MIS Test 2
Wi-Fi
802.11 is also know as
information policy
A (n) ___ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data
file
A ___ is a component in the computer system data hierarchy consists of multiple records of the same type
field
A ___ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A
byte
A ___ is a component in the computer system data hierarchy that represents an ASCII character
supply chain
A ___ is a network of organizations for obtaining raw materials
Trojan horse
A ___ is a software program that mimics another program and often causes damage
network
A ___ links two or more computers which enable the sharing of information
foreign key
A ___ provides the link from one table to another table's primary key
bit
A ____ is the smallest component in the computer system data hierarchy
wide area network
A network that spans between Montana and Washington is a(n)
packets of data
A router is a communications processer used to route ___ through different networks.
pull-based
A supply chain management system using a(n) ___ model bases production schedules on actual customer orders
push-based
A supply chain management system using a(n) ___ model bases production schedules on forecasts
database
A(n) ___ is a collection of data organized to serve many applications efficiently
portal
A(n) ___ is an Internet business model that creates a destination site and is provided by companies such as Yahoo, Bing, and Google
content provider
A(n) ___ is an Internet business model which includes companies such as iTunes and WSJ.com
entity-relationship(ER) model
A(n) ___ is the most popular method to model a database
digital
A(n) ___ signal is a discrete, binary waveform
analog
A(n) ___ signal is represented by a continuous waveform that passes through a communications medium
virtual private network (VPN)
A(n) ___ uses the Internet to create a secure network connection
2.8 million dollars
According to Panorama Consulting Solutions, the average cost of an ERP project is approximately
offline media
According to the E-Commerce Presence Map, activities such as education and branding are considered a(n) ___ type of presence
RFID
According to your reading, Dundee Precious Metals improved gold-mining operations by adding ___ technology to track workers, equipment, and vehicles.
business-to-business (B2B)
According to your text, ChemConnect's Web site for buying and selling chemicals is an example of ___ electronic commerc
petabytes
Although "Big Data" doesn't refer to a specific amount of data, it usually does involve
Amazon Relational Database Service
Amazon is one of the first to provide cloud computing relational databases. This effort is called
NoSQL
An emerging non-relational database management system is called
cross-selling
An example of ___ includes someone taking out a loan and then being sold a checking account as well
audit
An information systems ___ examines a firm's overall security environment and determines if the organization is properly prepared to address threats
helps protect a system using full-time monitoring tools
An intrusion detection system (IDS)
analyze customer data for improving business performance
Analytical CRM includes applications that
primary key
Another term for a key field is a
record
Another term for database row is
allows users to charge items to their credit cards
Apple Pay for the iPhone
customer lifetime value
Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called
bits per second
Digital information transfer speeds are measured in
digital good
Downloading a movie to watch is an example of acquiring a
are very expensive to purchase and implement
Enterprise applications have drawbacks mainly because they
Crystal Reports
For DBMS's that do NOT include a reports generator, ___ is a popular option for large corporate DBMS
gatekeeper
IS security firewalls are an example of a
pull-based
If a company produces a custom-made automobile only after a customer has placed an order, it is an example of a ___ production model
receiving, sending
If a computer is sending a file, and a packet being sent is damaged, the ___ computer asks the ___ computer to transmit it
global supply chain
If a supply chain includes organizations from the United States and China, it is considered a(n)
click fraud
If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to commit
key logger
If someone loads a program that tracks everything you type, the specific spyware is a
phishing
If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are
Sarbanes-Oxley Act
In 2002, the ___ was passed to help protect investors with new financial statements reforms
196 million
In 2014, approximately ___ Americans shopped online
finance and accounting
In an enterprise system, the integrated software modules that focus on customer credit are related to
human resources
In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to
manufacturing and production
In an enterprise system, the integrated software modules that focus on production capacity are related to
social CRM
Incorporating applications that allow customers to chat with one another about company products is an example of
disaster recovery planning
MasterCard having a duplicate computer center in multiple cities is an example of ___ in case operations at one location are disrupted
access
Microsoft's DBMS that includes built-in report generation and reporting is called
SQL Server
Microsoft's most powerful DBMS is
partner relationship management (PRM), employee relationship management (ERM)
More advanced CRM applications include ___ and ___
server
On a client/server system, most of the powerful processing is handled by the
two
Public key encryption uses ___ key(s)
denial of service
Regarding IS securities, DoS represents
enterprise software
SAP is the best-selling
databases
SQL injection attacks are related to
Structured Query Language
SQL stands for
packet switching
Slicing digital messages into parcels is called
hacker
Someone who intends to gain unauthorized access to a computer system is considered to be a
domain names, IP addresses
The Domain Name System (DNS) converts ___ to ___
JOIN
The SQL___ statement allows you to combine two different tables
Internet
The ___ is the world's most extensive, public communication system
upstream
The ___ portion of the supply chain includes organizations that supply materials
Netscape
The beginning of e-commerce occurred when ___ accepted the first ads from major corporation
the US Military
The domain extension .mil represents
mobile
The fastest growing type of B2C e-commerce is
primary key
The field that uniquely identifies a row in a relational database table is called a
normalization
The formal process to remove data problems such as repeating groups is called
password
The most commonly used authentication technique used for end users is a(n)
hertz
The number of cycles per second that can be sent through a network medium is calculated in
removing layers and reducing costs
The primary benefit of disintermediation to the consumer is
Internet
The world's largest network is the
biometric
Using your handprint to access a safe deposit box is an example of ___ authentication
can operate on their own without attaching to other computer program files
Viruses differ from worms because worms
bullwhip effect
When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a
Digital certificates
___ are data files used to identify and protect online transactions using a trusted third party.
RFIDS
___ are used to track movements of products through the supply chain.
Information systems (IS)
___ deal(s) with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by managers and employees
EDI
___ enables the computer-to-computer exchange between two organizations
Enterprise resource planning (ERP) systems
___ help businesses become more flexible and productive by integrating groups of processes so they focus on efficient management of resources and customer service such as sales, marketing, and accounting
Business intelligence
___ in enterprise applications provides features for managers to obtain meaningful information from massive amounts of data
Malware
___ includes computer viruses, worms, and Trojan horses
XML
___ is the standard for wireless technologies
Authentication
___ is used to ensure the person who is he/she claims to be
HIPAA
___ was passed in 1996 to protect medical records
decreased
iTunes has dramatically ___ illegal music downloads
MySQL
is a widely used open source DBMS
802.15
Bluetooth is another name for the ___ wireless networking standard
connection medium
Coaxial cable is a(n) ___ for linking network components
sales
Customer relationship management applications that track Web sales and retail store sales are related to the ___ aspect of customer relationships
service
Customer relationship management applications that track social networking data are related to the ___ aspect of customer relationships
capturing and integrating customer data
Customer relationship management primarily includes
data scrubbing
Data cleansing, working to identify and fix incorrect data, is also called