DSM Chapters 3, 4, 5, 6
Information systems affect ethical principles because they __________.
-create opportunities for intense social change -raise concerns about the use of intellectual property
How is a database different from a database management system (DBMS)?
A DBMS separates the logical and physical views of the data.
Which of the following statements best describes a strategic transition?
A change in an organization's culture and activities as the result of adopting a strategic information system.
The scenario describes which kind of external software source?
A cloud-based software service
Which of the following best describes the competitive forces model?
A competitive forces model can be used to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments.
Which of the following is an automated or manual file for storing and organizing information about the data maintained in a database?
A data dictionary
__________ is associated with a database management system that end users and programmers use to manipulate data in the database.
A data manipulation language
__________ is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulation or enforcement.
A safe harbor
Which of the following best defines copyright?
A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a copyright.
Which of the following is true of an efficient customer response system?
An efficient customer response system directly links consumer behavior to distribution and production and supply chains.
__________ is a method for documenting databases illustrating the relationship between various entities in the database.
An entity relationship diagram
Which of the following best describes an organization?
An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs.
__________ involves comparing the efficiency and effectiveness of a business process against strict standards and then measuring the performance against those standards.
Benchmarking
Which of the following best describes computer abuse?
Computer abuse is the commission of acts involving a computer that may not be illegal but that are considered unethical.
__________ is the commission of illegal acts through the use of a computer or against a computer system.
Computer crime
From which of the following occupational health risks does Judy likely suffer?
Computer vision syndrome
What are core competencies?
Core competencies are activities at which a firm excels as a world-class leader.
__________ is one of the four basic competitive strategies, and uses information systems to develop strong ties and loyalty with customers and suppliers.
Customer and supplier intimacy
__________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.
Data administration
What is data administration?
Data administration is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.
__________ is a DBMS capability that specifies the structure and content of the database.
Data definition
IBM DB2, Oracle, SQL Server, Sybase, MySQL, Apache, and Hadoop are all examples of which component?
Data management and storage
Implementing information systems has economic, organizational, and behavioral effects on firms. For example, information systems make it possible for companies such as Cisco Systems and Dell to outsource their production to contract manufacturers such as Flextronics instead of making their products themselves. In this example, information systems have what kind of an impact on an organization?
Economic
Implementing information systems has economic, organizational, and behavioral effects on firms. Information technology, especially the use of networks, can help firms lower the cost of market participation (transaction costs), making it worthwhile for firms to contract with external suppliers instead of using internal sources. As a result, firms can shrink in size. In this example, information systems have what kind of an impact on an organization?
Economic
Which of the following refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors?
Ethics
Which of the following is a grouping of characters into a word, a group of words, or a complete number?
Field
You've probably used __________ to find the best airfare on the Internet, get directions to a restaurant, do a search on Google, or connect with a friend on Facebook.
Hadoop
__________ breaks a big data problem down into sub-problems, distributes them among up to thousands of inexpensive computer processing nodes, and then combines the result into a smaller data set that is easier to analyze.
Hadoop
Which of the following is characteristic of the mainframe era?
Highly centralized computing
Which of the following best defines IT infrastructure?
IT infrastructure is the shared technology resources that provide the platform for the firm's specific information system applications.
Which of the following statements best describes the Immanuel Kant's Categorical Imperative?
If everyone did this, could the organization, or society, survive?
Which of the following is one of the five moral dimensions of the information age?
Information rights and obligations
What is data cleansing?
It consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant.
Which statement describes how trade secret laws are limited in their ability to protect intellectual property?
It is difficult to prevent ideas from falling into the public domain.
__________ is an operating system created by the open source community.
Linux
Which of the following is a microprocessor to which two or more processing cores have been attached for enhanced performance?
Multicore processor
Which of the following best describes NORA?
NORA is a new data analysis technology that takes information about people from many disparate sources and correlates relationship to find obscure hidden connections that might help identify criminals or terrorists.
Which of the following statements best describes nanotechnology?
Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.
Which of the following is the process of creating small, stable, yet flexible data structures from complex groups of data when designing a relational database?
Normalization
Microsoft Windows, Unix, Linux, Mac OS X, Chrome, Android, and iOS are all examples of which component?
Operating systems platforms
Which of the following statements best describes program-data dependence?
Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.
Which of the following types of cloud computing is owned and maintained by a cloud service provider and made available to the general public or an industry group?
Public cloud
Google G Suite is an example of ________.
SaaS
__________ consist of organization infrastructure (administration and management), human resources (employee recruiting, hiring, and training), technology (improving products and the production process), and procurement (purchasing input).
Support activities
Which of the following best describes the Risk Aversion Principle?
Take the action that produces the least harm or the least potential cost.
Which of the following ethical principles is best described as putting yourself into the place of others and thinking of yourself as the object of the decision?
The Golden Rule
__________ assumes you can prioritize values in rank order and understand the consequences of various courses of action.
The Utilitarian Principle
Which of the following statements holds true in this scenario?
The law protects her against the copying of the entire software program.
__________ can be used to analyze direct and indirect costs to help firms determine the actual cost of specific technology implementations.
The total cost of ownership (TCO) model
Which of the following statements about the social costs of information technology is true?
The traditional boundaries that separate work from family and just plain leisure have been weakened.
Which of the following highlights activities that add a margin of value to a firm's products or services where information systems can best be applied to achieve a competitive advantage?
The value chain model
Which of the following best defines a value chain model?
The value chain model highlights specific primary and support activities in the business where competitive strategies can best be applied (Porter, 1985) and where information systems are most likely to have a strategic impact.
Which of the following is not a step a firm might take to make sure it has a high level of data quality?
Using in-memory computing
__________ organizes computing resources so that their use is not restricted by physical configuration or geographic location.
Virtualization
Which of the following statements best describe web beacons?
Web beacons are tiny software programs that keep a record of users' online clickstream.
Which of the following refers to loosely coupled software components based on open Web standards that work with any application software and operating system?
Web services
To identify the types of systems that provide a strategic advantage to their firms, managers should ask the following question.
What are some of the competitive forces in the industry?
Which of the following is defined as Windows operating system software on a computer with an Intel microprocessor?
Wintel PC
A structured survey of the accuracy and level of completeness of the data in an information system is called __________.
a data quality audit
According to agency theory, __________.
a firm is viewed as a "nexus of contracts" among self-interested individuals rather than as a unified, profit-maximizing entity
Organizations using information systems to deal with competitive forces __________.
achieve the lowest operational costs
Java is __________.
an operating system- and hardware-independent programming language that is the leading interactive programming environment for the Web
A __________ is loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.
business ecosystem
Most businesses make a mistake when it comes to adopting or implementing information technology because ________.
businesspeople ignore IT instead of taking an active role in shaping it
Privacy is the __________.
claim of individuals to be left alone, free from surveillance
The ________ trend in computer hardware platforms explains how more and more people are using tablet devices to run enterprise wide software applications from remote locations.
cloud computing
When firms and individuals obtain computing power and software as services over a network, including the Internet, rather than purchasing and installing the hardware and software on their own computers, it is called __________.
cloud computing
The competitive advantages that strategic systems confer do not necessarily last long enough to ensure long-term profitability because ________.
competitors can retaliate and copy strategic systems
Procter & Gamble uses an intranet called InnovationNet to help people working on similar problems share ideas and expertise. InnovationNet connects those working in many different departments around the world. It uses a browser-based portal to access data and includes a directory of subject matter experts who can be tapped to give advice or collaborate on problem-solving or product development. This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage.
core competencies
A ________ is a database that stores current and historical data of potential interest to decision makers throughout the company.
data warehouse
Data redundancy occurs when ________.
different groups in an organization independently collect the same piece of data and store it independently of each other
Substitute products that perform as well as or better than anything currently produced are called __________.
disruptive technologies
When Samsung's smartphones overheated and caught on fire, the company had to recall 2.5 million devices. This example demonstrates the ________ component of the TCO model.
downtime
Data mining techniques can be used to ________.
find patterns in data to help managers create forecasts
According to transaction cost theory, __________.
firms and individuals seek to spend less on the costs incurred when a firm buys on the marketplace what it cannot make itself
Text mining tools _________.
help businesses analyze data by extracting key elements from unstructured big data sets, discover patterns and relationships, and summarize the information
Which of the following technology drivers is described by Moore's Law?
microprocessing power
Internet sites like eBay (the giant online auction site) and iVillage (an online community for women) can be used by firms to build communities of users—like-minded customers who want to share their experiences. This builds customer loyalty and enjoyment and develops unique ties to customers. This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage.
network-based strategies
Inbound logistics (receiving and storing materials for distribution to production), operations (transforming inputs into finished products), outbound logistics (storing and distributing finished products), sales and marketing, and service are all __________.
primary activities
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called __________.
profiling
In the most popular type of DBMS, data is represented as two-dimensional tables called ________.
relations
When dealing with platform and infrastructure change, __________ refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
scalability
An information policy __________.
specifies the organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information
According to __________, firms and individuals seek to spend less on the costs incurred when a firm buys on the marketplace what it cannot make itself.
transaction cost theory
The ethical "no free lunch" rule states that __________.
virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
The Utilitarian Principle rule assumes __________.
you can prioritize values in a rank order and understand the consequences of various courses of action