Mis test, Business inteligence test, plugin 6 and 5- security and privacy, CIS 3380 Angelow Final Review, CIS 3380 David Angelow TXState Final Exam
A(n) ________ being simply a business task, such as checking a potential customer's credit rating when opening a new account.
service
Data _______ is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.
steward
Which of the following are types of unstructured data?
text messages Twitter tweets emails
A(n) ________ is an act or object that poses a danger to assets.
threat
A(n) ____________ process is often referred to as the technical core, especially in manufacturing organizations, and is the actual conversion of inputs to outputs.
transformation
Historically, the percentage of IT projects that fully meet their goals is approximately ______%.
33%
Cash flow analysis
A means to conduct a periodic check on the company's financial health.
What is software written with malicious intent to cause annoyance or damage?
A virus
Break-even analysis
A way to determine the volume of business required to begin to make a profit at the current prices charged for the products or services.
A(n) ________ is software written with malicious intent to cause annoyance or damage.
virus
Account matches
An existing business relationship exists and can include customers, prospects, partners, and competitors.
__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
Analytical
What is the science of fact-based decision making?
Analytics
If a CEO wanted to know which systems were used to automate the business processes of the company, he would use the _____ area of enterprise architecture.
Application
Users of software typically interact with which of the following:
Applications Software
What simulates human thinking and behavior, such as the ability to reason and learn?
Artificial intelligence
Select 3 goals or objectives that a leadership plan might include to achieve a solid business strategy.
Attracting new customers Increasing sales Decreasing costs
What are the data elements associated with an entity?
Attributes
What is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system?
Autonomic Computing
What is the name of software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires?
Autonomous Agent
What are defects in the code of an information system?
Bugs
_______ e-commerce is also known as e-tailing.
Business-to-consumer
Software engineers use ___________ (use acronym) tools, which provide automated support for the development of the system.
CASE
Select the five primary reasons project fail.
Changing technology Skipped SDLC phases The cost of finding errors Unclear or missing business requirements Balance of the triple constraints
What is the electronic defacing of an existing website?
Cybervandalism
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
Digital Certificate
Which system coordinates the process of transporting materials from a manufacturer to distribution centers to the final customers?
Distribution management systems
What includes the variables that marketing managers can control in order to best satisfy customers in the target market?
Marketing mix
Which company is using a broad market and high cost strategy?
Neiman Marcus
What is the manipulation of information to create business intelligence in support of strategic decision making?
Online Analytical Processing (OLAP)
What extracts information from data and uses it to predict future trends and identify behavioral patterns?
Predictive Analytics
Select the five key competitive priorities associated with operations management.
Quality Delivery Flexibility Cost Service
What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part?
Systems Thinking
Which of the following systems acquisition methods is time consuming, costly, and may produce excessive documentation?
Systems development life cycle.
What provides an end-to-end view of how operations work together to create a product or service?
Systems thinking
Which of the following is NOT a goal of supply chain management?
To increase cycle time
What produces graphical displays of patterns and complex relationships in large amounts of data?
Visualization
In the __________ phase the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.
analysis
Enterprise resource planning systems _____.
are utilized to enable cross-functional business processes
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n)
attribute
Which of the following are the three areas of information security?
authentication and authorization prevention and resistance detection and response
A(n) __________ integration takes information entered into a given system and sends it automatically to all upstream systems and processes.
backward
Outbound logistics matches
, Distributes goods and services to customers. Distributes goods and services to customers. Marketing
Organizations address security risks through two lines of defense, what are they?
1. People 2. Technology
What is an example of a semi-structured decision?
Changing Employee Benefits
Which is a semistructured decision?
Changing employee benefits
Two major options for IT capabilities organizations can choose from are?
Cloud or On-Premise
What is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed?
Competitive intelligence
What is the science that studies encryption? which is the hiding of messages so that only the sender and receiver can read them.
Cryptography
analytics involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.
Customer
Which of the following is true about the impact of social computing on customer service?
Customers themselves can be used to reduce problems
Which phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation?
Design phase
The management cockpit best exemplifies which type of system?
Digital dashboard
What refers to a period of time when a system is unavailable?
Downtime
What enables users to view details, and details of details, of information?
Drill-down
Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Ediscovery Electronic discovery
______ which is a broader concept than ______, is the buying and selling of goods and services as well as servicing customers, collaborating with business partners, and performing transactions within an organization.
Electronic business; electronic commerce
Analytical information
Encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks.
The major problem with RFID has been ______.
Expense
Human Resources departments only use social computing for external tasks.
False
What is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions?
Feedback
Select the four gates of the RUP methodology.
Gate one: Inception Gate four: Transition Gate two: Elaboration Gate three: Construction
Select the four common reasons companies outsource.
Improve financial savings Expansion and rapid growth Gain core competencies The Internet and globalizatio
Who are the individuals valued for their ability to interpret and analyze information?
Knowledge workers
What is an old system that is fast approaching or beyond the end of its useful life within an organization?
Legacy system
Which of the following is a challenge to outsourcing?
Length of contract
What is a business function that moves information about people, products, and processes across the company to facilitate decision making and problem solving?
Management Information Systems (MIS)
CRM systems are primarily concerned with _____ and SCM systems are mainly concerned with ______?
Marketing; operations
What is the manipulation of information to create business intelligence in support of strategic decision making?
Online analytical processing (OLAP)
What deals with the day-to-day procedures for performing work, including scheduling, inventory, and process management?
Operational planning and control
For a company to have business intelligence capabilities which of the following are required?
Operational systems data
Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?
Optimization Analysis
What uses a zombie pharm, often by an organized crime association, to launch a massive phishing attack?
Pharming attack
What is a masquerading attack that combines spam with spoofing?
Phishing Expedition
What type of analytics takes past purchasing data as inputs into a model that recommends the best pricing strategy across all flights allowing an airline company to maximize revenue?
Prescriptive analytics
What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?
Primary value activities
What is a modern design approach where the designers and system users use an iterative approach to building the system?
Prototyping
Which methodology, owned by IBM, provides a framework for breaking down the development of software into four "gates?
RUP methodology
Which system allows users to create, read, update, and delete data in a relational database?
Relational database management system
Capital
Represents money whose purpose is to make more money, for example, the money used to buy a rental property or a business.
In ______ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins.
Reverse
Select the three variables included in the triple constraint.
Scope Resources Time
What is the name of the software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability?
Shopping Bot
Which policy outlines the corporate guidelines or principles governing employee online communications?
Social media policy
______ handles all aspects of an application - the application software, the computing resources to run it, and data storage.
Software-as-a-service model
Select the three correct criteria for SMART objective creation.
Specific Realistic Time Frame measurable agreed upon
A(n) ______ refers to the flow of materials, information, money, and services from raw materials suppliers, through factories and warehouses tot eh end customers.
Supply chain
What are easy to quantify and typically measured to determine the success or failure of a project?
Tangible benefits
E-commerce and E-business are enabled by using the internet to enable access to ERP or FAIS systems?
True
Which of the following questions can be answered using CRM predicting technologies?
Which products will customers buy?
What breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete?
XP methodology
sales
is the function of selling a good or service and focuses on increasing customer sales, which increases company revenues.
What are the 4 costs of downtime?
1. Financial Performance: Revenue recognition, cash flow, payment guarantees, credit rating, stock price. 2. Revenue: Direct loss, compensatory payments, lost future revenue, Billing losses, Investment losses, Lost Productivity. 3. Damaged Reputation: Customers, Suppliers, Financial Markets, Banks, Business Partners. 4. Other Expenses: Temporary employees, Equipment rentals, overtime costs, extra shipping charges, travel expenses, legal obligations.
Reconciling bank accounts is an example of a(n):
Accounting Business Process
Sales opportunity matches
An opportunity exists for a potential sale of goods or services related to an account or contact.
__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Competitive
What is the process of transferring information from a legacy system to a new system?
Conversion
What creates, reads, updates, and deletes data in a database while controlling access and security?
Database management system
A business process always includes information systems.
False
Which of the following is false?
Functional area information systems easily communicate with each other.
Which of the following is a benefit to outsourcing?
Increased quality and efficiency of business processes.
____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
Information
What is the act of conforming, acquiescing, or yielding information?
Information Compliance
What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?
Mail bomb
Two alternatives for ERP system computing environments are:
On Premise or SeaS
What activity can run over the Internet (or on a CD or DVD), allowing employees to complete their training on their own time at their own pace?
Online training
What is a graphical network model that depicts a project's tasks and the relationships between them?
PERT chart
What is a technique used to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?
Phishing
What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?
Physical security
What makes system changes to reduce the chance of future system failure?
Preventive maintenance
What is a temporary activity a company undertakes to create a unique product, service, or result.
Project
Who is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget?
Project manager
What describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project?
Project scope
Which tool helps users graphically design the answer to a question against a database?
Query-by-example
Select the four primary forms of agile methodologies.
RAD methodology RUP methodology Scrum methodology XP methodology
What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises?
Real-Time Adaptive Security
What is a collection of related data elements?
Records
________ analytics involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.
Sales
A primary concern in using E-business capabilities is ______.
Security risks from exposing systems to internet threats
__________ is the ability to look at information from different perspectives.
Slice-and-Dice
Traditional data formats change __________ while big data formats change ___________
Slowly, rapidly
What modifies software to meet specific user or business requirements?
Software customization
__________ is a method of delivering software in which a vendor hosts the applications and customers access these applications over the Internet.
Software-as-a-Service
What is a report that is created once based on data that does not change?
Static Report
Internal rate of return
The rate at which the net present value of an investment equals zero
What is Augmented Reality?
The viewing of the physical world with computer-generated layers of information added to it?
Supply chains structured with various links, the concept of managing a company's suppliers and suppliers', is the:
Upstream portion of the supply chain
________-if analysis checks the impact of a change in a variable or assumption on the model.
What
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?
Workplace MIS monitoring
At the _________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.
managerial
The __________ methodology is a sequence of phases in which the output of each phase becomes the input for the next.
waterfall
What are the 6 common types of hackers?
1. Black-Hat hackers: break into other people's computer systems and may just look around or may steal and destroy information. 2. Crackers: Have criminal intent when hacking. 3. Cyberterrorists: Seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction. 4. Hactivists: Have philosophical and political reasons for breaking into systems and will often deface the website as a protest. 5. Script Kiddies (Script Bunnies): Find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses. 6. White-Hat hackers: Work at the request of the system owners to find system vulnerabilities and plug the holes.
What are the 5 scientific methods that organizations use to anticipate, forecast, and assess future events?
1. Trend Analysis 2. Trend Monitoring 3. Trend Projection 4. Computer Simulation 5. Historical Analysis
In the video on artificial intelligence from DARPA they discuss past project involving self-driving cars. The duration from no one successfully completing the project to having several teams successfully complete the project was
12 months
The _____ is erratic shifts in orders up and down the supply chain.
Bullwhip effect
Which of the following is a challenge for organizations following the traditional SDLC method?
Compressing time to build a system.
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
Copyright
Select the three structured decisions that almost repetitive in nature and affect short-term business strategies.
Creating weekly production schedules Creating employee staffing schedules Reordering inventory
Searching for valuable business information in a database, data warehouse, or data mart is referred to as _______.
Data mining
What are logical data structures that detail the relationships among data elements using graphics or pictures?
Data models
What is a report that changes automatically during creation?
Dynamic Report
Analytic CRM systems help a company by interacting with its customers.
False
What is the best way to support users and respond to users' questions?
Help desk
Buyer power
High because customers have many airlines to choose from
Threat of new entrants
High because new airlines are continuously entering the market
What is it that examines the organizational resource of information and regulates its definitions, uses, value, and distribution. Ensuring that it has the types of data/information required to function and grow effectively?
Information Management
What is it that details how an organization will implement the information securities policies?
Information Security Plan
Which policy contains general principles to guide the proper use of the Internet?
Internet use policy
What is the process associated with promoting the sale of goods or services?
Marketing
In the video artificial intelligence from DARPA they discuss utilizing which of the following intelligent
Neural Networks
______ offer(s) consumers incentives to accept advertising and e-mail voluntary.
Permission marketing
What are the three categories of analytics?
Predictive analytics Descriptive analytics Prescriptive analytics
Which type of analysis studies the impact on other variables when one variable is changed repeatedly?
Sensitivity Analysis
_______-oriented architecture (SOA) is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services.
Service
The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as _______.
Social intelligence
Contact matches
Specific individual representing the account.
Select the three characteristics of online transactional processing.
Stores the information Processes the information according to defined business rules Updates existing information to reflect the new information
What includes firm infrastructure, human resource management, technology development, and procurement?
Support value activities
What details the steps the system must perform along with the expected result of each step?
Test conditions
Which phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase?
Testing phase
What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?
Threat of substitute products or services
What is the term used to describe the difference between the cost of inputs and the value of price of outputs?
Value-added
Which type of analysis checks the impact of a change in a variable or assumption on the model?
What-If Analysis
Which of the following E-commerce activities would be utilized when interacting with suppliers?
eAuctions
Information __________ is the duplication of data, or the storage of the same data in multiple places.
redundancy
The Internet of Things (IoT) is a world where interconnected Internet-enabled devices or "things" have the ability to collect and share data __________ human intervention.
without
Which of the following is a good example of a system, since removing one part will cause the entire system to stop working?
A car engine
How will a business estimate the impact on profits from increases or decreases in costs?
By manipulating variables
What helps an organization predict customer behavior, such as which customers are at risk of leaving?
CRM predicting technologies
Based on the information in the assigned McKinsey article, which of the following practices and systems have an outsized impsact on performance?
CRM/salesforce systems to enable and empower the salesforce
The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Child
What occurs when a complex system, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis?
Computer Simulation
What occurs when a system produces incorrect, inconsistent, or duplicate data?
Data integrity issues
_____________ occurs when the same data are stored in many places.
Data redundancy
Which of the following is the correct hierarchy from the lowest level to the highest level?
Data, information, knowledge
What type of analytics is best described with a report that includes charts and graphs explaining the data?
Descriptive analytics
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
Digital Rights Management
An organization's IT platform consists of the IT components and IT Services.
False
Enterprise resource management is an enterprise-wide effort to acquire and retain customers.
False
Examples of Functional Area Information Systems (FAIS) are CBIS, ERP, TPS, and SCM.
False
eBay uses an ______ auction.
Forward
_________ logic is a mathematical method of handling imprecise or subjective information.
Fuzzy
What includes the policies, plans, and procedures for the effective management of employees?
Human resources
For most companies, the Web ____ the threat that new competitors will enter the market by _____ traditional barriers to entry.
Increases, decreasing
What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, distribution, and processing of information itself?
Information Ethics
What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?
Information Property
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information Secrecy
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
Information Security
_________ management and control systems provide control and visibility to the status of individual items maintained in inventory.
Inventory
_________ switch is a trigger that enables a project manager to close the project before completion.
Kill
_____ are the physical products, raw materials, and supplies that flow along a supply chain.
Material flows
What provides details about data?
Metadata
What is a category of AI that attempts to emulate the way the human brain works?
Neural network
What is the creation of goods and services using the factors of production: land, labor, capital, entrepreneurship, and knowledge?
Production
Select the two benefits a business that sold hamburgers would experience if it could produce a hamburger with less expensive inputs or produce more hamburgers with the same inputs.
Rise in productivity A likely increase in profits
What evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies?
SWOT analysis
The __________ that changes are made in the systems development life cycle, the _______ expensive these changes become.
Sooner, less.
At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan?
Strategic level
What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?
Three generic business strategies
What are small electronic devices that change user passwords automatically?
Tokens
A business process has inputs and outputs.
True
The buy option is particularly attractive if the software vendor allows the company to modify the package to meet its needs.
True
The number of alternatives to be considered in decisions today is increasing.
True
The return on investment (ROI) method of cost-benefit analysis measures the effectiveness of management in generating profits with its available assets.
True
The two major categories of software are systems software and applications software.
True
True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.
True
True or false: The graphical user interface (GUI) is commonly way of interacting with an an information system.
True
True or false: The value of information is only as good as the people who make use of the information.
True
Select the three things a supplier can do to influence an industry if it has high supplier power.
charging higher prices limiting quality or services shifting costs to industry participants
Select the three things a supplier can do to influence an industry if it has high supplier power.
charging higher prices shifting costs to industry participants limiting quality or services
The ____________ phase takes all the detailed design documents from the design phase and transforms them into the actual system.
development
A(n) __________ privacy policy details the extent to which email messages may be read by others.
A(n) ______ is a simplified representation or abstraction of reality.
model
As discussed in class, completing the Foodmart exercise was an example of conducting business intelligence
true
What are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services?
web services
What are the 3 areas of Information Security?
1. People: Authentication and Authorization 2. Data: Prevention and Resistance 3. Attacks: Detection and Response
Inbound logistics matches
Acquires raw materials and resources and distributes to manufacturing as required.
Enterprise resource planning systems take a(n) _____ view of the overall organization.
Business process
What is the series of activities that determine the earliest time by which the project can be completed?
Critical path
Which of the following is an example of a tangible benefit?
Decreased processing error
Which of the following is not an affect that E-commerce has had on organizations?
E-commerce is a costly medium for increasing market share
Customers that are using software-as-a-service are not using cloud computing.
False
What is a mathematical method of handling imprecise or subjective information?
Fuzzy Logic
Which system provides the ability to locate, track, and predict the movement of every component or material anywhere upstream or downstream in the production process?
Global inventory management systems
Threat of substitute products or services and
High because of alternatives, such as videoconferencing and virtual meetings
What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information secrecy
Supply chain management is comprised of core components; the components are:
Plan, source, make, deliver, return
The name of the company who delivered the in-class meeting on SaaS ERP software was
Plex
What is a form of social engineering in which one individual lies to obtain confidential data about another individual?
Pretexting
What is a form of malicious software that infects your computer and asks for money?
Ransomware
What stores information in the form of logically related two-dimensional tables?
Relational database model
IOS technologies assist with a number of SCM tasks, which of the following is NOT a benefit of IOS?
Removing uncertainty in demand forecasts
Which of the following are examples of analytical information?
Sales projections Product statistics
_____ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future. (Enter one word in the blank.)
Strategic
________ costs are costs that make customers reluctant to switch to another product or service.
Switching
Which of the following is not a characteristic of a structured decision?
The first three phases of the decision-making process need not occur in any particular sequence
An attribute is any characteristic or quality that describes a particular entity
True
_____ is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Typosquatting
What is created that highlights how to use the system and how to troubleshoot issues or problems?
User documentation
Which of the ERP implementation approaches is used when a company decides to adopt the best-practices include in ERP systems?
Vanilla approach
A(n) ____________ integration takes information entered into a given system and sends it automatically to all downstream systems and processes.
forward
Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _________.
industry
The structure of a typical organization is similar to a __________, and the different levels require different types of information to assist in decision making, problem solving, and opportunity capturing.
pyramid
What is the difference between transactional information and analytical information? (transactional is listed first and analytical is second)
1- Encompasses all of the information contained within a single business process or unit of work, supports the performance of daily operational or structured decisions. Ex: Purchasing stocks, making airline reservations, and withdrawing cash from an ATM. 2- Encompasses all organizational information (including transactional information), its primary purpose is to support the performance of managerial analysis or semistructured decisions. Ex: trends, sales, product statistics, and future growth projections.
What are 5 potential features included in a dashboard designed for a manufacturing team?
1. A hot list of key performance indicators, refreshed every 15 minutes 2. A running line graph of planned versus actual production for the past 24 hours 3. A table showing actual versus forecasted product prices and inventories 4. A list of outstanding alerts and their resolution status. 5. A graph of stock market prices
What are the four common forms of viruses?
1. Backdoor Programs: Opens a way into the network for future attacks 2. Denial-of-service attack (DoS): Floods a website with so many requests for service that it slows down or crashes the site. (if done with multiple computers it is called Distributed Denial-of-service attack (DDoS) 3. Polymorphic viruses and worms: Change their form as they propagate. 4. Trojan-Horse Virus: Hides inside other software, usually as an attachment or downloadable file.
What are the 4 components of the digital dashboard analytical capabilities?
1. Consolidation: The aggregation of data from simple roll-ups to complex groupings of interrelated information. Ex: data for different sales reps can be rolled up to an office level, then a state level, then a regional sales level. 2. Drill-Down: Enables users to view details, and details of details, of information. This is the reverse of consolidation; a user can view regional sales data and then drill down all the way to each sales reps data at each office. Lets managers view monthly, weekly, daily, or even hourly information. 3. Slice-and-Dice: The ability to look at information from different perspectives. One slice of information can display all product sales during a given promotion. Another slice could display a single product's sales for all promotions. Slicing and Dicing is often performed along a time axis to analyze trends and find time-based patterns in the information. 4. Pivot (rotation): rotates data to display alternative presentations of the data. Ex: a pivot can swap the rows and columns of a report to show the data in a different format. (Think pivot table)
What are some examples of hacker weapons? (8 listed)
1. Elevation of Privilege: User misleads system into granting unauthorized rights, usually to destroy the system. 2. Hoaxes: Attack computer systems by transmitting a virus hoax with a real virus attached. 3. Malicious Code: A variety of threats such as viruses, worms, and trojan horses. 4. Packet Tampering: Altering the contents of packets as they travel the internet or altering data on computer disks after penetrating a network. 5. Sniffer: Program or device that can monitor data traveling over a network. 6. Spoofing: Forging the return address on an email so the message appears to come from someone other than the actual sender. 7. Splogs (Spam Blogs): Fake blogs created solely to raise search engine rank of affiliate websites. 8. Spyware: Software hidden in free downloadable software that tracks online movements, mines information stored on computers, or uses a computer's CPU and storage for some task the user knows nothing about.
What are the 5 areas where we are seeing artificial intelligence? and give examples of AI from each one.
1. Expert Systems: Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. Ex: Computers Playing Chess 2. Neural Networks: Category of AI that attempts to emulate the way the human brain works. Ex: Credit Card companies checking for fraud 3. Genetic Algorithms: An AI system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. Ex: Investment companies in trading decisions 4. Intelligent Agents: Special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users. Ex: Environmental scanning and competitive intelligence. 5. Virtual Reality: Computer-Simulated environment that can be a simulation of the real world or an imaginary world. Ex: Working virtually around the globe.
What are the 5 ethical guidelines for Information Management?
1. Information Secrecy 2. Information Governance 3. Information Management 4. Information Compliance 5. Information Property
What are the two sources of Unstructured Data?
1. Machine-Generated: includes satellite images, scientific atmosphere data, and radar data. 2. Human-Generated: Includes text messages, social media data, and emails.
What are the 3 challenges when it comes to managerial decision making?
1. Managers need to analyze large amounts of information. 2. Managers must make decisions quickly. 3. Managers must apply sophisticated analysis techniques, such as porter's strategies or forecasting, to make strategic decisions.
What are the 3 levels to a common company structure? and what are the objectives of each level? (Starting with the bottom and working upwards)
1. Operational Level: (Structured decisions) Employees develop, control, and maintain core business activities required to run the day-to-day operations. 2. Managerial Level: (Semistructured decisions) Employees are continuously evaluating company operations to hone the firm's ability to identify, adapt to, and leverage change. 3. Strategic Level: (Unstructured Decisions) Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan. - With Unstructured Decisions, there are no procedures or rules that exist to guide decision makers toward the correct choice.
What are the 6 steps in the decision making process?
1. Problem Identification: Define the problem as clearly and precisely as possible. 2. Data Collection: Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem. 3. Solution Generation: Detail every solution possible, including ideas that seem farfetched. 4. Solution Test: Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or temporary fix?), and acceptability (can all participants form a consensus?). 5. Solution Selection: Select the solution that best solves the problem and meets the needs of a business 6. Solution Implementation: If the solution solves the problem, then the decisions made were correct. If not, then the decisions were incorrect and the process begins again.
What are the 3 characteristics of online transaction processing?
1. Process the information according to defined business rules. 2. Stores the information. 3. Updates existing information to reflect the new information.
What are 7 trends that the book highlights that have the potential to change our world, our future, and our lives?
1. The world's population will double in the next 40 years. 2. People in developed countries are living longer. 3. The growth in information industries is creating a knowledge-dependent global society. 4. The global economy is becoming more integrated. 5. The economy and society are dominated by technology. 6. The pace of technological innovation is increasing. 7. Time is becoming one of the world's most precious commodities.
What is Big Data?
A collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
Partnership agreement
A legal agreement between two or more business partners that outlines core business issues.
What spreads itself from file to file but also from computer to computer causing annoyances as well as damage in a computer?
A worm
Match the departments on the left with their primary data types on the right.
Accounting matches Choice, Transactional data Sales matches Choice, Potential customer data Operations management matches Choice, Manufacturing data Marketing matches Choice, Promotion data Human resources matches Choice, Employee data Finance matches Choice, Investment data
Match the characteristic of high-quality information on the left with its corresponding question on the right. Instructions
Accurate matches Choice, Is there an incorrect value in the information? Is there an incorrect value in the information? Complete matches Choice, Is a value missing from the information? Is a value missing from the information? Consistent matches Choice, Is aggregate or summary information in agreement with detailed information? Is aggregate or summary information in agreement with detailed information? Timely matches Choice, Is the information current with respect to business needs? Is the information current with respect to business needs? Unique matches Choice, Is each transaction and event represented only once in the information? Is each transaction and event represented only once in the information?
What is it that the National Institute of Standards and Technology (NIST) introduced? Designed to keep government information secure.
Advanced Encryption Standard (AES)
What is software that, while purporting to serve some useful function and often fulfilling that function, also allows internet advertisers to display advertisements without the consent of the computer user?
Adware
What aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements?
Agile methodology
Match the testing type on the left with its correct definition on the right.
Alpha Testing matches Choice, Assess if the entire system meets the design requirements of the users Assess if the entire system meets the design requirements of the users Development Testing matches Choice, Test the system to ensure it is bug-free Test the system to ensure it is bug-free Integration Testing matches Choice, Verify that separate systems can work together, passing data back and forth correctly Verify that separate systems can work together, passing data back and forth correctly System Testing matches Choice, Verify that the units or pieces of code function correctly when integrated Verify that the units or pieces of code function correctly when integrated User Acceptance Testing (UAT) matches Choice, Determine if the system satisfies the user and business requirements Determine if the system satisfies the user and business requirements Unit Testing matches Choice, Test individual units or pieces of code for a system Test individual units or pieces of code for a system
Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:
Benefits tend to be more tangible than costs
Which of the following are examples of information as opposed to data? (Check all that apply.)
Best customer Best-selling product Worst-selling product
What is the identification of a user based on a physical characteristic? such as fingerprint, iris, face, voice, or handwriting.
Biometrics
In the data Hierarchy, the smallest element is the _______.
Bit
group data and corresponding processes into objects. (Enter one word in each blank.)
Blank 1: Object Blank 2: oriented Blank 3: languages
___________ is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
Brainstorming
A company can create a competitive advantage by executing well designed business processes. An organization seeking significant improvement requiring complete redesign of their business processes would likely use which of the following methods?
Business Process Reengineering
attempts to understand and measure the current process and make performance improvements accordingly.
Business process improvement
Porter's 5 forces model helps organizations identify _____, whereas his value chain model helps organizations identify specific _____.
Business strategies, activities
What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?
Business-critical integrity constraints
In _____ e-commerce, the sellers and buyers are organizations.
Business-to-business
Which type of electronic commerce is the largest by dollar volume?
Business-to-business
If you are a worker managing your fringe benefits over your company's intranet, you are engaging in _______ e-commerce.
Business-to-employee
The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the
CIO
What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors?
COBIT
What helps an organization segment their customers into categories such as best and worst customers?
CRM analysis technologies
Lead
Choice, A person or company that is unknown to your business. A person or company that is unknown to your business.
Marketing and sales matches Choice
Choice, Promotes, prices, and sells products to customers. Promotes, prices, and sells products to customers.
Service
Choice, Provides customer support after the sale of goods and services Provides customer support after the sale of goods and services
Operations
Choice, Transforms raw materials or inputs into goods and services. Transforms raw materials or inputs into goods and services.
__________-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Click
Cloud computing provides a financial advantage over on premise computing because:
Cloud computing is an operating expense while on premise computing is a capital expense
Match the PMBOK term on the left with its definition on the right.
Communication plan matches Choice, Defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations Defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations Executive sponsor matches Choice, The person or group who provides the financial resources for the project. The person or group who provides the financial resources for the project. Project assumption matches Choice, Factors considered to be true, real, or certain without proof or demonstration. Factors considered to be true, real, or certain without proof or demonstration. Project constraint matches Choice, Specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies Specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies Project deliverable matches Choice, Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Project objective matches Choice, Quantifiable criteria that must be met for the project to be considered a success. Quantifiable criteria that must be met for the project to be considered a success.
What is the legal protection afforded to an expression of an idea, such as a song, book, or video game?
Copyright
What is an artificially created legal entity that exists separate and apart from those individuals who created it and carry on its operations?
Corporation
____________ maintenance makes system changes to repair design flaws, coding errors, or implementation issues.
Corrective
Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?
Cost leadership
Managers and executives need information on business activities and may utilize dashboards to understand how the performance of specific elements. The essential elements to measure success of a business are called
Critical Success Factors
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
Cyberbullying
Data Information Business Intelligence Knowledge
Data matches Choice, I have one item. I have one item. Information matches Choice, The item I have is a product that has the most sales during the month of December. The item I have is a product that has the most sales during the month of December. Business Intelligence matches Choice, The month of December this year is going to see interest rates raise by 10 percent and snow storms are expected to cause numerous problems throughout the East coast. The month of December this year is going to see interest rates raise by 10 percent and snow storms are expected to cause numerous problems throughout the East coast. Knowledge matches Choice, Given the unexpected financial issues caused by the storms and the interest rate hike we will offer a discount on purchase in November and December to ensure sales levels increase by 10 percent. Given the unexpected financial issues caused by the storms and the interest rate hike we will offer a discount on purchase in November and December to ensure sales levels increase by 10 percent.
___________ occurs when various copies of the data agree
Data consistency
What compiles all of the metadata about the data elements in the data model?
Data dictionary
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management
Data inconsistency
Select the four primary reasons low-quality information occurs in a system.
Data-entry personnel enter abbreviated information to save time. Online customers intentionally enter inaccurate information to protect their privacy. Third-party and external information contains inconsistencies and errors. Different systems have different information entry standards and formats. Completeness. The customer's first name is missing. Another issue with completeness. The street address contains only a number and not a street name. Consistency. There may be a duplication of information since there is a slight difference between the two customers in the spelling of the last name. Similar street addresses and phone numbers make this likely. Accuracy. This may be inaccurate information because the customer's phone and fax numbers are the same. Some customers might have the same number for phone and fax, but the fact that the customer also has this number in the email address field is suspicious. Another issue with accuracy. There is inaccurate information because a phone number is located in the email address field. Another issue with completeness. The information is incomplete because there is not a valid area code for the phone and fax numbers.
What type of systems model information using Online Analytical Processing (OLAP), which provides assistance in evaluating and choosing among different courses of action?
Decision Support Systems
Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?
Decision support system
Project management is comprised of the following major phases:
Define, Plan, Execute, Close-out
Select the four functions that a database management system can perform on data in a database.
Delete data Update data Read data Create data
What do we call malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines?
Destructive Agents
What is a tool that supports visualization. As well as tracks Key Performance Indicators (KPIs) and Critical Success Factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs?
Digital Dashboard
What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?
Digital dashboard
________ prototyping builds a small-scale representation or working model of the system to ensure it meets the user and business requirements.
Discovery
_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
Drive
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
Drive-by hacking
Select the statement that accurately defines the relationship between entities and attributes in a relational database.
Each attribute of an entity occupies a separate column of a table.
Match the feasibility study on the left with its correct definition on the right.
Economic feasibility matches Choice, Measures the cost-effectiveness of a project Measures the cost-effectiveness of a project Operational feasibility matches Choice, Measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities Measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities Schedule feasibility matches Choice, Measures the project time frame to ensure it can be completed on time Measures the project time frame to ensure it can be completed on time Technical feasibility matches Choice, Measures the practicality of a technical solution and the availability of technical resources and expertise Measures the practicality of a technical solution and the availability of technical resources and expertise Political feasibility matches Choice, Measures how well the solution will be accepted in a given organization Measures how well the solution will be accepted in a given organization Legal feasibility matches Choice, Measures how well a solution can be implemented within existing legal and contractual obligations Measures how well a solution can be implemented within existing legal and contractual obligations
What is it that refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
Ediscovery (Electronic Discovery)
Match the hacker weapon on the left with its correct definition on the right.
Elevation of privilege matches Choice, A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. Hoaxes matches Choice, Attack computer systems by transmitting a virus hoax, with a real virus attached. Attack computer systems by transmitting a virus hoax, with a real virus attached. Malicious code matches Choice, Includes a variety of threats such as viruses, worms, and Trojan horses. Includes a variety of threats such as viruses, worms, and Trojan horses. Packet tampering matches Choice, Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. Sniffer matches Choice, A program or device that can monitor data traveling over a network. A program or device that can monitor data traveling over a network. Spoofing matches Choice, The forging of the return address on an email so that the message appears to come from someone other than the actual sender. The forging of the return address on an email so that the message appears to come from someone other than the actual sender. Splogs matches Choice, Fake blogs created solely to raise the search engine rank of affiliated websites. Fake blogs created solely to raise the search engine rank of affiliated websites. Spyware matches Choice, Software that comes hidden in free downloadable software and tracks online movements. Software that comes hidden in free downloadable software and tracks online movements.
All of the following are used to provide online market research except:
Emails
Transactional information
Encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks.
Select two unstructured decisions.
Entering a new market Entering a new industry
Select the four primary strategic initiatives for competitive advantages.
Enterprise resource planning Supply chain management Business process reengineering Customer relationship management
Select the term that refer to storing information about a person, place, thing, transaction, or event.
Entity
________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Epolicies
Which of the following is not a role that information systems play in business processes?
Establish standards
What are the two fundamental blocks on which organizations base their businesses?
Ethics and Security
What does a business analyst do?
Evaluates the company's business needs and select systems to improve performance
Which of the following is not an electronic commerce application?
Evaluating an employee
What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight?
Executive information system
What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?
Expert systems
Comparing FAIS to ERP systems which of the following is true?
FAIS are developed internally while ERP are purchased
An organization with multiple business written (SBU's) each having different business models would most likely utilize a centralized organization structure?
False
BPR is a strategy for improving the efficiency of an organization's data collection.
False
Big Data is easy to define
False
Business-to-consumer applications comprise the majority of electronic commerce dollar volume.
False
Businesses do not use social commerce for new products.
False
Data not refers to the quality of the data itself
False
ERP systems cannot manage cross departmental processes.
False
Functional area information silos were particularly efficient when business processes crossed functional boundaries in an organization.
False
Internet advertising is impersonal, one-way mass communication.
False
It is important for applications and data to be dependent on each other
False
Risk management is used to manage projects and the techniques used are unique, risk management cannot be used to assist other business function?
False
The four deployment methods for cloud computing are public clouds, private clouds, hybrid clouds, and horizontal clouds.
False
The internet increases traditional barriers to entry into a market.
False
True or false: Information in an organization exists only a few departments, such as sales and marketing.
False
Unstructured decisions require a combination of standard solution procedures and individual judgment.
False
Targeted marketing is a good example of the discovery of previously unknown or hidden patterns.
False/ but possibly *true*
___________ is the measure of the tangible and intangible benefits of an information system.
Feasibility
Which of the following is not an advantage of the buy option for acquiring IS applications?
Few types of off-the-shelf software are available, thus limiting confusion
Identify the costs of downtime on the right with the appropriate categories on the left. Instructions
Financial performance matches Choice, Revenue recognition, cash flow, credit rating, stock price Revenue recognition, cash flow, credit rating, stock price Damaged reputation matches Choice, Customers, suppliers, banks, business partners Customers, suppliers, banks, business partners Revenue matches Choice, Lost future revenue, billing losses, investment losses, lost productivity Lost future revenue, billing losses, investment losses, lost productivity Other expenses matches Choice, Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations
Identify the programing language on the left with the correct definition on the right.
First generation matches Choice, Machine language difficult for people to understand Machine language difficult for people to understand Second generation matches Choice, Assembly language difficult for people to understand Assembly language difficult for people to understand Third generation matches Choice, High-level programming languages, such as C+ and Java High-level programming languages, such as C+ and Java Fourth generation matches Choice, Programming languages that look similar to human languages Programming languages that look similar to human languages Fifth generation matches Choice, Programming languages for artificial intelligence and neural networks Programming languages for artificial intelligence and neural networks
Select the three generic business strategies Porter identified for entering a new market.
Focused strategy Broad cost leadership Broad differentiation
What are programming languages that look similar to human languages?
Fourth-generation languages
Select three examples of analytical information.
Future growth projections Market projections Sales trends
Which of the following is the greatest challenges implementing ERP systems?
Gaining employee support to change and adopt ERP system capabilities
What is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally?
Gantt chart
What finds the inputs necessary to achieve a goal such as a desired level of output?
Goal-seeking analysis
Direct payment of Social Security benefits is an example of ______ e-commerce.
Government-to-citizen
What refers to the level of detail in the model or the decision-making process?
Granularity
Rivalry among existing competitors
High because of the existence of websites such as Travelocity.com that force competition based solely on price
Supplier power
High because there are limited plane and engine manufacturers to choose from
What is it that occurs when attackers grant themselves the same access levels they already have but assume the identity of another user?
Horizontal Privilege Escalation
__________ management is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
Identity
In which phase does the organization place the system into production so users can begin to perform actual business operations with it?
Implementation phase
Which of the following is an example of an intangible benefit?
Improved community service
Which two terms describe the use of professional expertise within an organization to develop and maintain its information technology systems?
In-sourcing In-house development
Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.
Increase its supplier power
Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.
Increase its supplier power Create entry barriers to reduce the threat of new entrants.
Competitive advantage for an organization manifests itself as all of the following except:
Increased time to market
What is the method or system of government for information management or control?
Information Governance
What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?
Information Silo
What are the two primary resources knowledge workers use to make decisions?
Information and intuition
What is a method or system of government for information management or control?
Information governance
What refers to the extent of detail within the information?
Information granularity
Which epolicy contains general principles regarding information privacy?
Information privacy policy
Select the four primary traits of the value of information.
Information type Information quality Information timeliness Information governance
The _____ area of Enterprise Architecture can be used to understand the computer hardware, networking and other physical devices.
Infrastructure/Technical
Match the items on the right with their correct categories on the left. Instructions
Input matches Choice, Land, Labor, Capital, Information Land, Labor, Capital, Information Transformation matches Choice, Conversion process Conversion process Output matches Choice, Goods, Services Goods, Services
_________ benefits are difficult to quantify or measure.
Intangible
________ allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.
Integrations
What are rules that help ensure the quality of information?
Integrity constraints
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
Operational CRM systems help a company ______ with customers while Analytical CRM systems help a company _______.
Interact with customers; business intelligence on customer behaviors and perceptions
What consists of a series of tiny projects. It has become the foundation of multiple agile methodologies?
Iterative development
What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?
Knowledge
_________ is a process that helps organization identity, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.
Knowledge management
Which phase does the organization perform changes, corrections, additions, and upgrades to ensure the system continues to meet business goals?
Maintenance phase
Select all the activities for which transactional information is created.
Making airline reservations Withdrawing cash from an ATM Purchasing stocks
____ decisions cover short- and medium-range plans, schedules, and budgets along with policies, procedures, and business objectives for a firm and also allocate resources and monitor the performance of organizational subunits.
Managerial
Which of the following concerns how an organization should achieve the goals and objectives set by its strategy and are usually the responsibility of mid-level management?
Managerial decisions
________ requirement planning systems use sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company.
Materials
The major components of the "digital economy" as discussed in class are?
Mobil, Social, and Cloud/big data
The function of ______ is to convert digital signals to analog signals and vise-versa.
Modems
Companies commonly apply the 80/20 rule when evaluating vendor applications software options. When using the 80/20 rule, companies should seriously consider _______.
Modifying their business processes if vendor applications meet 80% of their needs
Decisions today are becoming _____ complex, due to ______ uncertainty in the decision environment.
More; Increased
What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?
Mutation
What groups data and corresponding processes into objects?
Object-oriented languages
What supports general business processes and does not require any specific software customization to meet the organization's needs?
Off-the-shelf application software
Match the outsourcing form on the left with its correct definition on the right.
Onshore outsourcing matches Choice, Engaging another company within the same country for services. Engaging another company within the same country for services. Nearshore outsourcing matches Choice, Contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country. Contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country. Offshore outsourcing matches Choice, Using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away. Using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away.
_________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.
Outsourcing
Place the phases in the systems development life cycle in the correct order, with the first phase at the top.
P A DES DEV TEST IMP/MAINT
Match the system implementation method on the left with its correct definition on the right.
Parallel Implementation matches Choice, Uses both the legacy system and new system until all users verify that the new system functions correctly Uses both the legacy system and new system until all users verify that the new system functions correctly Plunge Implementation matches Choice, Discards the legacy system and immediately migrates all users to the new system Discards the legacy system and immediately migrates all users to the new system Pilot Implementation matches Choice, Assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system Assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system Phased Implementation matches Choice, Installs the new system in phases (for example, by department) until it is verified that it works correctly Installs the new system in phases (for example, by department) until it is verified that it works correctl
What are similar to sole proprietorships, except that this legal structure allows for more than one owner.
Partnership
Match the focus areas on the right with the type on the left.
People matches Choice, Authentication and authorization Authentication and authorization Data matches Choice, Prevention and resistance Prevention and resistance Attacks matches Choice, Detection and response Detection and response
What is it that reroutes requests for legitimate websites to false websites?
Pharming
Match the key term on the left with its correct definition on the right.
Pie chart matches Choice, A type of graph in which a circle is divided into sectors that each represent a proportion of the whole. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole. Bar chart matches Choice, A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent. Histogram matches Choice, A graphical display of data using bars of different heights. A graphical display of data using bars of different heights. Sparkline matches Choice, A small embedded line graph that illustrates a single trend. A small embedded line graph that illustrates a single trend. Time-series chart matches Choice, A graphical representation showing change of a variable over time. A graphical representation showing change of a variable over time.
What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?
Porter's Five Forces Model
What are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service?
Porter's three generic strategies
What uses techniques that create models indicating the best decision to make or course of action to take?
Prescriptive analytics
What is a field that uniquely identifies a given record in a table?
Primary key
What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
Privacy
The alternatives for utilizing clod computing include which of the following:
Private Cloud, Public cloud and Hybrid Cloud
What is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications?
Privilege Escalation
Match the step in the decision-making process on the left with the correct definition on the right.
Problem identification matches Choice, Define the problem as clearly and precisely as possible. Define the problem as clearly and precisely as possible. Data collection matches Choice, Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem. Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem. Solution generation matches Choice, Detail every solution possible, including ideas that seem farfetched. Detail every solution possible, including ideas that seem farfetched. Solution test matches Choice, Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or a temporary fix?), and acceptability (can all participants form a consensus?). Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or a temporary fix?), and acceptability (can all participants form a consensus?).
Identify the key strategies and goals involved in business processes. (Check all that apply.)
Product realization Customer acquisition Order to delivery
Match the PMBOK term on the left with its definition on the right.
Project management office matches Choice, An internal department that oversees all organizational projects. An internal department that oversees all organizational projects. Project milestone matches Choice, Represents key dates when a certain group of activities must be performed. Represents key dates when a certain group of activities must be performed. Project requirements document matches Choice, Defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts. Defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts. Project scope statement matches Choice, Links the project to the organization's overall business goals Links the project to the organization's overall business goals Project stakeholder matches Choice, Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion. Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion. Responsibility matrix matches Choice, Defines all project roles and indicates what responsibilities are associated with each role. Defines all project roles and indicates what responsibilities are associated with each role. Status report matches Choice, Periodic reviews of actual performance versus expected performance Periodic reviews of actual performance versus expected performance
What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process?
RAD methodology
__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.
Relational
What is the process of managing changes to the business requirements throughout the project?
Requirements management
What is a programming method that provides for interactive modules to a website?
Scripting language
What uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal?
Scrum methodology
___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.
Semi
In you were to use Excel and build a model to help test the impact of changes to input variables on output variables is an example of a decision-support system performing which type of analysis?
Sensitivity Analysis
Match the SOA concept on the left with the correct definition on the right.
Service matches Choice, A business task. A business task. Loose coupling matches Choice, The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component. The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component. Interoperability matches Choice, The capability of two or more computer systems to share data and resources, even though they are made by different manufactures. The capability of two or more computer systems to share data and resources, even though they are made by different manufactures.
Select the organization on the left with its definition on the right.
Six sigma quality matches Choice, The goal is to detect potential problems to prevent their occurrence and achieve no more than 3.4 defects per million opportunities. That is important to companies like Bank of America, which makes 4 million transactions a day. The goal is to detect potential problems to prevent their occurrence and achieve no more than 3.4 defects per million opportunities. That is important to companies like Bank of America, which makes 4 million transactions a day. Malcolm Baldrige National Quality Award matches Choice, In 1987 in the United States, a standard was set for overall company quality with the introduction of the Malcolm Baldrige National Quality Awards, named in honor of the late U.S. secretary of commerce. Companies can apply for these awards in each of the following areas: manufacturing, services, small businesses, education, and health care. To qualify, an organization has to show quality in seven key areas: leadership, strategic planning, customer and market focus, information and analysis, human resources focus, process management, and business results. In 1987 in the United States, a standard was set for overall company quality with the introduction of the Malcolm Baldrige National Quality Awards, named in honor of the late U.S. secretary of commerce. Companies can apply for these awards in each of the following areas: manufacturing, services, small businesses, education, and health care. To qualify, an organization has to show quality in seven key areas: leadership, strategic planning, customer and market focus, information and analysis, human resources focus, process management, and business results. ISO 900 matches Choice, The common name given to quality management and assurance standards comes from the International Organization for Standardization (ISO), a nongovernmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services. ISO is a worldwide federation of national standards bodies from more than 140 countries. ISO 900 standards require a company to determine customer needs, including regulatory and legal requirements. The common name given to quality management and assurance standards comes from the International Organization for Standardization (ISO), a nongovernmental organization established in 1947 to promote the development of world standards to facilitate the international exchange of goods and services. ISO is a worldwide federation of national standards bodies from more than 140 countries. ISO 900 standards require a company to determine customer needs, including regulatory and legal requirements. ISO 14000 matches Choice, This collection of the best practices for managing an organization's impact on the environment does not prescribe specific performance levels, but establishes environmental management systems. This collection of the best practices for managing an organization's impact on the environment does not prescribe specific performance levels, but establishes environmental management systems. CMMI matches Choice, Capability Maturity Model Integration is a framework of best practices. The current version, CMMI-DEV, describes best practices in managing, measuring, and monitoring software development processes. CMMI does not describe the processes themselves; it describes the characteristics of good processes, thus providing guidelines for companies developing or honing their own sets of processes. Capability Maturity Model Integration is a framework of best practices. The current version, CMMI-DEV, describes best practices in managing, measuring, and monitoring software development processes. CMMI does not describe the processes themselves; it describes the characteristics of good processes, thus providing guidelines for companies developing or honing their own sets of processes.
What is a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission?
Spyware
What focuses on long-range planning such as plant size, location, and type of process to be used?
Strategic planning
_______ decisions are more common at lower organizational levels.
Structured
What type of data has a defined length, type, and format and includes numbers, dates, or strings such as customer address? Also stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
Structured Data
Computer support is greatest for which of the following problems?
Structured and operational control
A standardized language used to manipulate data is ________.
Structured query language
What is the tool that consists of lines of code (in contrast to a graphical design) for answering questions against a database?
Structured query language
The name of the company that delivered the demo in class showing data visualization and dashboards was
Tableau
________ planning focuses on producing goods and services as efficiently as possible within the strategic plan.
Tactical
What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another?
The Ambient Digital Experience
When a company evaluates options for acquiring information systems, which of the following is fundamental factor in the decision-making process?
The amount of code the company wants to write.
What includes the four phases a product progresses through during its life cycle including introduction, growth, maturity, and decline?
The product life cycle
An organization that has good Business and IT alignment is best described as which of the following?
Tight integration of the IT function with the organization's strategy, mission, and goals
What type of processing system is the basic business system that serves the operational level (analysts) and assists in making structured decisions?
Transaction Processing System (TPS)
__________ describe the activities of the business, whereas __________ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities
Transacton data, master data
___________ planning systems track and analyze the movement of materials and products to ensure the delivery of materials and finished goods at the right time, the right place, and the lowest cost.
Transportation
What examines a trend to identify its nature, causes, speed of development, and potential impacts?
Trend Analysis
What are trends that are viewed as particularly important in a specific community, industry, or sector that are carefully monitored, watched, and reported to key decision makers?
Trend Monitoring
What occurs when numerical data is available and a trend can be plotted to display changes through time and into the future?
Trend Projection
A major challenge in supply chain management is reducing uncertainty in demands and supply.
True
A university register who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be applying her knowledge in your application process.
True
According to the article from CIO, businesses are moving ERP systems from on-premise to cloud-based architectures
True
Aligning Business and IT strategies is important for organizations successful use of IT and has been a consistent theme throughout the semester?
True
An entity is a person, place, thing, or event about which information is maintained
True
An executive dashboard is very user friendly, supported by graphics, provides exception reporting and drill down, and provides information related to critical success factors.
True
Applications software cannot be run on computer hardware without operating systems software.
True
Based on the ERP demo, companies utilizing SaaS cloud computing have lower IT costs than firms not using SaaS computing
True
Business processes may be located within one functional area or may span multiple functional areas.
True
CRM is a customer-focused and customer-driven organizational strategy.
True
Channel conflict occurs when click-and-monitor companies have problems with their regular distributors when they sell directly to customers online.
True
Cross-functional business processes are horizontal, spanning multiple departments with each function (department) needing to complete an activity to complete the process.
True
Data from FAIS systems is used to create business intelligence systems and dashboards to help a management make decisions.
True
Digital dashboards are information systems that support all managers of the organization.
True
Ebusiness/Ecommerce has evolved into the digital economy which is comprised of mobile, social media, and big data.
True
Forward auctions are auctions that sellers use as a channel to many potential buyers.
True
Functional or information systems can be used to support the needs of the entire enterprise major portions of it.
True
Historically, the functional area information systems were often internally developed independently of one another.
True
Information technology refers to computer-based tools used to support the needs of an organization?
True
Measuring customer churn helps a company know the magnitude of the number of customers it loses?
True
One advantage of cloud computing is that it shifts IT from a capital expenses to an operating expense.
True
Organizations that use e-commerce and eBusiness utilize data gathered from interactions fir the purpose of analyzing the data with the objective of gaining insights into trends, patterns, and improve business outcomes.
True
Over the course of a project, there is an inverse relationship between the cost to correct a risk and likelihood a risk will occur.
True
Scope, Communications, Budget and Risk Management are all elements of project management.
True
Structured decisions address routine, repetitive problems for which standard solutions exist.
True
The ASP and SeaS alternative for acquiring IT applications both rely on vendors to provide the hardware needed for applications to operate.
True
The IT Steering committee is a critical component in developing and implementing the IT Strategic Plan.
True
The IT Strategic Plan must be aligned with the organization's strategic plan.
True
The IT function is an organization is a support function and the primary goal is cost minimization.
True
True or false: Decisions range from routine choices, such as how many items to order or how many people to hire, to unexpected ones such as what to do if a key employee suddenly quits or needed materials do not arrive. Today, with massive volumes of information available, managers are challenged to make highly complex decisions—some involving far more information than the human brain can comprehend—in increasingly shorter time frames.
True
True or false: Managers need to continuously monitor projects to measure their success. If a project is failing, the manager must cancel the project and save the company any further project costs. Canceling a project is not necessarily a failure as much as it is successful resource management as it frees resources that can be used on other projects that are more valuable to the firm.
True
True or false: The relationship among the triple constraint variables is such that if any one changes, at least one other is likely to be affected.
True
Understanding how IT systems improve efficiency and reduce cost of cross-functional business processes has been a consistent theme throughout the semester?
True
With the exception of the Business Architecture area, Enterprise architecture addressees the same elements as Computer Based Information Systems (CBIS)
True
An artiste is any characteristic or quality that describes a particular entity
Ture
What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice?
Unstructured
When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be:
Unstructured
What type of data does not follow a specific format and is typically free-form text such as emails, twitter tweets, and text messages? Also accounts for about 80 percent of the data that surrounds us.
Unstructured Data
You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size care of the same brand for you to drive. The salesperson is engaged in:
Up-selling
The comments of consumers in the blogosphere concerning a company's products are called ______.
User-generated content
Based on the CIO article on Business intelligence, they project the future capabilities will
Utilize advance technologies that calculate trends and future possibilities, predicting potential outcomes and making recommendations
Why does a database offer increased information security?
Various security features of databases ensure that individuals have only certain types of access to certain types of information.
What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?
Vertical Privilege Escalation
___ reality is a computer-simulated environment that can be a simulation of the real world or an imaginary world.
Virtual
What is a phone scam that attempts to defraud people by asking them to call a bogus phone number to "confirm" their account information?
Vishing (Voice Phishing)
What are the three distinct characteristics that distinguish big data from traditional data?
Volume, velocity and variety
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
Website name stealing
Select the question that can be answered using only raw data.
What is the date, amount sold, and customer number for a sale transaction?
What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?
White-hat hackers
Drag and drop the common types of hackers on the left against the corresponding definitions on the right.
White-hat hackers matches Choice, Work at the request of the system owners to find system vulnerabilities and plug the holes. Work at the request of the system owners to find system vulnerabilities and plug the holes. Script kiddies matches Choice, Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. Cyberterrorists matches Choice, Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. Crackers matches Choice, Have criminal intent when hacking. Have criminal intent when hacking.
What is held in a classroom environment and led by an instructor?
Workshop training
The advantages of electronic commerce for consumers include all of the following except:
You typically cannot access additional information, so you do not have information overload
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?
Zombie
What is a group of computers on which a hacker has planted zombie programs?
Zombie Farm
A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
acceptable
A(n) _________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.
business
Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
censorship
A value _____ analysis views a firm as a series of business processes that each add value to the product or service.
chain
A(n) ___________ agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.
change
Information _________ is the act of conforming, acquiescing, or yielding information.
compliance
In analyzing a business, the characteristics of an individual sale, such as the order date, are best referred to as ______.
data
Select a term that is a synonym for data element, the smallest or basic unit of information in a database.
data field or element
What illustrates the movement of information between external entities and the processes and data stores within the system?
data flow diagram
What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?
data stewardship
What includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data?
data validation
A(n) ________ maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
database
A requirements ___________ document prioritizes all of the business requirements by order of importance to the company.
definition
A(n) ___________ is a logical relationship that exists between the project tasks, or between a project task and a milestone.
dependency
A _____ report changes automatically during creation. It includes an update of daily stock market prices or the calculation of available inventory.
dynamic
Software __________ is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.
engineering
An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security.
ethical
The process of moving data from various sources into the data warehouse is called
extracting, transforming, and loading
A(n) _____ is the confirmation or validation of an event or object.
fact
There is no difference between master data and transaction data
false
A(n) __________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
foreign
Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.
governance
Rivalry among existing competitors is _____ when competition is fierce in a market and ______ when competitors are more complacent.
high; low
What is data that humans, in interaction with computers, generate?
human-generated data
human resources
includes the policies, plans, and procedures for the effective management of employees.
Information ___________ occurs when the same data element has different values.
inconsistency
What occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally?
information silo
Information _________ is a measure of the quality of information.
integrity
A(n) ______ agent is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.
intelligent
What is a hybrid entity that has the legal protections of a corporation and the ability to be taxed (one time) as a partnership?
liability corporation
Select the three things a supplier can do to influence an industry if it has high supplier power.
limiting quality or services charging higher prices shifting costs to industry participants
What is the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components?
loose coupling
Which type of data is created by a machine without human intervention?
machine-generated data
Production _________ describes all the activities managers do to help companies create goods.
management
Project ___________ is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
management
Extensible ________ Language (XML), a markup language for documents, containing structured information.
markup
A(n) ____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
methodology
Return on investment
ndicates the earning power of a project and is measured by dividing the benefits of a project by the investment.
Sign-_________ is the users' actual signatures indicating they approve all of the business requirements.
off
One primary goal of a database is to eliminate information redundancy by recording each piece of information in _______ place(s) in the database.
only one
At the ___________ level, employees develop, control, and maintain core business activities required to run the day-to-day operations.
operational
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?
patent
The project __________ is a formal, approved document that manages and controls the entire project.
plan
The __________ phase establishes a high-level plan of the intended project and determines project goals.
planning
What extracts information from data and uses it to predict future trends and identify behavioral patterns?
predictive analytics
Business __________ are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.
requirements
Human _______ includes the policies, plans, and procedures for the effective management of employees.
resources or resource
Market
segmentation is the division of a market into similar groups of customers.
A large foreign automobile manufacturer is considering where to build a new manufacturing plant in the United States. They are making which type of decision?
semistructured - how ever it may be unstructured
Which of the following are types of machine-generated structured data?
sensor data point-of-sale data web log data
Web ________ are application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services.
services
Operational decisions are considered __________ decisions, which arise in situations where established processes offer potential solutions.
structured
What is typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
structured data
The _________ development life cycle is the overall process for developing information systems, from planning and analysis through implementation and maintenance.
system
Competitive advantages are typically ___________.
temporary
A variable is a data characteristic that stands for a value that changes or varies over __________.
time
Strategic decisions are highly ____________ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice.
unstructured
What are intelligent systems?
various commercial applications of artificial intelligence. They include sensors, software, and devices that emulate and enhance human capabilities, learn or understand from experience, make sense of ambiguous or contradictory information, and even use reasoning to solve problems and make decisions effectively.