MIS 301 Mid-Term
Porter's competitive forces model identifies _________ major forces that can endanger or enhance a company's position in a given industry.
5
_________ is an attack by a programmer developing a system.
A Trojan horse
_________ is a communications control.
A firewall
Careless Internet surfing is _________ and is an _________ mistake.
A human error; unintentional
_________ refers to determining who is responsible for actions that were taken.
Accountability
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
Accuracy
_________ causes pop-up advertisements to appear on your screen.
Adware
Each characteristic or quality of a particular entity is called a(n) ________.
Attribute
Six Sigma is a popular _________ technique.
BPI
_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.
BPI
_________ integrates disparate BPI initiatives to ensure consistent strategy execution.
BPM
_________ uses a "clean sheet" perspective.
BPR
Which of the following is an accurate representation of the data hierarchy from smallest to largest?
Bit, Byte, Field, Record, File, Database
A ________ is a group of eight ________.
Byte; Bite
The _________ approach highlights the interlocking relationships that underlie all societies.
Common Good
Application Development Manager
Coordinates and manages new systems development projects
Which of the following is the correct order of the KMS cycle?
Create, Capture, Refine, Store, Manage, Disseminate
_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.
Customer satisfaction
Hackers would use a botnet to perform a _________.
DoS
_________ is a remote attack requiring no user action
DoS
The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
Fairness
BI systems provide the input data for corporate databases.
False
Data and information are synonyms.
False
Information is knowledge that has been organized to have meaning and value.
False
TPS typically collect data in batches.
False
The ________ creates links between two tables.
Foreign
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.
Hot
Which of the following is a property issue?
How should we handle illegally copying copyrighted software
IT services, IT personnel, and IT components make up the organization's ___________.
IT infrastructure
_________ are materials, services, and information that flow through and are transformed as a result of process activities.
Inputs
Intellectual capital is another term for ________.
Knowledge
Information Center Manager
Manages IS services such as help desks, hot lines, training, and consulting.
A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department
Mart; Warehouse
The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it
Opt-In
The ________ key is an identifier field that uniquely identifies a record.
Primary
_________ issues involve collecting, storing, and disseminating information about individuals.
Privacy
_________ is an example of a support activity for most firms.
Product and technology development
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.
Public; Private
Database systems minimize ________.
Redundancy
_________ means that you accept the consequences of your decisions and actions
Responsibility
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
Rights
Each relational database table contains records (listed in _______) and attributes (listed in ______) .
Rows; Columns
______ is the most popular query language used for interacting with a database.
SQL
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
Spamware
_________ collects personal information about users without their consent.
Spyware
Considering the following tables, ________ is a primary key.
Student Table: ID
Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?
Technology is getting cheaper to acquire, operate, and maintain.
CIO
The top technology job is
A foreign key is a primary key in another file.
True
Career opportunities in IS are strong and are projected to remain strong over the next 10 years.
True
Data is more elementary than information and knowledge.
True
The IT components make up the IT platform.
True
The relational database model is based on the concept of ________-dimensional tables.
Two
_________ is a private network that uses a public network to connect users.
VPN
_________ is a remote attack requiring user action.
Virus
Which of the following is NOT a characteristic of Big Data?
Viscous
A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.
Warehouse
________ is a collection of related files or tables containing data.
a database
When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the _________ phase of BPI.
analysis
In the _________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable.
control
_________ is a challenge of BYOD.
control
________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.
data
When you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the _________ phase of BPI.
define
The correct order of the BPI phases is ___________.
define, measure, analyze, improve, and control
consists of devices such as the processor, monitor, keyboard, and printer.
hardware
In the _________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution.
improve
is organized so that it has meaning and value to the recipient.
information
_________ is a technology pressure.
information overload
_________ industries experience the greatest threat from substitutes.
information-based
Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) _________ strategy.
innovation
_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.
mass customization
In the _________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time.
measure
IT makes managers ________ productive and ________ the number of employees who can report to a single manager.
more;increases
The internet makes customers _________ powerful; this is a _________ pressure.
more;market
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
Which of the following is NOT a benefit of IT?
quantity of leisure time
________ is a program or collection of programs that enable the hardware to process data.
software
Keystroke loggers and screen scrapers are examples of _________.
spyware
When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) ______________.
transaction; TPS
The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian