MIS Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the difference between a cloud service and a web service?

A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

The acronym for a database administrator is ________.

DBA

The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the

Digital Millennium Copyright Act (DMCA)

Most customer relationship management (CRM) systems help businesses to organize three main functions. These functions include marketing, sales, and inventory control.

False

Which is the best explanation of how the World Wide Web (WWW) differs from the Internet?

How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?

When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have

Increased

Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as

Porter's 5 Forces.

Why is it important to preserve the integrity of data, information, and systems?

These assets are more vulnerable to hackers if they have been obtained in an unethical or illegal manner.

Highlighting points where actual personnel numbers vary from expected norms and allowing the executive to drill down into areas of interest is a key element of the human resources management element of executive information systems applications.

True

What is the term for a CRM that tracks the type of sale that is most likely to make a person purchase an item that they have previously viewed on an e-commerce site?

User Experience

What is the second step that occurs when placing a call on a cellular network?

Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.

Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.

analyzing

Share of wallet is also known as share of

customer

Which business computer application system is focused on helping managers to maintain the business's focus on the individual customer by developing a lasting relationship that promote long-term buying?

customer relationship management (CRM) system

To ensure adequate spacing between flights, track changes in aircraft airspeed and altitude, and issue alerts at any deviations, air traffic controllers use

decision support systems (DSS).

Which type of MIS report pinpoints outliers that vary from the norm, such as when a production quota falls below forecasted levels?

exception reports

The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university, is referred to as a consumer-to-governance transaction.

false

Vector and raster files are

geographic data.

In cybersecurity risk analysis, PML (probable maximum loss) is used to

help determine spending needed to adequately secure an organization's IT infrastructure.

What type of decision-making software can identify issues and find and implement solutions at transactional speed?

high-velocity

Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?

protect government assets against cybersecurity events

Database policies should be created and implemented by all organizations, regardless of the ________ of the organization.

size

Which PESTEL factor can managers monitor by improving communications throughout the organization and gaining better perceptions of consumers' opinions using CRM software?

sociocultural

Keystroke loggers and packet analyzers (sniffers) are two common types of

spyware.

A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of

substitutes

When you revisit a website, your browser will send the website's cookie (a small text file) to the web server which uses this information to customize and optimize your experience.

true


संबंधित स्टडी सेट्स

Características Heredadas y Comportamientos Aprendidos

View Set

Intro to Data Structures - C243 - Midterm II

View Set

FINN 3160- Ch. 7 Equity Markets and Stock Valuation

View Set

PrepU: Bladder and Lower Urinary Tract (Chapter 35)

View Set

Chapter 31: Family Planning 4 & 6

View Set

ATI Medical-Surgical: Cardiovascular and Hematology questions

View Set