Test 2 MIS CH. 5,6,and 9
How does SMIS increase social capital?
-Capital Investment of resources for future profit - Types of business capital Physical capital: produce goods and services (factories, machines, manufacturing equipment) Human capital: human knowledge and skills investments Social capital: social relations with expectation of marketplace returns
What are the benefits of Content Delivery Networks?
-Decreased, even guaranteed, loadtime -Reduced load on origin server -Increased reliability -Protection from DoS attacks -Reduced delivery costs for mobile users -Pay-as-you-go
What is ESN?
-Software platform uses SM to facilitate cooperative work of people within an organization - Improve communication, collaboration, knowledge sharing, problem solving, and decision making
How do organizations use the cloud with Content Delivery Network (CDN)?
-Stores user data in many different geographical locations and makes data available on demand - Specialized type of PaaS, but usually considered in its own category - Minimizes latency - Used to store and deliver content seldom changed
What is a database management system (DBMS)?
-a program used to create, process, and administer a database -DBMS Process Operations a. Read b. Insert c. Modify d. Delete data -Also referred to as CRUD (Create, Read, Update, Delete)
What are the three SMIS roles?
1. Social media providers - Facebook, Google+, LinkedIn, Twitter, Instagram, and Pinterest platforms - Attracting, targeting demographic groups 2. Users - Individuals and Organizations 3. Communities - Mutual interests that transcend familial, geographic, and organizational boundaries
How do organizations develop effective SMIS?
1.Define goals 2. identify success metrics 3.identify target audience 4.define your value 5.make personal connections 6.gather and analyze data
Formatted messages are passed through networks in the form of _________. A.packets B.public IP addresses C.protocols D.cookies E.domain names
A
The world-wide unique name affiliated with a public IP address is called a ______. A.domain name B.cookie C.packet D.protocol E.private IP address
A
When the data model is converted to a database, which object on the model will become a column or fields in the table? A.Attributes B.Record C.Identifier D.Integrity constraint E.Entity
A
Which of the following is a purpose of "application programs"? A.Provide security, data consistency, and special purpose processing like handle out-of-stock situations B.Search based upon data values provided by the user C.Structured presentation of data using sorting, grouping, filtering, and other operations D.Granting access to the users E.View data; insert new, update existing, and delete existing data
A
Which of the following is not a common SM strategic goal? A. Planning management B. Web site traffic C. Brand awareness D. User engagement E. Conversion rates
A
Which of the following statements about a private cloud is NOT accurate? A. Private clouds provide secure access from outside that infrastructure. B. Private clouds provide the advantages of elasticity, but to questionable benefit. C. Private clouds provide security within the organizational infrastructure. D. To create a private cloud, the organization creates a private Internet and designs applications using Web service standards. E. A private cloud is a cloud that is owned and operated by an organization for its own benefit.
A
Which of the following statements is NOT true? A. "Clickstream data is difficult to gather, and analyses of it are sparse." B. "Social media is the ultimate expression of use increasing value." C. "Google is paid to target users with ads by using their search terms." D. "The two most common ways SM companies generate revenue are advertising and charging for premium services." E. "Social media has evolved in such a way that users expect to use SM applications without paying for them."
A
Which of the following tasks cannot be performed using a list but can be managed through databases? A.To keep track of student registration B.To store the grades of students C.To perform some calculations like addition and subtraction D.To modify the data that is already present E.To delete
A
Which social media provider has the second highest number of active users? A.Instagram B.Facebook C.LinkedIn D.Twitter E.Pinterest
A
With computing infrastructure so much ______________, there must be new jobs somewhere. A.cheaper B.deeper C.more expensive D.bigger E.more available
A
______________ provides not only hardware infrastructure, but an operating system and application programs as well. A.Software as a service service (SaaS) B.CDN C.Wiring as a service (WaaS) D.Platform as a service (PaaS) E.Infrastructure as a service (IaaS)
A
What is a foreign key?
A FOREIGN KEY in one table points to a PRIMARY KEY in another table. A column or group of columns used to represent relationships; values of the foreign key match values of the primary key in a different table.
A connection that is a virtual, private pathway over a public or shared network from the VPN client to the VPN server is called a(n) ________. A.IWS (Internal Web service) B.tunnel C.SOA D.CDN (content delivery network) E.Hop
B
A content delivery network (CDN) is ________. A. a system of only hardware that stores user data in many different geographical locations and makes those data available on demand B. a system of hardware and software that stores user data in many different geographical locations and makes those data available on demand C. a system of hardware and software that stores user data in many different geographical locations and does not let anyone access it D.a highly unreliable storage of data on many networks or servers E.a network of servers which are not capable of delivering small data
B
A future extension of cloud services might be _________ , where all aspects of a business are outsourced to a cloud-based service provider except for the aspect where the business adds unique value. A.Analytics as a Service B.Everything as a Service C.Business Processes as a Service D.Company as a Service E.Business as a Service
B
A type of query that is possible in a browser-based application is a(n) _________ query, where query criteria are created when the user clicks on a graphic. A.spontaneous B.graphical C.clickable D.enhanced E.immediate
B
A(n) _________________ connects computers at different geographic locations. A.Local Area Network (LAN) B.Wide Area Network (WAN) C.Internet D.Intranet E.Protocol
B
The DBMS does not provide applications for which operation? A.inserting data B.automatically correcting data C.deleting data D.reading data E.modifying data
B
What does 'C' stand for in the ACID property of DBMS? A.Complexity B.Consistency C.Capability D.Combinability E.Clarity
B
What happens when the tables are not normalized? A.Nothing is affected. B.There is a data integrity problem. C.Less number of records are loaded in tables. D.The performance of querying tables is enhanced. E.Taking a back-up of data becomes easy.
B
Which of the below exactly describes a procedure? A.Any user computing device B.Create and manage content, informal, copy each other C.Browser, IOS, Android, Windows 10, and other applications D.Key users, adaptive, can be irrational E.Content and connection data storage for rapid retrieval
B
Which of the below is NOT an ESN Deployment Best Practice for "Support"? A.Provide all user access to the ESN. B.Identify groups that would benefit most from the ESN. C.Provide employee training and ESN demonstrations. D.Provide incentives for ESN adoption and use. E.Mandate processes to be used within the ESN.
B
Which of the below is not a step in Social Media Plan Development? A. Identify Success Metrics B. Identify the Resources C. Identify Target Audience D. Define Your Goals E. Define Your Value
B
Which of the following cloud services can eHermes use to distribute its content worldwide as it grows and expands into new markets? A. SaaS (software as a service) B. CDN (content delivery network) C. IaaS (infrastructure as a service) D. IWS (internal Web services) E. PaaS (platform as a service)
B
Which of the following correctly describes a service-oriented architecture (SOA)? A.Programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients B.All interactions among computing devices are defined as services in a formal, standardized way C.Identifies a particular device on the public Internet D.An application program that runs on a server-tier computer E.The protocol used between browsers and Web servers
B
Which of the following is a valid DBMS category according to the new requirement? A.Out-Memory DBMS B.NoSQL DBMS C.Input-Memory DBMS D.OldSQL DBMS E.Output-Memory DBMS
B
Which of the following is one of the SaaS services that eHermes can utilize? A.Office 180 B.Google Drive C.Google Search D.Mainframe E.Google Glass
B
Which of the following terms is used to describe the characteristics of an entity? A.entity-relationship data model B.identifier C.entity D.metadata E.attribute
B
Which of the statements below is FALSE according to the database terminologies? A.Bytes are grouped into columns. B.A byte is a collection of a record. C.Columns are also called fields. D.Rows are also called records. E.A byte is a character of data.
B
eHermes could utilize one of the newer NoSQL DBMS products like __________, an open source document-oriented DBMS, to store the video footage in the same database as the metadata. A.MySQL B.MongoDB C.Oracle D.DB2 E.Teradata
B
A folksonomy __________. A.is a genre of music available on sites like iTunes B.is a database of user information compiled by a social media site C.is content structure that has emerged from the processing of many user tags D.organizes tags as a taxonomy does, but, unlike taxonomies, it is preplanned E.is a synonym for a taxonomy
C
A(n) ________ connects computers that reside in a single geographic location on the premises of the company that operates the network. A.Protocol B.Intranet C.Local Area Network (LAN) D.Internet E.Wide Area Network (WAN)
C
A(n) ________ is the movement from one network to another. A.LAN B.Cloud C.Hop D.WAN E.URL
C
If a database table contains redundant or duplicate data, it can be converted into two tables with better structure through _________. A.data integrity B.creating relationships C.normalization D.cardinality E.data modeling
C
Seth and Kamala discuss these alternatives and decide to use MySQL to store the metadata. They know this approach is ___________________ because it uses known technology. A.very easy B.more productive C.less risky D.more risky E.less productive
C
The __________ position is created in companies to oversee the development and management of innovative social media programs. A.Content Marketing Manager B.Chief Media Officer C.Chief Digital Officer D.Content Innovation Manager E.Human Resource Manager
C
Which of the below is an open source database management system? A.DB2 B.Oracle Database C.MySQL D.Access E.SQL Server
C
Which of the below is not a major source of UGC problems? A.Junk and crackpot contributions B.Mutinous movements C.Unwanted clicks D.Unfavorable reviews E.Inappropriate content
C
Which of the following is NOT one of the ways that organizations use the cloud? A.SaaS (software as a service) B.CDN (content delivery network) C.SCaaS (security control as a service) D.IaaS (infrastructure as a service) E.PaaS (platform as a service)
C
Which of the following is NOT part of the basic concept and definition of the cloud? A.Elastic leasing of resources B.Resource access via the Internet C.Resources owned and operated by a given company D.Pooled computer resources E.The term cloud is used because most early diagrams used a cloud symbol to represent the Internet.
C
Which of the following is not an operation performed by a database developer? A.Create relationships and other structures B.Create tables C.Grants access permission to a database D.Queries the table data E.Modify an existing table
C
Which of the following is not the right way to adhere to the "Disclose" policy according to Intel's Rules of Social Media Engagement? A.Write what you know. B.Use your real name and employer. C.Make your contribution worthwhile. D.Point out if you have a vested interest. E.Stick to your expertise.
C
Which of the following is the right practice to adhere to the "Protect" policy according to Intel's Rules of Social Media Engagement? A.Be transparent. B.Keep it cool. C.Don't slam the competition. D.Be yourself. E.Admit mistakes.
C
Database applications include __________. A.forms, reports, and queries B.user accounts, passwords, and permissions C.tables, relationships, and metadata D.data and information E.DB2 and Access
D
Lists that involve data with _______ require a spreadsheet. A.single columns B.multiple themes C.single rows D.single themes E.different fonts
D
Public IP addresses must be unique and worldwide; their assignment is controlled by a centralized organization known as __________. A.SOA B.Institute for Electrical and Electronics Engineers (IEEE) C.IaaS D.ICANN E.SOHO
D
The explosive growth of __________ has opened new markets for social media. A.crowdsourcing B.web clicks C.data breaches D.the Internet of Things E.human capital
D
Which among the following is a standard for describing the services, inputs and outputs, and other data supported by a Web service? A. SMTP or Simple Mail Transfer Protocol B. XML C. SOAP D. WSDL (Web Services Description Language) E. JSON (JavaScript Object Notation)
D
Which among the following is an example of PaaS? A.Office 365 B.Salesforce.com C.iCloud D.Microsoft Azure E.Amazon EC2 (Elastic Cloud 2)
D
Which of the ACID properties below defines "that either all of a transaction is processed or none of it is"? A.Consistent B.Isolated C.Complexity D.Atomicity E.Durable
D
Which of the below ACID property defines "that once a transaction is stored, it never goes away—even in the presence of failure"? A.Atomicity B.Isolated C.Consistent D.Durable E.Encryption
D
Which of the below correctly describes "Authoring" in SLATE? A. It refers to pushing enterprise content to users based on subscriptions and alerts. B. It refers to enterprise resources. C. It refers to using usage patterns to offer enterprise content via tag processing. D. To create enterprise content via blogs, wikis, discussion groups, presentations, etc. E. To create enterprise content without making use of blogs, wikis, discussion groups, presentations, etc.
D
Which of the following is FALSE with respect to eHermes usage of databases? A.It can store the customer product images in the same database as the metadata. B.The metadata will include the address of the image files on the file server. C.It can store customer product images on a file server. D.It cannot query the database having metadata. E.It can keep metadata about each customer product image in a relational database.
D
Which of the following is NOT a primary value chain activity? A.Customer service B.Manufacturing and operations C.Sales and marketing D.Project management E.Inbound and outbound logistics
D
Which of the following is NOT the way to generate revenue on social media sites? A.Donations B.Sale of apps C.Affiliate commissions D.Building a large network E.Sale of virtual goods
D
Which of the following is a DBMS product offered by Amazon? A.SQL Server B.Cognos C.Teradata D.RedShift E.Pig
D
IaaS provides basic __________ in the cloud. A. malware B. firmware C. DBMS D. software E. hardware
E
If the list is long, put it into a ___________. A.cell B.single list C.database column D.separate column E.spreadsheet
E
The prevailing architecture for Web applications is the _________ architecture. A.single-tier B.combination-tier C.production-tier D.two-tier E.three-tier
E
What does "E" stands for in the acronym, SLATES, given by McAfee? A.Efficiency B.Enterprise C.Effectiveness D.ERP E.Extensions
E
Which of the below defines an identifier? A.It describes characteristics of the entity. B.It is something that a user wants to track. C.It is basically a form of an entity-relationship data model. D.It may represent a physical object, logical construct, or transaction. E.It is an attribute or group of attributes whose value is associated with one and only one entity instance
E
Which of the below is NOT possible with respect to storage of metadata? A.They cannot use it for the most sophisticated query operations if needed. B.They can query data using the Access graphical query facility. C.They can use Access to store the data. D.They can store the URL of the file server location that has the product image. E.They can use the Access database metadata.
E
Which of the below is false with respect to "value of social capital"? A.Henk Flap defined it. B.The number of relationships in a social network determine it. C.It is determined by the resources controlled by those related. D.The strength of those relationships determine it. E.It is determined by only the relationship and not by the resources.
E
Which of the below is incorrect according to the pay-per-click revenue model? A. Online ads let us know what action they took next. B. Users can respond directly to Web ads by clicking on them. C. Online ads let us know the percentage of viewers who clicked on them. D. In this model, advertisers display ads to potential customers for free. E. Nobody is paid using these clicks.
E
Which of the following is NOT correct regarding browser-based database applications? A.Languages like C# and Java are used for server-side processing. B.JavaScript is the standard language for user-side processing. C.Forms, reports, and queries are displayed and processed using html. D.Browser-based applications are thin-client applications. E.Browser-based applications are thick-client applications.
E
Which of the following is NOT likely to lead to monumental changes in the next ten years? A.Agile information systems based on cloud computing B.Dynamic virtualization C.Dynamic information systems based on cloud computing D.New versions of mobile devices E.Company intranets
E
Which of the following is not a risk in a value chain activity? A.Loss of control B.Efficiency/effectiveness C.Loss of credibility D.Privacy E.Problem solving
E
Which of the following is one of the ways to add value to social relations? A.Personal capital B.Social capital C.People management D.Human capital E.Social credentials
E
Which of the following statements about Intel Corporations' social media (SM) policies is NOT accurate? A. Intel has pioneered open and employee-trusting SM policies and continues to evolve those policies as they gain more experience with employee-written social media. B. The three key pillars of Intel's SM policy are to disclose, protect, and use common sense. C. Intel tells employees to be transparent and to disclose their real name and company affiliation when engaging in SM. D. Intel tells employees to admit mistakes and to avoid inflaming a situation when engaging in SM. E. Intel tells employees to protect corporate proprietary and sensitive information at all costs, including lying if necessary to protect Intel's assets and reputation.
E
What is the Entity-Relationship Data Model?
Entities -Something to track Attributes -Describe characteristics of entity Identifier -Uniquely identifies one entity instance from other instances
How are data models used for database development?
Forms Reports and Queries -> Create Data Model (relationships) -> Create Database Design (tables & foreign keys -> Create Database - Data Model is built before constructing a database. Describes relationships and tables in database.
How Do SMIS Advance Organizational Strategy?
Improves communication channels within organization and externally with consumers, design products, develop supplier relationships, and operational efficiencies.
What is maximum cardinality?
Maximum number of entity instances that can occur on each side of the relationship.
________ activities are supported by structured process.
Operations and manufacturing
What is the purpose of a database?
Organize and keep track of things Keep track of multiple themes
How does the internet work?
Packet - a formatted message that passes through networks Domain name - Unique name affiliated with a public IP address - Dynamic affiliation of domain names with IP addresses - Multiple domain names for same IP address URL (Uniform Resource Locator) - Internet address protocol, such as http:// or ftp://
What network technology supports the cloud?
Personal area network (PAN): Devices connected around a single person Local area network (LAN) :Computers connected at a single physical site Wide area network (WAN): Computers connected between two or more separated sites The Internet and internets: Networks of networks Lowercase-i internet is a private network of networks Uppercase-i Internet is the public collection of networks used for transmitting data, worldwide Intranet: A private internet used exclusively within an organization
What are the three types of business capital?
Physical (factories, machines, equipment) Human (knowledge and skill investments) Social (social relations with expectation of marketplace returns)
How is a data model transformed into a database design?
Represent each entity with a table - Entity identifier becomes table key - Entity attributes become table columns Normalize tables as necessary - Remove duplicates to prevent data integrity problems Represent relationships - Use foreign keys - Add additional tables for N:M relationships
How do organizations use the cloud?
SaaS (software as a service): Employees and Customers PaaS (platform as a service):Application, Developers, and Application Testers IaaS (infrastructure as a service): Network Architects, Systems, Administrators
_________ is the use of information technology to support the sharing of content among networks of users.
Social Media
What is a social media information system?
Social media (SM) - IT for sharing content among networks of users - Enables communities of practice ▪ People related by a common interest • Unique aspect of Social Media Data: - Content Data (user contributions) & Connection Data (relationship data)
What does a database look like?
Tables OR Files + Relationships Among Rows in Tables + Metadata = Database
How do web servers support the cloud?
Three tier architecture: user tier, server tier, database tier
What is a three tier architecture?
Web/ presentation layer -------- Application layer ------ Database Layer
What is "Crow's Foot Notation"?
an Entity-Relationship Diagram notation that expresses the relationship between two entities as a line between the two boxes.
What is Structured Query Language-SQL?
an international standard language for processing a database that is used by nearly all DBMS.
The storage of ________ differentiates social media information systems (SMIS) from Website applications.
connection data
Social Media (SM) providers host the SM presence using ________ in the cloud.
elastic servers
Identify a characteristic that is a disadvantage of cloud-based hosting.
loss of control over data location
What is a databse?
self-describing collection of integrated records
What is minimum cardinality?
the minimum number of entity instances that must participate in a relationship instance
What is Enterprise 2.0?
the use of emergent social software platforms within companies or between companies and their partners or customers
A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.
viral hook