UMIS
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of an ____ relationship
N:M
The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After assessing the DBMS, she should type the keywords (criteria) into a _____ to obtain the information she wants.
Query
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products?
Relationship management
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
Social capital
Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are known as:
Social media providers
Which of the following is true for the relationship between business processes and information systems?
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.
What are the four phases of collaboration?
Starting, planning, doing, finalizing
What type of decision requires the most collaboration?
Strategic
A manager will essentially require _____ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
Systems thinking
Malware protection can best be described as which of the following:
Technical safeguard
Which of these is one of Porter's 5 forces that determine industry structure
Threat of new entrants
Which of the following is a reason for outsourcing?
To reduce risk
A ______ is a balancing of three critical factors: requirements, cost, and time.
Trade-off
Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database?
1:N
Metrics are only valuable when:
their measure indicates that you have reached your goals
______ are collections of related tasks that receive inputs and produce outputs.
Activities
What is a major function of the information system's department?
All of the above (Manage outsourcing; develop, operate, and maintain applications; plan the use of IS to accomplish organizational goals and strategy)
Which of the following can be described as a security threat?
All of the above (human error, cyber terrorists, natural disasters)
Which of the following are functions of the IS department?
All of the above (protect information assets; manage outsourcing relationships; develop, operate, and maintain applications)
The SDLC (Systems Development Life Cycle) are used for which of the following?
Applications and Information Systems
Training volunteers to use a database would be an example of which of the following ways that information systems improve process quality:
Augmenting a human who is performing an activity
What are the four primary purpose of collaborative teams
Become informed, make decisions, solve problems, manage projects
What is the most important quality to have as a collaborator?
Being able to give and receive critical feedback
. How does knowledge management (KM) benefit organizations?
Both a and b (improve process quality, increase team strength)
_________ is defined as information containing patterns, relationships, and trends
Business intelligence
Which of the following is not true of business processes and information systems?
Business processes, information systems, and applications have the same characteristics and components.
The ReStore case may contain some Content Management System (CMS) challenges. Which of the following is not a CMS challenge?
CMS content is static
In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side?
Data
A ____ is a logical representation of a database that describes the data and relationships that will be stored in the database
Data model
Because of the various problems with operational data, large organizations choose to extract operational data into a _____________.
Data warehouse
The centerpiece of an ERP application is the:
Database
A ____________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.
Datamart
When a company tries to offer the same products at a lower cost they are trying to ______ a customer's buyer power
Decrease
In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility?
Define system
The process a company goes through to determine whether or not to invest in a new location is a _______ process
Dynamic
Why is a working prototype important and useful?
E. Both B and D (Because working with the application allows users to assess usefulnes and usability, Because word descriptions, flowcharts, and sketches do not provide direct experience)
A way of increasing and strengthening social capital for an individual's professional life could be
Endorsing a colleague on LinkedIn
In a data model, an ________ is something that a user wants to track.
Entity
Social media information systems' components differ drastically from other kinds of information systems' components.
False
The information system that pairs with each step in a business process differs in components, based on what task is being completed.
False
The overall goal of IS Security is to
Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards
_______ is a major task when implementing enterprise systems.
Gap identification
The term for taking in-depth measures to reduce a system's vulnerability to harm caused by the public is...
Hardening
In the Five-Component Model, which component is the easiest to change?
Hardware
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to _______.
High levels of rivalry
The CIO is the representative for:
IS issues within the executive staff
Which type of Security Loss does the following scenario describe? A ReStore volunteer, while charging a customer for an item, incorrectly enters the price of an item and sells it to the customer for significantly less than what's on the price tag.
Incorrect Data Modifications
The two key characteristics of collaboration are:
Iteration and feedback
Metrics such as percentage of repeat donors, increase in weekly donation pick-up requests, and store foot traffic rate would be examples of _________________ for ReStore.
Key Performance Indicators (KPI)
Which of the following is a common description of information
Knowledge derived from facts or figures
An example of a social media service that is a 'freemium' is:
Organizational structure may vary depending on all of the following except:
Location
The primary risk of peer-to-peer support in the context of social media and customer service is ______.
Loss of control
What is the competitive strategy of Restore?
Lowest cost within an industry segment
Which of the following is an accurate representation of the steps in the business process management cycle?
Model processes; create components; implement processes; assess results
Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?
Pay-per-click
To effectively manage risk, organizations must proactively balance the trade-off between risk and ____.
Cost
_________ is the dynamic social media process of employing users to participate in product design or product redesign.
Crowdsourcing
What is the process of converting a poorly structured table into two or more well-structured tables?
Normalization
Transforming inputs into the final products describes which primary activity?
Operations/Manufacturing
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers
Outbound logistics
Which of the following would a ReStore managerial-level employee be responsible for?
Participating in requirements meetings
ReStore is creating a new database. Which phase of project management will they be in when they create a budget?
Planning
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the _____ component of an information system.
Procedure
A low inventory report that is automatically generated when the number of items reaches a certain number is an example of ______________.
Push publishing
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?
Training employees on the successful use of the new system
Determining a system's requirements is the most important and requirements are determined by interviewing users.
True
Social media fundamentally changes the balance of power among users, communities and organizations essentially because of its dynamic nature.
True