umis final
A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
N:M
The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keywords (criteria) into a ________ to obtain the information that she wants.
Query
Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products?
Relationship managment
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
Social capital
Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are know as:
Social media providers
Which of the following is true for the relationship between business processes and information systems?
Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction
What are the four phases of collaboration?
Starting, Planning, Doing, Finalizing
What type of decision requires the most collaboration?
Strategic
A manager will essentially require ________ skills to clearly understand how the resources that his or her company uses are converted to desired outputs.
Systems Thinking
Malware protection can best be described as which of the following...
Technical safeguard
Which of these is one of Porter's 5 forces that determine industry structure?
Threat of new entrants
A ________ is a balancing of three critical factors: requirements, cost, and time.
Trade-off
Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database?
1:N
Which of the following protocols guarantees secure data transmission?
https
________ are collections of related tasks that receive inputs and produce outputs.
Activities
What are the four primary purposes of collaborative teams?
Become informed, make decisions, solve problems, manage projects
What is the most important quality to have as a collaborator?
Being able to give and receive critical feedback
________ is defined as information containing patterns, relationships, and trends.
Business intelligence
A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart.
Commerce server
In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side?
Data
A _____________ is a logical representation of a database that describes the data and relationships that will be stored in the database.
Data model
Because of the various problems with operational data, large organizations choose to extract operational data into a(n) ________.
Data warehouse
The centerpiece of an ERP application is the:
Database
A ___________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business.
Datamart
When a company tries to offer the same products at a lower cost they are trying to __________ a customer's buyer power.
Decrease
In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility?
Define system
The process a company goes through to determine whether or not to invest in a new location is a ____________ process.
Dynamic
In a data model, a(n) ________ represents something that a user wants to track.
Entity
The overall goal of IS Security is to:
Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards
________ is a major task when implementing enterprise systems.
Gap indentification
The term for taking in-depth measures to reduce a system's vulnerability to harm caused by the public is...
Hardening
In the Five-Component Model, which component is the easiest to change?
Hardware
The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.
High levels of rivalry
Which of the following can be described as a security threat?
Human error, cyber terrorists, and natural disasters
How does knowledge management (KM) benefit organizations? Briefly explain your chosen answer.
Improve process quality and Increase team strength
Which of the following is a function of an Internet service provider?
It serves as a user's gateway to the Internet
The two key characteristics of collaboration are:
Iteration and feedback
Which of the following is a common description of information?
Knowledge derived from facts or figures
The primary risk of peer-to-peer support in the context of social media and customer service is ________.
Loss of control
Identify a characteristic that is a disadvantage of cloud-based hosting.
Loss of control over data location
________ are large-scale high-speed centralized computers, used for internal corporate data processing needs.
Mainframes
Which of the following is an accurate representation of the steps in the business process management cycle?
Model processes; create components; implement processes; assess results
Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?
Pay-per-click
A low inventory report that is automatically generated when the number of items reaches a certain number is an example of___________.
Push publishing
To effectively manage risk, organizations must proactively balance the trade-off between risk and ___.
Cost
________ is the dynamic social media process of employing users to participate in product design or product redesign.
Crowdsourcing
Transforming inputs into the final products describes which primary activity?
Operations/Manufacturing
Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers?
Outbound logistics
You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the ________ component of an information system.
Procedure
Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems?
Training employees on the successful use of the new system