MGMT 337: Final Exam Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following parts of the URL "http:// www.timesonline.co.uk" represents the top-level domain?

.uk

When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit, it is called ________.

cybersquatting

Kris, an IT manager at Park Infosystems, is handling four projects simultaneously. Each project has loaned and shared resources from other teams. The relationship between Kris and the project that he is working on represents a ________.

many-to-many relationship

The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting.

presence awareness

Which of the following pairs perform similar functions in the online world?

presence awareness and context indicators

A field or a group of fields that make a record unique in a table is called a(n) ________.

primary key

A(n) ________ is a temporary activity that is launched for a specific purpose, to carry out a particular objective.

project

Which of the following is an accurate definition of communities of practice?

groups of individuals who come together to share knowledge about their professions

Which of the following is a file format used to exchange contact management data electronically?

hCard

An operational database is not a good candidate for high-level management reporting because it is not equipped to ________.

handle complex queries for strategic planning

In an information system department, the operations department is responsible for ________.

handling backups and archiving

One of the uses of databases without boundaries is in ________.

handling unstructured data during emergency disaster relief situations

A ________ is a microblogging tool in which posts on a similar topic are indicated by a keyword prefixed by a certain special character on microblogging websites.

hashtag

The risk of privacy breaches in information systems has become greater because ________.

information systems have become more powerful and interconnected

The multitude of servers in Google's windowless data centers serves as an example that represents ________.

information technology

A ________ is a document that authorizes a project and includes a clear statement of objectives, estimated start and end dates, the names of the relevant people and their roles, a tentative budget, criteria for success, and other pertinent information.

project charter

Which of the following is a reason why CAPTCHA may no longer be widespread?

technology that can discriminate between the mouse movements and keystrokes of bots and humans

Unknown hackers hack into the network security of a bank and steal the personal identification information of approximately 200,000 clients. Which of the following persons will be responsible for handling this situation?

the Chief Information Security Officer

Which of the following individuals is responsible for ensuring that a company's confidential information is well-protected?

the Chief Information Security Officer

Which of the following is a measure of the satisfaction level of website usability?

the ratings of individual experiences on the website by the users ranging from pleasant to frustrating

Which of the following is an accurate definition of conversion rate?

the ratio of visitors who complete some activity divided by the total number of visitors

Which of the following is a concern regarding information systems that support virtual teamwork?

the relative stage of infancy of such systems

Which of the following is an element of privacy?

the right to be left alone

Batch processing is defined as ________.

the sequential execution of operations on each record in a large set

Which of the following best defines predecessors in a work breakdown structure?

the tasks that need to be completed before a particular task can begin

Which of the following best defines escalation of commitment?

the tendency to continue to invest in a project despite mounting evidence that it is not succeeding

Which of the following best describes an availability bias?

the tendency to judge the probability of an event based on how easily examples come to mind

Which of the following best describes an anchoring bias?

the tendency to rely on one specific piece of information, irrespective of its irrelevance

Which of the following best describes a planning fallacy?

the tendency to underestimate the time it will take to complete a task

The last string of letters in the name of a website indicates ________.

the type of organization or country code

Which of the following best describes the term scope creep?

the way in which project features are added in an uncontrolled way

White and Brown, a legal firm, stores details of each case in physical files and folders. The firm has a back room stacked with boxes containing hundreds of files. White and Brown's storage structure resembles ________.

unstructured information

Screen attractiveness is an example of the ________ included in an RDD.

usability requirements

Which of the following components of the HCM systems keep track of employee time and attendance, sick leave, vacation leave, and project assignments?

workforce management modules

Which of the following components of the HCM systems would airport managers use for optimizing the task schedules of ground personnel?

workforce management modules

A ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.

worm

Which of the following is true of a vCard?

It is used to exchange business card information electronically.

Which of the following is true of IMAP?

It maintains mail on a server instead of on a single machine.

Which of the following is true of the eXtensible Business Reporting Language (XBRL)?

It makes data computer-readable

What is the main drawback of using unstructured information?

It makes retrieving information very difficult.

When compared to a face-to-face setting, an online environment offers ________.

greater anonymity

A quantitative analyst working in an investment bank will be able to ________.

access some information on the bank's servers

Service-oriented architecture is especially useful in ________ companies.

agile

In the ________, tasks are not sequenced according to the SDLC and many activities occur simultaneously.

agile method

Delegating tasks to large diffuse groups or communities who often volunteer their contributions is called ________.

crowdsourcing

Which of the following is a metric that is commonly used in CRM?

customer satisfaction index

Which of the following activities should project managers spend more time on?

planning and team building

A ________ refers to the tendency to underestimate the time it will take to complete a task.

planning fallacy

Which of the following statements is true about user-generated content?

It makes up most of the information in systems such as eBay, Craigslist, and Wikipedia.

The term ________ refers to gateways that provide access to a variety of relevant information from many different sources on one screen.

portal

Which of the following components of the HCM systems focuses on employee life cycle and career development?

talent management applications

Which of the following is an example of a consumer to consumer e-marketplace?

A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page.

________ is a mix of technologies that builds on Javascript and draws on live data to create interactive online displays.

AJAX

Which of the following is true of asynchronous discussion forums?

They allow users to post text messages and reply to others at any time.

Which of the following demonstrates a downside of crowdsourcing?

An international funding organization for welfare programs in underdeveloped regions removes data from Wikipedia which described some of the allegations of corruption against the organization.

Which of the following is true of the psychological characteristics of online environments?

Anonymity can lead to problems because people feel less accountable for their actions.

Which of the following laws prohibits businesses from sending misleading or deceptive commercial emails, but denies recipients any legal recourse on their own?

CAN-SPAM Act

________ refer to the part of a website template that controls the fonts and colors which appear when an editor identifies some text as a page heading, a paragraph title, or some other style.

Cascading style sheets

________ is a structured approach for the transition employees must make as they switch from their existing work processes to new ones.

Change management

Which of the following statements is true of information technology (IT)?

Anything capable of collecting, processing, storing, or displaying electronic data is potentially part of an information system.

Which of the following web browsers is the dominant browser for Macintosh computers?

Apple Safari

Which of the following is true of the triple constraint in projects?

Changes in one fundamental constraint affect the other constraints as well.

Which of the following is true regarding customer retention?

Attracting new customers is often more difficult and expensive than retaining existing ones

________ refers to collections of data that are so enormous in size, so varied in content, and so fast to accumulate that they are difficult to store and analyze using traditional approaches.

Big data

________ simplifies the task of creating one's own website to review products, discuss hobbies, or express opinions about any subject.

Blogging

________ is a set of activities designed to achieve a task.

Business process

________ focuses on designing, optimizing, and streamlining business processes throughout the organization, taking into account the human element.

Business process management

Harry, an employee of Bennett-Techno Inc., is responsible for ensuring that the technological setup in the organization supports the organization goals. He is also responsible for setting the organization goals. Which of the following positions does Harry hold in the organization?

Chief Information Officer

Which of the following statements is true of intranets?

They are accessible only to authorized individuals through an organization's portal.

Which of the following is true about neural networks?

They are far simpler than the human brain.

Which of the following precautions need to be taken in order to create a secure password?

Personal information should not be used in passwords.

________ refers to an attempt to steal passwords or other sensitive information by persuading the victim to enter the information into a fraudulent website that masquerades as the authentic version.

Phishing

Which of the following statements is true of portals?

They are gateways that provide access to a variety of relevant information from many different sources on one screen.

Which of the following is true about third-party cookies?

They are not tied just to the site a person is visiting.

Which of the following is a feature of massive open online courses?

They are offered through a third party

Which of the following statements is true of data, information, and knowledge?

They blend together and form a continuum.

Which of the following holds true of neural nets?

They borrow the brain's approach, using digital signals in place of neural ones.

Which of the following is a function of bots?

They collect data from web pages on behalf of a user.

Which of the following is true of iCalendars?

They flag events that stretch over months or years.

Which of the following statements is true of honeypots?

They have specific vulnerabilities that attract different varieties of malware in the wild, study their properties, and find out who started them.

Which of the following is a constraint on crisis management teams?

They have very little time to react and take action.

Which of the following is a characteristic of decisions made at an organization's strategic level?

They have widespread effects which impact suppliers, customers, and the whole industry.

Which of the following best defines agile methods?

They involve characteristics of cohesiveness and trust

Which of the following statements is true of document management systems?

They make electronic documents searchable and easily transmitted.

Which of the following is a characteristic of best-of-breed suites?

They match user requirements closely

Which of the following statements is true of expert systems?

They mimic the reasoning of human professionals.

Which of the following is a characteristic of neural nets?

They mimic the way a human brain works.

Which of the following is true of microformats?

They rely on XML standards to represent metadata in HTML.

Data protection laws are not uniform across countries.

Creating passwords with symbols, mixed cases, and characters

________ encompasses the strategies, processes, and information systems that an organization uses to build and maintain relationships with the current and prospective users of its products or services.

Customer relationship management

Which of the following is an advantage of customizing a packaged solution?

Customization adds competitive advantage to processes that an organization cannot alter.

________ specifies the characteristics of a field, such as the type of data it will hold.

Data definition

________ refers to all the procedures, documentation, and resources an organization puts into place to prepare for a crisis situation and recover technical infrastructure.

Disaster recovery

________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash.

Distributed denial of service

________ is the hierarchical naming system that maps a more memorable URL to the actual IP address.

Domain name system

________ refers to the processes by which electronic data that might be used as legal evidence are requested, secured, and searched.

E-discovery

Which of the following is true regarding the use of electronic data interchange (EDI) between partner companies in a supply chain?

EDI often relies on private networks and proprietary software

Which of the following is an example of crowdsourcing?

Electrogadgets.com, a site that provides information on a range of electronic gadgets, encourages members to publish their reviews and user guides.

Which of the following is a difference between IM and email?

Email providers allow more interoperability than IM providers.

________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling it.

Encryption

________ is an important part of the planning stage of the systems development life cycle and examines whether an initiative is viable from technical, financial, and legal standpoints.

Feasibility study

________ help drivers navigate while transporting materials and keep managers in touch with their transportation fleets.

GPS devices

Which of the following tools helps keep a project on track to meet its deadlines by listing tasks on a work breakdown schedule?

Gantt chart

Which of the following is an example of amplification effect of information systems?

Information on a person's social networking account can easily be distributed to an unintended audience.

Which of the following is true of the web browser Safari?

It is the dominant browser for Macintosh computers.

________, also known as "chat," consists of real-time text-based interactions over a network.

Instant messaging

Which of the following statements is true of intellectual capital?

Intellectual capital consists of all the intangible assets of an enterprise that contribute to its competitive advantage.

Which of the following is a feature of human capital?

It consists of competencies and knowledge possessed by an organization's employees.

Which of the following is true of a blog?

It encourages cross-linking.

Which of the following is true of media richness?

It measures how well a communication medium reproduces the nuances and subtleties of a message.

Which of the following is an advantage of online anonymity?

It protects corporate whistleblowers and political activists in oppressive regimes.

Which of the following statements is true of social network analysis?

It provides insights into clusters and the roles different people play as leaders

Navi-devices Inc., a manufacturer of portable navigation devices, provides free traffic updates and identifies the nearest parking spaces available with its latest device. It accomplishes this by using GPS coordinates of subscribers and traffic data from radio stations. Which of the following is the most likely impact of this strategy?

It will provide the company with a competitive advantage.

Which of the following is true of HTML 5?

It will reduce problems for web developers struggling to support different browsers running on different devices.

________ is a language used to add interactivity to web pages.

Javascript

________ refers to the use of relevant text ads that appear as sponsored links along with the results of a particular word search in a search engine.

Keyword advertising

Which among the following software tools is commonly used as the front end for data retrieval and analysis in most business intelligence tools?

MS Excel

Which of the following is an advantage of IMAP?

Mail can be accessed from a number of systems.

Botnets function with the use of ________.

Malware

________ is a statistical technique that reveals customer behavior patterns as they purchase multiple items.

Market basket analysis

________ are a form of web logging in which the posts are quite short, containing a brief sentence fragment and, at times, a link to another web resource or video.

Microblogs

________ track progress from start to finish, pinpointing any deviations from the plan.

Monitoring and controlling processes

________ is an extension of goal-seeking analysis in which the user can change many variables to reach some maximum or minimum target, as long as the changes stay within the constraints the user identifies.

Optimization

Which of the following statements is true about the ethical issues surrounding information systems?

People tend to judge the severity of ethical violations in information systems partly on the basis of the number of people affected.

Which of the following is a provision of the State Security Breach Notification Laws?

They require organizations to inform state residents if sensitive data are released.

Which of the following is a social networking site that allows users to post updates, adding commentary, links, or images about current happenings?

Pinterest

________ is a continuous process that oversees all the projects for an organization, selecting which projects to pursue and culling those projects that have a poor prognosis.

Project portfolio management

Which of the following is a difference between projects and processes?

Projects are unique and one of a kind, whereas processes are recurring.

Which of the following principles is consistent with the natural laws and rights ethical framework?

Thou shalt not kill

________ ensures that every foreign key entry actually exists as a primary key entry in its main table.

Referential integrity

________ is a component of a web address that maps to the unique IP address of the destination location.

Registered domain name

________ is one way of recovering systems in an incidence response plan.

Restoring from media known to be good

________ is a driver of information systems development that touches on security, privacy, safety, and regulatory compliance.

Risk management

________ boosts the performance of an organization's sales reps by helping them track and manage their accounts, contacts, leads, and to-do lists.

Sales force automation

________ is an agile method for software development that relies on tightly knit, cohesive teams that do sprints of 2 to 4 weeks each.

Scrum

________ is an Internet marketing strategy used to increase the quantity and quality of traffic from search engines, often by improving the site's position in result lists.

Search engine optimization

________ helps organizations classify user-generated content as pro, con, or neutral toward the company or product.

Sentiment analysis

________ is a website structure that guides visitors step by step through a transaction, survey, or learning module.

Sequential architecture

Which of the following questions pertains to maintaining security in an information system?

Should an employee be allowed to delete or access data that another employee inputs into the information system?

________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to multiple software applications.

Single sign-on

Which product allows voice commands, sequenced like a natural conversation, as a means to access a database?

Siri

Which of the following is an example of a free IM software client?

Skype

________ describes the number and quality of relationships an organization's employees maintain with one another as well as with clients, customers, suppliers, and prospective employees.

Social capital

________ refers to how long visitors remain at a particular website.

Stickiness

________ decisions affect the organization and beyond and are guided by the leadership of the organization toward a long-term strategy.

Strategic

________ comprises knowledge stored as documentation about business processes, patents, policies, and other aspects of an organization's operations, often stored electronically.

Structural capital

________ are used to monitor email, web surfing, and other online communications in organizations.

Surveillance technologies

________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how personal data is collected.

TRUSTe

________ knowledge tends to be ingrained in a person's mind, and often the person may not realize that he possesses it.

Tacit

Which of the following is a difference between strategic-level and operational-level decision making?

The business intelligence needed to make decisions is less structured at the strategic level than at the operational level.

Which of the following statements is true about acceptable-use policies?

The surveillance and monitoring processes that are in place are also included in the policy.

Which of the following statements is true of the IT department areas?

The systems administration department installs, manages, and updates servers.

The IT department of Detroit University decides to create a website with the primary goal of facilitating offline relationships with students. Which of the following would best help the university to reach this goal?

The website should allow prospective students to access virtual tours of the campus

The term ________ refers to a seemingly harmless or useful program that installs malicious code allowing remote access to a computer, as for a botnet.

Trojan horse

________ is the microblogging website with the largest number of users in the world.

Twitter

________ integrates multiple applications and interactive channels into a single interface, accessible from many different devices.

Unified communications

________ refers to an approach in which organizations strongly prefer systems that are offered by a single vendor, which also supplies the ERP.

Unified procurement

Which of the following is true of microblogging?

Users can post links to web resources or videos

Which of the following is true of microblogging?

Users themselves have added their own conventions to make microblogging more useful.

________ is a widely accepted ethical system that considers the greatest good for the greatest number and considers the consequences of an action, weighing its positive effects against its harmful ones.

Utilitarianism

________ describes what people experience when some of their sensory input is not from the real world, but from a computer-generated one.

Virtual reality

________ describes how easily managers can track timely and accurate supply chain metrics.

Visibility

________ refers to how easily people with disabilities can approach and use web resources.

Web accessibility

Which of the following statements is true of content management systems?

Web content management systems enable people with limited web development skills to contribute to a website from anywhere in the world.

Which of the following is an example of a browser-based software tool that allows web conferences and webinars?

WebEx

________ is a simulation model, often constructed using Excel, which calculates the relationships between many variables; users can change some variables to see how others are affected.

What-if analysis

________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information.

Wikipedia

What is a group decision support system?

a collaborative technology that helps teams brainstorm and exchange views about a topic to come to an agreement

Which of the following is an example of a consumer to business (C2B) e-marketplace?

a blog featuring a link to a product sold by an e-commerce firm, added by the blogger, who gets paid by the firm when a visitor to the blog clicks on the link and buys the product

InfoTech Horizons, an IT company, is seeking to hire an experienced IT professional to assist the Chief Information Officer in his role. The new hire will be groomed to take on the role of the Chief Information Officer. Which of the following candidates, all of whom have good technical skills, will prove to be the best choice?

a computer professional with good knowledge of business

Which of the following is an example of a systems integrator?

a consultant who ensures that the hardware and software components of an IS work together

Which of the following performs functions similar to the presence awareness feature found in IM software?

a context indicator

Which of the following disclaimers would protect a firm from implied contract obligations in the event of an employee's email containing wording that implies a firm contract?

a disclaimer stating that any contract must be confirmed by the employee's manager

Which of the following is a part of a company's supply chain management?

aligning supply with demand

Which of the following is an example of an executing process?

allocating work assignments

Which of the following functions does the version control software perform?

allowing developers to track versions of the source code during development

Which of the following is most likely to be a consequence of a security breach in an organization?

alteration of data

Which of the following is an accurate definition of a mashup?

an approach to aggregating content from multiple sources on customizable web pages

Which of the following is a factor that directly affects a company's choice of suppliers?

business strategy

The ________ procures the finest systems for each application, regardless of the vendor.

best-of-breed approach

A(n) ________ can be described as a meeting of people in the same field, or who contribute to the same business process, and share tips for techniques that have consistently shown superior results in accomplishing a goal.

best-practice session

BusinessUSA.com allows small-scale producers to post information about their products on the site and prospective buyers compare the prices and features of the competing products before purchasing them. Which of the following types of e-marketplaces does BusinessUSA.com represent?

business to consumer (B2C)

The ________ phase in a project involves documenting lessons learned from the project, so that the experience is useful to other project teams and adds to the organization's knowledge base.

closing

The term ________ refers to a common human tendency to make systematic mistakes when processing information or making judgments.

cognitive bias

The term "artificial intelligence" describes the ________.

capability of some machines that can mimic human intelligence

For which of the following purposes are botnets most likely to be used?

capturing Internet users' sensitive information

The ________ refers to a process organizations put into place to manage and prioritize requests to add new features to an information system.

change control process

A ________ is a graphical user interface that organizes and summarizes information vital to the user's role and the decisions that user makes.

dashboard

A single high-temperature reading of a patient at Patient First, a 24-hour walk-in clinic in Florida, is a piece of ________.

data

Raw facts that are available in different formats and sizes are called ________.

data

Which of the following refers to individual facts or pieces of information?

data

Database architecture that has multidimensional data grouped in logical dimensions, such as sales by product, city, region, and country, is called ________.

data cubes

The facilities manager at Symphony Systems, an IT services company, wants the information systems department to set up a virtual collaboration team. Which of the following ways would enable him to communicate more effectively with the IT staff?

describing his end goal and not the means to get there

Testing is a part of the ________ phase of the SDLC.

development

Which of the following challenges is typically a feature of the closing phase of a project?

documenting lessons learned

The buying and selling of goods and services over the Internet or other networks, encompassing financial transactions between businesses, consumers, governments, or nonprofits is called ________.

e-commerce

What does the Family Educational Rights and Privacy Act stipulate?

establishing privacy rights over educational records

Which of the following is a characteristic of online communications?

fewer nonverbal cues to clarify meaning

An attribute of an entity in a table is called a ________.

field

Modules such as budget planning, debt management, travel and expense management, and contracts management are typically included in a ________ management system.

financial

Which of the following is a function of online analytical processing?

helping organizations spot suspicious activity

Which of the following is the role of a Chief Privacy Officer in an organization?

helping shape the policies that govern the protection of confidential information

Which of the following database architectures works well for one-to-many relationships, but is not effective with many-to-many relationships?

hierarchical database

Which of the following databases resembles an organizational chart?

hierarchical database

Which of the following is a disadvantage of the engineered suite?

high switching costs

Which of the following features is most likely an example of the usability requirements included in an RDD?

high task efficiency

A(n) ________ bias refers to a belief that an actual event was predictable even if it was not.

hindsight

Which among the following is the best example of a project?

opening a new branch office

Software programs used by search engines which crawl the web visiting sites to analyze the keywords, headers, content, and links to other sites are called ________.

spiders

Info Labs Inc., a marketing communications company, launches a project at a fixed cost of $180,000. What is the amount of savings earned from the project per month if it returns the investment in 3 years?

$5,000

Alzheimer's Society, a private, Chicago-based nonprofit organization, decides to create a social networking forum for caregivers of people with Alzheimer's disease. While selecting a domain name, which of the following top-level domains would best suit their goals?

.org

Which of the following is an example of typosquatting?

A person registers the domain name "currentaffairs.net" to take advantage of the huge popularity of the e-newspaper currentaffairs.org to divert traffic to his webpage and make money by selling advertising space.

Which of the following is an example of volunteering with the help of an information system?

A volunteer uses his cell phone to translate books into Spanish while commuting to work

Which of the following websites uses a sequential architecture?

A website that provides online counseling requires a visitor to enter certain information on the home page, which would then lead him to the subsequent page, until he is matched with a suitable counselor.

________ are used by infomediaries to retrieve current product prices from different vendors.

Bots

________ is a web metric that refers to the percentage of visits in which the user left the site from the same page he or she entered it.

Bounce rate

________ refers to maintaining an organization's business operations to avoid a devastating revenue loss and damaged reputation.

Business continuity

________ an information system is typically the best choice for a business when the available systems support common business functions, such as financial or human resource management.

Buying

________ is a test created by software developers to thwart software bots that the visitor must pass before continuing to register or enter the site.

CAPTCHA

________ is the person who heads the department responsible for managing and maintaining information systems, and ensuring they support the organization's strategic goals.

Chief Information Officer

________ plays a leading role in managing efforts to improve an organization's ability to capture, nurture, and disseminate expertise.

Chief Knowledge Officer

________ is a metric used to assess the impact of an online ad.

Click-through rate

________ is a peer review process in which programmers familiar with the project and the development environment check over one another's work to ensure it is well documented and properly written.

Code review

________ adds considerable value to information, particularly as a means to avoid bias or spin.

Completeness

Which of the following is true of compliance reporting?

Compliance reports relying on XBRL are more advanced than electronic PDFs

Which of the following is a drawback of digital rights management encountered by users today?

DRM systems prevent legitimate duplication of digital content in the event of hardware failure.

________ uses statistical techniques to explore a data warehouse and hunt for hidden patterns and relationships that are undetectable in routine reports.

Data mining

What of the following is a drawback of cloud computing?

Data protection laws are not uniform across countries.

________ is a prepackaged data warehouse solution offered by vendors that includes the hardware and software, maintenance, and support.

Data warehouse appliance

________ refers to a system of moral principles that human beings use to judge right and wrong and to develop rules of conduct.

Ethics

________ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities.

Exception reporting

________ in project management include all the coordinating efforts that ensure that tasks on the work breakdown structure are carried out properly.

Executing processes

________ crawl through databases, websites, emails, project summaries, and other electronic documents to refine their expertise ratings.

Expert location systems

________ knowledge refers to knowledge that can be documented and codified.

Explicit

Which of the following principles is consistent with the utilitarian ethical framework?

First, do no harm

Which of the following is used by web developers to add rich media interactivity to websites?

Flash

Which of the following websites predominantly features user-generated content?

Foodmania, a website that allows its users to post their own food recipes and upload photos

________ refers to analyzing historical and seasonal trends and then taking into account existing and predicted business conditions to estimate some variable of interest.

Forecasting

A ________ lists tasks on the work breakdown structure, along with each task's projected start and finish dates, in graphical format.

Gantt chart

Which of the following is true about work breakdown structure?

Gantt charts are generally used to show work breakdown structures.

Which of the following is a web-based email service that was built from the ground up to work within browsers rather than with client software installed on computers?

Gmail

________ is a decision support tool, often based on an Excel model, in which the user sets a target value for a particular variable, such as profit/ loss, and tells the program which variable to change to try to reach the objective.

Goal-seeking analysis

Microformats represent metadata in ________.

HTML

Which of the following technologies is better equipped than relational databases to handle big data?

Hadoop

________ is a website structure in which the top-level homepage contains links to second-level pages, which then link to further relevant pages.

Hierarchical website architecture

How does IMAP differ from SMTP?

IMAP handles incoming messages while SMTP handles outgoing messages.

Though every device connected to the net has an IP address, the Internet's designers added the Domain Name System (DNS) because ________.

IP addresses are numerical and cannot be easily remembered by users

________ consists of intangible assets which are expressions of the human mind that give the creator of the property the right to its commercial value.

Intellectual property

________ refers to software that can interpret handprinted text written on paper forms.

Intelligent character recognition

________ takes advantage of signals transmitted via the phone to access a database, retrieve account information, and enter data.

Interactive voice response

________ helps in determining the cause of a security threat in an incidence response plan.

Investigating system logs

Which of the following is a distinctive feature of optimization?

It allows a user to change many variables to reach its maximum or minimum target.

Which of the following is the primary function of a wiki?

It allows users to add and edit interlinked web pages.

Which of the following is true of instant messaging?

It allows users to display their current status to their contacts

What is the purpose of the "presence awareness" feature on instant messaging software?

It allows users to display their current status to their contacts, colleagues, or buddy list.

Which of the following is a characteristic of structured information?

It can be broken down into component parts and organized in hierarchies

Which of the following statements is true of structural capital?

It consists of electronically documented knowledge of a company's operations.

Which of the following functions does a firewall perform?

It defines which IP addresses or domain names should be blocked.

What function does a context indicator perform?

It displays whether an individual is available for communication at a certain time or not.

Which of the following is true of the European Union's Data Protection Directive?

It establishes privacy as a fundamental human right for EU citizens.

Which of the following is an accurate description of the Privacy Act of 1974?

It establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies.

Which of the following is the function of an SMTP server?

It handles and sends outgoing email.

Which of the following reasons explains why waterfall methods are still widely in use?

It has a logical and familiar structure which is comfortable to use.

Which of the following is a drawback of Wikipedia?

It has an open structure which allows scope for inaccuracy and bias.

How is metadata related to information?

It helps clarify the nature of the information.

How does implementing information systems impact business processes?

It helps eliminate business processes that aren't necessary

Which of the following is true of explicit knowledge?

It includes structured and unstructured information, as well as multimedia content.

Which of the following statements is true of clickstream data?

It indicates clicks made by every visitor in a site.

Which of the following is an accurate definition of scareware?

It is a kind of social engineering used to persuade people that a computer is infected when it is not.

Which of the following is true about Internet Corporation for Assigned Names and Numbers (ICANN)?

It is a nonprofit organization

Which of the following statements is true of encryption?

It is a powerful technical control that protects sensitive data.

Which of the following statements is true of goal-seeking analysis?

It is a process of setting a target value for a particular variable and telling the program which variable to change to reach the goal.

Which of the following best describes a business process?

It is a set of activities designed to achieve a task

Which of the following is an accurate definition of a computer virus?

It is a software program that can damage files or other programs.

Why is it a challenging task to calculate a project's return on investment (ROI)?

It is difficult to estimate ROI for projects where costs rise unexpectedly and revenue increases are hard to predict.

Which of the following is a drawback of the hierarchical website architecture?

It is difficult to locate information that does not easily fit into, or that spans across, categories

Chloe's, a chain of supermarkets, is conducting a customer survey in its largest store, which is in California. Customers are asked to fill out questionnaires as they enter the store. The questionnaire is divided into sections that polls customers on the store's products and the e-commerce website. Which of the following is a drawback of the data collected through this poll?

It is incomplete.

What advantage does instant messaging have over phone and conference calls?

It is more informal and saves time by reducing social courtesies during interactions.

Which of the following is an advantage of custom system development?

It is tailored closely to an organization's needs.

Which of the following is true of phishing?

It is the process of stealing personal data from a victim by convincing him to disclose information.

Which of the following is a drawback of the waterfall method?

It is unable to adapt to changes in the business landscape.

Which of the following is true of SMTP?

It is used for handling outgoing mail.

Which of the following is a characteristic of a universal dashboard?

It provides quick access to instant messaging and voice and video calling.

Which of the following is an accurate definition of digital rights management?

It refers to technologies that intellectual property owners use to control access to their digital content.

Which of the following statements is true of information privacy?

It refers to the protection of data about individuals.

A group of musicians buy a URL, Musik4Change.org for their website, which has a unique, numerical IP address assigned to it. After a year, they move their website to a new server with a different IP address. In this situation what happens to the URL of their website?

It remains the same.

Which of the following is an advantage of prepackaged software?

It requires a short implementation time.

Which of the following is a disadvantage of prepackaged software?

It requires an organization to change its business processes.

Which of the following is a disadvantage of custom system development?

It requires long periods of time before going live.

Which of the following statements is true of a project charter?

It shows that the senior management support the project

Which of the following is a disadvantage of using consulting services?

It tends to make employees feel less ownership of a project and less committed to changes.

Which of the following is a feature of public key encryption?

It uses a pair of keys, one to encrypt the data and the other to decrypt data.

Which of the following is true of the web browser Chrome?

It was developed using the open source model.

Which of the following is true of the web browser Internet Explorer?

It was initially bundled with the OS of Microsoft to gain an early lead in the "browser wars."

Which of the following statements is true of the information technology team in an organization?

It works closely with the staff from other functional areas of the organization

Which of the following is a drawback of the growing power of artificial intelligence?

Its techniques are used by scammers to gain access to sites.

How are policies enforced in information systems?

Managers develop policies that are enforced by the information systems

________ measures how well a communication medium can reproduce all the nuances and subtleties of the message it transmits.

Media richness

________ is a website structure with several links to pages at all levels, allowing visitors numerous paths through the site.

Multidimensional website architecture

________ is an ethical framework that judges the morality of an action based on how well it adheres to broadly accepted rules, regardless of the action's actual consequences.

Natural laws and rights

Which of the following statements is true of natural laws and rights?

Natural laws and rights does not consider the actual consequences of an action when judging its morality.

What is the drawback of using Social Security Numbers (SSN) as the primary key for tables of employees, hospital patients, students, or cable TV customers?

Non-U.S. citizens may not have an SSN

________ is a process that refines entities and their relationships to help minimize duplication of information in tables.

Normalization

Which of the following is true of group dynamics in virtual teams?

Norms regarding the sharing of workload are difficult to enforce online.

Which of the following is true about assistive technologies?

Offering tutorials to help organizations improve their sites and understand how design techniques can radically alter a site's accessibility.

Sam, the CEO of a product development company, is planning to implement an ERP system in his company. However, most of his colleagues advise him against implementing such a system saying that such systems have more weaknesses than strengths. Why should Sam still go ahead with the implementation?

Once in place, the ERP can dramatically enhance operational efficiencies and reduce costs.

________ systems allow users to interactively retrieve meaningful information from data, examining it from many different perspectives, and drilling it down into specific groupings.

Online analytical processing

Which of the following is a difference between operational-level and tactical-level decision making?

Operational decisions require detailed, structured information about actual transactions by customers, whereas tactical decisions need more aggregated information to monitor success and plan next steps.

________ is a type of intellectual property theft that involves reproducing the words of another and passing them off as one's own original work, without crediting the source.

Plagiarism

________ is the first step in the systems development life cycle, which defines the business need for a project, assesses its importance to the company, and determines whether the project is feasible.

Planning

________ refer to each bit of content or functionality that a user can customize and add to the display.

Portlets

________ is a part of the XML family of standards that is used to describe online resources and their properties for the semantic web.

RDF

________ are attached to packages or crates and can transmit data as they pass by readers at seaports, railway stations, or warehouses.

RFID chips

________ refers to the creation of software prototypes that can be shared with users for receiving feedback, so that developers can make improvements before a lot of effort is spent building a fully functioning version.

Rapid application development

________ is a process in which stakeholders identify the features that a project will need and then prioritize them as mandatory, preferred, or nonessential.

Requirements analysis

Which of the following is a disadvantage of using shadow systems?

Shadow systems contain information that is not consistent with the corporate database.

________ is a mentoring strategy in which a new employee works side-by-side for a few weeks or months with one who is leaving, allowing the veteran to impart knowledge in the context of the actual work.

Shadowing

________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.

Social engineering

________ analysis maps and measures the strength of relationships represented as nodes in clusters and uncovers those who play pivotal roles as bridges to other groups, both inside and outside an organization.

Social network

________ is often stored electronically and left behind with an organization even when an employee is no longer with the organization.

Structural capital

________ is a discovery process which relies on semantic structures, linguistic relationships, and common phrases to extract meaningful information.

Text mining

Which of the following is a difference between the Internet and intranets?

The Internet is publicly accessible, while access to intranets is protected with passwords known to authorized individuals.

Which of the following statements is true of information systems (IS)?

The ability to provide companies with competitive advantage makes IS a core feature of a company's strategic vision

Which of the following is the reason why privacy breaches present major risks in this era of information system computing?

The amount of information that is stored in information systems is vast and very private

Which of the following is the reason why speech data is gaining importance in call centers?

The analysis of the tone of voice and tempo reveals valuable information

________ is responsible for identifying, assessing, and addressing threats to an organization from unforeseen circumstances.

The crisis management team

Which of the following is true of public key encryption?

The encryption key is widely shared with everyone, while the decryption key is known only to the recipient.

Which of the following is a technical control that helps secure information flow in an organization?

The information system enforces the organization's policy about human review.

Which of the following is true of black swan events?

The invention of the personal computer is an example of a black swan.

Which of the following statements is true about information and communications technology?

The main role of the telecommunications component involves moving electronic signals from one place to another.

Which of the following administrative control actions helps enforce access controls in an organization?

The organization defines the information to be encrypted or stored offline in a secure location.

Which of the following is a disadvantage of a parallel implementation of an information system?

The process is expensive in nature and is usually in place for only a short period.

Which of the following statements is true of management information systems?

The study of information systems that includes how people, technology, processes, and data work together is called management information systems.

Which of the following is an advantage of a parallel implementation of an information system?

There are two systems processing the same case, both of which should have the same output.

Which of the following reasons led to the popularity of social networking sites?

These sites enabled the sharing of news, photos, videos, and tidbits easily

Which of the following statements is true of information systems that support collaborative human activities?

These systems, being in their early stages, offer a framework for more improvements and features to be included.

Which of the following is true of group decision support systems?

They allow users to express independent viewpoints that may differ from those of others in a group.

Which of the following is an advantage of asynchronous discussion forums?

They allow users to reply to topics at any time.

Which of the following statements is true of management information systems?

They support tactical decision making at the managerial level.

Which of the following is true of neural networks?

They work the same way as the human brain by reinforcing memory.

________ is a type of testing for information systems that involves programmers checking the functionality of small modules of code during the development phase of the SDLC.

Unit testing

Which of the following factors best explains why it was tougher for Amazon.com to build trust in its e-commerce website compared to Walmart?

Unlike Walmart, Amazon.com did not operate out of physical retail locations.

________ refers to the ease with which a person can accomplish a goal using some tool, such as a website, a mobile phone, or a kiosk.

Usability

________ help commercial shippers to read the barcodes on packages during transit and upload tracking number, date, time, and place to servers.

Wireless scanners

Which of the following is an example of a blogging tool?

Wordpress

________ is an international body that establishes and publishes standards for programming languages used to create software for the web.

World Wide Web Consortium

Which of the following languages is the resource description framework written in?

XML

Which database architecture is especially used for managing web content and web-based resources?

XML database

The advantage of using a suite with synchronized modules is that ________.

a common architecture overlays the systems to improve consistency across the modules

Which of the following illustrates a practice that can dramatically reduce supply chain costs?

a company supplying products directly to customers by omitting all middlemen

Which of the following is an accurate definition of text mining?

a discovery process in which unstructured text information is the source of business intelligence

Which of the following organizations requires the most number of modules for their financial systems?

a federal government agency

Which of the following is an accurate definition of knowledge management?

a field which uses practices and strategies to manage intellectual capital

What is a vCard?

a file format used to exchange business card information electronically

Which of the following best describes an IT dashboard?

a graphical user interface that organizes information vital to a user's role and decisions that user makes

In order to safeguard individuals' sensitive information, which of the following organizations would typically restrict its employees' Internet usage?

a hospital

Which of the following best describes a project charter?

a key document that authorizes a project

An after-action review refers to ________.

a meeting held after a project has been completed to document what worked well and what did not

Which of the following is an accurate definition of a keylogger?

a monitoring software that records a user's keystrokes

A foreign key is ________.

a primary key which appears as an attribute in a different table

Which of the following best describes project portfolio management?

a process that oversees all projects and selects which projects to pursue

On microblogging sites, a hashtag is used to indicate that ________.

a set of posts are on a similar topic

Which of the following uses databases without boundaries?

a social networking website

Which of the following is an accurate definition of RDF?

a specification written in XML, developed by the World Wide Web Consortium

Which of the following is a critical success factor for projects?

a strategy to manage conflicts among stakeholders

Which of the following is an accurate definition of a project?

a temporary activity to carry out a particular objective

Which of the following is an accurate definition of CAPTCHA?

a test that a visitor must pass before registering into a site

Which of the following websites would have the highest web accessibility?

a website in which text and images are large and/or enlargeable, to make it easier for users with poor sight to read and understand the content

The ________ encompasses services each employee will be provided, whether and how much they can utilize company resources for personal use, the kinds of surveillance that are in place, and reinforce legal requirements, such as prohibitions against unauthorized copying.

acceptable-use policy

The ________ lays out rules about what employees are allowed to do with IT resources and what activities are disallowed.

acceptable-use policy

The type of testing that involves end users performing final testing to determine whether a project is complete as specified is known as ________.

acceptance testing

Which of the following best defines change management?

an approach to the transition employees make as they switch from existing work to new processes

The ________ phase of the waterfall method involves nailing down requirements, at which point the developers estimate the time and resources needed to complete a project.

analysis

Which of the following is a function of forecasting?

analyzing seasonal trends, using statistical decision support tools, to predict the future

The term ________ refers to the tendency for people to rely too heavily on one piece of information to adjust their estimates, even if it is irrelevant.

anchoring

Black swan events ________.

are usually easy to predict

The term "war room" refers to a(n) ________.

area in which members of a project work together, surrounded by tools to facilitate smooth collaboration

Ravi is an account executive at the ad agency Rowland Clarkson. He organizes an after-action review for a recent advertising campaign that the agency worked on. Which of the following is the most likely objective of the review?

assessing the advertising campaign to determine lessons and achievements for the agency

Devices and software that help people with disabilities, such as screen readers for the visually impaired, are called ________.

assistive technologies

Videos on demand that are used as an instructional technology are based on ________.

asynchronous interaction

Which of the following knowledge management strategies should be used with compliance information?

automate collection and archiving to achieve cost-effectiveness

Which process assigns incremental numbers to records as they are created to ensure that each record has a unique primary key?

autonumbering

A(n) ________ bias refers to the tendency to judge the probability of an event based on how easily examples come to mind.

availability

An incidence response plan is created for the purpose of ________.

avoiding chaos and missteps

Which of the following would be the most effective option for a user interface design?

avoiding the addition of unnecessary links or options especially when the user is engaged in a sequential task

Which of the following techniques helps IT staff collaborate with people in other functional areas?

avoiding using technical terms while speaking to internal customers

How does a project charter help in managing a project?

avoids unexpected surprises and leaves room for changes to meet organization's needs

The term ________ is used to describe an extremely rare event that is difficult or nearly impossible to predict, but which can have an immense impact in areas such as technology, finance, and science.

black swan

A ________ allows users to maintain a website with ongoing commentary, images, and links to other online resources in which posts are displayed in reverse chronological order so that the most recent appears on top.

blog

Laid-off workers, who are hired back owing to their positive attitude and networking capabilities when businesses recover, are called ________.

boomerangs

The term ________ refers to a collection of computers that have been compromised by malware, often through some vulnerability in their software or operating system.

botnet

Intelligent agents that extract business intelligence from publicly accessible websites are also known as ________.

bots

iTicket, an online event-ticketing site, recently discovered that most of its good seats for a widely anticipated concert were preemptively booked in bulk by brokers. This resulted in a shortage of tickets that the public could have bought themselves. Which of the following would have best helped the brokers to book tickets in such large numbers?

bots

Software developers must test their code in one browser after another because ________.

browser developers add special features and proprietary tags that work only with their own browser

The distortions in a supply chain caused by changes in customer demand, resulting in large swings in inventory levels as the orders ripple upstream from the retailer to the distributor and manufacturer, is referred to as the ________.

bullwhip effect

Play-e-ball, a company that creates games for gaming consoles, gathers data from the information systems of its partners, suppliers, and distributors. It uses this data along with internal data to develop different games for different consumer demographics, and it targets the most profitable segments. Which of the following is illustrated in this scenario?

business intelligence

An early form of business process management (BPM) that was developed as a means to make sweeping changes to eliminate all processes that did not add value was known as ________.

business process reengineering

A ________ relationship is a(n) e-commerce relationship in which organizations buy and sell products or services online from or to one another.

business to business (B2B)

Which of the following functions does an intelligent agent perform?

classifying and indexing web pages for search engines

Escapade Holidays is a travel house in New Jersey that recently created a website to attract travel clientele for the company. It is vital that the company is able to track time spent on each page by visitors, which helps Escapade understand the destinations and offers that customers seek. Which of the following will best help the company understand customer behavior patterns as well as reveal the URLs left by visitors?

clickstream data

The term ________ refers to data associated with revealing customer behavior patterns, such as time spent on the page, the URL the visitor just left, and the visitor's IP address.

clickstream data

The ________ phase ideally involves wrapping up a project in an orderly way and a sponsor signing off that all deliverables have been received and accepted.

closing

Which of the following instructional technologies enables synchronous interaction in e-learning?

collaborative groupware

Which among the following is the hardest task for an organization's program management office?

collecting consistent data from projects

Which of the following should a project manager ideally do to efficiently manage a project?

communicate the time, cost, and scope constraints clearly as the project unfolds

One way to identify a threat in an incident response plan is to ________.

communicate with a crisis management team

Anything that gives a firm a lead over its rivals is called ________.

competitive advantage

The collection of ________ should be automated and such information should be archived to achieve cost-effectiveness.

compliance information

Giving clear definitions and tags to financial terms using eXtensible Business Reporting Language (XBRL) makes data ________.

computer-readable

The human tendency to choose information to examine and support a view they already hold and ignore data that might refute their hypothesis is known as a ________.

confirmation bias

The use of live chats as a CRM strategy in the context of customer support will most likely result in ________.

considerable savings

A(n) ________ is a large group of software products that helps manage digital content in collaborative environments.

content management system

When using databases without boundaries ________.

contributors feel strong ownership over their records

The ratio of visitors who buy a product from a website divided by the total number of visitors can be referred to as the ________.

conversion rate

Which of the following is the primary goal of the development phase of the SDLC?

converting a design into a fully operational information system

A ________ is a small text file left on a website visitor's hard drive that is used to personalize the site for the visitor, or track web activities.

cookie

In e-commerce metrics, ________ refers to the amount an advertiser pays each time a visitor clicks on the ad to navigate to the advertiser's site.

cost per clickthrough

Which of the following is calculated by adding the average advertising costs for job postings, agency fees, recruiter's salary and benefits, and relocation expenses for new employees?

cost per hire

Which of the following functions do wikis perform within an organization?

creating a substantial base of knowledge

Consistency in a company's financial management system is maintained by ________.

creating bridges and interfaces to other information systems

For which of the following purposes can blogs be used?

creating connections with customers

Which of the following factors would improve the web accessibility of a site?

creating text-only alternative versions for devices such as PDA

The ________ refers to the longest course through the project, which identifies those tasks that cannot be delayed without affecting the finish date.

critical path

Which of the following is a function of warehouse management software?

cross-docking

Which of the following is a CRM strategy used to earn more revenue from existing customers?

cross-selling

Retrieval is very fast through data cubes because ________.

data cubes group data in logical dimensions, such as sales by product, city, region, and country

The early file processing systems were very difficult to maintain because of ________.

data dependency between the programs and files

Documentation that contains the details of each field in every table, including user-friendly descriptions of the field's meaning, is known as ________.

data dictionary

Trekking blindly into terabytes of data to sniff out meaningless relationships that occur just by accident is called ________.

data drudging

In enterprise information management, data ownership issues arise because ________.

data is shared by all the stakeholders in the organization

A credit card company wants to spot elusive patterns in credit card transaction records to be able to block fraudulent transactions. This company should use ________.

data mining

Which of the following statements accurately defines the term predictive analytics?

data mining approaches and statistical techniques used to predict future behavior, especially to unlock the value of business intelligence for strategy

A model used for planning the organization's database that identifies what kind of information is needed, what entities will be created, and how they are related to one another is called a(n) ________.

data model

A person who ensures that people adhere to the definitions for the master data in their organizational units is called a(n) ________.

data steward

A central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning is called a ________.

data warehouse

A company maintains a centralized repository of information from internal sources, competitor information, census reports, and metadata from documents and multimedia. This is known as a ________.

data warehouse

Which of the following is used to spot trends, identify patterns, generate reports for compliance purposes, do research, and plan strategies?

data warehouse

An integrated collection of information that is logically related and stored in such a way as to minimize duplication and facilitate rapid retrieval is called a ________.

database

Databases are created and handled using ________.

database management software

A data model that graphically shows the tables, attributes, keys, and logical relationships for a database is called a ________.

database schema

Databases in which people outside the enterprise enter and manage most of the records are termed as ________.

databases without boundaries

Which of the following functions does a subject matter expert perform in an e-learning process?

deciding the content of the course

Which of the following functions does a project sponsor perform in an e-learning program?

defining project goals and paying the bills

Which of the following knowledge management strategies should be used with redundant information?

delete the information from the system

The term ________ refers to products, documents, or services that will be handed over to the sponsor during the course of the project.

deliverables

Johanna Taylor, a creative developer at Leo Technologies Inc., is developing a website for the company. To address the usability needs of website visitors, she ensures that visitors would be able to easily locate what they need on the website. She avoids flashy graphics and chooses a font with high readability. Joanna is most likely in the ________ stage of the SDLP.

design

The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will function together to accomplish goals, using descriptions, diagrams and models.

design

The goal of using eXtensible Business Reporting Language (XBLR) in compliance reporting is to ________.

develop a common language for all accounting and business reports

The goal of using XBRL in compliance reporting is to ________.

develop a common language for financial reporting

Which of the following knowledge management strategies should be used with strategically valuable information?

develop plans of action to experiment with and invest in this information

Which of the following is the primary function of the International Accounting Standards Board (IASB)?

developing and promoting a single worldwide set of financial reporting standards

Which of the following functions is performed by an instructional designer in an e-learning process?

developing the best strategies for the e-learning program

In an information systems department, the enterprise systems subunit is responsible for ________.

developing, installing, maintaining, and overseeing the organization's mission-critical software applications

Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating a software that would help travel agents answer and track traveler requests efficiently. He is now converting the design into an operational information system. Which of the following phases of the SDLC is the software currently in?

development phase

A use case diagram is used to indicate how ________.

different types of users will interact with a system

Halcyon, an e-publisher, has recently decided to use an information system that administers the way its customers access its online publications. The system assigns each customer with a unique ID, maintains records of the books purchased by them, encrypts electronic documents for transmission, and includes options to order hard copies of the electronic documents they read online. Which of the following refers to the set of technologies used in this case?

digital rights management

A ________ is often the only logical implementation strategy for smaller systems.

direct implementation

A ________ switches off the old system and launches all the modules of the new one on a single, very hectic go-live date, sometimes called the "big bang."

direct implementation

A major advantage of a ________ is that people whose roles span modules do not have to switch back and forth between old and new modules.

direct implementation

Demand forecast accuracy is important because overestimating demand leads to ________.

discount blowouts

Athena Jolene, a human resources executive at Thomas Griffith, wants to collect ideas from the company's employees for an upcoming company-wide event. The company has offices spread across the country. Which of the following techniques will best help Athena receive suggestions from employees, while also allowing employees to share their ideas with one another?

discussion forum

Which of the following types of websites allows users to undertake many of the same activities as bulletin boards?

discussion forums

Arthur, a salesperson in a leading apparel store, is very courteous and friendly with customers who visit the store. However, while interacting with customers through emails, he tends to be rather blunt and aggressive, which has led to a couple of complaints being lodged against him. Which of the following does the scenario illustrate?

disinhibition

A website that facilitates transactions by bringing together buyers and sellers from all over the world is called a(n) ________.

e-marketplace

A separate file processing system leads to the creation of redundant information because ________.

each set of computer programs operates on its own records

Which of the following elements of website usability measures the extent to which a user can accomplish simple tasks on the first visit to the website?

ease of learning

The website of an organization that has the main web goal of selling products and services must include ________.

easy shipping solutions

Which of the following elements of website usability describes how quickly a user performs tasks after learning a website's basic design measures?

efficiency

An electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data is called ________.

electronic data interchange

Which of the following is the central element of the human capital management (HCM) information system?

employee record

Which of the following is usually used as raw material for a social network analysis?

employee surveys

Which of the following is an example of the security requirements included in an RDD?

encryption

Which of the following approaches for integrating ERP modules has high switching costs?

engineered suite

Which of the following strategies for integrating ERP modules is built from the ground up with consistent user interfaces, integrated backend database, and a single architectural foundation?

engineered suite

An initial face-to-face meeting between the members of a virtual team through interactive video can ________ among the team members.

enhance trust

Which of the following requires application suites with synchronized modules?

enhancing ERPs through mergers or acquisitions

Johanna wishes to enroll for TryMail's email service. Which of the following actions should TryMail ask Johanna to take in order to establish that she is not a software bot?

enter a sequence of letters and numbers from an image

An integrated application suite to support a whole establishment that includes modules to manage financials, human resources, supply chain, customer relationships, and other business processes is called ________.

enterprise resource planning

Which of the following elements of website usability refers to the mistakes made by users when they attempt to accomplish a task and how easy it is to recover from those mistakes?

error rate

Which of the following is a disadvantage of best-of-breed suites?

error-prone synchronization between systems

A real estate developer in the New Jersey area purchases a large tract of land and plans to build an apartment complex equipped with a golf course and other amenities. The developer is targeting the affluent software engineers from Manhattan who are looking for second homes. Halfway through the process of construction, recession hits the nation and many people lose their jobs. There are no takers for the apartments the developer is building, as homebuyers look for less expensive options. The developer, dismayed at the huge investment he has already made in the project, decides that it would be unwise to stop the project and plans to go ahead with it. The developer's reasoning is consistent with the idea of ________.

escalation of commitment

The tendency to continue investing in a project, despite mounting evidence that it is not succeeding, often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment. This tendency is known as ________.

escalation of commitment

Which of the following is a function of what-if analysis?

establishing relationships between many variables and changing some of the variables to see how others are affected

Which of the following functions does a project charter perform?

estimating start and end dates for the project

What is the step involved in risk management after vulnerabilities of an organization have been examined?

evaluation of controls that fill in security gaps

Which of the following is an accurate definition of "black swans"?

events that occur very rarely and are difficult or nearly impossible to predict

Which of the following do all types of information system tests mimic?

events the system is likely to handle when it goes live

Carrie, the finance manager of an insurance company, suspects some of the sales representatives of submitting their travel expenses receipts twice. Which of the following would help her spot such fraudulent submissions?

exception reports

Rowland Perry, a headhunter in Manhattan, is required to find a capable candidate for the position of creative director for an ad agency. The creative director is a highly specialized position which requires the selected candidate to guide individual advertising campaigns for a diverse set of clients. Which of the following tools would help Rowland most in his search for a creative director?

expert location system

Software that mimic the reasoning and decision making of human professionals, drawing from a base of knowledge about a particular subject area developed with the assistance of the skillful, are known as ________.

expert systems

Pierce Bailey, a sales executive at a mobile service company, needs to document details of the sales calls he makes on a daily basis. What kind of knowledge is he documenting when he is feeding in customer contact information, responses of customers, and follow-up that needs to be done?

explicit knowledge

Which of the following functions do intelligent agents undertake in business intelligence?

extracting useful business information from publicly accessible websites

The process of retrieving data from multiple sources to be loaded into a data warehouse is called ________.

extraction

A distinguishing feature of ________ is that developers work in pairs, reviewing one another's work, providing each other with feedback, and testing the code as it is written.

extreme programming

An agile method that focuses on frequent releases of workable software and short time boxes for development is known as ________.

extreme programming

Which of the following collaborative technologies has the greatest amount of media richness as well as interactivity?

face-to-face conversations

The official website of Realtor USA, an independent real estate company in New York, allows visitors to view virtual tours of apartments, print a colorful flyer, view a map, contact an agent, and email a friend, all from one inclusive viewer. The primary web goal of this organization falls into the category of ________.

facilitating offline relationships

Michael Hammer's business process reengineering was criticized because it ________.

failed to realize that the human element is key to improving business processes

A function of an expert location system is to ________.

find people in an organization with specific types of skills

Which of the following authentication strategies is the most difficult to forge, crack, or copy and is hence used for physical security?

fingerprint scanner

A ________ is a technical control that inspects a network's incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes.

firewall

A newly opened law firm in Kirkland decides to create a small website that provides a brief introduction of the firm, its mission, the contact information and address of the firm, and a client list. Which of the following information architectures would be most suitable for its website?

flat website architecture

Which of the following is a function of transportation management software?

fleet routing and scheduling

Which of the following is a good master data management strategy?

focusing on key areas

Which of the following occurs during a phased implementation?

focusing on launching modules in steps rather than all at once

The analysts at Swirlees, a brand of ice-cream, are asked to assess revenue generated over the past five years to observe seasonal and historical trends so that they can make a business estimate for the next year. After extensive analysis, they arrive at the conclusion that the sales were highest during the months of July and August, the summer months in the country, and an all-time low during January, the peak of winter. Which of the following tools would best help them in making an estimate for the upcoming year?

forecasting

In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key-department ID. In the student table, department ID is a ________.

foreign key

Which of the following ensures that there will be minimum redundancy in a relational database?

foreign keys

The information systems used by customer relationship management (CRM) are often ________.

fragmented

Which of the following devices receives signals from orbiting satellites that transmit time and location data?

global positioning systems device

Which of the following software is used to ensure compliance for cross-border transactions for importers and exporters?

global trade management software

Which of the following is a tool that supports decision making in organizations?

goal-seeking analysis

The "big bang" approach for implementing ERP involves ________.

going live with all the core modules in the engineered suite at the same time

A database schema is used to ________.

graphically document a data model

Which of the following best describes the Sharable Content Object Reference Model?

guidelines that govern how e-learning objects communicate with the LMS on a technical level

The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them.

honeypots

Which of the following is stickiness a measure of?

how long visitors linger at a website

The web address originating an e-commerce transaction should show the ________ protocol, indicating that the transmission to that server is encrypted and secure.

https://

Negotiating strategies, mentoring, and coaching are all part of the ________ that one adds to the company.

human capital

The monetary gains produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for employee talent is called ________.

human capital return on investment

Which of the following components of the HCM systems is responsible for tracking employees' demographic information?

human resources management modules

The original language used to create web pages is called ________.

hypertext markup language

Which of the following is a transmission protocol which specifies that the resource is a web page containing code the web browser can interpret and display?

hypertext transfer protocol

The .ics extension indicates that a plain text file contains ________ code.

iCalendar

The first step involved in knowledge management is ________.

identifying the goal of the project

Which of the following will NOT improve the web accessibility of a site?

implementing forms that require a mouse click

Designers use the unified modeling language (UML) to ________.

improve communication and clarity by using standardized graphics symbols and notations

Peter automates his email inbox such that his incoming mails are filtered and all the junk mails are sent directly to the spam folder. This saves him time as he does not have to sort through the mails to find his work-related mails. He also creates a group mailing list for his team that makes it easier for him to send mails to the entire team instead of including their email addresses individually. In this scenario, Peter is using information systems tools to ________.

improve individual productivity

An advantage of electronic data interchange (EDI) is that it ________.

improves supply chain performance

The ad for a bakery is placed next to an article on the rising rate of diabetes in American youth, in an e-magazine. This is an example of ________.

inappropriate product placement

Organizations use a(n) ________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business.

incidence response plan

Which of the following has led to stiff laws about retaining electronic documents?

increasing corporate scandals

The website of Vogue, a hair and beauty salon chain, allows visitors to upload their photographs and try virtual hairstyles and virtual makeovers. In this example, the primary web goal of the salon is to ________.

influence the audience

A(n) ________ focuses on informing visitors and empowering them with aggregated information about products from different suppliers.

infomediary

Consumer Reports is a magazine that tests consumer products in its labs and disseminates information on the results so consumers can compare brands. Hence, Consumer Reports is an example of a(n) ________.

infomediary

The online book review magazine, bookreviewusa.com, offers free access to all their reviews and author interviews; however, only those who have purchased a premium access can read book extracts from recently published books. What is the primary web goal of this organization?

inform or entertain the audience

Mark, a 22-year old with a viral infection, is admitted to a hospital. On the second day post-admission, a nurse takes a single high-temperature reading and enters it into the patient records information system. This single reading when combined with Mark's other symptoms and previous medical records, becomes ________.

information

Which of the following refers to facts that are assembled and analyzed to add meaning and usefulness?

information

The ________ process lays the groundwork for the project by clarifying the value it will bring to the organization, setting its objectives, and estimating the project's length, scope, and cost.

initiating

The stage at which a project is conceived is known as the ________ process.

initiating

The stage at which early phase managers identify the major players in the project, including the sponsor, the project manager, the team members, and other stakeholders, is known as the ________.

initiating process

Which of the following sets of processes is carried out first in project management?

initiating process

In an organization that is open to ideas from all employees, ________.

innovative concepts for information systems can come from any level

In an ERP suite that includes modules specialized for higher education, which of the following would be used to track donations, pledges, and gifts, and manage contacts and donor relationships?

institutional advancement

A(n) ________ is a person who brings together the knowledge and skills about what strategies work best for e-learning.

instructional designer

Which of the following is a function of unified communications?

integrating multiple applications and communications channels into a single interface

The financial management system of a software company automatically updates the general ledger whenever there are any transactions in the company's accounts receivable and accounts payable. This is an example of the financial system's ________.

integration of components

Lee works for Pink Net Worldwide Inc., an advertising company in California. Lee is developing software to improve the process of coordination with clients. Which of the following requirements is he concentrating on if he is interfacing the clients' software with a few of the information systems that are currently functioning within the company?

integration requirements

A patent law firm based in New Jersey provides patent drafting and filing services to its clients. The company is planning to build an electronic database of the patent applications it has filed for its clients over the years. However, most of its clients use handwritten notes and figures for their reference. Which of the following software tools would best help the firm convert the large number of paper-based notes from its clients into electronic records that can be easily searched and referenced?

intelligent character recognition

With the help of ________, the digital version of a document is displayed on the screen for a human viewer to verify letters that the software cannot read.

intelligent character recognition

User navigation and data display are examples of the ________ included in an RDD.

interface requirements

Which of the following assets is a part of human capital?

interview techniques

Halcyon is an information technology firm that uses its own private web space to organize and distribute employee forms and announcements. It has recently begun using the same web space to manage its knowledge-related initiatives as well. The private web space discussed in this case is an example of a(n) ________.

intranet

The ________ refers to an organization's private web space that is password-protected and accessible only to authorized individuals through the organization's portal.

intranet

Which of the following systems are used to combat spam?

intrusion prevention systems

Knowledge management refers to ________.

investigations that researchers make about roles that intangible assets play

Which of the following technologies serves as a biometric identifier for physical security?

iris configuration

In comparison with unstructured information, semi-structured information ________.

is easier to query and aggregate

When compared to electronic data interchange, the use of collaborative systems with XML formats to improve visibility between partner companies in a supply chain ________.

is more flexible

Enforcing intellectual property laws becomes difficult when ________.

it is digitized

Making changes to an integrated database is considered a challenge because ________.

it takes less time from IT but more from the end users

A drawback of the hierarchical database was that ________.

it was ineffective at handling many-to-many relationships

The ________ compresses the time horizon for software development and focuses on the time available until the next release while the development team determines how many of the requirements it can deliver in that time frame.

iterative method

Which of the following should be undertaken during the design phase of the SDLC?

keeping in mind end users with disabilities

The term ________ refers to quantifiable metrics used to evaluate an organization or an individual's success in a particular activity.

key performance indicators

Just Cazuals, a brand of street wear in California, recently advertised its newly launched line of clothing. The firm pays Spydrware, a search engine, for delivering the link to its website as the top search result to Internet users when they search for words such as "jeans" and "fashion." This is an example of ________.

keyword advertising

A(n) ________ is an initiating process where stakeholders meet one another, sometimes for the first and only time.

kickoff meeting

Robert, a stockbroker, recommends that his clients buy and hold stock of Andersonz Corp for a minimum period of six months and then sell them. His recommendation is based on a graph of the firm's fluctuating performance for the past three quarters and an analysis of other information. The basis of Robert's recommendations can be termed as ________.

knowledge

Which of the following is a disadvantage of using shadow systems?

lack of documentation and support

A company tried implementing an ERP system and failed. Which of the following is the most likely reason for its failure?

lack of preparatory training

Which of the following will take place in a parallel implementation of an information system?

launching the new system while the old one is still running

A(n) ________ is an information system used to deliver e-learning courses, track student progress, manage educational records, and offer other features such as online registration, assessment tools, collaborative technologies, and payment processing.

learning management system

A(n) ________ is a self-contained digital resource embedded in an e-learning course that can be edited and reused for other purposes.

learning object

Which of the following would be the least effective option for a user interface design?

letting users know in an indirect way when something on the website changes, or the user has completed an action

In knowledge management, the step that comes immediately after identifying the goal is ________.

locate the sources of relevant knowledge

Demand forecast accuracy is important because underestimating demand leads to ________.

lost sales

Vendors are providing software-as-a-service (SaaS) products because of the need to ________.

lower implementation costs

Which of the following is a negative impact of surveillance in online communications?

lowered productivity of employees

Google developed a text translator that acquires its skills directly from the data and need not be programmed with any rules about semantics or syntax of the languages involved in the translation. This is an example of ________.

machine learning

Which of the following functions does a project- and issue-tracking software perform?

maintaining a complete history of project activity, including dates and tasks assigned

One goal of normalization is to ________.

make data functionally dependent

Which of the following would improve a website's accessibility?

making bold headings, short paragraphs, and orderly paragraph arrangements

Early integrated application suites evolved from systems that supported ________.

manufacturing resource planning

Danielle, searching online for a hair fall control shampoo, entered the HairCare website. She noticed that the HairCare web page for shampoos also showed conditioners, hair gels, and hair dryers in the "Customers Who Bought This Item Also Bought" section in its product screens. Which of the following techniques does HairCare use in order to cross-sell its products?

market basket analysis

Shirley Yearwood is an analyst at a retail outlet and is required to assess customer data to understand which items are more likely to be bought together. What analysis process will best help her to analyze purchasing habits of customers who bought gum boots along with umbrellas, ties along with shirts, and hair clips along with headbands among other related products?

market basket analysis

Which of the following analyses is used by Amazon to show sections titled "Frequently Bought Together" in their product screens?

market basket analysis

Sam Reid is a web designer at a publishing firm in Minnesota. He wants to use a process to aggregate a wide array of information like book reviews, customer feedback, awards won, and company details on the firm's public website. Which of the following should he use in order to bring together all this information from multiple internal and external sources onto the firm's customizable web pages?

mashup

The term ________ refers to an approach to aggregating content from internal and external sources on customizable web pages that relies on Web 2.0 technologies.

mashup

An approach that attempts to achieve consistent and uniform definitions for entities and their attributes across all business units is called ________.

master data management

In Aster Limited, the HR department did not include interns as employees in their database, while the finance department included them. Such inconsistencies can be avoided through ________.

master data management

Which of the following elements of website usability refers to the effort it takes to regain the same level of proficiency when a user returns to a website after a period of time?

memorability

While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report's properties. What type of information is Ashley adding to her report?

metadata

The term ________ refers to a set of formats that rely on the XML family of standards to represent metadata in HTML code.

microformat

Which of the following best describes tactical-level decisions?

mid-level decisions undertaken by managers on issues like product development and membership drives

Software used as a bridge to integrate separate information systems and synchronize data across multiple systems is referred to as ________.

middleware

Which of the following is a function of normalization?

minimizing duplication of information

The process by which users are directed to a copy of the database when the main one fails is called ________.

mirroring

BTC, a consulting company with offices across the U.S., began an employee discussion forum on its website. A few employees began criticizing the company on the forum and undermining its morale. BTC does not want to limit employee interaction, but at the same time, it would like to limit what employees can write. Which of the following features of a discussion forum will help them achieve this?

moderators

In the ________ phase, project managers pay close attention to reports and dashboards that might show early warning signs that some tasks have fallen behind.

monitoring

A company requires its employees to include a certain disclaimer in their emails that states that the company is not responsible if recipients of emails rely on the advice provided by the employees. What potential threat does such a disclaimer protect the company from?

negligent misstatements

Which of the following activities is supported by financial management systems?

negotiating the terms and conditions of payment agreements made with vendors

Which of the following is an early database approach that allowed flexible links to support many-to-many relationships?

network database

Which of the following do database developers use to avoid anomalies that result when users try to insert, edit, or delete data?

normalization

Which of the following is the best way to handle complex relationships, such as the data for a company where employees can be assigned to more than one project, and each project can have more than one employee assigned to it?

normalizing the relationship between "employees" records and "projects" records

Which database architecture is popularly used for organizing complex data types such as graphics and multimedia?

object-oriented database

Digital rights management offers IP holders the benefit of ________.

offering technological protection for their products

Which of the following is a function of the Web Accessibility Initiative (WAI)?

offering tutorials and tips to help organizations improve their sites

Which of the following best describes legacy systems?

old systems which are built on aging or obsolete architectures

Roman Jade, an interior decorations company, stores employee details in its employee information system. The birth date of each employee is stored along with other details, including employee names. The relationship between the employee names and employee birth dates is a ________.

one-to-one relationship

James, who works in the marketing department of the Whistlewoods Hotel, has been given the responsibility of identifying patterns in the preferences of guests who have repeatedly visited the hotel in the past ten years. Which of the following would best help him categorize the massive amounts of data to reveal preferences of guests, such as type of suite, room service, etc.?

online analytical processing

Which of the following methods categorizes massive amounts of data stored in data warehouses to reveal significant patterns and trends in the data?

online analytical processing

Employees working primarily at the ________ decision level deal directly with customers and handle all the routine transactions where their decisions follow predetermined policies and procedures that spell out how to handle different situations.

operational

Clara Thomas is an employee at the Citizens Trade Bank. What type of decisions will she undertake if her responsibilities include receiving customer queries, fixing appointments for sales representatives of the bank, and tracking potential clients through call records?

operational decisions

Which of the following types of captured knowledge should ideally be systematically collected and organized and made widely available throughout an organization?

operational information

Business intelligence is said to be used at the ________ if companies use it to bring meaningful, performance-related information to all employees.

operational level

Which of the following functional areas in an information systems department maintains the location of servers and communications equipment?

operations

The process which reads typed text and helps document management systems index, tag, and decipher document identifiers quickly is known as ________.

optical character recognition

Which of the following is a function of the human capital management system?

optimizing labor schedules

Which of the following is the primary function of supply chain management in companies?

optimizing the flow of products and services from their source to the customer

As a result of people editing, cutting and pasting, and making copies of electronic documents, ________.

organizations find it difficult to manage the retention process

What function were intranets originally intended to serve?

organizing and distributing employee forms and announcements

A company resorts to discount blowouts to get rid of excess merchandise. Which of the following scenarios is most likely to have triggered this action?

overestimation of demand

Which of the following disasters is most likely to cause massive absenteeism in organizations?

pandemics

A ________ of an information system launches the new system while the old one is still running and employees either do their jobs twice or two separate teams handle the same processes.

parallel implementation

Escapade Inc., a travel agency in Sydney, is using a highly expensive implementation process for a short period of time. It launches the new system while the old one is still running and employees have to do their jobs twice, once on each system. Which of the following is the company using?

parallel implementation

Which of the following is a type of testing for information systems where developers use the same input and compare the new system's output to the output generated by the system it is replacing?

parallel testing

A ________ is an e-commerce application that facilitates online shopping by mediating the interconnections to the merchant's bank, the bank or other entity that issued the card, and then back to the original website to approve or decline the purchase.

payment gateway

Dense connections in a social analysis map represent ________.

people in informal networks who are willing to provide assistance

What does bounce rate mean in the context of web metrics?

percentage of visits in which the user leaves the site from the same page he or she entered it

Components such as response time, availability, and scalability are examples of the ________ included in an RDD.

performance requirements

A disadvantage of a ________ is that the new system's modules may be tightly integrated, so implementing one without the others may create some confusion and require temporary interfaces to the old systems.

phased implementation

Janet received an email that contained a link to a website that imitated the authentic website of her bank. The email requested her to key in her credit card number, her Social Security number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. It is inferred from this case that Janet is a victim of ________.

phishing

A profile in a social networking site consists of ________.

photos and education details

Margaret O'Connor is an upcoming poet from Georgia who recently updated her blog with her piece of writing titled, "Shadows." One of her readers copied her piece onto his own blog and passed it off as his original work. This is an example of ________.

plagiarism

Jonathan has joined a new software company in Manhattan and has been assigned the task of developing an internal communications system. He begins the task by assessing how the system will help in efficiently coordinating the projects that the company handles and in determining the feasibility of the system. In the given scenario, Jonathan is in the ________ step of the systems development life cycle.

planning

The ________ process in project management focuses on devising how the project will be executed.

planning

The first step in the successful management of a next-generation supply chain is ________.

planning

The term ________ refers to a task in the work breakdown structure that needs to be completed before a particular task can begin.

predecessor

Which of the following is a function of a supply chain planning software?

predicting demand

Data mining approaches and statistical techniques used to predict future behavior, especially to unlock the value of business intelligence for strategy, are known as ________.

predictive analytics

An organization is using a unified procurement approach if it ________.

prefers systems that are offered by a single vendor

A ________ is a series of events designed to deliver a product or service that is recurring in nature.

process

The function of which of the following components of an information system is to oversee if every data transaction made by an employee is logged in the information system?

process

The major function of a process diagram is to trace ________.

process operations from beginning to end in a way that is clear to all stakeholders

Which of the following is a critical component of an information system?

processes

The first targets of process improvements through integration of modules and creation of workflows in companies were ________.

procurement and accounts payable

An organization is using the best-of-breed approach if it ________.

procures the best systems, regardless of the vendor

Which of the following best describes deliverables in a project?

products, documents, or services that will be handed over to the sponsor

A ________ oversees all the projects going on throughout the organization and provides project management training, software, and support.

program management office

Which of the following collects data from each project and aggregates it, building a larger picture of the overall health of the organization's project portfolio?

program management office

Which of the following best describes an operational-level decision?

programmed decisions that deal directly with customers

Independent testers are critical in testing information systems mainly because ________.

programmers are inept at testing their own code

Which of the following administrative security controls is most likely to be adopted by a company which handles high-level sensitive information?

prohibiting downloading data to USB drives

The manager in an e-learning program who pays the bills is called a(n) ________.

project sponsor

A kick-off meeting involves ________.

project stakeholders meeting one another to review the project charter

The ________ offers customizable dashboards so that developers can see at a glance how a process is coming along, what activities they need to complete in a day, and how they can keep abreast of all aspects of the process.

project- and issue-tracking software

A drawback of online anonymity is that it ________.

protects spammers and imposters

After a discussion with his investors, the owner of a newly launched online video site decides that entertaining his audience will be the primary web goal of the website. Which of the following actions will best support his decision?

providing free access to quality content and selling advertising space on the website

A ________ is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations.

proxy

Which of the following factors is taken into account by search engines while determining the relevance of a website?

quality of external links to the site from other websites

Which of the following best describes the term key performance indicator?

quantifiable metrics most important to an individual's role and an organization's success

Which of the following functions does optical character recognition perform?

reading typed text to enable indexing and tagging for processing forms

A representation of an entity in a meaningful way, which includes the attributes of the entity, is called a ________.

record

In a relational database, information is organized into tables in which each row represents a(n) ________.

record

Which of the following is a characteristic of a process?

recurring in nature

A steel manufacturing company that follows a low-cost leadership strategy does not accept any product returns from its customers. The company's "no-return" policy aims to ________.

reduce supply chain costs

Single sign-on is implemented by organizations for the purpose of ________.

reducing the cognitive load associated with multiple passwords

Projects focused on explicit knowledge and structural capital, much of which is in electronic form and scattered across different formats and media types, are worsened by the ease of copying and editing electronic files because different versions contain inconsistent information. This problem is referred to as ________.

redundancy

Which of the following types of captured knowledge should be deleted from the system?

redundant information

Aban Constructions Limited, a construction company, maintains data in the form of records within tables, and the tables are interconnected by linking matching fields. Which type of database architecture does Aban Constructions Limited use?

relational database

The database model that organizes information into tables of records that are connected to one another by linking a field in one table to a field in another table is called ________.

relational database

Which of the following is the most widely used database architecture?

relational database

Which type of database architecture does Oracle use?

relational database

Which of the following authentication strategies is the easiest to compromise or crack?

reliance on user knowledge

A ________ is a request sent to software vendors describing a new system that an organization requires in broad, high-level terms, to which interested vendors can respond by describing the products and services that could fit the requirement.

request for information

Which of the following includes a high-level description of a system that an organization is on the lookout for?

request for information

A ________ is an invitation to software companies to submit a formal bid, including a detailed description of their products, services, and costs.

request for proposal

Mike, a research analyst, is in the analysis phase of a project, the goal of which is the development of smile shutter technology in cameras. Mike first identifies and analyzes the integral elements that need to be included in the technology such as red eye removal, blink detection, and face identification and then prioritizes them as mandatory, preferred, or nonessential. Which of the following processes is being illustrated in the given scenario?

requirements analysis

Which of the following assets is a part of structural capital?

research documents

Which of the following is a reason why humans are soft targets for social engineering?

respect for authority

According to the incidence response plan, which of the following would be most useful in containing any damage caused by a security threat?

restrict system access

Which of the following will typically have a major impact on global supply chain costs?

restrictions on carbon emissions

Which of the following functions do intelligent agents perform in the context of search engines?

retrieving downloadable files from online sources

Which of the following is an accurate definition of online analytical processing?

retrieving, examining, and drilling data into specific groups

A(n) ________ lists out and rates the vulnerabilities of an organization.

risk matrix

Which of the following is a function of the telecommunications component?

routing traffic to different locations

Sellers Forever Inc. makes use of a system that sends emails to all employees in the organization with requests to recognize and congratulate the top performing sales reps at the end of every week to encourage and motivate the sales team. Which of the following has the company employed?

sales force automation

A system's ability to handle rapidly increasing demand is called ________.

scalability

Which of the following is a characteristic of image recognition?

scanning facial features and returning possible matches from a database

The term ________ refers to the way in which features are added in an uncontrolled way, often without considering the impact on the budget or timeline.

scope creep

A(n) ________ is a document that clarifies which features are included in a project.

scope statement

Sam Torres, a security officer at a content management firm, is required to monitor the people coming in and going out of the organization and ensure data privacy through the process of encryption. Which of the following types of requirements is Sam focusing on in the given scenario?

security requirements

In Internet terminology, a worm refers to a(n) ________.

self-replicating program that sends copies to other nodes on a computer network

A ________ refers to a system in which online resources and their relationships can be read and understood by computers as well as human beings.

semantic web

In Robin Dave Hospital, visiting physicians use different spreadsheets to record the name, address, mobile number, and email of clients. These individual spreadsheets are then compiled by a data-entry operator into one spreadsheet. What type of information does the compiled spreadsheet represent?

semi-structured information

Which of the following is a function of the Internet Corporation for Assigned Names and Numbers (ICANN)?

settling disputes over domain names

To collate innovative ideas for an important business project, a manager creates a database which is not integrated into the enterprise database. The new database is an example of a(n) ________.

shadow system

Databases that are smaller than enterprise databases and focus on their creators' specific information requirements are known as ________.

shadow systems

Kate Anderson is taking over from Barry Brown as the Regional Sales Manager for Florida state at 99, a large chain of retail stores in Florida. She is assigned to work side-by-side with Barry until he retires and to learn about procurement processes, supplier preferences, etc. through observation. Which of the following mentoring techniques is employed in this case?

shadowing

A ________ is an area on a server in which team members can post documents, maintain membership lists, feature news and announcements, and collaborate on edits and updates.

shared workspace

Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. The company's project teams across different countries frequently exchange documents over email, with multiple users making changes to a particular document. As a result, there are often multiple copies of a particular document in existence. Which of the following will allow the teams to share documents in such a way that they can keep track of the changes made to a particular document and note the team members who make the changes?

shared workspace

Which of the following is a feature of a project's closing process?

signing off by the sponsor that all deliverables have been accepted

An SMTP server is a server that handles outgoing email, where SMTP stands for ________.

simple mail transfer protocol

Which of the following mail protocols is commonly used to handle outgoing mail from users?

simple mail transfer protocol

Which of the following instructional technologies can be used only when the students and the instructor are in the same location at the same time?

smartboards

Jonathan Collins, a customer relations manager at a retail firm in Minnesota, has accumulated contacts with clients and suppliers throughout his years in the organization. Which of the following is a type of intellectual capital he is contributing to in this case?

social capital

Sally Frost is a public engagement coordinator at Wildlife Foundation. What kind of capital does she contribute to the organization when she successfully interacts with volunteers, builds contacts with corporate houses and long-term relations with government bodies over the years?

social capital

Which of the following modules of the human capital management systems encourages interactions through wikis and blogs?

social networking software

Poise, a fashion apparel brand, intends to increase its online presence by creating online communities with its customers as members. The customers can interact with each other as well as the company. The generated information can then be used for developing future products. Which of the following is the company most likely to make use of?

social networking system

A general rule of thumb is that an organization should consider buying software rather than building it if the ________.

software can meet 75% to 80% of all business requirements

Which of the following is an example of intellectual property owned by an IT firm?

software code

Which of the following is an accurate definition of malware?

software designed to attack computer systems

Companies pay subscription fees to access a vendor's software in the cloud, via the web, in the case of ________.

software-as-a-service (SaaS) products

Which of the following methods is often used for phishing purposes?

soliciting personal information through emails

Shadow systems focus on ________.

specific information requirements of an individual or department

Which of the following is a function of a requirements definition document (RDD)?

specifying the features that an information system should have

Exception reports that are generated by financial information systems help organizations primarily in ________.

spotting fraudulent transactions and mistakes that require a manual review

Evelyn Birch is a freelance content writer whose desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits, her email communications, etc. Data gathered from the monitoring activity is sent to a remotely located hacker. Which of the following is most likely to have infected Evelyn's computer?

spyware

The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

spyware

Which of the following provisions does the Gramm-Leach-Bliley Act make?

stipulating how financial institutions are required to protect the privacy of consumers' financial information and notify them of their privacy policies

In Kansas, an athletics association is partnered with a university to identify talented youth across the state. They use an online test to ensure easy accessibility to students across the state. This is an illustration of ________.

strategic use of information systems

Jane Adams is a director at Wilderness, a travel house in Manhattan. What type of decisions would she have to make if Wilderness decides to open a new branch of the company in Chicago?

strategic-level decisions

Which of the following types of captured knowledge is ideal for developing plans of action to experiment with and invest in?

strategically valuable information

Which of the following types of testing for information systems is conducted to assess how well a system performs under peak loads?

stress testing

McCloy-Hill, a well-known law firm in California, adopts a regular practice of documenting its client-related data daily in an electronic database. The client-related data includes the nature of legal advice sought, revenue generated by each client, and progress on each case, among others. What type of intellectual capital does such data represent to the firm?

structural capital

Flippy, an online shoe store, uses an information system to store sales transactions with clearly defined fields for date, customer number, item number, invoice number, and amount. What type of information resource does Flippy use?

structured information

A person in an e-learning program who knows just what should be included in the course and possesses the content expertise is known as a ________.

subject matter expert

In which of the following approaches for integrating ERP modules does the vendor provide middleware to connect systems that may be running on different platforms?

suite with synchronized modules

Which of the following assets is a part of social capital?

supplier contacts

The bullwhip effect can be reduced if ________.

suppliers have real-time access to up-to-date retail sales data

A bag manufacturing company had suffered financial losses due to overestimation of demand, which led to overproduction. Which of the following software can help the company prevent such situations in the future?

supply chain planning software

Which of the following types of testing involves both end users and IT staff testing the functionality of an entire IS?

system testing

Which of the following knowledge management strategies should be used with operational information?

systematically collect and organize, making it widely available throughout the organization

Which of the following best describes service-oriented architecture (SOA)?

systems assembled from relatively independent software components

Which of the following is an accurate definition of document management systems?

systems that manage electronic records, often converted from paper sources, making them searchable and easily transmitted

Known to be an integral part of Green Living Inc., Rhonda Lloyd worked as a renewable energy campaigner for nine years in a remote region of Indonesia. What kind of knowledge represents her understanding of the dynamics of village communities and the apprehensions of the locals?

tacit

Knowledge that is elusive in nature and encompasses insights, judgment, creative processes, and wisdom that come with long experience in a field, as well as many trials and errors is known as ________.

tacit knowledge

Josh Lucas is a marketing manager at Grey Thompson, the largest advertising firm in Washington. What level of decision making would Josh be involved in if he undertakes decisions on promotional campaigns, guerilla marketing, and brand awareness?

tactical

People at ________ levels in an organization draw on business intelligence to make decisions related to marketing plans, product development, and departmental budgets.

tactical

A ________ is a visual depiction of keywords related to the search, with font size and position indicating relevance.

tag cloud

A collection of online tools that organizes and collects a variety of activities for a group of people working together, such as calendars, document and multimedia repositories, blogs, announcements, chat, and discussion boards, is known as a ________.

team workspace

Which of the following is a common source of misunderstanding between IT and other departments?

technical jargon

The impression created when remote participants in an interactive video meeting are almost life-sized and images are vividly clear is known as ________.

telepresence

A disadvantage of electronic data interchange (EDI) is that it ________.

tends to lock partners into their relationship

Which of the following is involved in the integration testing process for information systems?

testing a new system's interfaces with other software components it links to

Which of the following best describes keyword advertising?

text ads that appear as sponsored links along with the results of a particular word search in a search engine

Structured information can be defined as data ________.

that can be organized into hierarchies

A patient lodges a complaint with the management of a hospital because he is unsatisfied with their policies on safeguarding patient information. In this situation, which of the following individuals is responsible for ensuring that the hospital policies safeguard the information of the patients?

the Chief Privacy Officer

Which of the laws stipulates how financial institutions are required to protect the privacy of consumers' personal financial information and notify them of their privacy policies annually?

the Gramm-Leach-Bliley Act

Which of the following laws establishes requirements that govern how personally identifiable information on individuals is collected, used, and disseminated by federal agencies?

the Privacy Act of 1974

Which of the following factors is the most important reason why data can be shared across different systems?

the ability to convert any data into digital form

Which of the following best describes overconfidence bias?

the act of having more faith in our own estimates than is realistically justified

Which of the following best describes a hindsight bias?

the belief that an actual event was predictable even if it was not

A disadvantage of using a suite with synchronized modules is that ________.

the bridges between modules can be fragile

It is important to appreciate the ethical issues involved in the development and use of information systems because ________.

the data they contain is vast and personal

What is the function of microformats like the hCard?

the electronic exchange of business card information

An information system is used to centralize information related to voting behavior in Texas. One of the indicators measured by the system is the average waiting time to vote. The time people spend waiting in line to vote at each polling booth is aggregated for each region. This is then used to create a graph that depicts the average waiting times by location. According to this scenario, which of the following refers to information?

the graph with average waiting times

Intellectual capital refers to ________.

the intangible assets and resources of an enterprise

Which of the following is an accurate definition of social capital?

the internal and external relationships that are maintained by an organization's employees

Marsha, a sales executive, faces issues while copying data from one spreadsheet to another. The formatting of the copied data is not the same as that of the data that is pasted. She started facing this problem only after her older spreadsheet application was upgraded to a newer version. She raises a ticket stating "Request older system. New system not working as desired." The IT technician misconstrues this as a request to replace the computer with an older version. When Marsha returns the next morning, she finds that her computer has been replaced with an older version. Which of the following is the reason why her request had been misunderstood?

the jargon barrier

The database performance tuning process takes into account ________.

the kind of data accessed by the end users

Which of the following poses a hindrance to the adoption of information systems in nonprofit organizations and government?

the lack of dedicated funding

One of the critical factors that contribute to the failure of projects is ________.

the lack of executive support for the project

Which of the following best defines a critical path in a project?

the longest project path that identifies tasks that cannot be delayed without affecting the finish date

Which of the following is a drawback of using a proxy server to ensure online anonymity?

the need to rely on the promise of the company that operates the proxy to protect its customers' identities

Which of the following is an accurate definition of a top landing page?

the number of entrances to a site for each page

Which of the following is an accurate definition of the web metric "unique visitors"?

the number of first time visitors to a site

In web metrics, which of the following best describes depth of visit?

the number of page views per visit

The click-through rate (CTR) is computed as ________.

the number of visitors who click on the ad divided by the number of impressions

Which of the following is an accurate definition of multifactor authentication?

the process of combining two or more authentication strategies

Which of the following best describes confirmation bias?

the tendency to choose information that supports our existing position

Cadmia University is planning to start an online course called "Cultural diversities." The university wants to develop an information system to support virtual, collaborative education. Which of the following factors should be taken into account when developing the new system?

the way students interact in an actual classroom setting

A person clicks on an ad of a fitness club in a blog on nutrition. The person conducts a search on yoga and moves to another webpage, which is also a network client. The stored information about the person is retrieved, and he sees more ads about health clubs and gyms. Which of the following web advertising tools is being used in this example?

third-party cookies

In which of the following project management areas is a Gantt chart most likely to be used?

time management

People pay a monthly subscription fee to financial service companies to get current stock prices. Which of the following characteristics of information does this highlight?

timeliness

For which of the following reasons are companies most likely to use social networking sites?

to connect with customers and announce new products

Which of the following is a reason why employers adopt surveillance technologies to track online communications?

to increase employee productivity

Which of the following is a function of predictive analytics?

to unlock the value of business intelligence for strategy

The last string of letters in a URL that indicates the type of organization or country code is called the ________.

top-level domain

What role does a project manager in an e-learning program play?

tracking progress from kickoff to completion

Which of the following functions is performed by texting?

transfer of photos and videos

Julian, a database administrator, prepares data to be loaded to a data warehouse. He checks the zip code field against a reference database of zip codes to ensure that it conforms to standards. The zip codes that aren't in the standard format are reformatted. This process is called ________.

transformation

When building a warehouse, the process of reformatting data so that it conforms to set standards is called ________.

transformation

Which of the following supply chain management software is used to manage and optimize shipping, logistics, fleet routing, and scheduling?

transportation management software

The percentage of workers who left an organization and were replaced during a time period is called employee ________.

turnover

The total of termination costs, hiring costs, training costs, and other costs related to replacing a worker is referred to as ________.

turnover cost

Registering a replica site with a misspelling in the trademark name that users might easily mistake for the real thing and displaying negative information about the actual company on the replica site is called ________.

typosquatting

Which of the following contributes to successful knowledge management?

understanding an organization's specific needs to identify goals

Which of the following is a function of market basket analysis?

understanding behavior patterns of customers as they buy multiple items

What is the first step involved in risk management?

understanding what information assets need protection

Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches?

understanding which information assets need protection

Jennifer, a client services manager in an advertising agency, is on vacation. Her smartphone lets her clients and subordinates know that she is available for hands-free cell-phone conversations at certain times of a day, and at other times communicates that she is available for IM or videoconferencing, depending on her activities at the vacation spot. Which of the following technologies is Jennifer's system using?

unified communications

The unique global address for a web page or other resource on the Internet is called the ________.

uniform resource locator

A ________ provides quick access to context indicators, email, secure instant messaging, voice and video calling, conference calling, corporate RSS feeds, and more.

universal dashboard

Sarah Jones is a communications assistant at Sustainable Living Inc., a nonprofit organization in Las Vegas. Which of the following can give her quick access to emails, video calling, and corporate RSS feeds that help her be in constant touch with the campaigners for the organization?

universal dashboard

Which of the following is the most critical factor that contributes to failure of projects?

unrealistic time frames

Pieces of information that cannot be linked together are called ________.

unstructured information

Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value-added services in a matter of seconds. Which of the following requirements is Tom developing if he is working to improve the visual appeal of the interface and to enhance the ease of learning the software?

usability requirements

Structured query language is a standard query language ________.

used to manipulate information in relational databases

Purple Stones, an interior decorator, has an online store to enable quicker purchase of its products. The website allows users to post reviews of products. This helps other customers evaluate the quality of a product before buying it. Which of the following is illustrated in this scenario?

user-generated content

An online retail website has a low rate of customer retention. Which of the following would be the most effective way to help the company increase its retention rate?

using a CRM system to track customer behavior when they visit the site

Which of the following is a method employed by some organizations to prevent access to USB ports in order to keep employees from copying data?

using epoxy glue

Which of the following would NOT improve a website's accessibility?

using fixed text sizes

SQL links tables together by ________.

using primary keys and foreign keys

Which of the following steps should be undertaken while designing a dashboard?

using seven or fewer graphs, charts, maps, or tables on one dashboard

Microsoft's Sharepoint includes features for ________, which ensures that older copies of documents are maintained and no changes are lost.

version control

Which of the following database architectures relies on a cooperating collection of existing databases?

virtual federated warehouse

A graphical, often 3D environment in which users can immerse themselves, interacting with virtual objects and one another using avatars is known as a(n) ________.

virtual world

Which of the following technologies is most likely to be used by organizations as an authentication strategy?

voice pattern recognition

Which of the following supply chain management software is used to manage and optimize inventories, space allocation, shipments, and cross-docking?

warehouse management software

The ________ involves the sequential occurring of systems development life cycle tasks, with one activity starting only after the previous one has been completed.

waterfall method

E-marketing information systems provide extensive tracking capabilities by embedding in the HTML email a ________.

web beacon

A ________ is a software application that retrieves, interprets, and displays web resources.

web browser

Which of the following is a software tool that allows synchronous collaboration and allows online meetings via the Internet?

web conferencing

A standardized and regularly updated output from a publisher that can be embedded in a customized mashup is known as a ________.

web feed

Which of the following instructional technologies enables asynchronous interaction in e-learning?

webcasting

Which of the following is an accurate definition of wikis?

websites in which users add and edit articles about specific topics and discuss contents of articles

Under which of the following circumstances is information privacy most difficult to achieve?

when information is stored on highly interconnected systems

When does a computer become a zombie?

when it is infected by malware

Which of the following instructional techniques does not support asynchronous interaction?

whiteboard

A ________ is a website in which users add and edit articles about specific topics and discuss the contents of each article with other editors.

wiki

Donald Garner Inc., a manufacturing company in California, recently recruited a large number of employees for its new branch office in the city. The company wants to create knowledge storehouses that employees can edit as needed, adding contributions from their own personal experience or updating existing information. Which of the following can the company use to create such a substantial base of knowledge for its new employees?

wiki

Which of the following is a technology that facilitates end-user contributions and allows collaborative editing by allowing users to add and edit interlinked web pages?

wiki

A majority of retail companies in Arizona are increasingly using a certain strategy to capture tacit knowledge which is helping them to successfully handle knowledge management. Which of the following processes would help such users add and edit articles about specific topics and discuss the contents of each article with other editors?

wikis

A(n) ________ is an orderly listing of actual tasks that a project team must complete to produce the project's deliverables.

work breakdown structure


Set pelajaran terkait

Chapter 7: Deviance, Crime, and Social Control

View Set

Triangle Similarity: AA pretest (100%)

View Set

Research Methods Chapter 1: Introduction, Acquiring Knowledge, and the Scientific Method

View Set

Ch 26 Assessment of High Risk Pregnancy

View Set

NET-126 (Hands-On Microsoft Windows Server Chapter 12)

View Set

Ch. 9 Earthquakes and Earth's Interior

View Set

Chapter 10 Review, Chapter 12 SmartBook

View Set

BUS 101 D F Sections 4-1 to 4-8, 5-1 to 5-5, and 6-1 to 6-5

View Set

Asl reading quiz on Douglas Tilden

View Set

1 - Four Functions of Management: Planning, Organizing, Leading & Controlling

View Set