DSM Chapters 3, 4, 5, 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Information systems affect ethical principles because they __________.

-create opportunities for intense social change -raise concerns about the use of intellectual property

How is a database different from a database management system (DBMS)?

A DBMS separates the logical and physical views of the data.

Which of the following statements best describes a strategic transition?

A change in an organization's culture and activities as the result of adopting a strategic information system.

The scenario describes which kind of external software source?

A cloud-based software service

Which of the following best describes the competitive forces model?

A competitive forces model can be used to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments.

Which of the following is an automated or manual file for storing and organizing information about the data maintained in a database?

A data dictionary

__________ is associated with a database management system that end users and programmers use to manipulate data in the database.

A data manipulation language

__________ is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulation or enforcement.

A safe harbor

Which of the following best defines copyright?

A statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author's death is a copyright.

Which of the following is true of an efficient customer response system?

An efficient customer response system directly links consumer behavior to distribution and production and supply chains.

__________ is a method for documenting databases illustrating the relationship between various entities in the database.

An entity relationship diagram

Which of the following best describes an organization?

An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs.

__________ involves comparing the efficiency and effectiveness of a business process against strict standards and then measuring the performance against those standards.

Benchmarking

Which of the following best describes computer abuse?

Computer abuse is the commission of acts involving a computer that may not be illegal but that are considered unethical.

__________ is the commission of illegal acts through the use of a computer or against a computer system.

Computer crime

From which of the following occupational health risks does Judy likely suffer?

Computer vision syndrome

What are core competencies?

Core competencies are activities at which a firm excels as a world-class leader.

__________ is one of the four basic competitive strategies, and uses information systems to develop strong ties and loyalty with customers and suppliers.

Customer and supplier intimacy

__________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Data administration

What is data administration?

Data administration is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

__________ is a DBMS capability that specifies the structure and content of the database.

Data definition

IBM DB2, Oracle, SQL Server, Sybase, MySQL, Apache, and Hadoop are all examples of which component?

Data management and storage

Implementing information systems has economic, organizational, and behavioral effects on firms. For example, information systems make it possible for companies such as Cisco Systems and Dell to outsource their production to contract manufacturers such as Flextronics instead of making their products themselves. In this example, information systems have what kind of an impact on an organization?

Economic

Implementing information systems has economic, organizational, and behavioral effects on firms. Information technology, especially the use of networks, can help firms lower the cost of market participation (transaction costs), making it worthwhile for firms to contract with external suppliers instead of using internal sources. As a result, firms can shrink in size. In this example, information systems have what kind of an impact on an organization?

Economic

Which of the following refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors?

Ethics

Which of the following is a grouping of characters into a word, a group of words, or a complete number?

Field

You've probably used __________ to find the best airfare on the Internet, get directions to a restaurant, do a search on Google, or connect with a friend on Facebook.

Hadoop

__________ breaks a big data problem down into sub-problems, distributes them among up to thousands of inexpensive computer processing nodes, and then combines the result into a smaller data set that is easier to analyze.

Hadoop

Which of the following is characteristic of the mainframe era?

Highly centralized computing

Which of the following best defines IT infrastructure?

IT infrastructure is the shared technology resources that provide the platform for the firm's specific information system applications.

Which of the following statements best describes the Immanuel Kant's Categorical Imperative?

If everyone did this, could the organization, or society, survive?

Which of the following is one of the five moral dimensions of the information age?

Information rights and obligations

What is data cleansing?

It consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant.

Which statement describes how trade secret laws are limited in their ability to protect intellectual property?

It is difficult to prevent ideas from falling into the public domain.

__________ is an operating system created by the open source community.

Linux

Which of the following is a microprocessor to which two or more processing cores have been attached for enhanced performance?

Multicore processor

Which of the following best describes NORA?

NORA is a new data analysis technology that takes information about people from many disparate sources and correlates relationship to find obscure hidden connections that might help identify criminals or terrorists.

Which of the following statements best describes nanotechnology?

Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.

Which of the following is the process of creating small, stable, yet flexible data structures from complex groups of data when designing a relational database?

Normalization

Microsoft Windows, Unix, Linux, Mac OS X, Chrome, Android, and iOS are all examples of which component?

Operating systems platforms

Which of the following statements best describes program-data dependence?

Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

Which of the following types of cloud computing is owned and maintained by a cloud service provider and made available to the general public or an industry group?

Public cloud

Google G Suite is an example of ________.

SaaS

__________ consist of organization infrastructure (administration and management), human resources (employee recruiting, hiring, and training), technology (improving products and the production process), and procurement (purchasing input).

Support activities

Which of the following best describes the Risk Aversion Principle?

Take the action that produces the least harm or the least potential cost.

Which of the following ethical principles is best described as putting yourself into the place of others and thinking of yourself as the object of the decision?

The Golden Rule

__________ assumes you can prioritize values in rank order and understand the consequences of various courses of action.

The Utilitarian Principle

Which of the following statements holds true in this scenario?

The law protects her against the copying of the entire software program.

__________ can be used to analyze direct and indirect costs to help firms determine the actual cost of specific technology implementations.

The total cost of ownership (TCO) model

Which of the following statements about the social costs of information technology is true?

The traditional boundaries that separate work from family and just plain leisure have been weakened.

Which of the following highlights activities that add a margin of value to a firm's products or services where information systems can best be applied to achieve a competitive advantage?

The value chain model

Which of the following best defines a value chain model?

The value chain model highlights specific primary and support activities in the business where competitive strategies can best be applied (Porter, 1985) and where information systems are most likely to have a strategic impact.

Which of the following is not a step a firm might take to make sure it has a high level of data quality?

Using in-memory computing

__________ organizes computing resources so that their use is not restricted by physical configuration or geographic location.

Virtualization

Which of the following statements best describe web beacons?

Web beacons are tiny software programs that keep a record of users' online clickstream.

Which of the following refers to loosely coupled software components based on open Web standards that work with any application software and operating system?

Web services

To identify the types of systems that provide a strategic advantage to their firms, managers should ask the following question.

What are some of the competitive forces in the industry?

Which of the following is defined as Windows operating system software on a computer with an Intel microprocessor?

Wintel PC

A structured survey of the accuracy and level of completeness of the data in an information system is called __________.

a data quality audit

According to agency theory, __________.

a firm is viewed as a "nexus of contracts" among self-interested individuals rather than as a unified, profit-maximizing entity

Organizations using information systems to deal with competitive forces __________.

achieve the lowest operational costs

Java is __________.

an operating system- and hardware-independent programming language that is the leading interactive programming environment for the Web

A __________ is loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.

business ecosystem

Most businesses make a mistake when it comes to adopting or implementing information technology because ________.

businesspeople ignore IT instead of taking an active role in shaping it

Privacy is the __________.

claim of individuals to be left alone, free from surveillance

The ________ trend in computer hardware platforms explains how more and more people are using tablet devices to run enterprise wide software applications from remote locations.

cloud computing

When firms and individuals obtain computing power and software as services over a network, including the Internet, rather than purchasing and installing the hardware and software on their own computers, it is called __________.

cloud computing

The competitive advantages that strategic systems confer do not necessarily last long enough to ensure long-term profitability because ________.

competitors can retaliate and copy strategic systems

Procter & Gamble uses an intranet called InnovationNet to help people working on similar problems share ideas and expertise. InnovationNet connects those working in many different departments around the world. It uses a browser-based portal to access data and includes a directory of subject matter experts who can be tapped to give advice or collaborate on problem-solving or product development. This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage.

core competencies

A ________ is a database that stores current and historical data of potential interest to decision makers throughout the company.

data warehouse

Data redundancy occurs when ________.

different groups in an organization independently collect the same piece of data and store it independently of each other

Substitute products that perform as well as or better than anything currently produced are called __________.

disruptive technologies

When Samsung's smartphones overheated and caught on fire, the company had to recall 2.5 million devices. This example demonstrates the ________ component of the TCO model.

downtime

Data mining techniques can be used to ________.

find patterns in data to help managers create forecasts

According to transaction cost theory, __________.

firms and individuals seek to spend less on the costs incurred when a firm buys on the marketplace what it cannot make itself

Text mining tools _________.

help businesses analyze data by extracting key elements from unstructured big data sets, discover patterns and relationships, and summarize the information

Which of the following technology drivers is described by Moore's Law?

microprocessing power

Internet sites like eBay (the giant online auction site) and iVillage (an online community for women) can be used by firms to build communities of users—like-minded customers who want to share their experiences. This builds customer loyalty and enjoyment and develops unique ties to customers. This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage.

network-based strategies

Inbound logistics (receiving and storing materials for distribution to production), operations (transforming inputs into finished products), outbound logistics (storing and distributing finished products), sales and marketing, and service are all __________.

primary activities

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called __________.

profiling

In the most popular type of DBMS, data is represented as two-dimensional tables called ________.

relations

When dealing with platform and infrastructure change, __________ refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

scalability

An information policy __________.

specifies the organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information

According to __________, firms and individuals seek to spend less on the costs incurred when a firm buys on the marketplace what it cannot make itself.

transaction cost theory

The ethical "no free lunch" rule states that __________.

virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise

The Utilitarian Principle rule assumes __________.

you can prioritize values in a rank order and understand the consequences of various courses of action


Set pelajaran terkait

Logic Homework 1a-2e (aka midterm review)

View Set

Medical Terminology Py- (o) through Sinistr- (o)

View Set

NetAcad CCNA Connecting Networks Chapter 1

View Set

172.4 Ethical and patient safety

View Set

2023 Intake/Interview and Quality Review Exam

View Set

Exam # 1 - International Business

View Set

Maternal Child Online Book Questions Ch. 29

View Set