MIS final
Cookie
A _____ is a small text file passed to web browser on a user's computer by a web server.
downstream
A ______ information flow relates to the information that is produced by a company and sent along to another organization
sharing economy
A _________ is defined as an economic system in which assets or services are shared between private individuals, either free or for a fee
Justin works on the system to make the user interface more user-friendy
A company has a five-member team in charge of the development and maintenance of its information systems. An Information system is in place and the team-performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?
to indicate the topic and relate the tweet to other tweets about the same topic
A hash tag is used in a tweet
Process and decision making to orchestrate the day to day operations of an organization
Administrative focus on the _______
Risk Acceptance
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occure
Cloud Computing
As defined by the national institute of standards and technology (NIST) is a model for enabling ubiquitous, convenient
Operations and manufacturing
Assembly processes are ________ activities.
Managerial
At the ____ level of an organization, functional manages focus on monitoring and controlling operational level activities and providing information to high levels of the organization
Historical data
Backward looking budgets are typically based on _______
Characterized based on its high velocity
Big Data is ______.
Facts
Business case arguments based on data, quantitive analysis, and/or indisputable factors are known as arguments based on ________
The ratio of surfers who click on an ad divided by the number of times it was displayed
Click through rate reflects______.
Allow for easy trasferability of documents from one person to another
Cloud based collaboration tools ______
Transportation
Distribution planning leads to the overall development of the overall ______ plan
cyber squatting
Fyroff consultants,a leading software consulting firm in the United States,decides to launch an Enterprise Resource Planning (ERP)solution.The company chooses the brand name FyroffEnterprise for the new solution.However,when the company attempts to register the domain name,it finds that a small unknown firm is already registered under the same domain name.The small firm is now attempting to sell the domain name to Fyroff.Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
That will respond to the web request
Host name
by charging a commission on transactions
How do comparison shopping sites generate revenue?
Evolution of Technology
Identify a key factor of globalization
Evolution of Technology
Identify a key factor of globalization.
Identifying how to recognize, generate, store, share, and manage tacit knowledge
Identify the primary goal for deploying knowledge management system.
pay-per-click
If a company's web sites is in the sponsored list of a search engine, the search engine receives revenue on a _____ basis
vanilla
If the ______ version does not support a certain business process, the company may require a customized version
Tracking
In the context of GPS- Enabled location-based services, the ability to see another persons location is an example of _______ service.
process
In the context of organizational requirements for innovation to deploy innovation information system well, people in the organization must be willing to do whatever they can to bypass and eliminate internal bureaucracy, set aside political squabbles and pull together for the common good.These requirements can be categorized
Issuing the purchase order
In the procure to pay process the negotiation of price and term is followed by ________
computer literacy
Joe and megan know how to use a computer. Which of the following describes this fact?
The bull whip efftect
La Belle Inc introduced a new line of accessories for teenaged girls last season. following it's immense popularity with the targeted group, the company anticipated high sales htis season. it ordered raw materials accordingly, and even ensured that they had sufficient inventory to meet excess demand, if any. however, the success of the new line turned out to be a fad, as the teens soon turned to other products offered by competing brands, and La Belle's sales declined. This caused a huge discrepancy in the amount of raw materials they needed and the amount of inventory they had piled up in anticipation of good sales. This is an example of
resource
Organizations deploying innovative information systems must have the human capital necessary to deploy the new systems. These requirements can be
Making changes to an information system to reduce the chance of future system features
Preventive maintenance of a system involves _________.
focuses on the coordination of all activities needed to create the product or service.
Production scheduling ________
Folksonomies
Social bookmarking allows users to share internet bookmarks and to create categorization systems. These categorization systems are referred to as ______
Collocation facilities
Some data centers rent server space to multiple customers and provide necessary infrastructure such as data centers are called
Operational
Systems that are used to interact with customers and run a business in real time are called ________ systems
effectivness
The extent to which tasks are accomplished well is called _______
maintenance
The final phase of the systems development life cycle is systems________.
infrastructure
The hardware and software that must be implemented to support the applications that the primary activities use are a part of the _______ activities.
conversion rate
The performance of a pay per click advertising model can be assessed by ________ marketer's desired action such as making a purchase
because the foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).
The protocol used by the internet is called the
Supply Chain
The term ___ is commonly used to refer to a collection of companies and processes involved in moving a product from the suppliers of raw materials to the customer.
can be played on a variety of devices in addition to Apple's iPods
The term podcasting is a misnomer because podcasts
Cloud Computing
The various services offered by Google, such as Gmail (e-mail), Google drive (word processing) or google calendar, are good example of _________
Cloud computing
The various services offered by google, such as Gmail (e-mail), google drive (word processing), or google calendar, are good examples of _______
Business model
What a company does, how a company uniquely does it how a company gets paid for doing it and what costs are involved are all part of an organizations
structural firmness
When a website ensures privacy and security of the consumer's data, ________ can be achieved.
Order-to-cash
When ever an order is placed with online retailers, the retailers put together the order, ship it, and charge the payment to the customers credit card. This process of selling a product or service is know as the _______
Trojan Horse
When shelly downloaded an arcade game from an unknown internet web site, an unauthorized connection unknown to shelly was established with her computer. The arcade game is most likely to be ________.
Blogs
Which of the following Web 2.0 applications has been classified by noted technology journalist Nicholas Carr as the "amateurization" of journalism?
Microsoft hands over its customer service function to convergys
Which of the following can be cited as an example of outsourcing?
It is the cost of producing an additional unit of outpt
Which of the following defines marginal cost?
Analyzing data warehouses to detect changes deemed important by a user tracking inventory levels assembling customized news
Which of the following is a role of data mining agents?
Encrypted messages cannot be deciphered without the decoding key
Which of the following is a valid observation about encrytion?
Belair buys a system from the vendor who offers the cheapest prices.
Which of the following is an example of a basic relationship between an outsourcing vendor and client?
video conferencing
Which of the following is an example of synchronous communication
To optimize the allocation of the available supply to meet demand
Which of the following is the key use of the distribution planning module of supply chain management?
He is responsible for managing an existing information system
Which of the following is true about the responsibility of an is manager in the context of information systems management?
It is the extent to which a system enables the firm to accomplish goals well
Which of the following is true of system effectiveness?
Content delivery networks
Which of the following is used to increase web application performance
Companies using this strategy are trying to optimize their ordering quantities such that parts or raw material arrive just when they are needed for production.
Which of the following statements about just-in-time strategies is true?
They answer unplanned information requests to support a non routine decision
Which of the following statements is true about ad hoc queries?
It is the uses of information systems to gather and analyze information from internal and external sources in order to make
Which of the following statements is true about business intelligence?
These firms operate in both physical and virtual arenas
Which of the following statements is true about firms pursuing a click and mortar business strategy?
It is a representation of reality
Which of the following statements is true about information?
it allows users to create folksonomies
Which of the following statements is true about social bookmarking?
Writing a business letter
Which of the following tasks is performed by application software
Collaboration system
Which of the following types of information systems enables people to communicate, team up, and coordinate with each other?
Collaboration system
Which of the following types of information systems enables people to communicate, team up, and coordination with each other
Business Continuity Plan
Which of the following types of plans describes how business resumes operation after a disaster?
Custom
Which of the following types of software is best suited for tasks that are unique to particular business?
Service Innovation
Which type of innovation is best described as supporting and enhancing the value of an offering
Analyze the root causes of an exception
While using digital dashboards, pull reporting is conducted to ______.
local area
With respect to computer networks, a typical _____ network has a bandwidth of 10 maps to 1 gbps
Local area
With respect to computer networks, a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps.
Office automation
With respect to the types of information systems used in organizations, a word processor is an example of a(n) _____ system
Customer portals
_____ are designed to automate the business processes that occur before, during, and after sales transactions between a supplier and multiple customers
vendor managed inventory
_____ is a business model in which the suppliers to a manufacturing manage the manufacturers inventory levels based on pre-established service levels.
Metadata
_____ is data about data
Packaged
_____ software is written by third party vendors to support standardized and repetitive tasks.
Online transaction processing
_____ systems are designed to handle multiple concurrent transactions from customers
managerial level
_______ decision making in an organization is referred to as semistructured decision making because solutions and problems are not clear cut and often require judgment and expertise.
Data Cleansing
_______ involves standardizing the format of data retrieved from different systems.
Shrink wrap
_______ licenses are activated as soon as the packaging of the software has been removed.
transaction
_______ refers to anything that occurs as part of a daily business of which a record must be kept.
Cyberharassment
_______ refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress
Media sharing
________ is a cooperative social media application making use of the network effect
social media monitoring
________ is the process of identifying and assessing the volume and sentiment of what is being said about a company, individual, product, or brand.
Social networking
________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.
Enterprise marketing management
________ tools help a company in the execution of the customer relationship management (CRM) strategy by improving the management of promotional campaigns.
Cybersquatting
_________ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.
patriot hackers
independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies