Management Information Systems Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Business Process Management​ (BPM) includes​ _________ steps designed to continuously improves the processes of an organization. A. an undetermined number of B. 4 C. 3 D. 5 E. 6

5

Porter's competitive forces model includes​ _________ forces that impact every organization. A. an undetermined number of B. 5 C. 4 D. 6 E. 3

5

The philosophy that quality should be the responsibility of everyone that works in a firm and every business unit is best known as which of the​ following? A. Total quality management B. Quality control C. Business process improvement D. Six sigma E. Lean business

A

The popular USB​ "thumb" drive uses a storage technology very similar​ to: A. solid state drives. B. digital video disks. C. magnetic disks. D. ​3D-Printers. E. ​CD-ROMs.

A

What are the major objectives that businesses use information systems to​ achieve? A. Operational​ excellence, new​ products, services, and business​ models; customer/supplier​ intimacy; improved decision​ making; competitive​ advantage; and​ day-to-day survival B. Increase​ profit, decrease​ expenses, increase customer​ exposure, and customer relations management C. Operational​ excellence; customer​ intimacy; improved decision​ making; competitive​ advantage; and​ day-to-day survival D. ​Products; customer and supplier​ intimacy; improved decision​ making; competitive​ advantage; and​ day-to-day survival E. Customer​ relations; automated​ orders, customer and​ vendor; employee​ management; and data management

A

What is a specific software for​ creating, storing,​ organizing, and accessing data from a​ database? A. DBMS B. SQL C. Excel D. Dreamweaver E. HTML5

A

What is the term for data sets with volumes so huge that they are beyond the ability of typical DBMS to​ capture, store, and​ analyze? A. Big Data B. Hadoop C. DeepData D. ConsoliDATA E. Voluminous Data

A

Porter's competitive force concerned about barriers to entry​ is/are _______________. A. traditional competitors B. new market entrants C. emerging companies D. Internet service providers E. substitute products and services

B

Quality described as adhering to specific specifications with minimal variations would be through the lens of​ a: A. salesperson. B. producer. C. customer. D. store. E. child.

B

Technology, economy,​ politics, and global changes are typically classified best by which of the​ following? A. Key environment groups that most impact operational management teams B. ​Broad, general, external environment groups that influence an​ organization's strategy C. General internal groups within an​ organization's environment that influence competitive strategy D. Business unit groups that provide strategic input to the firm E. General groups of business objectives that are the basis for continual process improvement

B

The IT infrastructure computer software component includes both​ ____________ and​ __________ software categories. A. ​Windows; MacOS B. ​system; application C. ​database; spreadsheet D. ​programming; system E. ​Oracle; SQL Server 2014

B

The term​ ____________ describes data sets like​ Google's database that are too big for traditional DBMS to handle. A. Excel B. big data C. analytics D. Oracle Database E. Access

B

The​ Problem-Solving Model consists of​ __________________, solution​ design, solution evaluation and​ choice, and implementation. A. implementation B. problem identification C. solution design D. evaluation E. analysis

B

In the​ U.S., while there are many people that have access to technology and​ information, there are many that do not. This creates a​ ______ that leads to unequal opportunities. A. reengineering job loss B. social society C. digital divide D. social gap E. hierarchy

C

Many companies have social networks that gather and use information from customers and employees thus creating an important role for the​ _____ to coordinate the protection of all data. A. chief security executive B. chief web officer C. chief privacy officer D. chief social officer E. chief information officer

C

Surprisingly, laws guiding American privacy law are based on a 1973 report called the​ _____________. A. GAAP B. SQL C. FIP D. CPU E. TIO

C

Business​ ______________ are the strategized steps and activities that are coordinated within an organization. A. intelligence B. acumen C. databases D. analysts E. processes

E

Collectively, the coordination of computer​ hardware, software, data​ management, networking, and technology services collectively is​ termed: A. Mainframe computing. B. business intelligence. C. IT compliance. D. distributed processing. E. IT infrastructure.

E

A collection of computers on the Internet that allow for innovations such as software as a service​ (SaaS) is simply called​ (the): A. Cloud. B. big data. C. operating system. D. database. E. Internet.

A

A(n) _____ is a mechanism that enables the U.S. government to extend consumer protection beyond U.S. borders through private policies and​ self-regulation that meet U.S. guidelines. A. safe harbor B. EU trade agreement C. ​opt-in agreement D. copyright E. ethics code

A

A(n) _____________ is a database whose content focuses on historical organizational data. A. data warehouse B. historical data house C. data historicity D. Access Database E. SQL Server

A

An important word associated with social business is​ ___________ which includes​ customers, suppliers,​ employees, managers, and oversight committees. A. conversations B. customer attention C. business intelligence D. database E. digital dashboard

A

Business process management​ (BPM) is concluded​ _________________________. A. never B. after the new system has been properly tested C. after senior management has signed off on the project D. after the analysis has been completed E. after customer complaints have been resolved

A

Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of​ ________________. A. operations management B. accounting C. marketing D. human resources E. finance

A

For​ technology, which are the three interrelated advances that make MIS so exciting now and into the​ future? A. Big​ data, cloud​ computing, and the mobile digital platform B. Social​ media, virtual​ meetings, and cloud computing C. Big​ data, social​ media, and cloud computing D. Cloud​ computing, the​ Internet, and databases E. Big​ data, cloud​ computing, and telecommunications

A

Frustrated customers angry about a site not working is an example of which IT cost of ownership​ (TCO)? A. Downtime B. Infrastructure C. Fault Tolerance D. Space and Energy E. Mashup

A

If you include​ hardware, software,​ networking, and necessary management​ consulting, this amounts to over​ ________ in 2015 in the United States. A. ​$1 trillion B. ​$3.8 trillion C. ​$500 billion D. ​$1 billion E. ​$100 billion

A

In​ client/server computing, a client normally consists of​ a: A. desktop computer. B. smartphone. C. supercomputer. D. mainframe. E. smartwatch.

A

Professional organizations like the American Medical Association have​ _____________________, which includes specific conduct guidelines such​ as, do no harm. A. professional codes of conduct B. utilitarian principles C. liability D. golden rule E. no free lunch rules

A

Putting a key logger on your​ boss's computer without permission would be considered​ a(n) ___________. A. computer crime B. ethical C. computer abuse D. well intentioned E. spam

A

Regarding dimensions of business​ problems, a lack of properly trained employees is considered a​ ______________ dimension. A. people B. technology C. training D. organizational E. networking

A

Six sigma is a specific measure of​ _________, representing​ ____________________. A. ​quality; 3.4 defects per million opportunities B. customer web​ interaction; e-sales C. ​quality; 0 defects during production D. production​ rate; production margin E. vender web​ interaction; business process efficiency

A

What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one​ another? A. Enterprise applications B. Enterprise Linking Systems​ (ELS) C. Customer Relations Management​ (CRM) D. Use a Network Operating System​ (NOS) E. Simple Object Access Protocol​ (SOAP)

A

What technology trend raises ethical issues related to the limitless data that can be collected about​ you? A. Data storage costs rapidly decline B. Computer power doubles every 18 months C. Mobile device growth impact D. Networking advances E. Dynamic web pages

A

Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials as well as to​ customers? A. Supply chain management system B. Customer relationship management system C. Knowledge management system D. Executive support system E. Business intelligence system

A

Which of the following most accurately describes an information​ system? A. A set of components that​ gather, analyze,​ store, and utilize information for making better decisions for a firm B. The technology and data that a business leverages to gain a competitive advantage C. A software program that calculates a solution for a company D. A database that stores all the transactions that occur in a business E. All of the data a firm collects that pertains to its business

A

With regard to relational​ databases, which of the following is false​? A. Each table must have a​ one-to-one relationship to another table. B. A foreign key can be duplicated. C. The​ entity-relationship diagram depicts the relationships among tables in a database. D. A primary key cannot be duplicated. E. A​ customer's name would not make a good primary key.

A

ZipReality, which uses both Zillow and Google​ Maps, is an example of​ a: A. mashup. B. mushup. C. LMS. D. Zip drive. E. Microsoft Cloud.

A

_____ refers to the use of social networking to extend a​ business' collaboration efforts in order to engage and connect better with their​ employees, suppliers,​ and/or their customers. A. Social business B. Collaboration C. Customer support D. Networking E. Web marketing

A

____________________ is the most popular​ open-source program that allows for storage of big data. A. Hadoop B. Andromeda C. Access D. SQL Server E. DBMS

A

____________________, which is now available for average consumers to​ purchase, has been used in industry to create solid​ objects, layer by​ layer, from specifications in a digital file. A. ​3-D printing B. Cycle time C. ​Computer-aided design D. Dot matrix printing E. Color printing

A

​_____ is output from an information system that is returned to key people who analyze it​ to, evaluate​ it, and refine inputs for the system. A. Feedback B. Business intelligence C. A finalized report D. Data E. Knowledge

A

​______ is a set of applications that manages the activities and resources of a computer. A. System software B. Network software C. Platform software D. Management software E. Application software

A

​_________ is when a company transfers tasks of the firm to other firms that operate in​ low-wage countries, possibly reducing job opportunities within the U.S. A. Offshoring B. Outsourcing C. Contracting D. Labor relocation E. Delegating

A

​_________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards. A. Marketing B. Accounting C. Finance D. Instructional technology E. Management

A

Michael Porter developed the​ ________________ model, which emerged as a leading model for better understanding the important concept of competitive advantage. A. competitive advantage B. competitive forces C. component display D. big data E. information technology

B

Among the five identified moral dimensions of the information​ age, which addresses the question​ "which cultural values are supported by information​ technology?" A. Accountability and control B. Quality of life C. Information rights and obligations D. Property rights and obligations E. System quality

B

An example of the business objective​ ___________ would include one online coin shop offering a free app that can detect fake​ coins, and all other online stores following this strategy or potentially going out of business. A. customer and supplier intimacy B. survival C. competitive advantage D. decision making E. training

B

Andrew analyzes an ethical issue at​ work, evaluates the outcomes of various​ options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew​ applying? A. Golden Rule principle B. Utilitarian principle C. Risk aversion principle D. ​Descartes' rule of change E. ​Kant's categorical imperative

B

Attempting to determine when a computer hardware system will be maxed out is​ called: A. CPU speed. B. capacity planning. C. XML. D. referential integrity. E. business intelligence.

B

If Megan sends out unauthorized data to another​ organization, she has likely violated the​ company's ______________. A. DBMS B. information policy C. data foundations D. primary key E. data warehouse

B

It has been shown that one of the best ways to reduce quality problems is to reduce​ _____________. A. the number of employees involved in the business process B. cycle time C. outsourcing D. cost E. the number of departments involved in the business process

B

What are the four generic information system strategies for dealing with competitive​ forces? A. ​Low-cost leadership,​ margin/cost ratio below national​ average, market​ focus, and deepening customer online data B. ​Low-cost leadership, product​ differentiation, focus on market​ niche, and strengthening customer and supplier intimacy C. ​Low-cost leadership, product​ differentiation, focus on​ e-market, and strengthening customer and supplier privacy D. ​Low-cost leadership, product conforms to standard​ design, focus on broad​ market, and strengthening customer and supplier intimacy E. ​Customer/Competitor data​ leader, product​ e-visibility, increasing percentage of online to in store sales​ ratio, data security

B

What is social​ business? A. Use of social networking platforms to handle all customer relations B. Use of social networking platforms to engage​ employees, customers, and suppliers C. Identifying customers through the use of social media D. Doing business through a social network only E. A company whose only web presence is on social media

B

What is the process of predicting when a computer hardware system will become​ saturated? A. Permeation testing B. Capacity planning C. Burden testing D. Saturation testing E. Overload planning

B

What is the understanding that most American and European privacy law is based​ on? A. Data Privacy Practices​ (DPP) B. Fair Information Practices​ (FIP) C. End User License agreement​ (EULA) D. Stop Online Piracy Act​ (SOPA) E. Digital Millennium Copyright Act​ (DMCA)

B

Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and typically used by the​ government? A. FIP B. NORA C. ​TCP-IP D. ERP E. ​SEC_DBA

B

Which of the following is false about information​ systems? A. Management of information systems brings in behavioral issues in addition to technical issues. B. Customers and suppliers are considered important elements of the information system as they provide key data. C. Information systems is really information technology plus people and organizations. D. Computers are like hammerslong dashthey are not information systems but are used to create information systems. E. Information is created through the​ input, processing, and output activities of an information system.

B

Checking for quality and paying creditors would fall within which two functional​ areas? A. Finance and​ accounting, and human resources B. Manufacturing and​ production, and human resources C. Manufacturing and​ production, and finance and accounting D. Manufacturing and​ production, and sales and marketing E. Human​ resources, and sales and marketing

C

Concerning​ Porter's model and the​ Internet, which of the following is false​? A. Due to global​ information, customer bargaining power increases. B. With readily available pricing​ information, customer bargaining power increases. C. Due to technology​ requirements, the threat of new entrants decreases. D. The more suppliers a firm​ has, the more control a firm has over those suppliers. E. With new ways to meet​ needs, the threat of substitute products increases.

C

Domestic exporter strategy is characterized by which of the​ following? A. Transnationalism B. Virtual organization C. Centralization D. Regionalization E. Decentralization

C

For the sale of online used textbooks with many suppliers and low cost to switch to a different​ supplier, is an example​ of: A. new entrants being unable to enter the market. B. rivalry being strong. C. customers having a lot of power. D. suppliers having a lot of power. E. similar products causing high substitute power.

C

Google Apps is a popular​ cloud-based: A. open source software. B. DBMS. C. software as a service​ (SaaS). D. operating system. E. mapping program.

C

If a firm wants to learn more about its​ users, behaviors, and marketing​ effectiveness, they might turn to​ ____, relying on the huge amount of data available through the Internet. A. sentiment analysis software B. HANA C. Web mining D. Hadoop E. data marts

C

A car reservation system requiring processing a thousand transactions per second would likely require a​ __________ to process the transactions. A. workstation B. supercomputer C. mainframe D. microcomputer E. personal computer

C

A computer​ _________________ causes the most repetitive stress injuries. A. virus B. fan C. keyboard D. hard drive E. monitor

C

A data​ __________ is a method using a survey to determine the accuracy of a data set. A. scrubbing B. base C. audit D. cleansing E. review

C

A multinational strategy is often described where financial management and strategy operate out of a central​ __________________. A. transnational B. exporter C. home base D. franchiser E. home field

C

A single screen of graphs or charts of key performance indicators is known as​ a(n) ________________________. A. ESS B. aggregator C. digital dashboard D. portal E. DSS

C

An online store asking you to complete a customer satisfaction survey to better understand its customers after making a purchase is primarily addressing which business​ objective? A. competitive advantage B. decision making C. customer and supplier intimacy D. training E. survival

C

Apple's ITunes and a traditional music store have very different business​ ___________ with regards to how they produce and deliver products to customers. A. analysts B. management C. models D. customers E. information systems

C

The most common type of database is a​ __________. A. normalized database B. ​non-relational database C. relational database D. hierarchical database E. SAP database

C

The popular quality control​ model, six sigma specifically calls for 3.4 defects per​ ____________ as a measure of quality. A. hundred B. hundred thousand C. million D. billion E. thousand

C

What are the steps of the problem solving​ process? A. Problem​ Identification, Solution​ Design, and Solution Implementation B. Problem​ Identification, Team​ Organizing, Resolution​ Building, and Resolution Implementation C. Problem​ Identification, Solution​ Design, Solution Evaluation and​ Choice, and Implementation D. Problem​ Definition, Problem​ Scrutiny, Generating​ Solutions, Analyzing the Solutions and Selecting the best Solution E. Defining the​ problem, choosing the best​ solution, implementing the solution.

C

What does Data Management Software do with business data regarding​ inventory, customers, and​ vendors? A. Data Management Software makes business data searchable via Google. B. Data Management Software aggregates data purchased from BigData. C. Data Management Software​ organizes, manages, and processes business data. D. Data Management Software merges it with HTML to make a web page. E. Data Management Software merges it with SQL to make a database.

C

What is a widely used form of distributed​ processing? A. W.A.D.C. Wide Area Distributed Computing B. ​Multi-Core Processing. C. ​Client/Server Computing D. Parallel Processing E. Centralized Processing

C

What is the domestic exporter strategy characterized​ by? A. Slight concentration of corporate activities in the home country of origin B. Concentration financial management and control out of a central home base while decentralizing​ production, sales, and marketing operations to units in other countries C. Heavy centralization of corporate activities in the home country of origin D. Import of raw​ products, export of finished products ratio is above​ 50% E. No centralization of corporate activities in the country of origin

C

What type of computing involves connecting computers that are not near one another into a signal network and combining the computational power of the computers on the​ network? A. Mainframe computing B. Parallel computing C. Grid computing D. ​Multi-threaded computing E. Time slice computing

C

When a leading discount​ store's database was​ breached, a lot of attention was on the​ company's ____________________, who is specifically responsible for training employees about security. A. systems analyst B. chief information officer C. chief security officer D. chief privacy officer E. chief financial officer

C

When is business process management​ (BPM) concluded? A. When the business process reaches an acceptable level of efficiency B. After implementation of the new process C. BPM is never concluded. D. When the business process is complete E. After you identify the process that needs to be​ changed, then you implement Business Process Modification.

C

If someone at your work accuses you of sending inappropriate​ emails, you should be afforded​ __________________. A. responsibility B. accountability C. a third chance D. due process E. liability

D

Which Ethical rule below is combined with its proper​ description? A. ​Moore's Law; the number of transistors in a dense integrated circuit has doubled approximately every two years. B. Immanuel​ Kant's categorical​ imperative; placing yourself in the place of​ others, and thinking of yourself as the object of the decision C. The utilitarian​ principle; assumes values are prioritized in an order and the consequences of various courses of action are understood D. Golden​ Rule; an action is not right for everyone to​ take, it is not right for anyone E. Ethical​ rule; some actions have extremely high failure costs of very low probability or extremely high failure costs of moderate probability

C

Which Microsoft operating system specifically supports mobile features such as multitouch and mobile​ devices? A. Mac OS B. Windows 15 C. Windows 10 D. Microsoft SQL Server 2014 E. Microsoft Azure

C

Which of the following is false concerning the social and cultural issues in regard to the prevalence of information​ systems? A. It has increased the ability to telecommute while confusing the separation between work and personal life. B. It has led to an increased reliance on information systems. C. It is an equalizer for social classes and minorities. D. It has led to increased work efficiency while reducing the number of middle manager positions. E. It is easier for a business to quickly​ change, but competitive advantage is maintained for shorter time frames.

C

_____ is responsible for​ enterprise-wide governance and usage of information to maximize the value of the​ organization's data. A. Chief information officers B. Chief privacy officer C. Chief data officer D. Chief knowledge officer E. Information systems developers

C

_____ is when a firm connects numerous computers together into one network to create​ one, very powerful computer system that has coordinated processing A. Centralized processing B. ​Client/server computing C. Grid computing D. Mainframe computing E. Distributed processing

C

___________________ is a term used by companies looking to detect and correct​ incomplete, redundant, or incorrect data. A. SQL B. Data mining C. Data scrubbing D. Primary key E. Referential integrity

C

​ESS, DSS, and MIS systems all fall under the generic term of​ _______ systems as they help with the decision making process. A. transaction processing B. enterprise C. business intelligence D. infrastructure E. management information

C

If you accept a position as an information systems​ manager, you have​ a(n) ____________ to accept the​ costs, benefits, and obligations for the decisions you make. A. accountability B. due process C. recklessness D. responsibility E. liability

D

Most larger corporations utilize a​ ______ to consolidate data from a business along with external data. A. DBMS B. data mart C. Hadoop D. data warehouse E. data consolidator

D

Numerous companies choose​ a(n) _________ model where they retain some infrastructure ​in-houselong dashprimarily their critical systemslong dashwith the​ less-essential systems outsourced to a third party. A. hierarchical B. web hosting C. onshore outsourcing D. hybrid cloud E. service level

D

Outsourcing to domestic U.S. firms and​ _____________ outsourcing are both considered ways to reduce costs by US organizations. A. China B. Canada C. network D. offshore E. Internet

D

As part of a​ DBMS, a(n)​ _________ documents information about a database. A. entity relation diagram B. attribute listing C. data definition D. data dictionary E. data manipulation language

D

A​ _______________ uniquely represents a record or row. A. prime key B. foreign key C. cost key D. primary key E. data key

D

Because important financial documents are required to be submitted via the Internet in formats such as​ XBRL, ______________ has been impacted by information systems. A. management B. marketing C. instructional technology D. accounting E. finance

D

Enterprise Systems are also known as​ ________________. A. Cloud computing B. Transaction Processing Systems​ (TPS) C. Enterprise Social Systems D. Enterprise Resource Planning​ (ERP) Systems E. Parallel processing

D

Taking application components from various​ resources, ________ mixes and matches to create a​ new, customized Internet experience. A. open source software B. cloud computing C. XML D. a mashup E. SaaS

D

The senior leadership position responsible for the​ organization's data is called the​ ____________ officer. A. chief privacy B. chief information C. systems analyst D. chief data E. chief security

D

The​ _______________ has helped level the playing field for companies wanting to do business globally. A. database B. transnational C. LAN D. Internet E. systems analyst

D

Virtually anyone can set up​ a(n) ________________, an application of social business which allows for publishing opinions and experiences about a variety of topics. A. file sharing B. training program C. social network D. blog E. Internet

D

What affects approximately​ 90% of persons who spend 3 or more hours a day at a​ computer? A. Retinal socket swelling B. Retinal Pixelazation​ (RP) C. Repetitive Upper Spinal Strain​ (RUSS) D. Computer Vision Syndrome​ (CVS) E. Cognitive Dimming

D

What are the dimensions of information​ systems? A. ​Organizations, Data, and Information Technology B. Coarseness of​ data, depth of​ information, and source reliance C. ​Information, Data, and Internet Technology D. ​Organizations, People, and Information Technology E. ​Information, Data, and Computer Technology

D

When thinking about managing and controlling data within a​ company, which of the following is false​? A. An information policy would establish who in human resources could get to employee​ data, for example. B. As part of​ control, a firm may set policy about passwords for accessing data. C. An information policy sets up who can access what information within a firm. D. The actual physical database is never created by the database administration of a company. E. Large companies may have several​ departments, each handling specific tasks involving data assurance for the firm.

D

Which of the following is false about Microsoft​ Access? A. Microsoft Access works with Crystal​ Reports, a popular report generator. B. Microsoft Access is a DBMS. C. Microsoft Access has capabilities for developing desktop system applications. D. Microsoft Access does not have report generation capability. E. Microsoft Access has rudimentary data dictionary capabilities.

D

Which of the following is false regarding business process​ management? A. If a process needs​ major, quick​ revisions, business process reengineering may be required. B. Measurement may be needed during the design of a process in addition to after implementation. C. It is important to prioritize projects for improvement. D. The BPM process concludes once metrics are established and the system is implemented. E. It is important to document the sequence of a current​ system, then create diagrams of the​ new, improved system.

D

With​ E-commerce and the​ Internet, which of the following depicts a trend in​ advertising? A. ​E-commerce and Internet advertising have remained flat and traditional advertising and commerce has also remained flat. B. ​E-commerce and Internet advertising have grown while traditional advertising and commerce have decreased. C. ​E-commerce and Internet advertising have decreased while traditional advertising and commerce have remained flat. D. ​E-commerce and Internet advertising have grown while traditional advertising and commerce have grown also. E. ​E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.

D

_____ are the people or​ groups, both internal and external to the​ organization, for whom applications are developed. A. Senior managers B. Knowledge workers C. Clients D. End users E. Managers

D

_____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location. A. Optimization B. Cloud computing C. Nanotechnology D. Virtualization E. Network infrastructure

D

___________________ is/are an application of social business that allows for the opportunity to share documents. A. Crowdsourcing B. Social networks C. Social marketing D. File sharing E. Communities

D

​(A) _______________ is the formal name for questioning or making a data request from the database. A. DDL B. DML C. cloud D. query E. Access

D

​________________ focus(es) on providing decision making data available for middle managers to make sound business decisions. A. Transaction processing systems B. Decision support systems C. Business intelligence D. Management information systems E. Executive support systems

D

A formal name to describe​ self-regulating policies is called​ _____________. A. due process B. accountability C. liability D. privacy E. safe harbor

E

Among the five identified moral dimensions of the information​ age, which addresses the question of liability related to information​ systems? A. Information rights and obligations B. Quality of life C. System quality D. Property rights and obligations E. Accountability and control

E

An organization interested in the most popular open source DBMS on the market would adopt​ _____ SQL. A. Oracle Database B. Access C. DB2 D. Server E. MySQL

E

An​ unethical, but not illegal act committed using a computer is called​ _____________. A. closed source B. well intentioned C. computer fraud D. computer crime E. computer abuse

E

A​ _______________ is represented as a column in a database table that represents things like a​ person's first​ name, last​ name, and age. A. record B. byte C. file D. bit E. field

E

A​ _______________ is used to link the SUPPLIER and PART tables by entering SupplierID in the PART table. A. primary key B. data key C. cost key D. prime key E. foreign key

E

A​ __________________ is a popular business organization that has a product or service created in the home country​ (i.e., McDonald's and Chem​ Dry), and distributes the same products worldwide. Individual stores or locations are often owned by a local individual. A. partnership B. transnational C. corporation D. multinational E. franchiser

E

Creating a new system that provides charts and graphs to assist senior management make​ non-routine decisions is called​ (a): A. Transaction processing system. B. Decision support systems. C. Management information systems. D. Business intelligence. E. Executive support systems.

E

Determining the​ inputs, outputs, and resources​ required, and documenting the sequence of activities in a process typically occur during​ the: A. implementation of a new process. B. development process. C. development of metrics for the process. D. identification of processes that need changed. E. analysis of existing processes.

E

IT professionals working to make a new system work with an existing system is focusing​ on: A. data accuracy B. cost C. volatility D. data mining E. systems integration

E

If you return to a website that welcomes you back by​ name, you likely have small text file on your computer with information about your prior visits called a​ ___________. A. network B. malware C. cake D. customization E. cookie

E

In a relational database generalized categories represent​ a(n) __________, and each category has characteristics called​ ______________. A. ​attribute; entities B. ​relationship; entities C. primary​ key; attributes D. primary​ key; index E. ​entity; attributes

E

IoT stands for​ the: A. Intranet of Things. B. Internet Protocol of Things. C. IPhone of Things D. Instructional Technology of Things E. Internet of Things.

E

Systems designed to help maintain and improve customer data and its relationship with customers are called​ __________________ systems. A. customer attention B. guest feedback C. transaction processing D. knowledge management E. customer relationship management

E

The BPM step which addresses the question of which processes need to be addressed is​ ___________________________. A. process analysis B. the needs analysis C. analyzing existing processes D. continuous measurement E. identifying processes for change

E

The senior leadership position responsible for the​ organization's internal knowledge​ (i.e. tacit​ knowledge) is called the​ ____________. A. knowledge management officer B. systems analyst C. chief training officer D. chief privacy officer E. chief knowledge officer

E

The​ Problem-Solving Model phase where you determine a performance discrepancy that might be caused by an outdated system is the​ ________ phase. A. analysis B. evaluation C. implementation D. solution design E. problem identification

E

The​ _________ actually works with the​ databases, creating relations between tables and implementing controls that would minimize data issues and provide security for the data. A. information policy group B. auditing team C. data cleansing team D. CIO E. database administration

E

Transnational firms have no single national headquarters but instead have many regional headquarters and perhaps a world headquarters. What is the transnational strategy characterized​ by? A. ​Production, finance/accounting,​ sales/marketing, human​ resources, and strategic management are set up to optimize resources in the home country of origin. B. Concentration financial management and control out of a central home base while decentralizing​ production, sales, and marketing operations to units in other countries C. Product​ created, designed,​ financed, and initially produced in the home country but relies heavily on foreign personnel for further​ production, marketing, and human resources D. Centralizing financial services in a country that offers the most favorable tax laws E. Nearly all the​ value-adding activities are managed from a global perspective without reference to national borders.

E

What are the four elements of critical​ thinking? A. Dismissing doubt and continuing​ judgment, Focusing on a single​ perspective, Letting experience​ guide, and Being aware of personal limitations B. Maintaining doubt and suspending​ judgment, focusing on one​ perspective, testing alternatives and letting experience​ guide, and Being aware of organizational and personal limitations C. Maintaining​ doubt, suspending​ judgment, testing​ alternatives, and being aware of organizational limitations D. Problem​ Identification, Solution​ Design, Solution​ Evaluation, and Choice Implementation E. Maintaining doubt and suspending​ judgment, Being aware of different​ perspectives, Testing alternatives and letting experience​ guide, and Being aware of organizational and personal limitations

E

What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate​ computers? A. The Android OS B. Grid computing C. Use of Web OS D. The use of non SQL databases E. Cloud computing

E

What is it called when companies combine data from multiple sources and create electronic dossiers of detailed information on​ individuals? A. Social gathering B. Data rooting C. Data sourcing D. BigData E. Profiling

E

What is​ service-oriented architecture​ (SOA)? A. An​ XML-based productivity suite B. A​ service-oriented computer platform C. A​ service-oriented networking architecture D. A​ service-oriented operating system architecture E. A set of​ self-contained services that communicate with each other to create a working software application

E

What would an organization use to specify rules for​ sharing, disseminating,​ acquiring, standardizing,​ classifying, and inventorying​ information? A. Company mission statement B. EULA C. Fair use policy D. Copyright law E. An information policy

E

Which of the following is the best example of a software​ suite? A. Firefox B. Java C. Microsoft Windows 7 D. XML E. Microsoft Office 2013

E

_______________________ are the functional business processes responsible for quality assurance. A. Human resources B. Instructional technology C. Finance and accounting D. Sales and marketing E. Manufacturing and production

E

_______________________ is an example of a DBMS desktop system geared toward smaller business data needs. A. DB2 B. SQL Server C. MySQL D. Oracle Database E. Access

E

_______________________ is the functional business process responsible for managing cash accounts. A. Human resources B. Sales and marketing C. Manufacturing and production D. Instructional technology E. Finance and accounting

E

___________________________ is an open source operating system for mobile devices. A. UNIX B. Linux C. Moodle D. Windows mobile E. Android

E


Set pelajaran terkait

международные организации

View Set

Chapter 2: Family-Centered, Community-Based Care

View Set

3 - Sinónimos y antónimos (Vistas 13 Contextos)

View Set

IT project management Goals and Requirements

View Set

Prep-U Chapter 13: Fluid and Electrolytes: Balance and Disturbance

View Set