MIS 301 Mid-Term

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Porter's competitive forces model identifies _________ major forces that can endanger or enhance a company's position in a given industry.

5

_________ is an attack by a programmer developing a system.

A Trojan horse

_________ is a communications control.

A firewall

Careless Internet surfing is _________ and is an _________ mistake.

A human error; unintentional

_________ refers to determining who is responsible for actions that were taken.

Accountability

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

Accuracy

_________ causes pop-up advertisements to appear on your screen.

Adware

Each characteristic or quality of a particular entity is called a(n) ________.

Attribute

Six Sigma is a popular _________ technique.

BPI

_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs.

BPI

_________ integrates disparate BPI initiatives to ensure consistent strategy execution.

BPM

_________ uses a "clean sheet" perspective.

BPR

Which of the following is an accurate representation of the data hierarchy from smallest to largest?

Bit, Byte, Field, Record, File, Database

A ________ is a group of eight ________.

Byte; Bite

The _________ approach highlights the interlocking relationships that underlie all societies.

Common Good

Application Development Manager

Coordinates and manages new systems development projects

Which of the following is the correct order of the KMS cycle?

Create, Capture, Refine, Store, Manage, Disseminate

_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.

Customer satisfaction

Hackers would use a botnet to perform a _________.

DoS

_________ is a remote attack requiring no user action

DoS

The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

Fairness

BI systems provide the input data for corporate databases.

False

Data and information are synonyms.

False

Information is knowledge that has been organized to have meaning and value.

False

TPS typically collect data in batches.

False

The ________ creates links between two tables.

Foreign

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.

Hot

Which of the following is a property issue?

How should we handle illegally copying copyrighted software

IT services, IT personnel, and IT components make up the organization's ___________.

IT infrastructure

_________ are materials, services, and information that flow through and are transformed as a result of process activities.

Inputs

Intellectual capital is another term for ________.

Knowledge

Information Center Manager

Manages IS services such as help desks, hot lines, training, and consulting.

A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department

Mart; Warehouse

The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it

Opt-In

The ________ key is an identifier field that uniquely identifies a record.

Primary

_________ issues involve collecting, storing, and disseminating information about individuals.

Privacy

_________ is an example of a support activity for most firms.

Product and technology development

In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.

Public; Private

Database systems minimize ________.

Redundancy

_________ means that you accept the consequences of your decisions and actions

Responsibility

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

Rights

Each relational database table contains records (listed in _______) and attributes (listed in ______) .

Rows; Columns

______ is the most popular query language used for interacting with a database.

SQL

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

Spamware

_________ collects personal information about users without their consent.

Spyware

Considering the following tables, ________ is a primary key.

Student Table: ID

Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?

Technology is getting cheaper to acquire, operate, and maintain.

CIO

The top technology job is

A foreign key is a primary key in another file.

True

Career opportunities in IS are strong and are projected to remain strong over the next 10 years.

True

Data is more elementary than information and knowledge.

True

The IT components make up the IT platform.

True

The relational database model is based on the concept of ________-dimensional tables.

Two

_________ is a private network that uses a public network to connect users.

VPN

_________ is a remote attack requiring user action.

Virus

Which of the following is NOT a characteristic of Big Data?

Viscous

A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.

Warehouse

________ is a collection of related files or tables containing data.

a database

When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the _________ phase of BPI.

analysis

In the _________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable.

control

_________ is a challenge of BYOD.

control

________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.

data

When you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the _________ phase of BPI.

define

The correct order of the BPI phases is ___________.

define, measure, analyze, improve, and control

consists of devices such as the processor, monitor, keyboard, and printer.

hardware

In the _________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution.

improve

is organized so that it has meaning and value to the recipient.

information

_________ is a technology pressure.

information overload

_________ industries experience the greatest threat from substitutes.

information-based

Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) _________ strategy.

innovation

_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.

mass customization

In the _________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time.

measure

IT makes managers ________ productive and ________ the number of employees who can report to a single manager.

more;increases

The internet makes customers _________ powerful; this is a _________ pressure.

more;market

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

Which of the following is NOT a benefit of IT?

quantity of leisure time

________ is a program or collection of programs that enable the hardware to process data.

software

Keystroke loggers and screen scrapers are examples of _________.

spyware

When you go through the checkout line at your local grocery store, this is a(n) ________ that could be processed by a(n) ______________.

transaction; TPS

The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian


संबंधित स्टडी सेट्स

Michigan State Insurance Exam 6/3/2021

View Set

Health Assessment - Urinary System

View Set

CH 18 SMARTBOOK: Gram Positive Cocci of Medical Importance

View Set

chapter 3 human ap migration "study guide"

View Set

LearnTEFL Final (correct answers only)

View Set