CIS 2700 Final
_________ is larger by volume; _________ is more complex.
B2B; B2C
___ is the ability of information systems to identify objects, scenes, and activities in images.
Computer vision
Cloud computing has the following benefit for companies:
Cost
_________ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else.
Cyber-squatting
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
Cyberterrorism
Which of the following is NOT an example of excellent alignment?
Organizations allow IT employees to develop overarching goals for the business.
________ is a program or collection of programs that enable the hardware to process data.
Software
Considering the following tables, ________ is a primary key.
Student Table: ID
Which of the following is the correct order of networks from largest to smallest?
WAN, MAN, LAN, PAN
________ are applications delivered over the internet that MIS professionals can select and combine through almost any device.
Web services
_________ is the most recent example of ethical misbehavior in organizations.
Wells Fargo Bank
Bandwidth is stated in ________ per second.
bits
Which of the following is NOT a use for data mining?
comparing products
________ marketing is when companies use social computing tools to obtain feedback from customers.
conversational
A(n) ________ portal is an intranet.
corporate
________ is an advantage of cloud-based ERP systems.
cost
Companies purchase digital dossiers to ________.
create customer intimacy
Which of the following is NOT an organizational response to business pressures?
creating a digital divide
Information Systems for marketing incorporate the following functions: (check all that apply)
customer relationship management
_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.
customer satisfaction
An/The ________ is a network of networks.
internet
SCM systems are ________ systems.
interorganizational
BPI is typically performed by ___________.
knowledge workers
Typing in your password to access a system is an example of something the user _________.
knows
Organizations typically invest in cloud-based ERP systems because they are _________.
less expensive
An electronic _________ is a collection of individual shops consolidated under one internet address.
mall
_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.
mass customization
Databases ________ inconsistency; this means ________.
minimize; various copies of the data do not agree
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.
minimum; maximum
Data marts can be implemented ________ compared to data warehouses.
more quickly
_____ is NOT a statistical tool used for predictive analytics.
multidimensional analysis
________ advertising is a sales pitch that fits into the flow of information being shown.
native
________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.
network neutrality
In ________, manufacturers or retailers sell directly to customers.
online direct marketing
_________ is an example of a primary activity for most firms.
operations
Europeans and privacy advocates prefer the _________ model of informed consent.
opt-in
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
You would use optimization or simulation for ______ analytics.
prescriptive
The ________ process originates in the warehouse department and ends in the accounting department.
procurement
With ________, customers use the internet to self-configure products or services.
product customization
________ is an advantage of telecommuting.
productivity
_________ is the result of optimizing the design, development, and production processes.
quality
A ________ generally describes an entity.
record
Database systems minimize ________.
redundancy
_______ is a decisional role.
resource allocator
________ marketing is word-of-mouth advertising.
viral
Data marts and data warehouses typically use ________.
OLAP
If you analyze a data cube, this is an example of using
OLAP
The correct order of the BPI phases is ___________.
define, measure, analyze, improve, and control
__________ reports show a greater level of detail than is included in routine reports.
Drill-down
In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.
forward; higher
Organization's use Porter's competitive forces model to design _________ strategies; they use the value chain model to identify _________ activities to make the greatest impact.
general; specific
________ is NOT an advantage of twisted-pair wire.
high bandwidth
LinkedIn's main market segment is _________.
high-skill jobs
A(n) ________ is an intraorganizational system.
human resources system
Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC.
implementation
When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI. Question options:
improve
________ is an example of effectiveness.
increasing customer satisfaction
The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from________.
increasingly; other business units
________ is a broadcast medium.
infrared
Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) _________ strategy.
innovation
The NBA's use of virtual reality indicates they are using Porter's __________ strategy for competitive advantage.
innovation
All the information about you in your university's database is a(n) ________.
instance
Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.
intelligence
A circle with a "chicken leg" to the entity represents the ________ cardinality symbol.
optional many
_________ are people and equipment that perform process activities.
resources
Modern credit cards are _________ cards.
smart
As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.
structured
You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision.
structured; operational control
________ is an extended ERP module.
supply chain management
A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user.
true
A wiki is a website made up entirely of content posted by users.
true
Businesses must respond to customers more quickly and appropriately than they did prior to social computing.
true
Companies listen to consumers in the blogosphere who express their views on the companies' products. This is consumer-generated media.
true
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. part-structured
unstructured
It is possible to damage your own reputation on LinkedIn.
True
With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options.
vanilla
A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.
warm
________ are an example of harnessing collective intelligence.
wikis
The "_______ Effect" sometimes drives physicians to provide care that patients do not actually need as a way of trying to make the patients happy.
yelp
________ are designed to correct a lack of communication among _________.
ERP; FAIS
_________ materials are those items that are needed for MRO.
Indirect
A(n) ___ agent is a software program that assists you, or acts on your behalf, in performing repetitive computer-related tasks.
Information
Ethernet is a technology associated with ________s.
LAN
________ satellites have an orbital life of 6-12 years.
MEO
Hackers would use a botnet to perform a _________.
DDoS
The ________ rule of thumb is that ________ percent of individuals contribute ________ percent of the content.
20-80; 20; 80
________ is expected to be deployed by 2020.
5G
Information Systems for production and operations management (POM) incorporate the following functions: (check all that apply)
?
________ is a two-dimensional code that can store much more information than ________.
A QR code; bar codes
________ is a collection of related files or tables containing data.
A database
_________ refers to determining who is responsible for actions that were taken.
Accountability
_________ reports contain special information not found in routine reports.
Ad hoc
________ does NOT currently have a GPS system planned or in use.
Australia
_________ comprises the vast majority of e-commerce by volume.
B2B
_________ integrates disparate BPI initiatives to ensure consistent strategy execution.
BPM
Many organizations find _________ too difficult, too radical, too lengthy, and too comprehensive.
BPR
_________ uses a "clean sheet" perspective.
BPR
_________ represents a huge challenge for IT departments because it means IT loses the ability to fully control and manage employee devices.
BYOD
Which of the following is NOT a problem associated with Big Data?
Big Data can be structured, unstructured, or semi-structured.
Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________.
CRM
________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time.
Cable
________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.
Cardinality
________ is the most recent evolution of the modern IT infrastructure.
Cloud computing
Your professor hands you a piece of paper with the number 75 on it. This is ________.
Data
________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.
Data
___ is a subset of machine learning where the system discovers new patterns without being exposed to labeled historical or training data.
Deep learning
________ occurs when the functions of many physical devices are included in one other physical device.
Dematerialization
ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________.
ERP II
________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.
ES
Which of the following cloud computing characteristics allows organizations to share resources? Question
Encompasses the characteristics of grid computing
Which of the following cloud computing characteristics represents the "pay-as-you-go" concept?
Encompasses the characteristics of utility computing
_________ is an access control.
Encryption
________ is NOT a problem caused by computers.
Ergonomics
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
Espionage
_________ is the third step in the general framework for ethics.
Evaluate alternative actions
Expert systems always replace human decision makers.
False
Functional information systems support the entire enterprise or major portions of it.
False
If you grew up using IT, you are an informed user.
False
Only computer science majors can become CIOs.
False
The ultimate goal of AI is to build machines that replace human intelligence.
False
Transaction processing systems typically provide information to managers in the functional areas.
False
You have satellite TV. Providers use ________ satellites to get this service to you.
GEO
________ satellites are stationary relative to a point on the Earth.
GEO
Which of the following is an accuracy issue?
How can we ensure that the information will be processed properly and presented accurately to users?
Which of the following is an accessibility issue?
How much should companies charge for permitting access to information in their databases?
The adoption of ________ has been an important factor in the development of the Internet of Things.
IPv6
________ users install their operating system and their application software on the cloud computing provider's computers.
IaaS
The customer manages the most with ________.
Iaas
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Increasing skills necessary to be a computer hacker
Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________.
Information
________ is organized so that it has meaning and value to the recipient.
Information
_________ are materials, services, and information that flow through and are transformed as a result of process activities.
Inputs
Which of the following increases supplier power?
Integrated Supply Chains
The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.
Internet
Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring that average up to a B by the end of the semester. This is ________.
Knowledge
A network that is restricted to a single building is a ________.
LAN
Medium-range wireless networks are ________ technology.
LAN
NICs allow devices to physically connect to the _______'s communications medium.
LAN
Satellite telephone services are provided through ________ satellites.
LEO
________ satellites have the most negligible transmission delay.
LEO
_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Liability
A network stretching across New York City would be a ________.
MAN
________ are/is a tool for democratizing higher education.
MOOCs
________ is part of the ________ process and occurs when the company is trying to increase its inventory.
Make-to-stock; production
BI systems provide computer-based primarily support _________.
Middle managers
________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control.
Middle managers
________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.
NFC; short
_________ appear(s) underneath the active windows.
Pop-under ads
A(n) ___ agent constantly observes and reports on some item of interest.
Predictive
_____ analytics require _______ analytics.
Prescriptive; predictive
________ clouds provide IT activities and applications as a service over an intranet within an enterprise.
Private
Which of the following is not a function of functional area information systems?
Providing data from business events to the corporate database
________ cloud services may be free or offered on a pay-per-usage model.
Public
Which of the following is NOT a benefit of IT?
Quantity of leisure time
_________ is the first step in the general framework for ethics.
Recognize an ethical issue
Which of the following is NOT a basic function of TCP/IP?
Responsible for disassembling, delivering, and reassembling data during transmission
________ is the most popular query language used for interacting with a database.
SQL
________ is the most widely used service model.
SaaS
________ transmission systems can have a large coverage area but are expensive.
Satellite
_________ occurs when shoppers visit a brick-and-mortar store but then purchase online.
Showrooming
________'s platform helps enterprises to manage the consumer experience at every interaction; the company provides social media marketing, social media monitoring, social advertising, content management, collaboration, and advocacy for large companies.
Sprinklr
_________ collects personal information about users without their consent.
Spyware
________ was/were NOT initially supported by firms' IT departments.
Stand-alone PCs
_________ cards allow you to store a fixed amount of prepaid money and then spend it as necessary.
Stored-value money
A URL that begins with https uses _________.
TLS
________ is the cumulative store of subjective or experiential learning.
Tacit knowledge
___ is a capability performed relatively better by AI than human intelligence.
Total cost of knowledge
A buyer agent is also called a shopping bot.
True
Customers want to be heard and to know whether other customers agree with them, so retailers should allow customers to post reviews and ratings for the best social computing results.
True
________ does NOT use a peer-to-peer business model.
________ is a short-range wireless network.
UWB
Industry experts estimate that 80-90 percent of data in an organization is ________.
Unstructured
_________ organizations are only online.
Virtual
Which of the following cloud computing characteristics allows organizations to use a single physical server for multiple purposes?
Virtualization
_________ is a remote attack requiring user action.
Virus
The ________ is a system of universally accepted standards for storing, retrieving, formatting, and displaying information through a ________ architecture.
WWW; client/server
IBM's Watson is considered ___ AI.
Weak
Which of the following is a privacy issue?
What information about individuals should be kept in databases, and how secure is the information there?
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.
a human error; unintentional
Which of the following was NOT used in the cyberattack on Ukraine?
a logic bomb
If you bring your own router to school to set-up Wi-Fi but do not have permission from your university to do this, this is ________.
a rogue access point
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
accuracy
Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites.
advertising
In the _________ phase of BPI, the BPI team examines the "as is" process map and the collected data to identify problems with the process and their root causes.
analysis
When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the _________ phase of BPI.
analysis
The ________ coordinates and manages new systems development projects.
applications development manager
Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.
around
_________ is an example of efficiency.
automating order entry
You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation.
best-of-breed
________ is an example of the third type of peer-to-peer processing that allows for advanced search and file sharing.
bit torrent
You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit.
blue
The _________ is a model in which organizations attempt to procure needed products or services from other organizations electronically.
buy-side marketplace
Social computing increases _________.
buyer power
A ________ is a group of eight ________.
byte; bits
A _________ site is the least expensive option.
cold
A(n) ________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time.
commercial
_________ is the result of optimizing the manufacturing and logistics processes.
cycle and fulfillment time reduction
If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using
data mining
Data reduction is the conversion of raw _______ into a smaller amount of more useful _______.
data; information
In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs.
define
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
deontology
________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today.
dial-up
GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using
digitized maps
You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard.
drill down
You have to offer online banking if you want to operate a bank. This is a(n) ________.
entry barrier
________ is a common LAN protocol.
ethernet
Dashboards evolved from
executive information systems
Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________.
explicit knowledge
An/The ________ connects networks of multiple organizations so they can communicate securely.
extranet
________ offer limited accessibility to the ________ of participating companies.
extranets; intranets
Any LinkedIn page is better than nothing.
false
Exception reports show a greater level of detail than is included in routine reports.
false
If a company is getting a lot of negative posts on its Wall, it is best to turn off features that let customers post comments without company approval.
false
Social media is a reliable method for communicating about emergencies, so emergency responders use social media in conjunction with the 911 system as much as possible.
false
The best thing about blogs is that they accurately reflect the opinions of customers.
false
Users had passive involvement with Web 2.0 websites. Web 3.0, on the other hand, facilitates more interactive social computing.
false
________ is a cable medium.
fiber-optic
Which of the following Internet services is typically NOT available in rural areas?
fiber-optics
________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content.
folksonomies; tags
Organizations do NOT typically use wikis to _________.
follow consumers' social networking comments
Supplier power is _________ when buyers have few choices from whom to buy and _________ when buyers have many choices.
high; low
The threat of new competitors will enter your market is _________ when entry is easy and _________ when there are significant barriers to entry.
high; low
You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.
sensitivity
________ is an example of the first type of peer-to-peer processing that accesses unused CPU power among networked computers.
seti@home
United Airlines originally apologized only for the "overbook situation" that caused Dr. Dao physical harm. After two days, United Airlines changed its public responses due to ________.
social media backlash
The digital divide is an issue associated with a _________ pressure.
societal
A(n) ________ is an interorganizational system.
supply chain system
_________ are the costs, in money and time, imposed by a decision to buy elsewhere.
switching costs
A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.
systems analyst
Information overload is a _________ pressure.
technology
Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?
technology is getting cheaper to acquire, operate, and maintain
You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of
the development of infrastructure to support enterprise-wide analytics
Data marts are typically associated with
the development of one or a few related analytics applications.
Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______).
the outputs; inputs
The music and newspaper industries were hurt primarily by _________.
threat of substitutes
A _________ is an intellectual work that is not based on public information.
trade secret
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.
transference
Social computing empowers customers and enables them to become business advocates and influencers.
true
Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.
true
________ is the greatest concern in the peer-to-peer economic model.
trust
Six Sigma is a popular _________ technique.
BPI
Buyer power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices.
many; few
________ feature remixable applications and data.
mashups
You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.
passive RFID codes
The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach.
rights
You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.
rot
The fulfillment process originates in the ________ department and ends in the ________ department.
sales; accounting
________ is part of the ________ process and involves sending goods that are in the warehouse to customers.
sell-from-stock; fulfillment
In the ________, organizations sell their products or services to other organizations electronically from their own private e-marketplace website or from a third-party website.
sell-side marketplace