MIS FINAL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Craigslist is an example of: A) C2C e-commerce. B) B2B e-commerce. C) B2C e-commerce. D) M-commerce. E) P2P-commerce.

C2C e-commerce

________ systems are designed to help firms manage their relationships with their customers A) CRM B) MIS C) CLE D) CLU

CRM

In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting

Classifications

What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) FTP C) IP D) HTTP E) DNS

DNS

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which of the following types of information system? A) MIS B) TPS C) ESS D) DSS E) KMS

DSS

Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system ? A) MIS B) TPS C) ESS D) DSS

DSS

Which of the following types of information system is especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance? A) MIS B) TPS C) DSS D) KMS E) RPS

DSS

Which type of information system would you use to forecast the return on investment if your firm planned to switch to a new supplier that offered products at a lower cost? A) ESS B) TPS C) MIS D) CRM E) DSS

DSS

Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) DSS

DSS

Which of the following is a grouping of characters into a word, a group of words, or a complete number? A) File B) Table C) Entity D) Field E) Tuple

Field

T/F: A TPS is an information system that keeps track of all of the daily routine transactions of a business.

True

T/F: Analytical CRM uses tools to analyze customer data collected from the firm's customer touch points and from other sources.

True

T/F: Apple Pay uses an RFID-related technology called near field communication.

True

T/F: CRM software can help organizations identify high-value customers for preferential treatments.

True

T/F: Cloud computing is the fastest growing form of computing.

True

T/F: Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

True

T/F: Expert systems are typically used in business in discrete, highly structured decision-making situations.

True

T/F: Expert systems capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization.

True

T/F: Major CRM application software vendors include Oracle, SAP, and Salesforce.com.

True

T/F: Mass customization offers individually tailored products or services using the same resources as mass production.

True

T/F: NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations.

True

T/F: Supply chain management systems are a type of enterprise system.

True

T/F: The Domain Name System (DNS) converts domain names to IP addresses.

True

T/F: Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace.

True

T/F: Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.

True

T/F: You can use OLAP to perform multidimensional data analysis.

True

Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining

Tunneling

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain.

Uniform resource labor

Which type of decision is deciding whether to introduce a new product line? A) Structured B) Unstructured C) Recurring D) Nonrecurring E) Procedural

Unstructured

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect. A) network B) bullwhip C) ripple D) whirlpool E) diffraction

bullwhip

Operational CRM applications include tools for all of the following except: A) sales force automation. B) call center support. C) marketing automation. D) customer service support.. E) calculating CLTV

calculating CLTV

Virtually all expert systems deal with problems of: A) policy development. B) classification. C) logic and control. D) high complexity. E) imprecise rules.

classification

Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete? A) Network economics model B) Competitive forces model C) Competitive advantage model D) Demand control model E) Agency costs model

competitive forces model

The use of digital technology and the Internet to execute the major business processes in the enterprise is called A) e-commerce. B) e-business. C) enterprise applications. D) MIS.

e-business

Buying or selling goods over the Internet is called A) e-commerce. B) e-business. C) an intranet. D) an extranet.

e-commerce

Which of the following best illustrates the transaction fee revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase. C) Pandora provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads. E) Netflix charges customers a monthly fee for access to its library of movies.

eBay receives a small fee from a seller if a seller is successful in selling an item

The four major enterprise applications are A) SCMs, CRMs, DSSs, and KMSs. B) SCMs, CRMs, ESSs, and KMSs. C) enterprise systems, SCMs, DSSs, and CRMs. D) enterprise systems, SCMs, CRMs, and KMSs.

enterprise systems, SCMs, CRMs, and KMSs

A company having difficulty with timely delivery of parts to its manufacturing plants should implement a supply chain ________ system. A) execution B) planning C) optimization D) management E) touch point

execution

What are the steps in conducting an ethical analysis?

(1) Identify and describe clearly the facts (2) define the conflict or dilemma and identify the higher-order values involved (3) identify the stakeholders (4) identify the options that you can reasonably take (5) identify the potential consequences of your options.

The decision-making process is:

1. Intelligence, or problem discovery: How many temps need to be hired, for how long, and what skills would they need? 2. Design, or solution discovery: What temp agencies are available and what are their prices? 3. Choice, or choosing solutions: Evaluate the offerings of the temp agencies, and evaluate the abilities of temps as per need. 4. Implementation, or solution testing: Evaluate the work of each temp against assignments and other needs.

Which of the following is the best description of a protocol in a telecommunications network architecture? A) A device that handles the switching of voice and data in a local area network B) A standard set of rules and procedures for control of communications in a network C) A communications service for microcomputer users D) The main computer in a telecommunications network E) A pathway through which packets are routed

A standard set of rules and procedures for control of communications in a network

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) Address B) City C) Airport code D) State E) Day

Airport code

Which of the following customer relationship management applications provides analysis of customer data? A) Operational CRM B) Analytical CRM C) Operational SCM D) Analytical SFA E) Operational SFA

Analytical CRM

Which of the following tools is used to analyzing customer buying patterns? A) CLTV B) Analytical CRM C) Operational CRM D) Demand planning E) SFA

Analytical CRM

Which of the following best illustrates the sales revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Yelp receives a fee after steering a customer to a participating website where he or she makes a purchase. C) Pandora provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads. E) Netflix charges customers a monthly fee for access to its library of movies.

Apple accepts micropayments for single music track downloads

Which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet? A) B2C e-commerce B) B2B e-commerce C) C2C e-commerce D) B2B e-commerce E) P2P e-commerce

B2C e-commerce

Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry? A) Benchmarking B) Best practices C) Value chain analysis D) Strategic systems analysis E) Secondary activities

Benchmarking

Evil twins are: A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent websites that mimic a legitimate business's website. D) computers that fraudulently access a website or network using the IP address and identification of an authorized computer. E) bogus wireless network access points that look legitimate to users.

Bogus wireless network access points that look legitimate to users

You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast

Classify data

Computer forensics tasks include all of the following except: A) presenting collected evidence in a court of law. B) securely storing recovered electronic data. C) collecting physical evidence on the computer. D) finding significant information in a large volume of electronic data.

Collecting physical evidence on the computer

The Mandarin Oriental's use of computer systems to keep track of guests' preferences is an example of which of the following? A) Improved flexibility B) Improved decision making C) Improved efficiency D) Customer intimacy E) Operational excellence

Customer Intimacy

Which of the following is a specialized language that programmers use to add and change data in the database? A) Data access language. B) Data manipulation language. C) Structured query language. D) Data definition language. E) DBMS.

Data manipulation language

Which supply chain planning function determines how much product is needed to satisfy all customer demands? A) Distribution management B) Replenishment planning C) Demand planning D) Order planning E) Customer planning

Demand planning

Reducing the business process layers in a distribution channel is called: A) disintermediation. B) BPR. C) market segmentation. D) network effects. E) market transparency.

Disintermediation

Which of the following refers to a company's organizations and processes for distributing and delivering products to the final customers? A) Supplier's internal supply chain B) External supply chain C) Upstream portion of the supply chain D) Downstream portion of the supply chain E) Onstream portion of the supply chain

Downstream portion of the supply chain

Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? A) Process management software B) ERP systems C) Groupware D) CRM software E) Supply chain management systems

ERP systems

Which of the following systems would you expect to deliver integrated, personalized business content through a web-based interface? A) TPS B) ESS C) MIS D) DSS E) SCM

ESS

Which of the following types of system typically uses a digital dashboard to display an array of charts and graphs of a business's key performance indicators? A) MIS B) TPS C) ESS D) CRM E) SCM

ESS

Which of the following would you use to forecast trends in your supplier's industry that could affect your firm over the next five years? A) ESS B) TPS C) MIS D) DSS E) KMS

ESS

Which type of system would you use to determine what trends in your supplier's industry will affect your firm the most in five years? A) ESS B) TPS C) MIS D) DSS

ESS

T/F: The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.

False

T/F: Wireless networks are more difficult for hackers to gain access too because radio frequency bands are difficult to scan.

False

CRM systems help businesses achieve which of the following business objectives? A) Automated accounting processes B) Automated production forecasts C) Faster time to market with new products and services D) Enhanced supplier intimacy E) Enhanced customer intimacy

Enhanced customer intimacy

Which of the following are the three major types of knowledge management systems? A) MIS, DSS, and TPS B) CRM, SCM, and CAD C) DBMS, DSS, and ECM D) COPs, ECM, and MIS E) Enterprise-wide knowledge management systems, KWS, and intelligent techniques

Enterprise-wide knowledge management systems, KWS, and intelligent techniques

T/F: A computer network consists of at least three computers.

False

T/F: All CRM packages contain modules for PRM and ERM.

False

T/F: Disintermediation provides major benefits to the distributor.

False

T/F: Expert systems are the primary tools used for knowledge discovery.

False

T/F: Expert systems work by applying a set of AND/OR rules against a knowledge base, both of which are extracted from human experts.

False

T/F: Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.

False

T/F: OLAP is unable to manage and handle queries with very large sets of data.

False

T/F: RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

T/F: The competitive forces model cannot be used to analyze modern digital firms which face new competitive forces that are not true of traditional firms.

False

T/F: The design phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization.

False

T/F: The third stage in Simon's description of decision making is implementation.

False

Data mining allows users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) access the vast amounts of data in a data warehouse.

Find hidden relationships in data

Which of the following statements about Flash cookies is not true? A) Flash cookies are installed only at the user's request. B) Flash cookies are stored on the user's computer. C) Flash cookies cannot be easily detected or deleted. D) Flash cookies are sometimes called super cookies. E) Flash cookies can be installed whenever a person clicks a Flash video.

Flash cookies are installed only at the user's request

In data mining, which of the following involves using a series of existing values to determine what other future values will be? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting

Forecasting

A(n) ________ facilitates the solution to unstructured problems by a set of decision makers working together as a group. A) DSS B) ESS C) CDSS D) GIS E) GDSS

GDSS

Supply chain execution systems provide all of the following functions except: A) generating demand forecasts for products. B) tracking the flow of finished goods. C) managing materials. D) managing warehouse operations. E) managing the financial information involving all parties

Generating demand forecasts for products

The value chain model: A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain. D) highlights specific activities in the business where competitive strategies can best be applied. E) enables more effective product differentiation.

Highlights specific activities in the business where competitive strategies can be best be applied

SaaS refers to: A) supplying online access over networks to storage devices and storage area network technology. B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C) self-contained services that communicate with each other to create a working software application. D) easy-to-use software tools for displaying Web pages. E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

Hosting and managing access to software applications delivered over the Internet to clients on a subscription basis

The ethical "no free lunch" rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.

If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work

The business value of an effective supply chain management system includes all of the following except: A) faster time to market. B) cost reduction. C) supply matched to demand. D) improved delivery service. E) increased inventory levels.

Improved delivery service

Which of the following statements about network economics is not true? A) Uber is an example of a business model that is based on the principle of network economics. B) The law of diminishing returns does not always apply to every situation. C) From a network economics perspective, the value of a community of people grows as the number of participants in the community increases. D) Information technology can be strategically useful from a network economics perspective. E) In network economics, the marginal cost of adding new members to the network is higher than the marginal gain.

In network economics, the marginal cost of adding new members to the network is higher than the marginal

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A) IoT application B) IoP application C) BLE application D) GPS application E) Web 3.0 application

IoT application

A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporations.

Is an encrypted private network configured within a public network

Why isn't overstocking warehouses an effective solution for a problem of low availability? A) It does not speed product time to market. B) It is an inefficient use of raw materials. C) It increases sales costs. D) It increases inventory costs. E) It lowers fill rate.

It increases inventory costs

Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making? A) TPS B) An extranet C) KMS D) CRM E) MIS

KMS

Specialized systems built for knowledge workers charged with discovering and creating new knowledge for a company are called: A) KWS. B) LMS. C) wikis. D) COPs. E) enterprise-wide knowledge management systems.

KWS

A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) key attribute.

Key field

Which of the following is an important capability for sales processes that is found in most SFA modules in major CRM software products? A) Returns management B) Lead management C) Channel promotions management D) Events management E) Customer satisfaction management

Lead management

An ESS supports which of the following? A) Long-range planning activities of senior management B) Knowledge and data workers in an organization C) Decision making and administrative activities of middle managers D) Day-to-day processes of production E) Transactional needs of the organization

Long-range planning activities of senior management

What is the primary benefit to consumers of disintermediation? A) Faster service B) Lower costs C) Higher quality D) Greater choices E) None, because disintermediation primarily benefits manufacturers.

Lower costs

A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions falls into which of the following categories? A) KMS B) TPS C) ESS D) MIS E) DSS

MIS

Which of the following would you use in order to determine which of your suppliers has the best and worst records for keeping to your production schedule? A) MIS B) TPS C) UPS D) DSS E) CRM

MIS

Mintzberg classifies a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management as a ________ bureaucracy. A) machine B) professional C) divisionalized D) multidivisional E) ad hoc

Machine

Who does Decision-support systems (DSS) support?

Management decisions in unique, rapidly changing, and not easily specified in advance situations

A relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of A) knowledge management systems. B) transaction processing systems. C) executive support systems. D) management information systems.

Management information systems

SFA modules in CRM systems provide tools for all of the following except: A) team selling. B) territory management. C) sales forecasting. D) managing sales prospect and contact information. E) managing customer service requests.

Managing customer service requests

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement

Managing the supply chain

The ability to offer individually tailored products or services using the same production resources as bulk production is known as: A) mass marketing. B) micromarketing. C) micro customization. D) niche customization. E) mass customization.

Mass customization

The point-of-sale Pulse system used by Domino's to maintain consistent and efficient management functions in its restaurants is best categorized as which type of system? A) TPS B) DSS C) CRM D) more than one of the above

More than one of the above

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? A) HIPAA B) FIP C) NORA D) COPPA E) Spyware

NORA

Which of the following tools enables users to view the same data in different ways using multiple dimensions? A) Predictive analysis B) SQL C) OLAP D) Data mining E) Hadoop

OLAP

Which type of software is created and updated by a worldwide community of programmers and available for free? A) Software packages B) Mashups C Outsourced D) Open source E) Closed source

Open source

Which of the following are most likely to rely primarily on production reports for their decision-making needs? A) Operational supervisors B) Senior managers C) Analytic modelers D) Business analysts E) Executives

Operation supervisors

________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation. A) Analytical B) Employee C) Operational D) Partner E) Next-generation

Operational

Walmart exemplifies the power of information systems coupled with state-of-the-art business practices and supportive management to achieve which of the following? A) New products and services B) Operational efficiency C) Survival D) Customer intimacy E) Competitive advantage

Operational efficiency

________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. A) SCM B) SFA C) ERM D) DRM E) PRM

PRM

You are consulting for a natural food products distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step? A) Identify the business ecosystem the distributor is in. B) Implement a strategic transition to the new system. C) Perform a strategic systems analysis. D) Benchmark existing systems. E) Set up a strategic transition.

Perform a strategic systems analysis

________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. A) Product differentiation B) Low-cost leadership C) Focusing on market niche D) Strengthening customer intimacy E) Strengthening supplier intimacy

Product differentiation

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware

Profiling

Walmart's continuous replenishment system allows it to do all of the following except: A) provide mass customization. B) transmit orders to restock directly to its suppliers. C) keep costs low. D) better meet customer demands. E) fine-tune merchandise availability

Provide mass customization

Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes.

RFIDs require line-of-sight contact to be read

________ is malware that hijacks a user's computer and demands payment in return for giving back access. A) A Trojan horse B) Ransomware C) Spyware D) A virus E) An evil twin

Ransomware

RFID sensor-generated data on stored food items such as storage location is an example of: A) raw input. B) raw output. C) customer and product data. D) sales information. E) information systems.

Raw input

Which of the following is not one of the NIST defined characteristics of cloud computing? A) Ubiquitous network access B) Location-independent resource pooling C) On-demand self service D) Measured service E) Reduced elasticity

Reduced elasticity

In a table for customers, the information about a single customer resides in a single: A) field. B) row. C) column. D) table. E) entity.

Row

From your reading of the chapter's opening case, Skullcandy chose enterprise resource planning software from which of the following ERP vendors? A) Oracle B) SAP C) IBM D) Microsoft E) Infor Global Solutions

SAP

Which of the following types of system enables management to make better decisions regarding organizing and scheduling sourcing, production, and distribution? A) SCM B) TPS C) KMS D) ERP E) MIS

SCM

________ modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services. A) Customer B) SOA C) Marketing D) Complex E) SFA

SFA

Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL

SQL

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain? A) Safety stock B) Continuous replenishment C) Just-in-time strategies D) Demand planning E) Perfect information

Safety stock

________ knowledge exists in formal documents, as well as in formal rules that organizations derive by observing experts and their decision-making behaviors. A) Unstructured B) Tacit C) Management D) Explicit E) Semi-structured

Semi-structured

ESS are specifically designed to serve which level of the organization? A) operational B) end-user C) middle management D) senior management

Senior Management

Which level of the organization is an ESS specifically designed to serve? A) Operational B) End-user C) Middle management D) Senior management E) Knowledge workers

Senior management

In data mining, which of the following involves events linked over time? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting

Sequences

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) social engineering. C) phishing. D) pharming. E) snooping

Social engineering

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a/an: A) distribution channel. B) supply chain. C) value chain. D) marketing channel. E) information system.

Supply chain

Which of the following manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner? A) Supply chain demand system B) Supply chain delivery system C) Supply chain planning system D) Supply chain execution system E) Supply chain optimization system

Supply chain execution system

Which of the following enables a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product? A) Supply chain demand system B) Supply chain delivery system C) Supply chain optimization system D) Supply chain execution system E) Supply chain planning system

Supply chain management

On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS

TCP/IP

A(n) ________ is typically a major source of data for other systems. A) TPS B) MIS C) ESS D) DSS E) KMS

TPS

If your main supplier was late in delivering goods, which type of system would you use to update your production schedule? A) ESS B) TPS C) MIS D) DSS E) BIS

TPS

To monitor the status of internal operations and the firm's relations with the external environment, managers need which of the following types of system? A) DSS B) KWS C) TPS D) MIS E) BIS

TPS

You have been hired by a non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, SMS, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities E) DSS with MIS capabilities

TPS with MIS capabilities

You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS B) TPS with DSS capabilities C) TPS with MIS capabilities D) TPS with ESS capabilities

TPS with MIS capabilities

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships. A) OLAP B) Text mining C) In-memory D) Clustering E) Classification

Text mining

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use. A) A safe harbor B) The opt-in model C) FIP principles D) P3P E) The opt-out model

The opt-in model

Expert systems are expensive and time consuming to maintain because: A) their rule base is so complex. B) they rely on equipment that becomes outdated. C) their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules. D) only the person who created the system knows exactly how it works, and may not be available when changes are needed. E) it is difficult to program at this level of complexity without introducing software bugs.

Their rules must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules

Which of the following is an example of a legacy system? A) Transaction processing system running on a mainframe. B) Scalable grid computing system C) Web services running on a cloud computing platform D) MDM software E) Quantum computing system

Transaction processing system running on a mainframe

Which systems are typically a major source of data for other systems? A) transaction processing systems B) management information systems C) executive support systems D) decision-support systems

Transaction processing systems

Which of the following refers to a company's suppliers, supplier's suppliers, and the processes for managing relationships with them? A) Supplier's internal supply chain B) External supply chain C) Upstream portion of the supply chain D) Downstream portion of the supply chain E) Onstream portion of the supply chain

Upstream portion of the supply chain

OLAP enables: A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data. E) users to quickly generate summary reports

Users to obtain online answers to ad-hoc questions in a rapid amount of time

The ________ model highlights the primary or support activities that add a margin of value to a firm's products or services where information systems can best be applied to achieve a competitive advantage. A) competitive forces B) value chain C) bargaining power D) new entrant E) rivalry

Value chain

All of the following are cloud computing services except: A) infrastructure as a service. B) platform as a service. C) software as a service. D) on-demand computing. E) virtualization as a service.

Virtualization as a service

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? A) War driving B) Sniffing C) Cybervandalism D) Drive-by tapping E) Snooping

War driving

Which of the following is the foundation technology for web services? A) XML B) HTML C) SOAP D) UDDI E) SCSI

XML

________ provides a standard format for data exchange, enabling web services to pass data from one process to another. A) HTML B) HTML5 C) Java D) Chrome OS E) XML

XML

Which of the following best illustrates the affiliate revenue model? A) eBay receives a small fee from a seller if a seller is successful in selling an item. B) Yelp receives a fee after steering a customer to a participating Web site where he or she makes a purchase. C) Pandora provides basic services for free, but charges a premium for advanced services. D) Apple accepts micropayments for single music track downloads. E) Netflix charges customers a monthly fee for access to its library of movies.

Yelp receives a fee after steering a customer to a participating Web site where he or she makes a purchase

You work for a highly successful advertiser that is just about to expand nationally. Of utmost importance will be finding a way to store and disseminate their clients' continually updated branding guides, which include multiple image files and text documents, to all of the firm's branches. What system will best serve these needs? A) an intranet with KMS capabilities B) an extranet with KMS capabilities C) a TPS with KMS capabilities D) a CRM

an extranet with KMS capabilities

Which of the following is not one of the Simon's four stages of decision making? A) Implementation B) Intelligence C) Analysis D) Choice E) Design

analysis

Customer service modules in CRM systems provide tools for: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) managing sales prospect and contact information. E) organizing effective marketing campaigns.

assigning and managing customer service requests

Marketing modules in CRM systems provide tools for all of the following except: A) assigning and managing customer service requests. B) capturing prospect and customer data. C) identifying profitable and unprofitable customers. D) qualifying leads. E) identifying opportunities for cross-selling.

assigning and managing customer service requests

All of the following are steps in the process for analyzing an ethical issue except: A) assigning responsibility. B) identifying the stakeholders. C) identifying the options you can reasonably take. D) identifying and clearly describing the facts. E) identifying the potential consequences of your options.

assigning responsibility

All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.

bar codes

The most successful solutions or methods for achieving a business objective are called: A) value activities. B) best processes. C) core competencies. D) best practices. E) benchmarks.

best practices

The enormous volume of data generated by Internet activity, such as web traffic, email, and social media is referred to as: A) IoT B) big data. C) the mobile digital platform. D) cloud computing. E) business intelligence.

big data

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. E) RPMs.

bps

Which systems often deliver information to senior executives through a portal, which uses a Web interface to present integrated personalized business content? A) transaction processing systems B) executive support systems C) management information systems D) decision-support systems

executive support system (ESS)

All of the following are competitive forces in Porter's model except: A) suppliers. B) new market entrants. C) external environment. D) customers. E) substitute products

external environment

You have been hired by Inspiration Inc. to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company's business processes and increase their profit margin? A) extranet, to enable quick collaboration over the Internet , minimize the time spent communicating with the client, and minimize the amount of paperwork needed B) CRM, to maintain easily accessible customer records to minimize the time spent looking for client data C) KMS, for minimizing redundant work on similar clients D) marketing system, for improving sales levels

extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed

In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services. A) free/freemium B) subscription C) transaction fee D) affiliate E) sales

free/freemium

Systems that integrate different types of techniques, such as genetic algorithms, fuzzy logic, neural networks, and expert systems, into a single application are called ________ systems. A) differential intelligence B) hybrid AI C) machine learning D) enterprise learning E) CAD

hybrid AI

Which of the following is not an example of a computer used as a target of crime? A) Knowingly accessing a protected computer to commit fraud B) Accessing a computer system without authority C) Illegally accessing stored electronic communication D) Threatening to cause damage to a protected computer E) Breaching the confidentiality of protected computerized data

illegally accessing stored electronic communication

The three activities in an information system that produce the information organizations use to control operations are: A) information, research, and analysis. B) input, output, and feedback. C) data, information, and analysis. D) data analysis, processing, and feedback. E) input, processing, and output.

input, processing, and output

The ________ phase of decision making finds or recognizes a problem, need, or opportunity. A) choice B) design C) implementation D) analysis E) intelligence

intelligence

A Trojan horse: A) is software that appears to be benign but does something other than expected. B) is a virus that replicates quickly. C) is malware named for a breed of fast-moving Near-Eastern horses. D) installs spyware on users' computers. E) is a type of sniffer used to infiltrate corporate networks.

is software that appears to be benign but does something other than expected

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy. A) just-in-time B) frictionless C) bullwhip D) safety-stock E) streamlined

just-in-time

Expert systems: A) are capable of solving wide ranges of problems. B) are based on DO WHILE rules. C) lack the general intelligence of human beings D) share characteristics with mainframe computing. E) are used for knowledge discovery.

lack the general intelligence of human beings

Executive support systems are information systems that support the A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision-making and administrative activities of middle managers. D) day-to-day processes of production.

long-range planning activities of senior management

Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors. A) product differentiation B) market niche C) mass customization D) process efficiency E) low-cost leadership

market niche

The term management information systems refers to a specific category of information systems serving: A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) the information technology function. E) middle management functions.

middle management functions

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected. A) opt-in B) opt-out C) P3P D) PGP E) safe harbor

opt-out

Major CRM products typically have all of the following service capabilities except: A) customer satisfaction management. B) returns management. C) call center & help desk. D) service analytics. E) order management

order management

Most computer viruses deliver a: A) worm. B) Trojan horse. C) driveby download. D) keylogger. E) payload.

payload

Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems.

planning; execution

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) primary entity.

primary key

________ is a competitive strategy for creating brand loyalty by developing new and unique products and services that are not easily duplicated by competitors. A) Product differentiation B) Low-cost leadership C) Focusing on market niche D) Strengthening customer intimacy E) Strengthening supplier intimacy

product differentiation

A supply chain driven by actual customer orders or purchases follows a ________ model. A) pull-based B) build-to-stock C) push-based D) replenishment-driven E) optimized

pull-based

As they move through the supply chain, ________ are transformed into finished products and shipped to retailers and customers. A) raw materials B) intermediate products C) basic products D) natural resources E) nascent products

raw materials

Which of the following industries has the lowest barrier to entry? A) Automotive B) Computer chip C) Solar energy D) Airline E) Small retailer

small retailer

Using social networking tools to converse with customers is called: A) analytical CRM. B) social CRM. C) operational CRM. D) PRM. E) ERM.

social CRM

E-government refers to the application of ________ to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of government A) the Internet and networking technologies B) e-commerce C) e-business D) any computerized technology

the Internet and networking technologies

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? A) Kant's categorical imperative B) the risk aversion principle C) the utilitarian principle D) the Golden Rule E) the "no free lunch" rule

the golden rule

The model of human knowledge used by expert systems is referred to as: A) the knowledge base. B) CBR. C) a neural network. D) expert AI E) VRML.

the knowledge base

Supply chain planning systems perform all of the following functions except: A) establish inventory levels for raw materials and finished goods. B) identify the transportation mode to use for product delivery. C) determine where to store finished goods. D) determine how much product to manufacture in a given time period. E) track the physical status of goods.

track the physical status of goods

In a relational database, a record is referred to in technical terms as a(n): A) tuple. B) table. C) entity. D) field. E) key.

tuple

A client computer networked to a server computer, with processing split between the two types of computers, is called a(n): A) service-oriented architecture. B) on-demand architecture. C) multi-tiered client/server architecture. D) two-tiered client/server architecture. E) divided architecture.

two-tiered client/server architecture


संबंधित स्टडी सेट्स

Chapter 14-15 Worksheet: True & False

View Set

Nutrition in Adolescence, the Adult Years and Aging

View Set

PFLAG National Glossary of Terms

View Set

Microeconomics Chap 19 (self-test)

View Set

5th Grade Science Light Study Guide

View Set

ACC 241: Ch 10 Performance Evaluation

View Set

3.9.6 Practice Questions Troubleshooting Memory

View Set

Balancing Oxidation-Reduction Equations

View Set

2.6.F - Test: Module 2 Test: Chemistry

View Set