MIS FINAL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication? a. An internal workplace policy b. A social media policy c. A technology information policy d. A Youtube policy

b. A social media policy

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her costumer's names. This is a classic example of which of the following security breaches? a. A social engineer b. An insider c. A spammer d. A dumpster diver

b. An insider

What is intangible creative work that is embodied in physical form and includes copyright, trademarks, and patents? a. Ethics b. Intellectual property c. Privacy d. Confidentiality

b. Intellectual property

What has the potential to contain more than one value for an attribute? a. Single valued attribute b. Multivalued attribute c. null valued attribute d. all of these are correct

b. Multivalued

Which of the following forms of data mining assigns records to one of a predefined set of classes? a. Clustering b. Classification c. Estimation d. Affinity grouping

B. Classification

Which type of business model best describes apple? a. Pick and mortar b. Brick and mortar c. Click and mortar d. Virtual

C. Click and mortar

True or False: Granularity refers to the level of detail in the model or the decision-making process.

True

True or False: The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.

True

Trina works for Johnson Electric as a corporate lawyer, and part of her duties are to ensure that ethical and legal use of information within the company. Which of the following represents Trina's primary role at Johnson Electric as described by the text? a. Chief of Knowledge Officer (CKO) b. Chief Privacy Officer (CPO) c. Chief Technology Officer(CTO) d. Chief Information Officer(CIO)

b. Chief Privacy Officer (CPO)

True or False: If a business could produce the same product with less expensive inputs it would probably see a decrease in profits.

False

True or False: Maintainability means the system functions correctly and provides accurate information?

False

True or False: Porter has identified three generic business strategies including focused, broad cost leadership, and switching strategy.

False

True or False: Strategic decisions are highly structured decisions.

False

What is a system weakness that can be exploited by a threat? a. capacity b. web accessibility c. web accessibility initiative d. vulnerability

d. vulnerability

Callie owns and operates one of the most successful local coffee shops in Denver called The Edgewater Cafe. Each time a customer purchases their 100th cup of coffee at The Edgewater Cafe, they receive a free pound of coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marketing program? a. Reducing buyer power with a loyalty program b. Increasing buyer power with a loyalty program c. Decreasing supplier power with a differentiated product d. Creating a substitute product

A. Reducing buyer power with a loyalty program

True or False: A data driven website can help limit the amount of information displayed to customers based on unique search requirements.

True

True or False: A disruptive technology is a new way of doing things that initially does not meet the needs of existing customers.

True

True or False: A foreign key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

True

True or False: A primary key is a field that uniquely identifies a given record in a table.

True

True or False: A sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

True

True or False: An acceptable use policy (AUP) requires a user to agree to follow it in order to be provided access to corporate email, information systems, and the internet.

True

True or False: An enterprise architect is a person grounded in technology, fluent in business and able to provide the important bridge between MIS and the business.

True

True or False: Asking how many employees are out sick is a type of operational question.

True

True or False: Benchmarks are baseline values the system seeks to attain.

True

True or False: Bring your own device is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.

True

True or False: Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationships for strategic decision making.

True

True or False: Competitive advantages provide the same product or service either at a lower price or with additional value that can fetch premium prices.

True

True or False: Fail-back occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

True

True or False: FedEx created a first-mover advantage by developing its customer self-service software, which allows people to request parcel pickups, print mailing slips, and tracking parcels online.

True

True or False: MIS is a tool that is most valuable when it leverages the talent of people who know hot to use and manage it effectively.

True

True or False: Order date, amount sold, and customer number are all forms of data.

True

True or False: Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability within an industry.

True

True or False: Social networking is the practice of expanding your business and or social contacts by constructing a personal network.

True

True or False: Supplier power is one of Porter's five forces and it measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)

True

True or False:A hashtag is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#). For example, the hashtag #sandiegofire helped coordinate emergency responses to a fire.

True

True or false: Date of birth would be a stored attribute

True

True or false: Fuzzy logic is a mathematical method of handling imprecise or subjective information.

True

A _________ includes the tasks, activities, and responsibilities required to execute each step in a business process?

Work flow

What is big data? a. A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools. b. Processes and manages algorithms across many machines in a computing environment. c. Focusing on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization. d. Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.

a. A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

What occurs when resources reach full capacity and cannot handle any additional demands limiting throughput and impeding operations? a. Bottlenecks b. Redundancy c. Automation d. Streamlining

a. Bottlenecks

What is a technique for documenting the entities and relationships in a database environment? a. Entity relationship diagram b. data model c. database d. relational database model

a. Entity relationship diagram

Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby's tasks is to input positive and negative customer reviews into her computer system. What type of information is Shelby gathering? a. Feedback b. Processing c. Output management d. Sales processing

a. Feedback

Within the sites that support disaster recovery, _____ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. a. Hot site b. Cold site c. Warm site d. Disaster site

a. Hot side

What expresses the specific number of instances in an entity? a. Cardinality b. Composite entity c. Business rule d. Null valued attribute

a. cardinality

What kind of attribute is assigned to an attribute when no other value applies or when a value is unknown? a. Null valued attribute b. sing valued attribute c. Derived attribute d. multivalued attribute

a. null valued attribute

Which of the following is considered data? a. quantity sold b. best customer by month c. best-selling item by month d. worst selling item by month

a. quantity sold

Which of the below is NOT considered an advantage of a content management system? a. Content management systems sore website content. b. Content management systems increase order entry speed. c. Content management systems manage website creation. d. Content management systems allow editing and publication of information.

b. Content management systems increase order entry speed.

What is predictive analytics? a. A world where interconnected, Internet enabled devices or "things can collect and share data without human intervention b. Extracts information from data and uses it to predict future trends and identify behavioral patterns. c. Refers to devices that connect directly to other devices d. opportunities to change the way people purchase books.

b. Extracts information from data and uses it to predict future trends and identify behavioral patterns.

What is extraction, transformation, and loading? a. It is a process of entering data, tracking data, and loading it into a database b. It is a process that extracts information from internal and eternal databases, transforms it using common set of enterprise definitions, and loads it into a data warehouse c. It is process that is performed at the end of the data warehouse model prior to putting the information in a cube. d. It is a process that is performed at the beginning of the data mining model.

b. It is a process that extracts information from internal and eternal databases, transforms it using common set of enterprise definitions, and loads it into a data warehouse

What generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call? a. Pay per click b. Pay per call c. Pay per conversation d. All of these are correct

b. Pay per call

What in the cloud means that each customer or tenant must purchase and maintain an individual system? a. Multi-tenancy b. Single-tenancy c. Cloud fabric d. Cloud fabric controller

b. Single-tenancy

As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 50 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable business tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective business tool for Tina to implement in order to accomplish all of her training goals? a. IMing b. Webinar c. Blog d. Email

b. Webinar

Which of the below would NOT Be found in a digital dashboard for a manufacturing team? a. A graph of stock market prices. b. A running line graph of planned versus actual production for the past 24 hours. c. An excel spreadsheet with static cost analysis data d. A hot list key of performance indictors, refreshed every 15 minutes

c. An excel spreadsheet with static cost analysis data

What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes? a. Community cloud b. Private cloud c. Cloud bursting d. Hybrid cloud

c. Cloud bursting

What process decodes information? a. Digital certificate b. Encryption c. Decryption d. Cryptography

c. Decryption

What kind of attribute would be age? a. Null valued attribute b. sing valued attribute c. Derived attribute d. Stored attribute

c. Derived attribute

Which of the following are examples of analytical information? a. Airline tickets, sales receipts, and packing slips b. Hotel reservations, sales receipts, and packing slips. c. Future growth analysis, sales projections, and product statistics d. Packing slips, grocery receipts, and competitor information.

c. Future growth analysis, sales projections, and product statistics

Which of the following is considered information? a. quantity sold b. date sold c. best-selling item by month d. product sold

c. best-selling item by month

With grid computing, a problem is broken into pieces and distributed to many machines, allowing ________ processing than could occur with a single system. a. more accurate b. slower c. faster d. cleaner

c. faster

What occurs when two entities can be related to each other in many instances? a. one to one relationship b. one to many relationship c. many to many relationship d. composite entity

c. many to many relationship

All of the following are common tools used in industry to analyze and develop competitive advantages, except ______. a. The Five Forces Model. b. The three generic strategies c. the competitive analysis model d. value chain analysis

c. the competitive analysis model

Which of the following is an example of dynamic processes? a. Running payroll b. calculating taxes c. Creating financial statements d. Employee layoffs

d. Employee layoffs

Which of the choices below represents the definition of information management? a. The act of conforming, acquiescing, or yielding information b. A method or system of government for information management or control. c. Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. d. Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.

d. Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively.

Which of the following are included as potential external weaknesses in a SWOT analysis that are harmful to an organization? a. Core competencies, mark leaders, cost advantages, excellent management b. Lack of strategic direction, obsolete technologies, lack of managerial talent, outdated, product line c. Expanded product line, increase in demand, new markets, new regulations d. New Entrants, substitute products, shrinking markets, costly regulatory requirements

d. New Entrants, substitute products, shrinking markets, costly regulatory requirements

What is software that will search several retailers' websites and provide a comparison of each retailer's offerings including prices and availability? a. Augmented reality b. Mutation c. Fuzzy logic d. Shopping bot

d. Shopping bot

Which social media site works by allowing content to find the users, instead of the users having to search for the customers? a. Myspace b. Facebook c. Google d. StumbleUpon

d. StumbleUpon

What is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part? a. Value Chain Analysis b. The Five Forces Model c. Feedback d. Systems Thinkin

d. Systems Thinking

Which of the following implies that information is current with respect to the business requirement? a. Uniqueness b. Accuracy c. Consistency d. Timeliness

d. Timeliness

Which of the following statements is accurate? a. a correct business rule for one organization may not be correct for another organization. b. business rules should be integral to operations c. a typical business may have hundreds of business rules d. all of these are correct

d. all of these are correct

True or False: Companies do not need a privacy policy for email because an employees' work email is private and cannot be viewed by the company.

False

True or False: Ebusiness is the buying and selling of goods and services over the internet.

False

True or False: Predictive analytics is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention.

False

True or False: Structured query language complies all of the metadata about the data elements in the data model.

False

True or False: The primary purpose of a data warehouse is to perform transactional processes.

False

True or False: Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.

False

What is the most secure type of authentication? a. Something the user knows such as a user ID and password b. something the user has scubas a smart card or token c. Something that is part of the user such as a fingerprint or voice signature. d. Combination of all these are correct.

D. Combination of all these are correct

__________ observes the exact pattern of a consumer's navigation through a site.

Clickstream Data

Cheryl is the operations manager for Natures Bread Company, which specializes in providing natural products for health conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of KNOWLEDGE that Cheryl would be using to successfully perform her job? a. Craig Newmark is customer number 15467 b. Flour Power is supplier number 8745643 c. Best selling product by day d. Best selling product changes when Tony the best baker is working.

D. Best-selling product change when Tony the best baker is working.

The management of information flows between and among activities in a supply change to maximize total supply chain effectiveness and profitability.

Supply change management


संबंधित स्टडी सेट्स

Motivation and Emotion Final Review

View Set

Growth and Development: OB & PEDS

View Set

NUS111: ELIMINATION/DIGESTION REVIEW

View Set

chapter 15: Health Promotion of the School-Age Child and Family

View Set