Management Information Systems Midterm
Business Process Management (BPM) includes _________ steps designed to continuously improves the processes of an organization. A. an undetermined number of B. 4 C. 3 D. 5 E. 6
5
Porter's competitive forces model includes _________ forces that impact every organization. A. an undetermined number of B. 5 C. 4 D. 6 E. 3
5
The philosophy that quality should be the responsibility of everyone that works in a firm and every business unit is best known as which of the following? A. Total quality management B. Quality control C. Business process improvement D. Six sigma E. Lean business
A
The popular USB "thumb" drive uses a storage technology very similar to: A. solid state drives. B. digital video disks. C. magnetic disks. D. 3D-Printers. E. CD-ROMs.
A
What are the major objectives that businesses use information systems to achieve? A. Operational excellence, new products, services, and business models; customer/supplier intimacy; improved decision making; competitive advantage; and day-to-day survival B. Increase profit, decrease expenses, increase customer exposure, and customer relations management C. Operational excellence; customer intimacy; improved decision making; competitive advantage; and day-to-day survival D. Products; customer and supplier intimacy; improved decision making; competitive advantage; and day-to-day survival E. Customer relations; automated orders, customer and vendor; employee management; and data management
A
What is a specific software for creating, storing, organizing, and accessing data from a database? A. DBMS B. SQL C. Excel D. Dreamweaver E. HTML5
A
What is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze? A. Big Data B. Hadoop C. DeepData D. ConsoliDATA E. Voluminous Data
A
Porter's competitive force concerned about barriers to entry is/are _______________. A. traditional competitors B. new market entrants C. emerging companies D. Internet service providers E. substitute products and services
B
Quality described as adhering to specific specifications with minimal variations would be through the lens of a: A. salesperson. B. producer. C. customer. D. store. E. child.
B
Technology, economy, politics, and global changes are typically classified best by which of the following? A. Key environment groups that most impact operational management teams B. Broad, general, external environment groups that influence an organization's strategy C. General internal groups within an organization's environment that influence competitive strategy D. Business unit groups that provide strategic input to the firm E. General groups of business objectives that are the basis for continual process improvement
B
The IT infrastructure computer software component includes both ____________ and __________ software categories. A. Windows; MacOS B. system; application C. database; spreadsheet D. programming; system E. Oracle; SQL Server 2014
B
The term ____________ describes data sets like Google's database that are too big for traditional DBMS to handle. A. Excel B. big data C. analytics D. Oracle Database E. Access
B
The Problem-Solving Model consists of __________________, solution design, solution evaluation and choice, and implementation. A. implementation B. problem identification C. solution design D. evaluation E. analysis
B
In the U.S., while there are many people that have access to technology and information, there are many that do not. This creates a ______ that leads to unequal opportunities. A. reengineering job loss B. social society C. digital divide D. social gap E. hierarchy
C
Many companies have social networks that gather and use information from customers and employees thus creating an important role for the _____ to coordinate the protection of all data. A. chief security executive B. chief web officer C. chief privacy officer D. chief social officer E. chief information officer
C
Surprisingly, laws guiding American privacy law are based on a 1973 report called the _____________. A. GAAP B. SQL C. FIP D. CPU E. TIO
C
Business ______________ are the strategized steps and activities that are coordinated within an organization. A. intelligence B. acumen C. databases D. analysts E. processes
E
Collectively, the coordination of computer hardware, software, data management, networking, and technology services collectively is termed: A. Mainframe computing. B. business intelligence. C. IT compliance. D. distributed processing. E. IT infrastructure.
E
A collection of computers on the Internet that allow for innovations such as software as a service (SaaS) is simply called (the): A. Cloud. B. big data. C. operating system. D. database. E. Internet.
A
A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and self-regulation that meet U.S. guidelines. A. safe harbor B. EU trade agreement C. opt-in agreement D. copyright E. ethics code
A
A(n) _____________ is a database whose content focuses on historical organizational data. A. data warehouse B. historical data house C. data historicity D. Access Database E. SQL Server
A
An important word associated with social business is ___________ which includes customers, suppliers, employees, managers, and oversight committees. A. conversations B. customer attention C. business intelligence D. database E. digital dashboard
A
Business process management (BPM) is concluded _________________________. A. never B. after the new system has been properly tested C. after senior management has signed off on the project D. after the analysis has been completed E. after customer complaints have been resolved
A
Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of ________________. A. operations management B. accounting C. marketing D. human resources E. finance
A
For technology, which are the three interrelated advances that make MIS so exciting now and into the future? A. Big data, cloud computing, and the mobile digital platform B. Social media, virtual meetings, and cloud computing C. Big data, social media, and cloud computing D. Cloud computing, the Internet, and databases E. Big data, cloud computing, and telecommunications
A
Frustrated customers angry about a site not working is an example of which IT cost of ownership (TCO)? A. Downtime B. Infrastructure C. Fault Tolerance D. Space and Energy E. Mashup
A
If you include hardware, software, networking, and necessary management consulting, this amounts to over ________ in 2015 in the United States. A. $1 trillion B. $3.8 trillion C. $500 billion D. $1 billion E. $100 billion
A
In client/server computing, a client normally consists of a: A. desktop computer. B. smartphone. C. supercomputer. D. mainframe. E. smartwatch.
A
Professional organizations like the American Medical Association have _____________________, which includes specific conduct guidelines such as, do no harm. A. professional codes of conduct B. utilitarian principles C. liability D. golden rule E. no free lunch rules
A
Putting a key logger on your boss's computer without permission would be considered a(n) ___________. A. computer crime B. ethical C. computer abuse D. well intentioned E. spam
A
Regarding dimensions of business problems, a lack of properly trained employees is considered a ______________ dimension. A. people B. technology C. training D. organizational E. networking
A
Six sigma is a specific measure of _________, representing ____________________. A. quality; 3.4 defects per million opportunities B. customer web interaction; e-sales C. quality; 0 defects during production D. production rate; production margin E. vender web interaction; business process efficiency
A
What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one another? A. Enterprise applications B. Enterprise Linking Systems (ELS) C. Customer Relations Management (CRM) D. Use a Network Operating System (NOS) E. Simple Object Access Protocol (SOAP)
A
What technology trend raises ethical issues related to the limitless data that can be collected about you? A. Data storage costs rapidly decline B. Computer power doubles every 18 months C. Mobile device growth impact D. Networking advances E. Dynamic web pages
A
Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials as well as to customers? A. Supply chain management system B. Customer relationship management system C. Knowledge management system D. Executive support system E. Business intelligence system
A
Which of the following most accurately describes an information system? A. A set of components that gather, analyze, store, and utilize information for making better decisions for a firm B. The technology and data that a business leverages to gain a competitive advantage C. A software program that calculates a solution for a company D. A database that stores all the transactions that occur in a business E. All of the data a firm collects that pertains to its business
A
With regard to relational databases, which of the following is false? A. Each table must have a one-to-one relationship to another table. B. A foreign key can be duplicated. C. The entity-relationship diagram depicts the relationships among tables in a database. D. A primary key cannot be duplicated. E. A customer's name would not make a good primary key.
A
ZipReality, which uses both Zillow and Google Maps, is an example of a: A. mashup. B. mushup. C. LMS. D. Zip drive. E. Microsoft Cloud.
A
_____ refers to the use of social networking to extend a business' collaboration efforts in order to engage and connect better with their employees, suppliers, and/or their customers. A. Social business B. Collaboration C. Customer support D. Networking E. Web marketing
A
____________________ is the most popular open-source program that allows for storage of big data. A. Hadoop B. Andromeda C. Access D. SQL Server E. DBMS
A
____________________, which is now available for average consumers to purchase, has been used in industry to create solid objects, layer by layer, from specifications in a digital file. A. 3-D printing B. Cycle time C. Computer-aided design D. Dot matrix printing E. Color printing
A
_____ is output from an information system that is returned to key people who analyze it to, evaluate it, and refine inputs for the system. A. Feedback B. Business intelligence C. A finalized report D. Data E. Knowledge
A
______ is a set of applications that manages the activities and resources of a computer. A. System software B. Network software C. Platform software D. Management software E. Application software
A
_________ is when a company transfers tasks of the firm to other firms that operate in low-wage countries, possibly reducing job opportunities within the U.S. A. Offshoring B. Outsourcing C. Contracting D. Labor relocation E. Delegating
A
_________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards. A. Marketing B. Accounting C. Finance D. Instructional technology E. Management
A
Michael Porter developed the ________________ model, which emerged as a leading model for better understanding the important concept of competitive advantage. A. competitive advantage B. competitive forces C. component display D. big data E. information technology
B
Among the five identified moral dimensions of the information age, which addresses the question "which cultural values are supported by information technology?" A. Accountability and control B. Quality of life C. Information rights and obligations D. Property rights and obligations E. System quality
B
An example of the business objective ___________ would include one online coin shop offering a free app that can detect fake coins, and all other online stores following this strategy or potentially going out of business. A. customer and supplier intimacy B. survival C. competitive advantage D. decision making E. training
B
Andrew analyzes an ethical issue at work, evaluates the outcomes of various options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew applying? A. Golden Rule principle B. Utilitarian principle C. Risk aversion principle D. Descartes' rule of change E. Kant's categorical imperative
B
Attempting to determine when a computer hardware system will be maxed out is called: A. CPU speed. B. capacity planning. C. XML. D. referential integrity. E. business intelligence.
B
If Megan sends out unauthorized data to another organization, she has likely violated the company's ______________. A. DBMS B. information policy C. data foundations D. primary key E. data warehouse
B
It has been shown that one of the best ways to reduce quality problems is to reduce _____________. A. the number of employees involved in the business process B. cycle time C. outsourcing D. cost E. the number of departments involved in the business process
B
What are the four generic information system strategies for dealing with competitive forces? A. Low-cost leadership, margin/cost ratio below national average, market focus, and deepening customer online data B. Low-cost leadership, product differentiation, focus on market niche, and strengthening customer and supplier intimacy C. Low-cost leadership, product differentiation, focus on e-market, and strengthening customer and supplier privacy D. Low-cost leadership, product conforms to standard design, focus on broad market, and strengthening customer and supplier intimacy E. Customer/Competitor data leader, product e-visibility, increasing percentage of online to in store sales ratio, data security
B
What is social business? A. Use of social networking platforms to handle all customer relations B. Use of social networking platforms to engage employees, customers, and suppliers C. Identifying customers through the use of social media D. Doing business through a social network only E. A company whose only web presence is on social media
B
What is the process of predicting when a computer hardware system will become saturated? A. Permeation testing B. Capacity planning C. Burden testing D. Saturation testing E. Overload planning
B
What is the understanding that most American and European privacy law is based on? A. Data Privacy Practices (DPP) B. Fair Information Practices (FIP) C. End User License agreement (EULA) D. Stop Online Piracy Act (SOPA) E. Digital Millennium Copyright Act (DMCA)
B
Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the government? A. FIP B. NORA C. TCP-IP D. ERP E. SEC_DBA
B
Which of the following is false about information systems? A. Management of information systems brings in behavioral issues in addition to technical issues. B. Customers and suppliers are considered important elements of the information system as they provide key data. C. Information systems is really information technology plus people and organizations. D. Computers are like hammerslong dashthey are not information systems but are used to create information systems. E. Information is created through the input, processing, and output activities of an information system.
B
Checking for quality and paying creditors would fall within which two functional areas? A. Finance and accounting, and human resources B. Manufacturing and production, and human resources C. Manufacturing and production, and finance and accounting D. Manufacturing and production, and sales and marketing E. Human resources, and sales and marketing
C
Concerning Porter's model and the Internet, which of the following is false? A. Due to global information, customer bargaining power increases. B. With readily available pricing information, customer bargaining power increases. C. Due to technology requirements, the threat of new entrants decreases. D. The more suppliers a firm has, the more control a firm has over those suppliers. E. With new ways to meet needs, the threat of substitute products increases.
C
Domestic exporter strategy is characterized by which of the following? A. Transnationalism B. Virtual organization C. Centralization D. Regionalization E. Decentralization
C
For the sale of online used textbooks with many suppliers and low cost to switch to a different supplier, is an example of: A. new entrants being unable to enter the market. B. rivalry being strong. C. customers having a lot of power. D. suppliers having a lot of power. E. similar products causing high substitute power.
C
Google Apps is a popular cloud-based: A. open source software. B. DBMS. C. software as a service (SaaS). D. operating system. E. mapping program.
C
If a firm wants to learn more about its users, behaviors, and marketing effectiveness, they might turn to ____, relying on the huge amount of data available through the Internet. A. sentiment analysis software B. HANA C. Web mining D. Hadoop E. data marts
C
A car reservation system requiring processing a thousand transactions per second would likely require a __________ to process the transactions. A. workstation B. supercomputer C. mainframe D. microcomputer E. personal computer
C
A computer _________________ causes the most repetitive stress injuries. A. virus B. fan C. keyboard D. hard drive E. monitor
C
A data __________ is a method using a survey to determine the accuracy of a data set. A. scrubbing B. base C. audit D. cleansing E. review
C
A multinational strategy is often described where financial management and strategy operate out of a central __________________. A. transnational B. exporter C. home base D. franchiser E. home field
C
A single screen of graphs or charts of key performance indicators is known as a(n) ________________________. A. ESS B. aggregator C. digital dashboard D. portal E. DSS
C
An online store asking you to complete a customer satisfaction survey to better understand its customers after making a purchase is primarily addressing which business objective? A. competitive advantage B. decision making C. customer and supplier intimacy D. training E. survival
C
Apple's ITunes and a traditional music store have very different business ___________ with regards to how they produce and deliver products to customers. A. analysts B. management C. models D. customers E. information systems
C
The most common type of database is a __________. A. normalized database B. non-relational database C. relational database D. hierarchical database E. SAP database
C
The popular quality control model, six sigma specifically calls for 3.4 defects per ____________ as a measure of quality. A. hundred B. hundred thousand C. million D. billion E. thousand
C
What are the steps of the problem solving process? A. Problem Identification, Solution Design, and Solution Implementation B. Problem Identification, Team Organizing, Resolution Building, and Resolution Implementation C. Problem Identification, Solution Design, Solution Evaluation and Choice, and Implementation D. Problem Definition, Problem Scrutiny, Generating Solutions, Analyzing the Solutions and Selecting the best Solution E. Defining the problem, choosing the best solution, implementing the solution.
C
What does Data Management Software do with business data regarding inventory, customers, and vendors? A. Data Management Software makes business data searchable via Google. B. Data Management Software aggregates data purchased from BigData. C. Data Management Software organizes, manages, and processes business data. D. Data Management Software merges it with HTML to make a web page. E. Data Management Software merges it with SQL to make a database.
C
What is a widely used form of distributed processing? A. W.A.D.C. Wide Area Distributed Computing B. Multi-Core Processing. C. Client/Server Computing D. Parallel Processing E. Centralized Processing
C
What is the domestic exporter strategy characterized by? A. Slight concentration of corporate activities in the home country of origin B. Concentration financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries C. Heavy centralization of corporate activities in the home country of origin D. Import of raw products, export of finished products ratio is above 50% E. No centralization of corporate activities in the country of origin
C
What type of computing involves connecting computers that are not near one another into a signal network and combining the computational power of the computers on the network? A. Mainframe computing B. Parallel computing C. Grid computing D. Multi-threaded computing E. Time slice computing
C
When a leading discount store's database was breached, a lot of attention was on the company's ____________________, who is specifically responsible for training employees about security. A. systems analyst B. chief information officer C. chief security officer D. chief privacy officer E. chief financial officer
C
When is business process management (BPM) concluded? A. When the business process reaches an acceptable level of efficiency B. After implementation of the new process C. BPM is never concluded. D. When the business process is complete E. After you identify the process that needs to be changed, then you implement Business Process Modification.
C
If someone at your work accuses you of sending inappropriate emails, you should be afforded __________________. A. responsibility B. accountability C. a third chance D. due process E. liability
D
Which Ethical rule below is combined with its proper description? A. Moore's Law; the number of transistors in a dense integrated circuit has doubled approximately every two years. B. Immanuel Kant's categorical imperative; placing yourself in the place of others, and thinking of yourself as the object of the decision C. The utilitarian principle; assumes values are prioritized in an order and the consequences of various courses of action are understood D. Golden Rule; an action is not right for everyone to take, it is not right for anyone E. Ethical rule; some actions have extremely high failure costs of very low probability or extremely high failure costs of moderate probability
C
Which Microsoft operating system specifically supports mobile features such as multitouch and mobile devices? A. Mac OS B. Windows 15 C. Windows 10 D. Microsoft SQL Server 2014 E. Microsoft Azure
C
Which of the following is false concerning the social and cultural issues in regard to the prevalence of information systems? A. It has increased the ability to telecommute while confusing the separation between work and personal life. B. It has led to an increased reliance on information systems. C. It is an equalizer for social classes and minorities. D. It has led to increased work efficiency while reducing the number of middle manager positions. E. It is easier for a business to quickly change, but competitive advantage is maintained for shorter time frames.
C
_____ is responsible for enterprise-wide governance and usage of information to maximize the value of the organization's data. A. Chief information officers B. Chief privacy officer C. Chief data officer D. Chief knowledge officer E. Information systems developers
C
_____ is when a firm connects numerous computers together into one network to create one, very powerful computer system that has coordinated processing A. Centralized processing B. Client/server computing C. Grid computing D. Mainframe computing E. Distributed processing
C
___________________ is a term used by companies looking to detect and correct incomplete, redundant, or incorrect data. A. SQL B. Data mining C. Data scrubbing D. Primary key E. Referential integrity
C
ESS, DSS, and MIS systems all fall under the generic term of _______ systems as they help with the decision making process. A. transaction processing B. enterprise C. business intelligence D. infrastructure E. management information
C
If you accept a position as an information systems manager, you have a(n) ____________ to accept the costs, benefits, and obligations for the decisions you make. A. accountability B. due process C. recklessness D. responsibility E. liability
D
Most larger corporations utilize a ______ to consolidate data from a business along with external data. A. DBMS B. data mart C. Hadoop D. data warehouse E. data consolidator
D
Numerous companies choose a(n) _________ model where they retain some infrastructure in-houselong dashprimarily their critical systemslong dashwith the less-essential systems outsourced to a third party. A. hierarchical B. web hosting C. onshore outsourcing D. hybrid cloud E. service level
D
Outsourcing to domestic U.S. firms and _____________ outsourcing are both considered ways to reduce costs by US organizations. A. China B. Canada C. network D. offshore E. Internet
D
As part of a DBMS, a(n) _________ documents information about a database. A. entity relation diagram B. attribute listing C. data definition D. data dictionary E. data manipulation language
D
A _______________ uniquely represents a record or row. A. prime key B. foreign key C. cost key D. primary key E. data key
D
Because important financial documents are required to be submitted via the Internet in formats such as XBRL, ______________ has been impacted by information systems. A. management B. marketing C. instructional technology D. accounting E. finance
D
Enterprise Systems are also known as ________________. A. Cloud computing B. Transaction Processing Systems (TPS) C. Enterprise Social Systems D. Enterprise Resource Planning (ERP) Systems E. Parallel processing
D
Taking application components from various resources, ________ mixes and matches to create a new, customized Internet experience. A. open source software B. cloud computing C. XML D. a mashup E. SaaS
D
The senior leadership position responsible for the organization's data is called the ____________ officer. A. chief privacy B. chief information C. systems analyst D. chief data E. chief security
D
The _______________ has helped level the playing field for companies wanting to do business globally. A. database B. transnational C. LAN D. Internet E. systems analyst
D
Virtually anyone can set up a(n) ________________, an application of social business which allows for publishing opinions and experiences about a variety of topics. A. file sharing B. training program C. social network D. blog E. Internet
D
What affects approximately 90% of persons who spend 3 or more hours a day at a computer? A. Retinal socket swelling B. Retinal Pixelazation (RP) C. Repetitive Upper Spinal Strain (RUSS) D. Computer Vision Syndrome (CVS) E. Cognitive Dimming
D
What are the dimensions of information systems? A. Organizations, Data, and Information Technology B. Coarseness of data, depth of information, and source reliance C. Information, Data, and Internet Technology D. Organizations, People, and Information Technology E. Information, Data, and Computer Technology
D
When thinking about managing and controlling data within a company, which of the following is false? A. An information policy would establish who in human resources could get to employee data, for example. B. As part of control, a firm may set policy about passwords for accessing data. C. An information policy sets up who can access what information within a firm. D. The actual physical database is never created by the database administration of a company. E. Large companies may have several departments, each handling specific tasks involving data assurance for the firm.
D
Which of the following is false about Microsoft Access? A. Microsoft Access works with Crystal Reports, a popular report generator. B. Microsoft Access is a DBMS. C. Microsoft Access has capabilities for developing desktop system applications. D. Microsoft Access does not have report generation capability. E. Microsoft Access has rudimentary data dictionary capabilities.
D
Which of the following is false regarding business process management? A. If a process needs major, quick revisions, business process reengineering may be required. B. Measurement may be needed during the design of a process in addition to after implementation. C. It is important to prioritize projects for improvement. D. The BPM process concludes once metrics are established and the system is implemented. E. It is important to document the sequence of a current system, then create diagrams of the new, improved system.
D
With E-commerce and the Internet, which of the following depicts a trend in advertising? A. E-commerce and Internet advertising have remained flat and traditional advertising and commerce has also remained flat. B. E-commerce and Internet advertising have grown while traditional advertising and commerce have decreased. C. E-commerce and Internet advertising have decreased while traditional advertising and commerce have remained flat. D. E-commerce and Internet advertising have grown while traditional advertising and commerce have grown also. E. E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.
D
_____ are the people or groups, both internal and external to the organization, for whom applications are developed. A. Senior managers B. Knowledge workers C. Clients D. End users E. Managers
D
_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location. A. Optimization B. Cloud computing C. Nanotechnology D. Virtualization E. Network infrastructure
D
___________________ is/are an application of social business that allows for the opportunity to share documents. A. Crowdsourcing B. Social networks C. Social marketing D. File sharing E. Communities
D
(A) _______________ is the formal name for questioning or making a data request from the database. A. DDL B. DML C. cloud D. query E. Access
D
________________ focus(es) on providing decision making data available for middle managers to make sound business decisions. A. Transaction processing systems B. Decision support systems C. Business intelligence D. Management information systems E. Executive support systems
D
A formal name to describe self-regulating policies is called _____________. A. due process B. accountability C. liability D. privacy E. safe harbor
E
Among the five identified moral dimensions of the information age, which addresses the question of liability related to information systems? A. Information rights and obligations B. Quality of life C. System quality D. Property rights and obligations E. Accountability and control
E
An organization interested in the most popular open source DBMS on the market would adopt _____ SQL. A. Oracle Database B. Access C. DB2 D. Server E. MySQL
E
An unethical, but not illegal act committed using a computer is called _____________. A. closed source B. well intentioned C. computer fraud D. computer crime E. computer abuse
E
A _______________ is represented as a column in a database table that represents things like a person's first name, last name, and age. A. record B. byte C. file D. bit E. field
E
A _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table. A. primary key B. data key C. cost key D. prime key E. foreign key
E
A __________________ is a popular business organization that has a product or service created in the home country (i.e., McDonald's and Chem Dry), and distributes the same products worldwide. Individual stores or locations are often owned by a local individual. A. partnership B. transnational C. corporation D. multinational E. franchiser
E
Creating a new system that provides charts and graphs to assist senior management make non-routine decisions is called (a): A. Transaction processing system. B. Decision support systems. C. Management information systems. D. Business intelligence. E. Executive support systems.
E
Determining the inputs, outputs, and resources required, and documenting the sequence of activities in a process typically occur during the: A. implementation of a new process. B. development process. C. development of metrics for the process. D. identification of processes that need changed. E. analysis of existing processes.
E
IT professionals working to make a new system work with an existing system is focusing on: A. data accuracy B. cost C. volatility D. data mining E. systems integration
E
If you return to a website that welcomes you back by name, you likely have small text file on your computer with information about your prior visits called a ___________. A. network B. malware C. cake D. customization E. cookie
E
In a relational database generalized categories represent a(n) __________, and each category has characteristics called ______________. A. attribute; entities B. relationship; entities C. primary key; attributes D. primary key; index E. entity; attributes
E
IoT stands for the: A. Intranet of Things. B. Internet Protocol of Things. C. IPhone of Things D. Instructional Technology of Things E. Internet of Things.
E
Systems designed to help maintain and improve customer data and its relationship with customers are called __________________ systems. A. customer attention B. guest feedback C. transaction processing D. knowledge management E. customer relationship management
E
The BPM step which addresses the question of which processes need to be addressed is ___________________________. A. process analysis B. the needs analysis C. analyzing existing processes D. continuous measurement E. identifying processes for change
E
The senior leadership position responsible for the organization's internal knowledge (i.e. tacit knowledge) is called the ____________. A. knowledge management officer B. systems analyst C. chief training officer D. chief privacy officer E. chief knowledge officer
E
The Problem-Solving Model phase where you determine a performance discrepancy that might be caused by an outdated system is the ________ phase. A. analysis B. evaluation C. implementation D. solution design E. problem identification
E
The _________ actually works with the databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data. A. information policy group B. auditing team C. data cleansing team D. CIO E. database administration
E
Transnational firms have no single national headquarters but instead have many regional headquarters and perhaps a world headquarters. What is the transnational strategy characterized by? A. Production, finance/accounting, sales/marketing, human resources, and strategic management are set up to optimize resources in the home country of origin. B. Concentration financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries C. Product created, designed, financed, and initially produced in the home country but relies heavily on foreign personnel for further production, marketing, and human resources D. Centralizing financial services in a country that offers the most favorable tax laws E. Nearly all the value-adding activities are managed from a global perspective without reference to national borders.
E
What are the four elements of critical thinking? A. Dismissing doubt and continuing judgment, Focusing on a single perspective, Letting experience guide, and Being aware of personal limitations B. Maintaining doubt and suspending judgment, focusing on one perspective, testing alternatives and letting experience guide, and Being aware of organizational and personal limitations C. Maintaining doubt, suspending judgment, testing alternatives, and being aware of organizational limitations D. Problem Identification, Solution Design, Solution Evaluation, and Choice Implementation E. Maintaining doubt and suspending judgment, Being aware of different perspectives, Testing alternatives and letting experience guide, and Being aware of organizational and personal limitations
E
What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate computers? A. The Android OS B. Grid computing C. Use of Web OS D. The use of non SQL databases E. Cloud computing
E
What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on individuals? A. Social gathering B. Data rooting C. Data sourcing D. BigData E. Profiling
E
What is service-oriented architecture (SOA)? A. An XML-based productivity suite B. A service-oriented computer platform C. A service-oriented networking architecture D. A service-oriented operating system architecture E. A set of self-contained services that communicate with each other to create a working software application
E
What would an organization use to specify rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information? A. Company mission statement B. EULA C. Fair use policy D. Copyright law E. An information policy
E
Which of the following is the best example of a software suite? A. Firefox B. Java C. Microsoft Windows 7 D. XML E. Microsoft Office 2013
E
_______________________ are the functional business processes responsible for quality assurance. A. Human resources B. Instructional technology C. Finance and accounting D. Sales and marketing E. Manufacturing and production
E
_______________________ is an example of a DBMS desktop system geared toward smaller business data needs. A. DB2 B. SQL Server C. MySQL D. Oracle Database E. Access
E
_______________________ is the functional business process responsible for managing cash accounts. A. Human resources B. Sales and marketing C. Manufacturing and production D. Instructional technology E. Finance and accounting
E
___________________________ is an open source operating system for mobile devices. A. UNIX B. Linux C. Moodle D. Windows mobile E. Android
E