INFS Final review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

an example of raw data from a national chain of automobile stores would be

1 Toyota RAV4 sold March 3, 2008, in Louisville, Kentucky

Linux is

An example of open-source software

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?

Decision Support System (DSS)

_________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance

Decision Support systems (DSS)

the term "blank divide" refers to large disparities in access to computers and internet among different social groups and different locations

Digital divide

The use of digital technology and the internet to execute the major business processes in the enterprise is called

E-business

Buying or selling goods over the intent is called

E-commerce

Which of the following provides a suite of integrated software modules and a common central database that allows data to be used by multiple functions and businesses processes?

ERP system

which of the following types of systems helps expedite the low of information between the firm and its supplier and customer?

Extranet

You would use an MIS to help decide whether to introduce a new product line

False

which type of software is created and updated by a worldwide community of programmers and available for free?

Open-Source software

_____ systems integrate supplier, manufacturer, distributor, and customer logistics processes

Supply-chain management (scm) systems

Which of the following is one of the support activities in a firm's value chain?

Technology

Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses

True

A networks that cover entire geographical regions is most commonly referred to as a(n):

Wide Area Network(WAN)

a _____ is a senior management who oversees the use of IT in the firm

a chief information officer (CIO)

A Trojan horse:

a type of malware that appears to be legitimate software but secretly performs malicious actions

A characteristic or quality that describes a particular database entity is called a(n)

attribute

Enterprise software is built around thousands of predefined business processes that reflect:

best practices

A distortion of information about the demand for a product as it passes form one entity to the next across the supply chain is called the ___ effect.

bullwhip effect

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs. This is am example of:

click fraud

Which of the following refers to all the methods, policies, and organizational procedures that ensures the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

controls

_____ creates confusion that hampers the creation of information systems that integrate data from different sources.

data inconsistency

Data ______ occurs when the same data is duplicated in multiple files of database

data redundancy

A(n)________ signal is a discrete, binary wavefront that transmits data coded into two discrete states: 1-bits and 0-bits.

digital signal

Client/server computing is a :

distributed computing model where processing is split between "clients" and "servers"

Suing numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) _____ attack.

distributed denial-of service DDoS Attack

_______ are designed to support organization-wide process coordination and integration

enterprise applications

which of the following is not one of the competitive forces?

external environment

Computer networks that's use packet switching are less efficient than telephone networks that use circuit switching

false

Disintermediation does not benefit the customer.

false

IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise

false

In a client/server network, the clients sets the rules of communication for the network.

false

Strong linkages to customers and suppliers decrease switching costs

false

The internet increases information asymmetry

false

a hotel reservations system is typical emplace of a management information system

false

a firm can exercise greater control over its suppliers by having

fewer suppliers

A common field that links two different tables and serves as a primary key to one of these tables is called the:

foreign key

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:

grid computing

Compared to digital goods, traditional goods have:

higher marginal costs and lower initial production costs

intellectual property can best be described as

intangible property created by individuals or corporations

Which of the following dimensions of e-commerce technology involves engaging consumers in a dialogue that dynamically adjusts the experience to the individual?

interactivity

In a ______ strategy, components arrive exactly at the moment they are needed and finished goods are shopped as soon as they leave the assembly line.

just-in-time (JIT) strategy

______ is a spyware that logs and transmits everything a user types

keylogger

executive support systems are information systems that support the

long-range planning activities of senior managment

Compared to traditional goods, digital goods have:

lower marginal costs and higher initial production costs

What is the primary benefit to consumers of disintermediation?

lower prices

Evil twins are:

malicious wi-fi access points that mimic legitimate public wi-fi networks

The universal standards of the internet and e-commerce lower which of the following?

market entry costs

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

modem

European privacy protection is blank than in the united States

much more stringent

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization

when a cookie is created during a web site visit, it is stored

on the visitor's computer

in a business hierarchy, the level that is for monitoring the daily activities of the business is

operational management

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling at their destination?

packet switching

Most computer viruses deliver a:

payload

All of the following are unique features of e-commerce technology, except:

peer-to-peer networking

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

ransomware

A(n) ______ represent data as two-dimensional tables

relational database

In a relational database table for customers, the information about a single customer resides in a single:

row

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

security

A network or organizations and businesses processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n):

supply chain

A company having difficulty with timely delivery of parts to its manufacturing plants should implement a _______ system.

supply chain management (SCM) system

Which of the following is the last entity in the downstream portion of a supply chain ?

the customer

Which of the following best illustrates the relationship between entities and attributes?

the relationship between a record and the field in that record

What event marked the beginning of e-commerce?

the sale of the first product online

Output is

transfers processed information to the people who will use it or to the activities for which it will be used

A query is a request for data from a database.

true

Authentication refers to verifying that people are who they claim to be.

true

E-commerce refers to the use of the internet and te web to transact business

true

Encryption is a key feature of a blockchain database

true

Enterprise systems are built around a small number of predefined business processes.

true

In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks.

true

Organizations car rewrite enterprise system software to support their existing business processes.

true

The internet is the largest implementation of client/server computing.

true

developing a new product, fulfilling an order, and hiring a new employee are examples of business processes

true

in the value chain model, primary actives are most directly related to the production and distribution of the firms products and services that create value for the customer

true

privalry is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations

true

spyware is software that comes hidden downloaded applications and can track your online movements

true

the dimensions of information systems are management, organizations and technology

true

In the supply chain, components or parts are referred to as:

upstream materials

Sets of loosely coupled software components that exchange information with each other using standard web communications standards and languages are referred to as

web services

_______ systems are designed to help firms manage their relationship with their customer

CRM (Customer Relationship Management) systems

which of the following is not an example of the merging mobile computing platforms?

CRM( Customer Relationship Management)

Converting raw data into a more meaningful form is called

Processing

Which of the following industries has a low barrier to entry?

Retail, food trucks, freelancing, lawn, e-commerce

Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?

Router

Enabling management to make better decisions regarding organizing and scheduling sourcing production and distribution is a central feature of

SCMs (Supply Chain Management systems)

A set if self-contained services that communicate with each other to create a working software applications is called

SOA (Service-oriented architecture)


Set pelajaran terkait

Chapter 9: Customer-Defined Service Standards

View Set

French 2 U3L3 -re Verbs (conjugations)

View Set

Personal Finance Module 3 Review

View Set

ATI Learning System 3.0 - Fundamentals 2

View Set

General Psychology Quiz 1 Ch 1-3

View Set

Társas képességek fejlesztése (alapok) igaz - hamis

View Set

ADQ functional Ability 1520 NURSG

View Set