BMIS 311 : Final (Rats 1-12)
What are the four layers of the TCP/IP reference model?
Application, Transport, Internet, and Network Interface
Which of the following is the last step in the knowledge management value chain?
Apply
Which of the following statements about enterprise applications is not true?
Enterprise applications are best implemented when few changes in business processes are required.
Which of the following is not true about enterprise systems?
Enterprise software is expressly built to allow companies to mimic their unique business practices
Which of the following statements about genetic algorithms is not true?
Genetic algorithms discover knowledge by using hardware and software that parallel the processing patterns of the biological or human brain.
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?
Information rights and obligations
The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?
Lack of flexibility
Which of the following is not one of the five classical functions of managers?
Leading
________ attempts to leverage the fact that there is always some demand, however small, for a product
Long tail marketing
An ESS supports which of the following?
Long-range planning activities of senior management
Which of the following is an example of a social complementary asset
Technology and service firms in adjacent markets
Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers?
Telecommunications
________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships
Text mining
Which of the following is an example of an organizational complementary asset?
Using the appropriate business model
Which quality dimension of information is concerned that the data values of an information source fall within a defined range?
Validity
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?
Virtualization
Which of the following statements about Internet security is not true?
VoIP is more secure than the switched voice network.
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?
War driving
Which of the following is a recent addition to the mobile digital platform?
Wearable computing devices
Which of the following is a milestone for the website development phase of building an e-commerce presence?
Website plan
Which of the following factors does not help explain why computing resources today are even more available than in previous decades?
Widespread rejection of technology standards
Which of the following is the foundation technology for web services?
XML
A characteristic or quality that describes a particular database entity is called a(n):
attribute.
All of the following are physical components of an RFID system except:
bar codes.
Exposing an individual to ads that are chosen and based on the recorded and analyzed online behavior of the individual is referred to as:
behavioral targeting.
The most successful solutions or methods for achieving a business objective are called:
best practices
Enterprise software is built around thousands of predefined business processes that reflect:
best practices.
Evil twins are:
bogus wireless network access points that look legitimate to users
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
bps
A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:
browser
Enterprise application vendors are now including ________ features, such as tools for data visualization, flexible reporting, and ad-hoc analysis, as part of the application.
business intelligence
The interaction between information technology and organizations is influenced:
by many factors, including structure, politics, culture, and environment.
Application controls:
can be classified as input controls, processing controls, and output controls.
Information systems enhance core competencies by:
encouraging the sharing of knowledge across business units
A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.
enterprise
A schematic of the entire database that describes the relationships in a database is called a(n):
entity-relationship diagram.
All of the following are considered to be knowledge workers except:
executives
All of the following are competitive forces in Porter's model except:
external environment
The concept of management ________ describes situations in which managers act on preconceived notions that reject information that does not conform to their prior conceptions.
filters
Data mining allows users to:
find hidden relationships in data.
In 2010, the FTC added all of the following recommendations to its privacy guidelines except:
firms should limit the length of time that any personal data is stored to six months or less.
MIS typically produce:
fixed, regularly scheduled reports based on data extracted from the organization's TPS
In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services.
free/freemium
Compared to traditional goods, digital goods have:
greater pricing flexibility.
Compared to digital markets, traditional markets have:
higher transaction costs.
The value chain model:
highlights specific activities in the business where competitive strategies can best be applied.
High velocity decision making systems are growing rapidly for decisions classed as:
highly structured.
A data warehouse is composed of
historic and current internal data
SaaS refers to:
hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
Sociologists study information systems with an eye to understanding
how systems affect individuals, groups, and organizations
Psychologists study information systems with an eye to understanding
human decision makers perceive and use formal information
The ethical "no free lunch" rule states that:
if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work
The Sarbanes-Oxley Act:
imposes responsibility on companies and management to safeguard the accuracy of financial information.
All of the following are issues with the traditional file environment except:
inability to develop specialized applications for functional areas.
GDSS capabilities have improved along with all of the following except:
increase in dedicated conference rooms
The business value of an effective supply chain management system includes all of the following except:
increased inventory levels
Redesigning and automating business processes can be seen as a double-edged sword because:
increases in efficiency may be accompanied by job losses.
An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n):
information policy
As discussed in the chapter text, the three main reasons that investments in information technology do not always produce positive results are:
information quality, organizational culture, and management filters.
All of the following are intangible assets of a firm except its:
information systems.
The three activities in an information system that produce the information organizations use to control operations are:
input, processing, and output.
The ________ phase of decision making finds or recognizes a problem, need, or opportunity
intelligence
Apple's Siri application is an example of
intelligent agents.
Components or parts of finished products are referred to as:
intermediate products.
Mintzberg outlined three categories of managerial roles:
interpersonal, informational, and decisional.
A VPN:
is an encrypted private network configured within a public network.
A Trojan horse:
is software that appears to be benign but does something other than expected
All of the following statements are true about information technology's impact on business firms except:
it helps firms expand in size.
If manufacturers had perfect information, they could implement a:
just-in-time strategy.
Along with capital, ________ is the primary production input that the organization uses to create products and services
labor
Expert systems:
lack the general intelligence of human beings.
A ________ is an example of pre-digital data storage that is comparable to a database
library card catalog
The four major competitive strategies are:
low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.
Order fulfillment involves all of the following business processes except:
making customers aware of the product.
The Internet increases the bargaining power of customers by
making information available to everyone.
Selling the same goods to different targeted groups at different prices is called:
price discrimination
A field identified in a table as holding the unique identifier of the table's records is called the:
primary key.
The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called:
procurement.
Manufacturing and production processes include all of the following except
product configuration.
Market creators:
provide a digital environment where buyers and sellers can establish prices for products.
VR systems:
provide architects, engineers, and medical workers with precise, photorealistic simulations of objects.
CAD workstations:
provide engineers, designers, and factory managers with precise control over industrial design and manufacturing.
Walmart's continuous replenishment system allows it to do all of the following except:
provide mass customization.
The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of
quantum computing
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
radiation.
RFID sensor-generated data on stored food items such as storage location is an example of
raw input
As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers
raw materials
Pharming involves:
redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser
The bullwhip effect can be countered by:
reducing information uncertainty
The Gramm-Leach-Bliley Act:
requires financial institutions to ensure the security of customer data
Disciplines that contribute to the technical approach to information systems include
roles in a firm would be least affected by using mobile devices to access firm information systems?
In a table for customers, the information about a single customer resides in a single:
row.
Transaction brokers:
save users money and time by processing online sales transactions.
The decisions involved in creating and producing a corporate intranet can be classified as ________ decisions
semi structured
In a hierarchical organization, the upper level consists of:
senior management
The three principal levels within a business organization hierarchy are
senior management, middle management, and operational management
Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called:
social engineering.
In planning a robust e-commerce presence, you will want to consider the blog platform as part of your ________ presence
social media
Thomas Friedman's description of the world as "flat" refers to:
the flattening of economic and cultural advantages of developed countries
The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output, is referred to as:
the law of diminishing returns
According to ________, you should take the action that produces the least harm
the risk aversion principle
In a multi-tiered network
the work of the entire network is balanced over several levels of servers.
Information density refers to the:
total amount and quantity of information available to all market participants.
A ________ is a method of interaction with a customer, such as telephone or customer service desk
touch point
A well designed ESS will allow management to:
track the activities of competitors
All of the following are examples of business intelligence systems except a system that:
tracks the flows of materials in a factory
When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as
transaction costs
Output:
transfers processed information to the people who will use it or to the activities for which it will be used.
All of the following are unique features of e-commerce technology, except:
transparency
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n):
two-tiered client/server architecture
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):
uniform resource locator
When there is no well-understood or agreed on procedure for making a decision, it is said to be:
unstructured.
OLAP enables
users to obtain online answers to ad-hoc questions in a rapid amount of time
A(n) ________ is software for locating and managing stored web pages
web server
A network that covers entire geographical regions is most commonly referred to as a(n):
wide area network.
The logical view of a database:
presents data as they would be perceived by end users
According to the 2016 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2015?
$15 billion
According to Ponemon Institute's 2015 Annual Cost of Cyber Crime Study, the average annualized cost of cybercrime for companies in the United States was approximately:
$15 million.
Which of the following may lead to competitive advantage? 1. New products, services, and business models; 2. Charging less for superior products; 3. Responding to customers in real time
. 1, 2, and 3
Which of the following is a computer-based system that attempts to emulate human behavior?
. AI technology
Geoadvertising sends ads to users based on their:
. GPS locations.
On which of the following protocols is the Internet based?
. TCP/IP
The 802.11 set of standards is known as:
. Wi-Fi
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect
. bullwhip
A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address
. router
GDSS such as Cisco Collaboration Meeting Rooms Hybrid can handle up to
500 participants.
About ________ percent of the United States GDP is produced by the knowledge and information sectors.
55
What percent of online retailers now have m-commerce websites?
55 percent
Which of the following statements about organizations is not true?
An informal group can be considered to be an organization.
________ is malware that logs and transmits everything a user types
A keylogger
Which of the following best describes the digital social graph?
A mapping of all online social relationships
Which of the following is the best description of a protocol in a telecommunications network architecture?
A standard set of rules and procedures for control of communications in a network
Which of the following seeks to enhance human perception by combining a live direct view of the physical world with computer-generated images?
AR
All of the following are typical components or capabilities of an ECM system except:
AR tools.
How much did American businesses spend on information systems hardware, software, and telecommunications equipment in 2015?
About $1 trillion
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action
Accountability
You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?
Airport code
Which of the following describes how the Simon framework of decision making works in high velocity decision environments?
All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow.
Which of the following defines acceptable uses of a firm's information resources and computing equipment?
An AUP
Which signal types are represented by a continuous waveform?
Analog
Which of the following is not one of the Simon's four stages of decision making?
Analysis
Which of the following is not an example of the potential dark side of big data?
Analyzing data from sensors installed in local parks to monitor soil moisture.
Which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet?
B2C e-commerce
Firms that allow employees to use their own devices are embracing which of the following?
BYOD
Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry?
Benchmarking
________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.
Blade servers
Which of the following statements about wireless security is not true?
Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
The most appropriate wireless networking standard for creating PANs is:
Bluetooth.
Which of the following is not an example of a computer used as an instrument of crime?
Breaching the confidentiality of protected computerized data
Which of the following statements about business processes is not true?
Business processes are typically unaffected by changes in information systems
Which of the following dimensions of e-commerce technology has the potential to raise the quality of information?
Information density
A ________ is a senior manager who oversees the use of IT in the firm
CIO
Which of the following types of system would you use to manage relationships with your customers?
CRM
Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete?
Competitive forces model
Which of the following enables a company to tailor a particular aspect of enterprise software to the way a company does business?
Configuration tables
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
Controls
Which of the following protects the authors of a book from having their work copied by others?
Copyright law
Which of the following is an example of a cross-functional business process?
Creating a new product
Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company
Customer lifetime value
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack
DDoS
What service converts IP addresses into more recognizable alphanumeric names?
DNS
Non-typical business problems with causes and effects that are rapidly changing are typically handled by which of the following types of information system?
DSS
Which of the following types of information systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance?
DSS
Which type of information system would you use to forecast the return on investment if your firm planned to switch to a new supplier that offered products at a lower cost?
DSS
________ are visual tools for presenting performance data in a BI system.
Dashboards and scorecards
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?
Data dictionary
Which of the following occurs when the same attribute in related data files has different values?
Data inconsistency
Which of the following techniques is used for knowledge discovery?
Data mining
Which of the following is the most common reason that business systems fail?
Data quality
________ creates confusion that hampers the creation of information systems that integrate data from different sources.
Data redundancy
_______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage
Data security
The role of entrepreneur falls into which of Mintzberg's managerial classifications?
Decisional
Which supply chain planning function determines how much product is needed to satisfy all customer demands?
Demand planning
would not be used as an input for an information system
Digital Dashboard
Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?
Digital divide
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly
Due process
Which of the following is the most common type of electronic evidence?
Amazon.com is known primarily for its use of which of the following business models?
E-tailer
Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes?
ERP systems
An information system that combines data from internal TPS with information from financial systems and external sources to deliver reports such as profit loss statements and impact analyses, is an example of:
ESS
Which of the following systems would you expect to deliver integrated, personalized business content through a web-based interface?
ESS
Which of the following types of systems typically use a digital dashboard to display an array of charts and graphs of a business's key performance indicators?
ESS
Which of the following would you use to forecast trends in your supplier's industry that could affect your firm over the next five years?
ESS
What is the most important function of an enterprise application?
Enabling business functions and departments to share information
CRM systems help businesses achieve which of the following business objectives?
Enhanced customer intimacy
Which of the following is a firm's CPO responsible for?
Ensuring that the company complies with existing data privacy laws
Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?
Ethernet
Which of the following would not be classified as a KWS?
Expert system
In 2015, American businesses spent $500 billion on business and management consulting and information technology services. (T/F)
False
Which of the following is a grouping of characters into a word, a group of words, or a complete number?
Field
Which of the following statements about disruptive technologies is not true?
Firms that invent disruptive technologies as first movers always become market leaders.
In data mining, which of the following involves using a series of existing values to determine what other future values will be?
Forecasting
From your reading of the LG Electronics case study, the company implemented JDA software solutions to solve what problems?
Inefficient logistics
Which of the following is a highly structured decision?
Granting credit to a customer
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?
Green computing
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA
Web browser software requests web pages from the Internet using which of the following protocols?
HTTP
Which of the following technologies would you use to analyze the social media data collected by a major online retailer?
Hadoop
Which of the following is the key business metric behind the technologies implemented by Kroger, as discussed in the chapter-opening case?
Higher customer satisfaction levels
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?
His action is acceptable, because the higher social value is the survival of the family
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers
ISP
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else
Identity theft
Which of the following best describes Immanuel Kant's categorical imperative?
If an action is not right for everyone to take, it is not right for anyone to take
Which of the following is not a business benefit of collaboration?
Improved compliance with government regulations
Which of the following statements best describes the business value of improved decision making?
Improved decision making results in a large monetary value for the firm as numerous small daily decisions affecting efficiency, production, costs, and more add up to large annual values
Which of the following is not one of the current key technology trends that raises ethical issues?
Increase in data quality
Which of the following dimensions of e-commerce technology involves engaging consumers in a dialog that dynamically adjusts the experience to the individual?
Interactivity
The role of liaison falls into which of Mintzberg's managerial classifications?
Interpersonal
Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following?
IoT application
Which of the following is a primary drawback to the "do anything anywhere" computing environment?
It blurs the traditional boundaries between work and family time
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues
Why isn't overstocking warehouses an effective solution for a problem of low availability?
It increases inventory costs
Which of the following statements about 3-D printing is not true?
It is incompatible with the cloud
Which of the following statements about botnets is not true?
It is not possible to make a smartphone part of a botnet
Which of the following does not describe the dimensions of knowledge in a firm?
It is subject to the laws of diminishing returns.
Which of the following statements about the technical view of organizations is not true?
It sees the inputs and outputs, labor and capital, as being infinitely malleable.
Which of the following statements about Plan International's new human resources system, as described in the chapter case, is not true?
It took six months to implement a working system at Plan International's international headquarters
Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making
KMS
Measures defined by management and used to internally evaluate the success of a firm's financial, business process, customer, and learning and growth are called:
KPIs.
What is meant by the statement "knowledge is sticky"?
Knowledge is hard to move
Which of the following is not one of the main four dimensions of knowledge described in the chapter?
Knowledge is timeless
Which of the following statements is not an accurate description of the importance of knowledge to a firm?
Knowledge is unconditional
Which of the following statements best describes the relationship between collaboration and knowledge management?
Knowledge is useful only when shared with others
Personnel who design new products or services for a firm belong to which level of a business hierarchy
Knowledge workers
Which of the following is a tool for the management, delivery, tracking, and assessment of various types of employee learning?
LMS
Which field of study focuses on both a behavioral and technical understanding of information systems
Management information systems
Which of the following deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm?
Management information systems
Verizon's use of a web-based digital dashboard to provide managers with precise real-time information enabled it to improve which of the following?
Managerial decision making
Which of the following is not one of the five observed ways in which managerial behavior differs from the classical description of managers?
Managers perform a low number of activities for a high percentage of time.
The total number of food items with storage temperatures problems is an example of which of the following?
Meaningful information
________ states that the value or power of a network grows exponentially as a function of the number of network members
Metcalfe's Law
Which of the following are most likely to rely primarily on the drill-down functionality of BI for their decision making needs?
Middle managers
_______ uses individual atoms and molecules to create computer chips and other devices
Nanotechnology
Which of the following marketplace forces would be of least concern to a manufacturer of deep-sea oil rigs?
New market entrants
Which of the following tools enables users to view the same data in different ways using multiple dimensions?
OLAP
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?
On-demand
Walmart exemplifies the power of information systems coupled with state-of-the-art business practices and supportive management to achieve which of the following
Operational Efficiency
To make sure they stock clothes that their customers will purchase, a department store implements a new application that analyzes spending levels at their stores and cross-references this data to popular clothing styles. Which of the following business objectives is this information intended to support
Operational excellence
In a business hierarchy, which of the following levels is responsible for monitoring the daily activities of the business?
Operational management
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?
Packet switching
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Peer-to-peer
Converting raw data into a more meaningful form is called
Processing
________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors.
Product differentiation
in a firm what role would be least affected by using mobile devices to access firm information systems
Production Workers
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?
Quality of life
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read.
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Ransomware
Which of the following would not be considered semistructured knowledge?
Request for proposals
________ means that you accept the potential costs and obligations for the decisions you make.
Responsibility
Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience?
Richness
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?
Risk assessment
From your reading of the chapter's opening case, Skullcandy chose enterprise resource planning software from which of the following ERP vendors?
SAP
Which of the following types of system enables management to make better decisions regarding organizing and scheduling sourcing, production, and distribution?
SCM
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n)
SLA.
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
Safety stock
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
Security
You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take?
Select the functions of the system you wish to use.
Which level of the organization is an ESS specifically designed to serve?
Senior management
A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data?
Sentiment analysis software
Which of the following is not one of the techniques used in web mining?
Server mining
Which of the following is an example of a direct good in the automobile industry?
Sheet steel
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?
Slippery-slope rule
Which of the following industries has the lowest barrier to entry?
Small retailer
Which type of decision is calculating gross pay for hourly workers?
Structured
________ knowledge exists in formal documents, as well as in formal rules that organizations derive by observing experts and their decision-making behaviors
Structured
Which of the following statements about collaboration is not true?
Successful collaboration can be achieved through technology regardless of the organization's culture or structure.
A firm that invests in an information system because it is a necessity of doing business does so because it is seeking to achieve which of the following business objectives?
Survival
Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination?
Switch
Which of the following job categories is expected to experience the most growth over the next eight years?
Systems analysts
To monitor the status of internal operations and the firm's relations with the external environment, managers need which of the following types of system?
TPS
Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?
The Privacy Act
Which of the following best illustrates the relationship between entities and attributes?
The entity CUSTOMER with the attribute PURCHASE
________ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
Unified communications
Which of the following is not true about the changes to EU data protection rules proposed in 2012?
The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data.
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
The opt-in model
All of the following are current hardware platform trends except:
Unix.
Which type of decision is deciding whether to introduce a new product line?
Unstructured
Which of the following best describes how new information systems can result in legal gray areas?
They result in new situations that are not covered by old laws.
Which of the following is the greatest obstacle in enabling collaboration between employees at different, distant corporate locations?
Time zones
Which of the following statements about EDI is not true?
Today, EDI is only used for document automation.
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?
Trade secret
Which of the following is an example of a legacy system?
Transaction processing system running on a mainframe
Which of the following is the single greatest cause of network security breaches?
User lack of knowledge
Running a Java program on a computer requires:
a Java Virtual Machine to be installed on that computer
To use the analog telephone system for sending digital data, you must also use:
a modem.
Backward chaining is:
a strategy for searching the rule base in an expert system that begins with a hypothesis.
Forward chaining is:
a strategy for searching the rule base in an expert system that begins with information entered by the user.
An inference engine is:
a strategy used to search through the rule base in an expert system by forward chaining or backward chaining
A MOOC is:
a type of online course.
Today's nanotechnology-produced computer transistors are roughly equivalent in size to:
a virus
Walmart's attempt to increase its online presence is an example of a firm using information systems to:
achieve low-cost leadership.
The introduction of the minicomputer:
allowed computers to be customized to the specific needs of departments or business units.
a private corporate network extended to authorized users outside the organization
an extranet
In ________, raw data is systematically acquired and transformed during various stages that add value to that information.
an information value chain
Customer service modules in CRM systems provide tools for
assigning and managing customer service requests.
All of the following are steps in the process for analyzing an ethical issue except:
assigning responsibility
Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party
asymmetry
In order to achieve maximum benefit from an enterprise software package, a business should:
change the way it works to match the software's business processes
Instant messaging is a type of ________ service.
chat
The measurement of the number of customers who stop using or purchasing products or services from a company is called:
churn rate
The telephone system is an example of a ________ network
circuit-switched
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of
click fraud
All of the following are technologies used to analyze and manage big data except:
cloud computing.
Computer forensics tasks include all of the following except:
collecting physical evidence on the computer.
All of the following job categories are expected to grow over the next eight years except:
computer programmers.
Interpretations of Moore's law assert that:
computing power doubles every 18 months
The dimension of ________ describes whether data elements are consistently defined
consistency
A drawback to high velocity, automated decision-making systems is that they are unable to
control themselves and respond to new environments.
A(n) ________ is an activity for which a firm is a world-class leader
core competency
IPv6 has been developed in order to:
create more IP addresses.
Selling a customer with a checking account a home improvement loan is an example of:
cross-selling.
Netflix's public announcement of a reward for a technology solution to its movie recommendation system is an example of:
crowdsourcing.
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its
culture
The intentional defacement or destruction of a website is called:
cybervandalism.
A foreign country attempting to access government networks in order to disable a national power grid is an example of
cyberwarfare.
The total time it takes to complete a business process, from start to finish, is called its ________ time
cycle
The text defines ________ as the flow of events or transactions captured by an organization's system.
data
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:
data scrubbing.
All of the following are technical solutions to protecting user privacy except:
data use policies
The term big data refers to all of the following except:
datasets with fewer than a billion records
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits
digital
Removing the business process layers in a distribution channel is called:
disintermediation.
DBMSs typically include report generating tools in order to:
display data in an easier-to-read format.
Varying a product's price according to the supply situation of the seller is called ________ pricing
dynamic
In ________, digital technology and the Internet are used to execute the major business processes in the enterprise.
e-business
Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.
e-business suites
Using the Internet to buy or sell goods is called:
e-commerce.
Which of the following best illustrates the transaction fee revenue model?
eBay receives a small fee from a seller if a seller is successful in selling an item
Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors
market niche
The ability to offer individually tailored products or services using the same production resources as bulk production is known as:
mass customization.
Content providers use ________ systems to process large amounts of very small monetary transactions cost-effectively.
micropayment
The term management information systems refers to a specific category of information systems serving:
middle management functions.
Behavioral models of management see managers as being ________ than does the classical model.
more informal
A firm can exercise greater control over its suppliers by having:
more suppliers.
A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.
multicore processor
All of the following are increased in traditional markets compared to digital markets except:
network effects
The backbone networks of the Internet are typically owned by long-distance telephone companies called:
network service providers.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization.
Implementing enterprise software from Oracle enabled Alcoa to achieve all of the following except:
obtain lower prices for raw materials.
Software that manages the resources of the computer is called:
operating system software
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected
opt-out
The practice of contracting custom software development to an outside firm is commonly referred to as:
outsourcing
A DBMS makes the:
physical database available for different logical views
BI that is designed to determine the most likely effects of changes in the business environment is called:
predictive analytics
Predictive search in Google's search engine:
predicts what you are looking for as you enter words into the query box.
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:
software packages.
A SAN is a ________ network.
storage area
If you can follow a definite procedure to make a business decision, you are making a(n) ________ decision
structured
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a/an:
supply chain
The parts of an organization's infrastructure, human resources, technology, and procurement that make the delivery of the firm's products or services possible are known as ________ activities
support
The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as:
switching costs
When two organizations pool markets and expertise that result in lower costs and generate profits, they are creating:
synergies.
The principal liaison between the information systems groups and the rest of the organization is a(n):
systems analyst.
The text defines ________ as expertise of organizational members that has not been formally documented
tacit knowledge
According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are:
tasks, technology, people, and structure.
A(n) ________ is a scheme for classifying information and knowledge in such a way that it can be easily accessed.
taxonomy
Specifications that establish the compatibility of products and the ability to communicate in a network are called:
technology standards
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?
the Golden Rule
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called:
the Internet of Things.
"Look and feel" copyright infringement lawsuits are concerned with:
the distinction between an idea and its expression.