following is defined as the elastic leasing of pooled computer resources over the Internet?

the cloud

Which of the following describes the meaning of 'sense' activity, in the SEAMS dynamic process?

the communities which are important to a person

Which of the following factors determines the structure, features, and functions of the information system used in a company? A) the competitive strategy B) the brand value of its brands C) the size of the company D) the technology used by competitors

the competitive strategy

Deleting problematic content on social networking sites is best reserved for when ________.

the content is obscene and inappropriate

In-house hosting, delivered via Web service standards that can be configured dynamically, is referred to as ________.

the private cloud

Responding to problematic content on social networking sites is best reserved for when ________.

the problematic content has caused the organization to do something positive as a result

Which of the following is considered information rather than mere data?

the return on investment of an advertising campaign

Managerial decisions in an organization concern ________.

the utilization of resources

Server farms are used when ________.

the website has large numbers of users

An application that requires support beyond a browser on the user's computer is known as a(n) ________.

thick-client application

A client-server application that requires nothing more than a browser is called a ________.

thin-client application

A digital divide exists between ________. A) U.S. software companies and European software companies B) hardware companies and software companies C) those who have Internet access and those who do not D) employees of a software company and the managers of the company

those who have internet access and those who do not

The net result of the difference between the total value added and the total costs incurred is the ________ of the value chain. A) actual value B) total margin C) gross revenue D) gross turnover

total margin

Version-management systems ________.

track changes to shared documents

Which of the following information system requirements falls into the content sharing category?

tracking versions of many documents

ERP vendors train an organization's employees, called Super Users, to become in-house ERP trainers, in training sessions called ________.

train the trainer

The connection between a VPN client and a VPN server is called a(n) ________.

tunnel

"Name Box"

under "clipboard" used to name individual cells -Helpful when trying to make sense of formulas

Information silos are not a problem until they begin to ________.

use and store data about the same entities

The ________ tier of three-tier architecture consists of computers, phones, and other devices that have browsers that request and process Web pages.

user

What are the three tiers in three-tier architecture?

user, server, and database

________ is the essence of SM relationships.

user-generated content

________ are the final judges as to what data the database should contain and how the records in that database should be related to one another.

users

A characteristic of Web 2.0 is that the value of a Web site increases ________.

with users and use

Focused cost leadership is observed when a product has the lowest cost ________. A) within an industry segment B) within the product range offered by a company C) within an industry D) within the supply chain of a company

within an industry segment

Users employ client computers for ________.

word processing

Collaboration occurs when a number of people ________.

work together to achieve a common goal

plunge

A __________________ installation is the riskiest because the old system is shut down and the new system is turned on.

trade-off

A __________________ is a balancing of three critical factors: requirements, cost, and time.

Activities

_______________ are collections of related tasks that receive inputs and produce outputs.

IDS

A __________________ is a computer program that senses when another computer is attempting to scan the disk or other access a computer.

test plan

A __________________ is a formal description of a system's response to use and misuse scenarios.

Identify the project management phase in which the tasks of a project are performed.

doing

Which of the following is a component of an information system but not of information technology?

people

steering committee

A __________________ is a group of senior managers from the major businesses functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives

threat

A __________________ is a person or organization that seeks to obtain data or other assets illegally, without the owner's permission and often without the owner's knowledge.

10 TB is equivalent to ________ Gigabytes.

10,240

A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.

113

Ajax is one of the customers of a well known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely ________.

511

smart

A __________________ card has a microchip in it to hold data.

Which of the following components constitute the human side of information systems?

people and procedures

Business Process

A ___________ is a network of activities, repositories, roles, resources, and data flows that interact to accomplish a business function

Interenterprise

A business process that crosses into multiple companies is known as an __________________ business process.

issue-specific policy

A security policy covering the matters related to the personal use of computers at work would be an example of a __________________

Kerberos

A system called __________________ authenticates users without sending their passwords across a computer network.

payload

A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the __________________.

Which of the following statements regarding information technology (IT) is true?

A) Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information

Which of the following is an example of a database management system?

Access

________ is an example of a personal DBMS.

Access

delay the projects completion

According to Brooks' Law, adding more people to a late project will __________________.

departmental

Accounts payable is an example of the _________________ scope of business processes addressed by business process management.

With ________, Google searches an organization's Web site and inserts ads that match content on that site. When users click those ads, Google pays the organization a fee.

AdSense

With Google's ________ software, vendors pay a certain amount for particular search words

AdWords

The top layer of TCP/IP Protocol architecture is related to ________.

Applications

the organization should protect you computer and its files

As an IS user, you have a right to a secure computing environment. This means that __________________.

Which of the following statements is true about BI publishing alternatives?

BI servers extend alert/RSS functionality to support user subscriptions.

ERP vendor Infor acquired which of the following ERP products?

Baan

key escrow

Because encryption keys can be lost or destroyed a copy of the key should be stored with a trusted third party. This procedure is called ___________________.

Which of the following is a nonrelational data store developed by Google?

Bigtable

Communications speeds are expressed in ________.

Bits

________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines.

Cable

Which of the following is a nonrelational data store developed by Facebook?

Cassandra

Which of the following is true about the database development process?

Changing a relationship from 1:N to N:M is simply a matter of changing the notations.

________ differentiates SMIS from Web site applications.

Connection data

________ is data and responses to data that are contributed by users and SM sponsors.

Content Data

Which of the following is a major implication of Moore's law?

Costs of data communications and storage have become very low.

A(n) ________ is a program used to create, process, and administer a database.

DBMS

Which of the following is true of DSL modems?

DSL modem signals do not interfere with telephone signals

business and system analysts

During the requirements definition stage of developing and information system, the project team will include mostly __________________.

________ are flexible, informal, and adaptive processes that normally involve strategic and less specific managerial decisions and activities.

Dynamic processes

Which of the following is a nonrelational data store developed by Amazon?

Dynamo

phishing

Email spoofing is a synonym for __________________.

Which of the following statements is true of social CRM?

Each customer crafts his or her own relationship with the company.

Computer security is constrained by societal factors

Employees resent physical searches when arriving at and departing from work. Which aspect of computer security described in the NIST Handbook is reflected here?

A(n) ________ DBMS is designed to process large organizational and workgroup databases.

Enterprise

________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.

Enterprise resource planning

The IEEE 802.3 protocol standard is also known as ________.

Ethernet

________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.

Experimentation

________ attempt to capture human expertise and put it into a format that can be used by nonexperts.

Expert systems

maintenance

Fixing a system so that it work correctly, or adapting it to changes in requirements, occurs in the __________________ phase of the SDLC

________ is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser.

Flash

________ is a major task when implementing enterprise systems.

Gap identification

Spreadsheet

General type of software -Excel is the leader

Which of the following decisions is least likely to involve collaboration?

How much of product A should be ordered from vendor B?

The organization responsible for assigning public IP addresses is called ________.

ICANN

The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.

IP

A(n) ________ is a number that identifies a particular device.

IP address

Which of the following is the most common format for IP addresses?

IPv4

business and systems analysts.

If an organization does not develop programs in-house then the development group of the IS department will be staffed primarily by __________________.

CFO

If the primary information systems in an organization support only accounting and financing activities, the CIO should most likely report to the

business function

In 2005, Marriott International chose Hewitt Associates to handle its human resources needs for the next 7 years. This is an example of __________________ outsourcing.

an activity is independent of the process and is defined in detail in another diagram

In BPMN diagrams, a square with a plus sign means that __________________.

diamonds

In BPMN notation, __________________ represents decisions and usually contain a question that is answered with yes or no.

solid arrows

In BPMN, __________________ depict the flow or sequence of activities in a process.

rectangle with rounded corners

In a BPMN process diagram, a __________________ represents an activity

circle

In a BPMN process diagram, a __________________ represents the start of a process.

swim lane

In a BPMN process diagram, all activities for a given role are shown in it's _________________

square with a folded corner

In a BPMN process diagram, data is represented by a _______________.

messages and data flows

In a BPMN process diagram, dotted arrows depict the flow of __________________ in the process.

parallel

In a __________________ installation, the new system runs alongside the old one until it has been tested and is fully operational.

a collection of activities

In a business process, a role refers to ____________

people or computer applications that are assigned to roles

In a business process, resources are ________________

hot site

In a disaster-preparedness terminology, a ___________________ is a utility company that can take over another company's processing with no forewarning.

create system components

In business process management, once the as-is model is created, the team must

BPM authority is shared across several departments in an organization

In enterprise business processes, ____________________.

chief executive officer

In organizations that operate significant non-accounting information systems, the chief information officer is most likely to report to the __________________.

deliverables

In systems development, documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of __________________.

operations

In the IS department, the __________________ group manages computing infrastructure, including the individual computers, in-house server farms, networks, and communications media.

development

In the IS department, the __________________ group manages the process of creating new information systems as well as maintaining existing information systems.

form the project team

In the SDLC, if a defined project is determined to be feasible, the next step is to __________________.

plan the project

In the SDLC, the first major task for an assembled project team is to __________________.

Which of the following is true about the quality of information?

Information should be just barely sufficient for its purpose

________ are predesigned procedures for using software products

Inherent processes

________ are commands that the central processing unit can process.

Instruction sets

The primary purpose of an ERP system is ________.

Integration

Which of the following is true about a VPN?

It encrypts messages to ensure secure transmissions.

A private internet that is used exclusively within an organization is called a(n) ________. A) ethernet

Intranet

Which of the following is true of the model of social media developed by Gossieaux and Moran?

It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.

Which of the following statements is true about the IEEE 802.11 protocol?

It allows speeds of up to 600 Mbps.

Which of the following statements is true of enterprise application integration?

It connects system "islands" via a new layer of software.

Which of the following observations is true about a hyper-social organization?

It creates relationships in which both parties perceive and gain value.

Which of the following is true of source data for a BI system?

It refers to data that the organization purchases from data vendors.

Which of the following is a function of an ISP?

It serves as a gateway to the Internet.

Which of the following collaboration activities is mainly concerned with content sharing rather than communication?

Iteration

Which of the following statements about a structured interenterprise information system is true?

Its procedures are formalized and the problem solutions affect multiple organizations.

A ________ is equivalent to 1,024 bytes.

Kilobyte

With version-control systems, shared documents are placed into shared directories called ________.

Libraries

Which of the following is an SM application provider?

LinkedIn

________ is a version of Unix that was developed by an open source community.

Linux

The four major ERP products of ________ are AX, Nav, GP, and Solomon.

Microsoft Dynamics

Which of the following is an example of a closed source project?

Microsoft Office

The ________ is the most popular BI server today.

Microsoft SQL Server Report manager

Identify the most popular version control application for general business

Microsoft SharePoint

Which of the following alternatives for sharing content provides version control?

Microsoft SharePoint

Which of the following is an example of an application program?

Microsoft Word

________ states that the number of transistors per square inch on an integrated chip doubles every 18 months.

Moore's Law

Which of the following observations is true?

Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.

From among the following, identify the open source DBMS product.

MySQL

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.

N:M

Which of the following is the device that connects a computer's or printer's circuitry to network wires?

NIC

Vera wants to create a password. Which of the following is the strongest password that she can use?

NOOCSmyPw$42

________ typically have transmission speeds less than 56 Kbps.

Narrowband lines

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

Network

Which ERP vendor acquired PeopleSoft and Siebel?

Oracle

Who are the top two ERP vendors?

Oracle and SAP

Which of the following is an example of a PaaS?

Oracle on Demand

legal requirements

Organizational feasibility concerns whether the new system aligns with __________________.

vendor

Outsourcing gathers all of the possible risks into the risk of choosing the right __________________.

Ronald runs both Windows 7 and Linux on his desktop computer. This process is called ________.

PC virtualization

With ________, a personal computer, such as a desktop or portable computer, hosts several different operating systems.

PC virtualization

A cloud vendor who provides hosted computers, an operating system, and a DBMS is offering which of the following services?

PaaS

A(n) ________ is a piece of a message that is handled by programs that implement IP.

Packet

direct

Plunge installation is sometimes called __________________ installation.

by the departmental manager

Problems related to departmental business processes are resolved __________________

________ is a measure of the ratio of process outputs to inputs.

Process efficiency

Ribbon

Runs the length of the interface, has all frequently used tools from the tabs

work-breakdown structure

Project teams create a __________________, which is a hierarchy of the tasks required to complete a project.

Which of the following is an output device?

Projector

A ________ is a set of rules that programs on two communicating devices follow.

Protocol

Which of the following statements is true about operational data?

Purchased operational data often contains missing elements.

________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.

RFM

With a(n) ________ , users can subscribe to content sources and be notified when they have been changed.

RSS reader

Minimum cardinalities in an E-R diagram refer to the minimum number of entities required in a(n) ________.

Relationship

________ refers to a person's belief that he or she can be successful at his or her job.

Self-efficacy

Identify a key difference between a client computer and a server computer.

Servers are faster and usually have multiple central processing units

The directors of a company meet to decide if they should start a new product line or not. This is an example of a ________ decision.

Strategic

The need for collaboration is greatest for ________ decisions.

Strategic

________ decisions are those that support broad-scope, organizational issues

Strategic

An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.

Structured

Using a standardized procedure to calculate the incentives of employees is an example of a(n) ________ decision.

Structured

________ processes span an organization and support activities in multiple departments.

Structured enterprise

________ are formally defined, standardized processes that involve day-to-day operations.

Structured processes

The use of a conference call is an example of ________ communication.

Synchronous

________ communication occurs within a team when all team members meet at the same time.

Synchronous

________ refers to the ability to model components and show how the components' inputs and outputs relate to one another.

Systems thinking

The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.

TCP/IP

implementation

Tasks in the __________________ phase of the SDLC are to build and test system components and to convert users to the new system.

Wired Equivalent Privacy

The IEEE 802.11 Committee, the group that develops and maintains wireless standards, first developed a wireless security standard called __________________

CORBIT

The Information Systems Audit and Control association has created a set of standard practices called ________________ that are often used in the assessment stage of the BPM cycle.

records held by the US government

The Privacy Act of 1974 covers __________________.

OMG

The _________________ is a software-industry standards organization that created a standard set of terms and graphical notations for documenting business processes

Critical path

The __________________ is a sequence of activities that determines the earliest date by which a project will be completed.

CIO

The __________________ is the representative for IS and IT issues within the executive staff, providing the IS perspective during discussions of problems solution, proposals, and new initiatives..

requirements analysis

The __________________ phase of the SDLC involves identifying what is to be produced, how frequently and how fast it is to be produced.

component design

The __________________ phase of the SLDC involves determining hardware and program specifications, planning the database and procedures, and creating job definitions.

baseline

The final WBS plan, denoted as the __________________ WBS, shows planned tasks dependencies, durations, and resource assignments.

maintaining the system

The final stage of system development involves __________________.

determine the goals and scope

The first step in the system definition phase of systems development is to __________________.

Which of the following observations about the relationship between decision type and decision process is true?

The higher levels of decision making are associated with unstructured decision processes.

In SOA terminology, what does it mean if the production of a service is said to be encapsulated

The methodology and location of the service is private.

the systems development life cycle

The most common technique for developing information systems is __________________.

According to Moore's law, the ________.

The number of transistors per square inch on an integrated chip doubles every 18 months

data administration

The purpose of the __________________ group is to protect data and information assets by establishing data standards and data management practices and policies.

CTO

The responsibilities of a __________________ include advising the CIo, executive group, and project managers on emerging technologies.

installing software and repairing networks

The responsibilities of a computer technician include __________________.

How should a sales team respond to a customer who has an RFM score of 545?

The sales team should let go of this customer; the loss will be minimal.

diseconomies of scale

The situation that occurs when adding more resources creates inefficiencies is known as __________________.

configuration control

The term __________________ refers to a set of managment policies, practices, and tools that developers use to maintain control over the project's resources.

bot

The term ___________________ refers to any type of program that is surreptitiously installed and that take actions unknown and uncontrolled by the computer's owner/administrator.

Which of the following would be a consequence of teleaction?

The value of robotics would increase.

Title bar

The very top center; is the name of the workbook

multiply likelihood by the cost of the consequences

To obtain a measure of probable loss, companies __________________.

diseconomies of scales

To which of the following does Brooks' Law apply?

Quick Access Tool Bar

Top left of page, right above "file"

A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.

Trigger

When you visit the Web page of the luxury brand Bang & Olufsen, the address bar in your browser reads "http://www.bang-olufsen.com/", which is the ________ of the Web page.

URL

Most LAN connections are made using ________.

UTP cable

Which of the following is an example of an open source operating system?

Ubuntu

Which of the following is a key difference between collaboration and cooperation?

Unlike cooperation, collaboration gives importance to iteration and feedback

A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making

Unstructured

Which of the following statements is true of firmware?

Users do not need to load firmware into the devices' memory.

personal identification number

Users of smart cards are required to enter a __________________ to be authenticated.

learn basic computer skills

Users should not bother IS personnel for trivial reasons, so they have a responsibility to __________________.

A(n) ________ uses the Internet to create the appearance of private point-to-point connections

VPN

________ is a process that occurs when the collaboration tool limits, and sometimes even directs, user activity.

Version control

Computers that reside in different geographic locations are connected using a(n) ________.

WAN

For a printer or laptop to connect to a wireless LAN, it must have a(n) ________.

WNIC

A service provider creates a service description, which documents how to use a service, and publishes that description using a standardized language called ________.

WSDL

________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.

Web servers

A(n) ________ is an encapsulated software service provided over the Internet using standard protocols.

Web service

________ is a popular commercial webinar product used in virtual sales presentations.

WebEx

cost, schedule, technical, and organizational feasibility

What are the four dimensions of feasibility?

Unlike spyware, adware does not perform malicious acts

What is the major difference between spyware and adware?

vendor

When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the __________________.

remover user accounts and passwords

When an employee is terminated, IS administrators should receive advance notice so they can ___________________.

unauthorized data disclosure.

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of __________________.

"Screen Tips"

When you hold your mouse over a button, the description of the button comes up

the general statement of the security policy

Which element of a security policy specifies how organization will ensure the enforcement of security programs and policies?

likelihood

Which factor of risk assessment refers to the probability that a given asset will be compromised by a given threat, despite the safeguards?

conducting external audits

Which of the following is NOT a function of the information systems department?

establishing the security policy and managing risk

Which of the following is a critical security function of senior management?

cloud hosting

Which of the following is a form of hardware outsourcing?

setting IS priorities

Which of the following is a function of the steering committee for an IS department?

investigating new IS technologies

Which of the following is a function of the technology office in an organization's IS department?

receiving effective training according to their requirements

Which of the following is a right of users of informations systems?

It involves the potential loss of intellectual capital

Which of the following is a risk of outsourcing IS/IT functions?

symmetric

With __________________ encryption, the sender and receiver transmit a message using the same key

pilot

With __________________ installation, the organization implements the entire system/business processes on a limited portion of the business.

________ is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.

XML

https

You are transferring funds online through the Web site of a reputed bank. Which of the following displayed in you browser's address bar will let you know that the bank is using the SSL protocol?

As the IT manager of your organization, you need to use a coworker's account to access some information. In keeping with password etiquette, how would you go about getting his password?

You ask the coworker to type in the password where required, while you look away.

Identify how information technology differs from information systems.

You can buy information technology, but not information systems.

An ERP solution does not include ________.

a company's operational data

Which of the following is an example of computer hardware?

a computer monitor

Being ________ is one of the most important characteristics of an effective collaborator.

able to give negative feedback

Kerin is a business student interning at Benson and Hodgson, a firm specializing in exports of sophisticated equipment to other countries. She finds that she is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that she lacks ________ skills.

abstract reasoning

Which of the following is a component of a LAN device that processes wireless traffic and communicates with the wired switch?

access point

Which of the following is a function of an application program?

accessing a customer database

Push publishing delivers business intelligence ________.

according to a schedule or as a result of an event or particular data condition

Which of the following business processes is related to customer service?

account tracking

Which of the following types of skills is most likely be outsourced to the lowest bidder?

accounting skills

Which of the following is a critical characteristic of good information?

accuracy

Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

acquisition

A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.

active lurker

The hardware components of an information system will act as a(n) ________.

actor on the computer side

When using the relational model to represent data, one must ________.

add a foreign key to one of the tables

Social capital depreciates, but such depreciation can be ameliorated by ________.

adding something of value of the interaction

The Web 2.0 business model relies on ________.

advertising

"Formulas"

any toll that regards a formula

"Data"

anything you can do with data and what you can do with it

"Insert"

anything you can insert into a spreadsheet

Programs that perform business functions such as general ledger and accounting are known as ________.

application software

Bits are used for computer data because they ________.

are easy to represent electronically

Server application programs are programs that ________.

are processed on server computers

Web 2.0 companies provide software ________.

as a free service

Source code is computer code ________.

as written by humans

Which of the following business processes is related to human resources?

assessment

Entities in a data model have ________ that describe the characteristics of the entity.

attributes

In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.

authoring

The term "open source" means that the source code of the program is ________.

available to the public

Which of the following is an example of a measure in an OLAP report?

average cost

Drother Sports Inc. is a sports equipment provider that markets its products through a chain of retail outlets in three states. As part of its expansion strategy, the company decides to open outlets in six more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?

buying and installing new computers in the new outlets

Which of the following tasks should be performed during the planning phase of project management?

determining schedule

The CPU keeps frequently used instructions in the ________.

cache

Which of the following memory devices is volatile in nature?

cache

Which of the following is a basic operation used by reporting tools to produce information from data?

calculating

Machine code ________.

cannot be modified by humans

Top Level tabs

categories of sub-categories

The ________ is called the "brain" of the computer.

central processing unit

Which of the following would be the most disruptive to an organization when implementing an information system?

changing reporting relationships

With ________, statistical techniques can identify groups of entities that have similar characteristics.

cluster analysis

When presenting an idea to her colleagues, Marjorie failed to consider others' perspectives and got defensive when people asked her questions. This situation indicates that Majorie lacks ________ skills.

collaboration

A primary key used in a database is a ________.

column or group of columns that identifies a unique row in a table

A decision is called an operational decision if it ________.

concerns day-to-day activities

When using volatile memory, the ________.

contents are lost when power is off

Which of the following is considered a support activity in the value chain of a business? A) operations B) customer service C) contract negotiation D) marketing

contract negotiation

Information systems improve process quality by ________.

controlling process flow

A client operating system is a program that ________.

controls the client computer's resources

The cost of the business process is the sum of the cost of the inputs and the ________. A) cost of the activities B) cost of the outputs C) value of the outputs D) value of the product/service

cost of the activities

Synapz, a manufacturer of office automation products, recently received a patent for an advanced therapeutic ergonomics technology. By doing this, Synapz has ________. A) created entry barriers B) introduced product differentiation C) locked in its suppliers D) reduced the cost of operations

created entry barriers

Identify the first step in transforming a data model into a relational database design.

creating a table for each entity

Which of the following is a developmental task of database administration?

creating and staffing the DBA function

In marketing transactions, the fact that customers who buy product X also buy product Y creates a(n) ________ opportunity. That is, "If they're buying X, sell them Y," or "If they're buying Y, sell them X."

cross-selling

A line on an E-R diagram that indicates a 1:N relationship between two entities is referred to as ________.

crow's feet

________ is the dynamic social media process of employing users to participate in product design or product redesign.

crowd sourcing

Due to a phenomenon called the ________, the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor.

curse of dimensionality

Which of the following value chain activities involves assisting users to handle the product after sale, thus maintaining and enhancing the product's value? A) inbound logistics B) customer service C) operations D) outbound logistics

customer service

Which of the following is the first step in preparing a departmental hardware budget?

determining the base requirements of the system

Which of the following is an example of a strategic decision?

deciding to open a centralized distribution system

A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.

defenders-of-belief

"Page layout"

describes things you can do to the whole sheet/pages

Which of the following is an example of project data?

design document

Which of the following terms refers to the process of a single server hosting many versions of desktop operating systems?

desktop virtualization

The main purpose of the planning phase in a project is to ________.

determine who will do what and by when

An organization purchases server and client computers to build an information system. This is an example of a(n) ________ cost.

developmental

"View"

different ways of viewing the page

Which of the following principles of competitive advantage is associated with product implementations? A) locking in customers B) differentiating service offerings C) locking in suppliers D) establishing alliances

differentiating service offerings

Problematic operational data are termed ________.

dirty data

Which of the following tools facilitates asynchronous communication?

discussion forum

Asynchronous communication occurs when team members ________.

do not meet at the same time

A project manager has to manage tasks and budgets and solve problems during the ________ phase of project management.

doing

status bar

green bar at the bottom contains quick view button and zoom button

Process ________ is a measure of how well a process achieves organizational strategy.

effectiveness

The two dimensions of process quality are ________.

efficiency and effectiveness

Emergence in the context of management means loss of control of ________.

employees

Which of the following is a major category of knowledge assets?

employees

The major benefit of enterprise application integration is that it ________.

enables organizations to use existing applications

________ is the application of social media to facilitate the cooperative work of people inside organizations.

enterprise 2.0

Which of the following information systems minimizes data duplication among departments?

enterprise information systems

Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, percentage completed, and employee name. These aspects that Brad wants to track are called ________.

entities

In a data model, a(n) ________ is something that a user wants to track.

entity

A group of manufacturing organizations purchases raw materials collectively to obtain better deals. This is an example of obtaining competitive advantage by ________. A) differentiating the industry B) establishing standards C) establishing alliances D) enhancing the products

establishing alliances

An organization wants to achieve competitive advantage through process implementations. Which of the following actions would help them do that? A) establishing alliances B) creating new products C) enhancing products D) differentiating services

establishing alliances

A ________ is content structure that has emerged from the processing of many user tags.

folksonomy

A database design team transforms entities into tables and expresses relationships by defining ________.

foreign keys

Columns that belong to a different table than the one in which they reside are called ________.

foreign keys

Relational databases represent relationships using ________.

foreign keys

SM communities differ from communities in the past because they are ________.

formed based on mutual interests

________ is a term used to refer to the level of detail represented by the data.

granularity

Which of the following is a benefit of in-house hosting?

greater visibility of security and disaster preparedness

You are the production manager at a cola manufacturer's bottling plant. You receive a report that contains the list of raw materials stored in the warehouse. You find that the list includes items that are not present in the warehouse. The list that you received would qualify as bad information because it is ________.

inaccurate

) Identify the activity in the value chain that involves receiving, storing, and disseminating inputs to the product. A) inbound logistics B) procurement C) operations D) outbound logistics

inbound logistics

A retail marketing company sells such products as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________. A) outbound logistics B) inbound logistics C) operations D) internal marketing

inbound logistics

Mae manages delivery at a custom-kitchen outlet. Working with her customer's specifications, she contacts Gem Cabinets and places an order for a full-motion wall mount. Which of the following primary activities is Mae performing here? A) inbound logistics B) operations C) customer service D) marketing

inbound logistics

Which of the following is a part of the materials ordering process? A) outbound logistics B) marketing C) operations D) inbound logistics

inbound logistics

________ is the single most important content function in knowledge management applications.

indexing

Which of the following refers to a program that controls the computer's resources?

operating system

Which of the following is an example of a vertical-market software?

inventory tracking software for an auto manufacturer

The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.

irrelevant

You are looking to buy a home that costs less than $700,000, but your real estate agent keeps sending you fliers for homes that cost $1,000,000 or more. This information is likely to be useless because it is ________.

irrelevant

Virtualization is the process by which ________.

one computer hosts the appearance of many computers

With server virtualization, a server computer hosts ________.

one or more server computers

The viewer of an OLAP report can change its format. Which term implies this capability?

online

OLAP stands for ________.

online analytical processing

Linux is an example of a(n) ________.

open source operating system

Which of the following is a program that controls the computer's resources?

operating system

In cloud computing, resources are said to be "pooled" because ________.

organizations share the same physical hardware through virtualization

Which of the following statements is consistent with the central idea of business process design? A) Technology should be used to supplement the existing value chain. B) Business processes should not focus on the core competencies of organizations. C) Organizations should create new business processes rather than improving existing systems. D) Technology should be used to modify and improve standard business processes.

organizations should create new business processes rather than improving existing systems

Lynn, the manager of a transportation company, is going through this week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing? A) inbound logistics B) marketing C) customer service D) outbound logistics

outbound logistics

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A) inbound logistics B) operations C) customer service D) outbound logistics

outbound logistics

Which of the following devices is an example of an output hardware device?

overhead projector

Project data is data that is ________.

part of the collaboration's work product

The five-component framework considers individuals who maintain the data and who support the networks of computers as ________ components

people

An organization buys a proprietary database application to be used by a small workgroup of five people. This is an example of a(n) ________ DBMS

personal

Which of the following types of DBMS products is designed for smaller and simpler database applications?

personal DBMS

A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management

planning

Which of the following business processes is related to manufacturing?

planning and scheduling

Which of the following is a risk associated with human resources using social media to form conclusions about employees?

possibility of error

Which of the following ratios has fallen as a result of Moore's law?

price/performance

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________.

primary key

Huen Software, an application provider to the gaming industry, decided to increase its portfolio by developing 3-D graphics-supported games for the mobile gaming industry. By doing this, which competitive strategy is Huen Software implementing? A) creation of entry barriers B) product differentiation C) reduction of cost D) locking in of suppliers

product differentiation

N-joi Ice Cream was facing competition to their flagship brand of "black currant ice cream". The competitor began offering three varieties of "black currant ice cream." N-joi decided to counter the threat by introducing five new varieties of ice creams. Which competitive strategy is N-joi implementing? A) cost leadership B) product differentiation C) cost differentiation in the segment D) service focus

product differentiation

"Review"

proofing, thesaurus, research, research, translate etc

RedDart is a premium freight provider in the United States. The company offers premium shipment services to its customers. The company ships faster than its competitors and uses tamperproof containers to ship its products. RedDart company distinguishes itself from competitors by ________. A) providing an enhanced product B) locking in its suppliers C) locking in its customers D) offering low-cost operations and services

providing an enhanced product

________ requires the user to request BI results.

pull publishing

RFM analysis is used to analyze and rank customers according to their ________.

purchasing patterns

Which of the following is an example of a structured process?

purchasing the right amount of raw materials

A ________ is a request for data from a database.

query

Brenda, the sales manager of a firm, wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keyword into a ________ form to obtain the information that she wants.

query

Main memory is also known as ________.

random access memory

Which of the following is a primary activity in the value chain? A) receiving and disseminating inputs to the product B) negotiating prices with vendors C) finding suitable vendors to supply raw materials D) setting up contractual arrangements with various suppliers

receiving and disseminating inputs to the product

Which of the following is the best description of data?

recorded facts or figures

The rows in a database are called ________.

records

An organization implements an information system to optimize its supply chain. The system helps the organization reduce wastages and inventory charges. Hence, the system provides a competitive advantage to the organization. Here, the information system helped the organization achieve competitive advantage by ________. A) locking in customers B) reducing costs C) locking in suppliers D) differentiating the products

reducing costs

Which of the following is an example of a supervised data-mining technique?

regression analysis

In an E-R diagram, a line between two entities represents a(n) ________.

relationship

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more product?

relationship management

Good information must be ________.

relevant

A database is an example of a(n) ________. A) repository B) software C) linkage D) value chain

repository

A(n) ________ is a collection of something, such as data and raw materials. A) value chain B) cache C) linkage D) repository

repository

To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.

strength of a relationship

With ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

supervised data mining

In market-basket terminology, ________ is the term that describes the probability that two items will be purchased together.

support

RAC Associates is a car rental company. The company rents cars to customers in the United States. The company uses controls and procedures to prevent car theft. Such procedures are examples of ________. A) primary business processes B) core activities C) strategic activities D) supporting business processes

supporting business processes

A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.

switch

Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. A) entry barriers B) switching costs C) product standards D) value differentiation

switching costs

A large software manufacturer attempts to lock in customers by making it difficult for customers to change to another product. Identify the strategy used here. A) switching costs strategy B) low cost operation strategy C) differentiation strategy D) consumerist strategy

switching costs strategy

A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.

systems thinking

You constantly analyze your work in terms of the contribution that you make to the overall output of your organization. This shows your ________ skill.

systems thinking

Which of the following is a nonroutine cognitive skill?

systems thinking ability

Business users who administer the development of information systems should ________.

take an active role in that system's development

The term ________ refers to a collaboration tool where team members can easily respond and the management can easily identify the people who have not responded to a request.

team surveys

A social media policy is a statement ________.

that delineates employees' rights and responsibilities

Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?

training employees on the successful use of the new system

Glazer & Hicks is a firm that offers enterprise software solutions to independent retailers. The firm recently bagged a contract from a major national retail chain to develop and implement a proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?

training the employees to use and manage the new system

Project metadata is data that is ________.

utilized to manage the project

According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.

value of social capital

In an E-R diagram, a(n) ________ on a line means that at least one entity type of that type is required.

vertical bar

DenTimes, a software package for dentists, is an example of a(n) ________.

vertical-market software

A ________ is an inducement for passing the message along through the tiers.

viral hook

In the Web 2.0 world, new features are released and vendors wait for users to spread the news to one another in a process called ________.

viral marketing

Which one of the following characteristics is true for companies such as Google, Amazon.com, and eBay that exemplify Web 2.0?

viral marketing

Which of the following is the most important trait that an effective collaborator should have?

willingness to enter into difficult conversations


Ensembles d'études connexes

Chapter 3: Theoretical Models of Personality Development

View Set

Management of Patients with Oral and Esophageal Disorders

View Set

Business Law Test 2 Cases and Business Questions

View Set

08-02-02 Sets - set addition/removal

View Set

Intro to Info Systems (Homework #4)

View Set

Real Estate Investment and Finance 354-446

View Set