MISY 3310 Exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is big data?

A collection of large complex data sets, including structured and unstructured, which cannot be analyzed using traditional database methods and tools.

What is a telepresence robot?

A remote-controlled, wheeled device with a display to enable video chat and videoconferencing

What is information collected from multiple sources such was suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?

Business intelligence

What is the graphical notation that depicts the steps in a business process?

Business process model notation

The accounting and finance department performs processes such as creating financial statements, paying accounts payables, and collecting accounts receivables. What form of processes do these represent?

Business-facing process

How are the majority of companies today typically organized?

By departments or functional areas

The sales and marketing departments primarily use monetary data.

False

Assume you are in the business of producing and selling cars. If you could produce more cars with the same input what would happen to your productivity and profits assuming the price of your cars remains the same?

Increase in productivity, increase in profits

What do usability effectiveness MIS metrics measure?

The ease with which people perform transactions and find information

Domain name hosting (web hosting) is a service that allows the owner of a domain name to maintain a simple website and provide email capacity.

True

Downtime refers to a period of time when a system is unavailable and unplanned downtime can strike at any time for various reasons.

True

Epolicies are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

True

Firm infrastructure and human resource management are part of the support value activities.

True

Managerial business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.

True

Mutation is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome.

True

Phishing expedition is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter his or her username, password, and sometimes credit card information.

True

What is information security?

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

What is cyborg anthropology?

A discipline originated at the 1993 annual meeting of the American Anthropological Association.

Which policy can protect a company's brand identity and outlines the corporate principles governing employee online communication?

A social media policy

Which department records, measures, and reports monetary transactions?

Accounting

Which of the following represents the primary business revenue models?

Advertising fees, license fees, subscription fees, transaction fees, value-added service fees

What allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website?

Affiliate program

Which of the below represents the definition of information property?

An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanges.

What is Porter's Five Forces Model?

Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry

Which of the following represents the three areas where technology can aid in the defense against information security attacks?

Authentication and authorization, prevention and resistance, detection and response

What is represented by a diamond shape in a business process model?

BPMN Gateway

Who is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives?

Chief Information Officer (CIO)

Which of the following is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?

Collaboration system

Which of the following is not a common approach to closing an MIS skills gap?

Competitive salary

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?

Cryptography

What is the difference between customer-facing processes and business-facing processes?

Customer-facing processes are front-office processes, business-facing processes are back-office processes

Which of the following is considered a service?

Cutting hair

Which of the following represents the core drivers of the information age?

Data, Information, Business Intelligence, Knowledge

The Victory Wireless store in Denver is currently offering a fabulous marketing strategy for potential new iPhone customers. Victory Wireless offers customers who purchase an iPhone with a 2-year subscription a free Otter phone case, car charger, ear phones, and speakers. In terms of Porter's Five Forces what is Victory Wireless attempting to achieve with this marketing strategy?

Decrease buyer power

What uses techniques that describe past performance and history?

Descriptive analytics

What occurs when a business sells directly to a customer online and cuts out the middle man?

Disintermediation

What type of report can include updating daily stock market prices or the calculation of available inventory?

Dynamic report

What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?

Elevation of privilege

Which data types are typically found in the human resources department?

Employee data, promotion data, vacation data

Susan teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of the four ebusiness challenges which of the following is the most crucial challenge to consider before engaging in social media?

Ensuring consumer protection

Which of the below represents the definition of information management?

Examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

There are many different stakeholders found in an organization. Stakeholders drive business strategies, and depending on the stakeholder's perspective, the business strategy can change. Which of the following is a main concern for customers?

Exceptional customer service

A Business Process Model and Notation (BPMN) event is a task in a business process.

False

A firewall scrambles information into an alternative form that requires a key or password to decrypt.

False

A social bookmark is a locally stored URL or the address of a file or Internet page saved as a shortcut.

False

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

False

A worm is a form of malicious software that infects your computer and asks for money.

False

Mark Peterson identified the Porter's Five Forces Model which analyzes the competitive forces within a business environment.

False

Multi-factor authentication is the traditional security process, which requires a user name and password.

False

Porter's Five Forces Model outlines the process for a sales strategy.

False

Ransomware is a form of social engineering in which one individual lies to obtain confidential data about another individual.

False

Strategic planning is a customer-facing business process.

False

The Internet of Things (IoT) refers to devices that connect directly to other devices.

False

The business decisions made by the Human Resources department include investment data, monetary data, and reporting data.

False

The business decisions made by the marketing department include transactional data, purchasing data, payroll data, and tax data.

False

The chief data officer is responsible for (1) overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives.

False

The chief knowledge officer is responsible for (1) overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives.

False

Using only data and information to make decisions and solve problems is the key to finding success in business. These are also the only core drivers of the Information Age and the building blocks of business systems.

False

Web 3.0 refers to static text-based information websites.

False

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?

Hardware key logger

Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the below company policies?

Information security policies

Which of the following is a type of Web browser?

Internet Explorer and Mozilla Firefox

MIS can be an important enabler of business success and innovation. Which of the below statements is accurate when referring to MIS?

MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.

What type of structured data includes sensor data, point-of-sale data, and web log data?

Machine-generated

In a SWOT analysis, which of the following could you discover as potential external opportunities (helpful)?

New markets

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

Open system

Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's five forces model. Which of the following represents supplier power in the soft drink industry?

Pepsi requires stores that can carry Pepsi products to commit to minimum orders of 1,000 cases.

Which of the following represents the types of data commonly found in the marketing department?

Promotional data

What is the primary business advantage of using email?

Providing the ability to inform and communicate with many people simultaneously, immediately, and with ease

What are managerial business processes?

Semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements

Which of the following is not a topic or feature that is included in Web 3.0?

Social networking

Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?

Some online companies have to charge sales tax

Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique websites. Many of his daily tasks are heavily technical in nature and require a high level of computer programming and Internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?

Source code

Your boss, Penny Dirks, has asked you to analyze the airline industry using Porter's three generic strategies. Which of the following companies are using a cost leadership strategy?

Southwest, Horizon, Frontier, JetBlue

What is a small embedded line graph that illustrates as single trend?

Sparkline

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

Spoofing

Business process modeling or mapping, is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a _________ sequence.

Structured

What is the basic business system that serves the operational level and assists in making structured decisions?

TPS

When evaluating the six-step decision making process, what occurs during the solution implementation step?

The process will begin again if the decisions made were incorrect

What is pirated software?

The unauthorized use, duplication, distribution, or sale of copyrighted software

What is the primary goal of using As-Is and To-Be process models?

To determine what the problem is and then how to solve the problem

What are the three primary types of management information systems available to support decision making across the company levels?

Transaction Processing Systems, Decision Support Systems, Executive Information Systems

An ezine is a magazine published only in electronic form on a computer network. Flipboard is a social-network aggregation, magazine-format application software for multiple devices that collects content from social media and other websites, presents it in magazine format, and allows users to flip through the content.

True

Business-to-consumer applies to any business that sells its products or services directly to consumers online.

True

Predictive analytics extracts information from data and uses it to predict future trends and identify behavioral patterns.

True

Technology provides countless business opportunities, but can also lead to pitfalls and traps for a business.

True

Visualization produces graphical displays of patterns and complex relationships in large amounts of data.

True

Website name stealing is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

True

Which of the following terms could use synonymously when referring to the Web?

URL, Domain Name

Which of the below does not represent an example of analytical information?

Unstructured long-term decisions

Bob Silver loves playing a game called World of Warcraft where he has the capability to create his own character and even his own life-like environment. Which AI system would you categorize World of Warcraft?

Virtual reality

What is a computer-simulated environment that can be a simulation of the real world or an imaginary world?

Virtual reality

What allows user to access the WWW?

Web browser

The goal of value chain is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a ________ or ________.

cost advantage, product differentiation

In a SWOT analysis, opportunities and threats originate _________ an organization.

outside (externally)


संबंधित स्टडी सेट्स

Ethical Hacking Essentials Exam Prep

View Set

What are the three parts of a nucleotide?

View Set