Final Exam (Ch. 1- 9 Quiz Questions and Test 1 and 2 questions)
Which domain is reserved for accredited postsecondary institutions?
.edu
What are the three cloud computing service delivery models?
1. Infrastructure as a service 2. software as a service 3. platform as service
What is Mozilla Firefox?
A competitor to internet explorer
What is a primary key?
A field (or group of fields) that uniquely identifies a given entity in a table
What is a foreign key?
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
What is the difference between a B2C and a C2B?
B2C focuses on business to consumers and C2B focuses on consumers to business
What is the next and future step of information management systems?
BPM (Business process management)
What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time?
Bandwidth
What is it called when distorted product-demand information ripples from one partner to the next throughout the supply chain?
Bullwhip Effect
Which extended ERP component collects information used throughout an organization, organizes it, and applies analytical tools to assist managers with decisions?
Business intelligence
What is a standardized set of activities that accomplishes a specific task?
Business process
Which of the below does not represent a category of AI? genetic algorithms neural networks expert systems consolidation
Consolidation
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
Copyright
CSFs and KPIs are two core metrics used to evaluate results and measure the progress of a project for a business. Which of the below represents the acronyms for CSF and KPI?
Critical success factors and key performance indicators
What is information?
Data converted into a meaningful and useful context
which of the following represents the core drives of the information age? data, intelligence, business information, knowledge data, information, business intelligence, knowledge fact, data, intelligence, experience fact, intelligence, business skills, knowledge
Data, information, business intelligence, knowledge
What is at the heart of any ERP system?
Database
What maintains information about various types of objects, events, people, and places?
Database
What decodes information?
Decryption
which of the following is considered a managerial decision or semi-structured decision? investigating why payroll is having problems running tracking how much inventory is in the warehouse determining how many employees are out sick determining the impact of last month's marketing campaign
Determining the impact of last month's marketing campaign
Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing phase Analysis phase Development phase Planning phase
Development phase
What is the worldwide gap giving advantage to those with access to technology?
Digital divide
Which application's primary business benefits include forecasting, planning, purchasing, material management, warehousing, inventory, and distribution? CRM SCM ERP None of the above
ERP
A few examples of ebusiness advantages can include opening new markets, reducing costs, and expanding global reach. T/F
FALSE
Alpha testing occurs when programmers test the system to ensure it is bug-free. T/F
FALSE
Disruptive technology tends to provide us with better, faster, and cheaper products. T/F
FALSE
The structure of a typical organization is similar to a pyramid, with different levels that require one consistent type of information to assist with all managerial decision making. T/F
FALSE
effectiveness MIS metrics include throughput, transaction speed, and system availability. T/F
FALSE
buyer power is included as one of porter's three generic strategies T/F
FALSE 1. Cost leadership 2. Differentiation 3. Focus
Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry? taylor swift, beyonce, the beatles, the stones game systems like wii, social networks like facebook established record labels like EMI, sony, and universal independent record labels
Game systems like Wii, and social networks like facebook
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge known as?
Hacker
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on fixing?
Hardware
What is the difference between hardware and software?
Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks
What is the support value activity that provides employees with training, hiring, and compensation?
Human resources management
What is the largest and most important network that has evolved into a global information superhighway?
Internet
What is an ISP?
Internet service provider is a company that provides access to the Internet for a monthly fee.
There are three phases in the evolution of CRM: (1) reporting, (2) analyzing, and (3) predicting. What do CRM predicting technologies help organizations accomplish?
Making predictions regarding customer behavior such as which customers are at risk of leaving.
Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organization pyramid would you categorize Jenny? managerial strategic owner operational
Managerial
What are measurements that evaluate results to determine whether a project is meeting its goals?
Metrics
What is software whose source code is available free for any third party to review and modify?
Open source
Which of the following represents the phases in the SDLC? Plan, analysis, design, test, maintain, develop, implement Analysis, plan, design, test, develop, maintain, implement Plan, analysis, design, develop, test, implement, maintain Analysis, plan, develop, design, test, implement, maintain
Plan, analysis, design, develop, test, implement, maintain
What is any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project?
Project deliverable
Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal? SCRUM XP RUP RAD
SCRUM
What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server?
Secure hyperteXt transfer protocol (HTTPS)
Which of the below represents the three different levels of a company pyramid from the top to the bottom?
Strategic --- Managerial --- Operational
Which of the below represents a company in a supply chain?
Supplier and Customer
A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes. T/F
TRUE
A data warehouse is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks. T/F
TRUE
A domain name system (DNS) associates IP addresses with domain names, or identifying labels that use a variety of recognizable naming conventions. T/F
TRUE
A paradigm shift occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave. T/F
TRUE
A private cloud serves only the owner organization and can be located on the owner's premises or off the owner's premises. T/F
TRUE
A sustaining technology produces an improved product customers are eager to buy, such as a faster car or larger hard drive T/F
TRUE
A universal resource locator (URL) is the address of a file or resource on the web such as cofc.edu. T/F
TRUE
A variable is a business intelligence characteristic that stands for a value that is expected to change over time. T/F
TRUE
Broadband over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems. T/F
TRUE
Choosing not to fire a sales representative who is underperforming knowing that person is experiencing family problems is a form of knowledge. T/F
TRUE
Cloud computing could change not only the way businesses operate, but also the way people interact with technology. Google Apps is an example of a cloud computing service. T/F
TRUE
Cyberbullying is an act or object that poses a danger to people. T/F
TRUE
Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. T/F
TRUE
Enterprise application integration (EAI) connects the plans, methods, and tools aimed at integrating separate enterprise systems. T/F
TRUE
Fourth-generation languages (4GL) are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS "SMITH". T/F
TRUE
Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. T/F
TRUE
Key performance indicators can focus on external and internal measurements. T/F
TRUE
Middleware translates information between disparate systems. T/F
TRUE
Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs. T/F
TRUE
Order date, amount sold, and customer number are all forms of data T/F
TRUE
Plan, source, make, deliver, and return are the five basic supply chain management components. T/F
TRUE
RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranchers to track people, products and animals. T/F
TRUE
Search engine optimization (SEO) combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking. T/F
TRUE
Software engineers use computer-aided software engineering (CASE) software tools to provide automated support for the development of the system. T/F
TRUE
The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. T/F
TRUE
The logical view of information focuses on how individual users logically access information to meet their own particular business needs. T/F
TRUE
The physical view of information deals with the physical storage of information on a storage device. T/F
TRUE
Uber created a first-mover advantage by developing its customer self-service software, which allows people to request and pay for a ride online. T/F
TRUE
Unstructured decisions occur in situations in which no procedures or rules exist to guide decision makers towards the correct choice. T/F
TRUE
at the operational level employees develop, control, and maintain core business activities required to run the day-to-day operations. T/F
TRUE
business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision-making T/F
TRUE
productivity is the rate at which goods and services are produced based upon total output given total input T/F
TRUE
What is the systems development life cycle?
The overall process for developing information systems from planning and analysis through implementation and maintenance
What is McDonald's performing when it asks its customers if they would like to super-size their meals?
Up-Selling
What is VoIP? VoIP uses IP technology to transmit telephone calls VoIP offers the low cost ability to receive personal and business calls via computer VoIP offers the ability to have more than one phone number VoIP offers All of the above
VoIP offers all of the above
what is a competitive advantage?
a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors
Which of the following is not an example of unplanned downtime? power outages tornados a system upgrade network failure
a system upgrade
What is phishing?
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
What is cloud computing services changing? the way people access information the way people deliver information the way people use information all of the above
all of the above
what are the characteristics of unstructured data? emails, twitter tweets, and text messages free-form text does not follow a specified format all of these
all of these choices
What is a business that operates in a physical store without an Internet presence?
brick-and-mortar business
Which of the following reflects Moore's law?
computer chip performance per dollar doubles every 18 months
What is a single unit of binary data routed through a network?
ethernet packet
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
hardware key logger
Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
hot site
Which of the following include the three types of an MIS infrastructure?
information MIS, agile MIS, and sustainable MIS infrastructures
Which four elements are included in systems thinking?
input, process, output, feedback
which of the following represents the relationship between functional areas in a business? autonomous interdependent independent self-sufficient
interdependent
there are many different stakeholders found in an organization with common business interests. depending on the stakeholder's perspective, the business strategy can change. which of the following is not a main concern for shareholders/ investors? job security high return on investment maximize profits grow market share
job security
What is software whose source code is available free for any third party to review and modify?
open source
What is a computer dedicated to providing information in response to requests?
server
What verifies that the units or pieces of code function correctly when integrated together?
system testing
In terms of system thinking, what is output?
the resulting information from the computer program
How do the majority of potential customers find business websites?
through web search terms that match the content