MIS FINAL EXAM
The average ERP project takes ___________ months to complete.
16
In 2015, __________ million Americans purchased something online.
171
E-commerce began in ________ when Netscape earned their first online advertisement from a major corporation.
1995
If you want your cell phone to transmit up to 100 megabits/second downloads, you would need to upgrade to a(n) _____________ network.
4G
Porter's competitive forces model includes _________ forces that impact every organization.
5
Unfortunately, a majority of enterprise applications deliver __________ percent or less of the expected benefits.
50
Businesses retailing products and services directly via the Internet to individual consumers best describes ________.
B2C electronic commerce
Which of the following is NOT an example of disruptive technologies?
Digital television
Frustrated customers angry about a site not working is an example of which IT cost of ownership (TCO)?
Downtime
Concerning Porter's model and the Internet, which of the following is false?
Due to technology requirements, the threat of new entrants decreases.
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
Creating a new system that provides charts and graphs to assist senior management make non-routine decisions is called (a):
Executive support systems.
Which of the following refers to the capability of a computer, product, or system to add additional features?
Expandability
What is the understanding that most American and European privacy law is based on?
Fair Information Practices (FIP)
_____ is output from an information system that is returned to key people who analyze it to, evaluate it, and refine inputs for the system.
Feedback
With regard to ERP implementation, which of the following is false?
Firms see immediate operating efficiency and associated profits when first implementing an ERP application.
_____________ logic is a solution for problems that cannot be limited to a series of if-then rules.
Fuzzy
________ services can tell you the price of a house you are looking at or about special exhibits at a museum you are passing.
Geo information
The ethical principle that calls for hypothetically walking in the other person's shoes before making a decision is called the ______________.
Golden Rule
Nearly 80 percent of the Internet searches conducted use ___________, which makes it the largest data repository in history.
Which of the following businesses uses the portal Internet business model?
Which of the following is a file storage and synchronization service for cloud storage, file sharing, and collaborative editing?
Google Drive
_____ is when a firm connects numerous computers together into one network to create one, very powerful computer system that has coordinated processing
Grid computing
_______________ is an upgrade to traditional HTML because it allows the addition of multimedia features (i.e., video) without cumbersome add-ons.
HTML5
Which of the following statements is NOT a characteristic of Hadoop?
Hadoop extracts data from multiple tables that have a relationship.
What is the domestic exporter strategy characterized by?
Heavy centralization of corporate activities in the home country of origin
If you are renting a home while going to college and would like to connect to the Internet, you will need to contact a(n)______________ such as EarthLink, NetZero, or AT&T to connect.
ISP
Collectively, the coordination of computer hardware, software, data management, networking, and technology services collectively is termed:
IT infrastructure.
Which of the following statements represents a responsibility of the sales and marketing functional area?
Identifying customers
A manager upset that he or she is not receiving forecasts, sales projections, or appropriate dashboards is expressing frustration for having a poor ______________ business driver:
Improved Decision Making
The _______________ has helped level the playing field for companies wanting to do business globally.
Internet
IoT stands for the:
Internet of Things
________ is a new network backed by universities, government, and private companies in more than 100 countries.
Internet2
What primary goal does the San Francisco Giants' "dynamic ticket pricing" help accomplish?
It allows ticket prices to fluctuate according to demand.
_________ is when a company transfers tasks of the firm to other firms that operate in low-wage countries, possibly reducing job opportunities within the U.S.
Offshoring
Where is a cookie that is created during a Web site visit stored?
On the visitor's computer
___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits.
Operational excellence
According to the information presented in this video, a spreadsheet is great to manage information about one thing (e.g., items for sale), but a _____ is preferred to manage information about more than one thing (e.g., items for sale and suppliers of items).
database
Using SAP to help determine customers' demand for its products is called ____________ planning.
demand
In this video, Jack describes how metadata _____.
describe characteristics of each field
In client/server computing, a client normally consists of a:
desktop computer.
Network signals that are represented by on-off pulses indicate a(n):
digital signal.
A(n) ______________ specifically addresses plans for power outages, floods, fire, and other calamities.
disaster recovery plan
Delivering products to retail stores is considered the _____________ portion of the supply chain.
downstream
If someone at your work accuses you of sending inappropriate emails, you should be afforded __________________.
due process
The San Francisco Giants sell tickets based on ____________, where the prices often change based on demand and other variables.
dynamic pricing
eBay is an example of a/n ___________ because it sells products over the Internet.
electronic commerce
As Kevin explains, _____ processes support activities in multiple departments and span an organization.
enterprise
ERP stands for ___________________________________.
enterprise resource planning
Which of the following is NOT a function of the Internet service provider (ISP)?
The ISP provides applications services.
Principles of right and wrong that you use to make choices are called _____________.
ethics
A _______________ is represented as a column in a database table that represents things like a person's first name, last name, and age.
field
Using a combination of hardware and software, _______ are able to control incoming and outgoing data on a network.
firewalls
A _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table.
foreign key
A __________________ is a popular business organization that has a product or service created in the home country (i.e., McDonald's and Chem Dry), and distributes the same products worldwide. Individual stores or locations are often owned by a local individual.
franchiser
In this video, Samir describes how business executives use a BI application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
granular
Based on the information in this video, modern business intelligence reporting tools use _____ interfaces that display the results of data analysis.
graphical dashboard
Bandwidth transmission speed is measured in ______________.
hertz
A multinational strategy is often described where financial management and strategy operate out of a central __________________.
home base
The four major functions of a business include manufacturing/production, sales/marketing, finance/accounting, and _________________.
human resources
Business processes supported by enterprise systems related to travel expense reporting are associated with __________________.
human resources processes
Which of the following businesses uses the content provider Internet business model?
iTunes
The BPM step which addresses the question of which processes need to be addressed is ___________________________.
identifying processes for change
The final phase of the problem solving model is the ___________ phase.
implementation
Mary's company is implementing an ERP system to achieve which main business objective?
improved decision making
Automobiles have the opportunity to use computer-aided design (CAD) to create virtual models of parts and even prototype vehicles. This use of information systems to improve quality is related to ______________________.
improving design quality and precision
According to this video, behavioral tracking and targeted ads can be seen as a double-edge sword because _____.
increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy
If two people are trading coins and one has far more knowledge about the hobby than the other, this is called _________________.
information asymmetry
Information systems, management information systems, information technology, information management, and computer information systems are often confused with one another. Which of these focuses primarily on hardware and software?
information technology
If you want to collect data (i.e., photos) from someone and use the data, you must obtain _____________.
informed consent
A key benefit of collaboration is _______________, which focuses on deriving better and more unique ideas for products and services.
innovation
As Jack explains to Kate, a database is a collection of _____ records.
integrated
A photo you have taken of your family is considered ______________, and is protected by law.
intellectual property
According to the decision-making process described in your textbook, _____________ includes discovering, identifying, and understanding organizational problems.
intelligence
In this video dramatization, David diagrams Michael Porter's Five Forces Model. The force at the center of this model that is affected by the other forces is the _____.
intensity of rivalry within the industry
Which of the following is NOT a step in how case-based reasoning works?
The system asks the user additional questions to expand the database search.
According to Samir's explanation to Ryan, all of the following statements about data marts are true except _____.
They are larger than data warehouses.
Why are legacy systems still used?
They are too expensive to redesign.
According to this video, which of the following statements is true regarding enterprise resource planning systems?
They integrate data with a centralized database.
Which of the following is NOT part of the description of a value web?
They promote communication among units.
One of the characters in this video asks the question: "Are there any laws to keep companies from installing trackers on my computer?" According to his colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is used?
The Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent.
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
Total cost of ownership (TCO)
The philosophy that quality should be the responsibility of everyone that works in a firm and every business unit is best known as which of the following?
Total quality management
____________ focus on day-to-day operations of a business including managing sales, payroll, and receipts.
Transaction processing systems
A _______________ is a program that seems like a normal program, but does something completely unexpected.
Trojan horse
Among the eight unique features of e-commerce, which is related to the ability to interact with web technology everywhere?
Ubiquity
What type of decisions are the type where a person needs to provide judgment, evaluation, and insight to solve the problem?
Unstructured decisions
It is possible to use a special secure, encrypted network, a _____, which works on the public network, like the Internet.
VPN
_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location.
Virtualization
Which of the following is an opportunity for threats to gain access to assets?
Vulnerability
The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that:
Websites must disclose their information practices before collecting data.
This video describes how advertisers use _____ in order to display more relevant ads based on a user's search and browsing history.
behavioral tracking
Companies often use information systems to improve quality by ______________ as a way to set standards for products and services against predefined standards.
benchmarking
The term ____________ describes data sets like Google's database that are too big for traditional DBMS to handle.
big data
If your computer allows authentication using your fingerprint, this technology is considered __________________.
biometric authentication
According to the information in this video, computers represent data using _____.
bits
When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the _________________________.
bullwhip effect
ESS, DSS, and MIS systems all fall under the generic term of _______ systems as they help with the decision making process.
business intelligence
Enterprise software includes a database and thousands of predefined ________________.
business processes
An antique dealer buying items and hoping to sell them for more than he or she paid for them is the very definition of a:
business.
According to the information presented in this video, organizations have options for responding to problematic user-generated social media content that include all of the follow EXCEPT _____.
changing it
The senior leadership position responsible for the organization's data is called the ____________ officer.
chief data
When a leading discount store's database was breached, a lot of attention was on the company's ____________________, who is specifically responsible for training employees about security.
chief security officer
The ________ measures the number of customers who stop purchasing products or using a firm's services.
churn rate
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising.
click fraud
Tools that record customer activities at websites and store them in a log for further analysis are called ________.
clickstream tracking tools
A collection of computers on the Internet that allow for innovations such as software as a service (SaaS) is simply called (the):
cloud
What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate computers?
cloud computing
Based on the information in this video, all of the activities listed here describe behavioral tracking except _____.
collecting credit card data from online purchases
Putting a key logger on your boss's computer without permission would be considered a(n) ___________.
computer crime
Some firms, like Ernst and Young, use ______ to carefully collect and maintain data in such a way that they can be used as evidence in a court of law, on the behalf of a company or government agency.
computer forensics
If you return to a website that welcomes you back by name, you likely have small text file on your computer with information about your prior visits called a ___________.
cookie
When a firm does something in which they are a world-class leader, that activity would be considered to be a _____________ for the company.
core competency
The benefit of a consumer being able to look online to determine the actual cost a business pays for products is called ________________
cost transparency
As the two characters describe in this video, all of the following are a function of operating systems software except _____.
creating a presentation
Kickstarter.com is a popular _______________ site where start-up companies' ideas are presented to perspective investors.
crowdsourcing
Systems designed to help maintain and improve customer data and its relationship with customers are called __________________ systems.
customer relationship management
In this video dramatization, Kevin describes which component of an ERP system that consolidates data from sales, marketing, and service departments?
customer relationship management (CRM)
Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________.
cybervandalism
It has been shown that one of the best ways to reduce quality problems is to reduce _____________.
cycle time
In its simplest form, ___________ represents streams of raw facts with limited usefulness until organized.
data
A location specified to include IT infrastructure such as storage, security, and system backup is called a:
data center.
As part of a DBMS, a(n) _________ documents information about a database.
data dictionary
Creating visual representations of data through charts, graphs, and dashboards is formally called ____________________.
data visualization
Most larger corporations utilize a ______ to consolidate data from a business along with external data.
data warehouse
Typically, executives will review their ______________, which is a set of metrics they consider to be vital to understanding how the company is doing and give insight as to what they should be doing next.
key performance indicators (KPI)
A computer _________________ causes the most repetitive stress injuries.
keyboard
A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
keylogger
Organizations have institutional knowledge that needs to be stored, transferred, and applied as part of a _______________ strategy.
knowledge management
Canvas and Blackboard are examples of ______________________ systems that help manage employee learning.
learning management systems
As Mike explains to Valerie, which of the following is a significant risk of using social media?
loss of privacy
A car reservation system requiring processing a thousand transactions per second would likely require a __________ to process the transactions.
mainframe
A ________ is a large-capacity, high-performance computer that can process large amounts of data very rapidly.
mainframe
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware
Target was attacked by hackers who installed ___________ in the company's security and payments system.
malware
_____________ is the largest single group in the U.S. business labor force and this group dramatically benefits from information to help with the decision making process.
management
Business processes supported by enterprise systems related to quality control are associated with __________________.
manufacturing and production processes
ZipReality, which uses both Zillow and Google Maps, is an example of a:
mashup.
Compared to in-house hosting, cloud-based hosting ________.
minimizes the risk of investing in technology that will soon become obsolete
As Zero and One explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.
modem
When thinking about downloading and using a photo off the Internet, don't forget the ethical __________ lunch rule.
no free
In this video, Katie describes a decision that can be made by following a predetermined set of steps. According to Leila, this type of decision most often is made at the _____ level of an organization.
operational
Analytical CRM applications are based on data from _____________________.
operational CRM systems
Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of ________________.
operations management
In this video, One-Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination.
packet switching
Regarding dimensions of business problems, a lack of properly trained employees is considered a ______________ dimension.
people
If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________.
phishing
Many business analytics include ________, which utilizes statistics and data mining to try to determine the likelihood of future events for planning purposes.
predictive analytics
The benefit of a consumer being able to look online to find a variety of different prices for the same product is called ___________________.
price transparency
A _______________ uniquely represents a record or row.
primary key
The Problem-Solving Model consists of __________________, solution design, solution evaluation and choice, and implementation.
problem identification
What is the name for the process of converting raw data into a more meaningful form?
processing
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of ________.
property rights and obligations
A ________ is a set of rules that programs on two communicating devices follow.
protocol
In this video, Samir describes the role of the business intelligence team in three primary activities that include data acquisition, data analysis, and _____.
publishing results
(A) _______________ is the formal name for questioning or making a data request from the database.
query
A just-in-time strategy means:
raw materials would arrive just-in-time to be transformed into a product and the product would ship as soon as completed.
In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a ______________.
record
The most common type of database is a __________.
relational database
If you accept a position as an information systems manager, you have a(n) ____________ to accept the costs, benefits, and obligations for the decisions you make.
responsibility
Establishing a risk level of malware threats to an organization is an example of _______________.
risk assessment
A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and self-regulation that meet U.S. guidelines.
safe harbor
Identifying the most profitable customers would utilize the _____________ of a CRM system.
sales force automation
A(n) _________________ policy identifies and ranks information risks and goals.
security
Based on the information provided in this video, Porter's Five Forces Model is useful to analyze a business and identify its _____.
strategic position within its industry
According to David, Walmart negotiates with manufacturers and wholesalers to keep their profit margins low so that Walmart can offer lower prices to its customers. This is an example of _____.
strong bargaining power of buyers [Walmart is the buyer]
A college admission decision that is entirely based on a mathematical formula is called a(n) __________________ decision.
structured
According to the information presented in this video, determining how many workers are needed to produce 1,000 units of a product in a given work week is an example of a(n) _____.
structured decision
Knowledge that already exists inside a firm in the form of formal reports or presentations is categorized as ________.
structured knowledge
Paying an online journal a monthly fee for access to its content is called the __________ model.
subscription revenue
Activities related to procuring materials and refining these materials into finished projects to distribute to retail outlets are a firm's ________________.
supply chain
If a competitor to your business introduces an effective product or service (i.e., when Citibank first introduced the ATM), your need to follow is considered an example of the business driver:
survival
The Windows operating system is an example of ______________ software.
system
IT professionals working to make a new system work with an existing system is focusing on:
systems integration
When a top chef employee leaves without ever writing any recipes down, the lost knowledge is called:
tacit.
A large corporation managing a network over a global area would be considered a ________.
wide area network
A __________ is a unique type of malware that replicates itself from one computer to another.
worm
ERP implementations can be very expensive, averaging approximately _____.
$2.8 million
____________________, which is now available for average consumers to purchase, has been used in industry to create solid objects, layer by layer, from specifications in a digital file.
3-D printing
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that it becomes unavailable to its intended users.
What is Secure Hypertext Transfer Protocol?
A protocol for encrypting data transferred over the Internet
Which of the following most accurately describes an information system?
A set of components that gather, analyze, store, and utilize information for making better decisions for a firm
Which of the following BEST describes a pivot table?
A spreadsheet tool that displays two or more dimensions of data in a convenient format.
_________________ tracks and coordinates the delivery process and associated financial information.
A supply chain execution system
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
Authentication
Which of the following is FALSE about techno stress?
Affected people start to behave like computers, devoid of emotions.
Which is an essential component in the capability of GDSS to contribute to a collaborative environment?
Allows users to contribute simultaneously
___________________________ is an open source operating system for mobile devices.
Android
Micropayment systems allow for high volume, low cost transactions. __________ is considered the largest micropayment system in the world.
Apple
When is business process management (BPM) concluded?
BPM is never concluded.
________ refers to the tracking of individuals on thousands of websites for the purpose of understanding their interests and intentions.
Behavioral targeting
________ is starting to be used in predictive analytics from both the public and private sectors.
Big Data
For technology, which are the three interrelated advances that make MIS so exciting now and into the future?
Big data, cloud computing, and the mobile digital platform
Which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables?
Bluetooth
Which is eBay an example of?
C2C electronic commerce
What is the process of predicting when a computer hardware system will become saturated?
Capacity planning
The quality dimension of the decision-making process that addresses the ability to articulate the solution is called the ____________ dimension.
Coherence
Which of the following is NOT a way that information systems provide a competitive advantage?
Collecting and storing large amounts of data
Twitter and Facebook are both examples of the _____________ Internet Business Model.
Community provider
Which of the following business problems is NOT a problem in the technology dimension?
Complexity of task
____________ is the final and ongoing step of the business process management model.
Continuous measurement
An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business driver:
Customer and Supplier Intimacy
______________ is the total time it takes a child to purchase lemonade ingredients, create the lemonade, and set up operations for a neighborhood lemonade stand.
Cycle time
An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support which of the following?
Decision making and control in an organization
The stage of the decision-making process where identifying and exploring potential solutions takes place is in the ____________ phase.
Design
Which of the following adjusts copyright laws to the Internet age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials?
Digital Millennium Copyright Act
Which of the following is FALSE about Electronic Data Interchange (EDI)?
EDI is a larger firm using a secure website to link to its suppliers and other key business partners.
In this video, Kevin describes _____ as a set of integrated software modules that support nearly all of their organization's business processes.
ERP
According to Jack's explanation of the structure of relational database tables, which of the following statements about columns and rows is true?
Each row is a unique record for one of the items in the table and each column is an attribute of the item.
Which of the following is NOT an application used in social business?
Which of the following entities is NOT a part of the firm's environment?
Employees
_____ are the people or groups, both internal and external to the organization, for whom applications are developed.
End users
What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one another?
Enterprise applications
Why is an order-to-cash service considered a complex process to implement as an enterprise application?
It needs information from many different functions of the enterprise.
__________________ are designed to capture critical processes, procedures, and experience to ensure this critical content isn't lost when someone leaves the organization.
Knowledge management systems
_____ is a feature of political systems in which laws permit individuals to recover damages done to them by the actions of others.
Liability
Which of the following is an example of a popular open source operating system?
Linux.
What are the four elements of critical thinking?
Maintaining doubt and suspending judgment, Being aware of different perspectives, Testing alternatives and letting experience guide, and Being aware of organizational and personal limitations
According to Valerie, which of the following describes the identify guideline of social media behavior?
Make sure you clarify if views are personal or if they represent a company.
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
Malware
What is the name for the field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm?
Management information systems
________________ focus(es) on providing decision making data available for middle managers to make sound business decisions.
Management information systems
_________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards.
Marketing
Which is NOT a way in which NORA technology can create a detailed dossier of a person?
Medical records
According to the information presented in this video, which of the following is not an operating system software?
Microsoft Office
Which of the following is the best example of a software suite?
Microsoft Office 2013
Which is NOT one of the phases in the timeline for the development of an e-commerce presence?
Mobile implementation
A networked system configuration supports which of the following international business strategies?
Multinational and transnational
A server dedicated to managing HTML pages is called a(n):
web server.
Which of the following statements is FALSE regarding Pandora's Internet business model?
Pandora attracted new users by allowing them to download music for free.
Which of the following is NOT considered to be a typical people problem?
Political conflict
______________ analytics has been used by companies like FedEx to determine the impact of price changes on sales.
Predictive
Which type of activity within the value chain model is directly related to the production and distribution for a firm's products and services?
Primary activities
What are the steps of the problem solving process?
Problem Identification, Solution Design, Solution Evaluation and Choice, and Implementation
______________ is a term, when described from a customer perspective, that involves demanding durability, safety, ease of use, as well as service effectiveness and responsiveness.
Quality
What type of systems provide technology for tracking the movement of goods throughout the supply chain?
RFID
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
Ransomware
Which of the following is NOT an impact of the Internet on competitive forces and industry structure?
Reduces the price of products and services
Which of the following is an important capability for service-category business processes that are found in most major CRM software products?
Returns management
Among the eight unique features of e-commerce, which is related to a consumer being engaged with an immersive multimedia experience?
Richness
_____ refers to the use of social networking to extend a business' collaboration efforts in order to engage and connect better with their employees, suppliers, and/or their customers.
Social business
________________ commonly involves sites like Twitter and Facebook to collaborate with customers.
Social business
The social commerce feature that enables a consumer to log into sites through Facebook is called a ___________________.
Social sign-on
Which of the following is NOT a step in the problem-solving process?
Solution analysis
The quality dimension of the decision-making process that addresses the resources of affected parties is called the __________ dimension.
Speed
Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials as well as to customers?
Supply chain management system
When an intelligent system uses nodes that interact, similar to the human brain, to find hidden patterns within large data sets, it is most likely using _________.
a neural network
In this video dramatization, Valerie describes organizational guidelines for all of the following social media behaviors EXCEPT _____.
abstain
A quick report created by the user that is based on his or her own SQL code is called a(n) __________ report.
ad hoc
According to the information presented in this video, a database management system (DBMS) is a software program for creating, processing, and _____ a database.
administering
Sending customers to a website for a referral fee is called the _____________ model.
affiliate revenue
According to the information provided in this video, any business that has an online presence is at risk of _____.
all of the above
According to this video, the business benefits of behavioral tracking include _____.
all of the above
Electronic evidence on computer storage media that is not visible to the average user is called ________.
ambient data
Because so many Web pages use databases, _____ is a major malware threat since poorly coded Web application software is vulnerable.
an SQL injection attack
Based on the information in this video, which of the following is the most accurate description of a business intelligence system?
an information system that processes data into information containing patterns, relationships, and trends
In this video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____.
analog signal
The signal from your iPod earphone is a(n):
analog signal.
As explained in this video, an inventory management program is an example of _____.
application software
In the Star Wars movie, C3P0 was a robot that emulated human behavior and thought which is called ________________.
artificial intelligence
As David explains to Lauren, which of the following can force a business and its competitors to compete on price?
bargaining power of buyers
A company's marketing managers meet to create a new marketing plan. According to Leila, this is an example of _____ decision making.
semistructured
Developing a marketing plan could best be characterized as a(n):
semistructured decision by middle management.
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
social engineering
Facebook and Twitter are both companies that enable users to join up with a larger community. The formal name for this type of organization is called __________________.
social networking
Google Apps is a popular cloud-based:
software as a service (SaaS).
The popular USB "thumb" drive uses a storage technology very similar to:
solid state drives.
In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers.
spoofer
In an effort to ___________ critical business processes, Coca-Cola implemented an SAP enterprise system.
standardize
When talking about changes related to information technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital platform, ________________________, and the growth of cloud computing.
the growing use of big data
Walmart's decision to build fulfillment centers illustrates which force in Porter's Five Forces Model?
threat of new entrants
The social commerce feature that includes a stream of events to create a history for friends to view is/are called ______________.
timelines
Business intelligence (BI) differs from Business analytics (BA) because BA focuses more on ___________________________.
tools and techniques for analyzing data
The acronym related to organizational improvements, TQM, stands for ____________________.
total quality management
Interactions are critical when working to improve customer relations. Specific interactions with customers are called ____________.
touch points
According to the information presented in this video, a company's decision to introduce a new product is an example of _____ decision making.
unstructured
According to Leila, which types of decisions are made at the executive level of an organization?
unstructured
A company's suppliers and the suppliers' suppliers are considered the _____________ portion of the supply chain.
upstream
Disney's Epcot Center has ______________ systems that use interactive graphics software to simulate real-life experiences to both entertain and educate visitors.
virtual reality
The Apple watch is a new type of mobile digital computing called:
wearable computing.
According to the information presented by one of the characters in this video, which of the following describes the refrain guideline of social media behavior?
Don't use company resources such as logos, photos, company email, and so on, unless you have permission to use them.
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal?
Gramm-Leach-Bliley Act
Which of the following is the correct list and correct order of the stages of decision making?
Intelligence, design, choice, implementation
What are the dimensions of information systems?
Organizations, People, and Information Technology
A supply chain driven by actual customer orders or purchases follows which model?
Pull-based model
What are the three general business functions that CRM software serves?
Sales, customer service, and marketing
According to the information in this video, the telephone system is an example of a _____ network.
circuit-switched
In this video, Special Agent Macey says the single largest threat to the Internet is _____.
denial-of-service attacks
Application controls can be classified as _____ controls, _______controls, and ________ controls.
input; processing; output
Customer relationship management typically focuses on three key elements of the customer relationship:
marketing, sales, and service.
According to this video, Linux is an example of _____.
open-source software
Security in an information systems context refers to ___________________________, which are used to prevent unauthorized access or theft.
policies, procedures, and technical measures
Six sigma is a specific measure of _________, representing ____________________.
quality; 3.4 defects per million opportunities
Disney is using a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a guest's room key, park ticket, and eventually a vacation-planning system to make the experience more efficient with reduced wait times.
radio-frequency identification (RFID)
The IT infrastructure computer software component includes both ____________ and __________ software categories.
system; application
AccuMed is a software package used by doctors to schedule patient appointments. According to the information presented in this video, AccuMed is _____.
vertical-market software