MID MIDTERM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

As a future manager, why will it be important to engage in systems thinking?

because a successful manager keeps in mind that organization's operations must work together through the entire process of creating their products or service

which of the following is considered information rather than data? best selling item by month product sold quantity sold date sold

best selling item by month

Which of the following is an example of information that could come from an airline's ticket sales? Most popular flights Number of tickets sold Total revenue from ticket sale Count of empty seats on flights

Most popular flights

What is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement? Reputation system Native advertising Knowledge system Explicit system

Native advertising

Which type of ebusiness marketing technique induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect? Pop-up ad Cookies Viral marketing Click-through

Viral marketing

In 2011 a computer called "Watson" competed against and beat former champions during rounds of Jeopardy. Watson uses artificial intelligence to understand and answer questions posed in everyday language. A similar technology enables computers to understand the relationships among topics, concepts and characteristics to help users search for information. This is the basis for what concept in this chapter? Knowledge management systems Tacit knowledge Mashups Web 3.0

Web 3.0

As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals? Webinar Email IM'ing Blog

Webinar

The General Motors Lordstown Complex, which makes the Chevrolet Cruze, is located in Northeast Ohio. It is one of the highest volume single line vehicle assembly facilities in the world. Which of the activities below would be considered a support value activity for this facility? Acquiring the car parts from manufacturers Shipping the cars to dealerships Assembling the cars on the assembly line Researching new assembly line efficiency methods

Researching new assembly line efficiency methods

evaluates an organization significant internal and external influences that may work for or against certain business strategies

SWOT analysis

what is the main purpose of using information systems in any organization?

to support business processes and decision making to help an organization achieve its goals

Which type of decision-making information system is used for systemized operational decisions? transaction processing system (TPS) decision support systems (DSS) executive information system (EIS) a magic 8 balls

transaction processing system (TPS)

T/F: process diagrams allow you to understand a process' steps and identify problems and areas in need of improvement

true dat

if there are three swimmers in an As-Is process, how many swimmers should there be in the improved to-be process?

unknown, because the number of actors varies depending on the new process design

What is one of the major problems with email in terms of information security? nonrepudiation user's expectation of privacy intellectual property internet use policy

user's expectation of privacy

determines how to create the greatest possible value for customers by analyzing business processes that add value to the product or service

value chain analysis

what is a computer-simulated environment that simulates the real world or an imaginary world used for entertainment, training and remote, "hands on" work?

virtual reality

in what industry is business process modeling used?

virtually all industries

Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, WA area. Bonnie is highly-technical and uses many types of online marketing techniques to increase business. One of most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using? A pop-up ad A banner ad A cookie A click-through ad

A banner ad

Which of the following directives could be part of an information security policy? Passwords must be at least 8 characters, contain at least 1 upper and 1 lower case letter and at least one number All company computers must run Norton Anti-Virus software, and every computer must be scanned at least once a week. Company computers may only be used for business purposes. Personal smart phones may be used for company and personal phone calls in the US only. All of these are examples of items that could be included in an information security policy

All of these are examples of items that could be included in an information security policy

How do information systems help organizations? Information systems support the integration of functionalities in an organization to achieve a goal. Information systems support the individual functions within an organizations' departments. Information systems store and organize data to be utilized across an entire organization. All of these are ways that information systems help organizations.

All of these are ways that information systems help organizations.

Organizations try to make informed decisions in order to reduce risk and make the most of current situations. BI information systems can be utilized to capture, organize and assist those analyzing the data. The science of fact-based decision making (and a new minor being offered in the MIS department) is called what? Dynamic Reporting Variable determination Analytics SWOT Analysis

Analytics

What is the difference between a B2C and a C2B? B2C focuses on consumers as customers and C2B focuses on companies as customers B2C focuses on companies as customers and C2B focuses on consumers as customers B2C focuses on collaboration and C2B focuses on consumers B2C focuses on business to consumers and C2B focuses on consumers to business

B2C focuses on business to consumers and C2B focuses on consumers to business

You're rolling out a new information system for your company. You compare the system results to the values that the system should achieve. What is this process called? Benchmarking Artificial Intelligence Business Intelligence Transactional processing

Benchmarking

Huge amounts of data are captured in many organizations. Why is data itself not useful? Data must be put into an understandable context in order to make it useful information Consumers have strong control over the data that is collected about them There isn't enough data to utilize effectively in most organizations Data is difficult to store

Data must be put into an understandable context in order to make it useful information

You've heard about the Target security breach. It cost the company numerous customers and millions of dollars. Ideally these types of issues would be prevented, but when they aren't the company is forced to which of the three technology-based defense categories? Duck and cover Prevention and resistance Authentication and authorization Detection and Response

Detection and Response

Which of these is considered a business-facing process rather than a customer-facing process? Updating a retailer's website Collecting payments Determining employees' schedules Processing returns

Determining employees' schedules

An organization, at the very least, should have one of these, because it serves as the foundation and umbrella for any computer policies the company creates. Fair information practices Ethical computer use policy Internet use policy Click-fraud

Ethical computer use policy

Web designers have to consider many aspects when designing and developing a website. Which of these considerations is an effectiveness metric rather than an efficiency metric? How long does it take the webpage to load? How many new customers has the website attracted for the company? How many users can access the website at the same time without it crashing? Is the information retrieved from the database for each customer correct?

How many new customers has the website attracted for the company?

Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin beings a Facebook group finding other college students who need to purchase laptops. Soon, Kevin's Facebook group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops? Increasing buyer power Collecting business intelligence Purchasing a substitute product Decreasing entry barriers

Increasing buying power

As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively. What is Kristin overseeing for the company? information codes information security information management information deployment

Information management

Which of the following is an issue with the Internet of Things? Staying connected via a smart phone Not enough consumers own a wi-fi enabled device Creating market interest and demand Keeping personal data secure among a large number of devices

Keeping personal data secure among a large number of devices

Social media is one of the most commonly used forms of Web 2.0. Which of the following social media sites is commonly used to expand business contacts and as a recruiting tool? Facebook Linkedin Twitter Instagram

Linkedin

What is the business function that utilizes systems thinking to move information throughout an organization in order to help users make informed decisions and create competitive advantages? Analytics Knowledge Management Information Systems Accounting

Management Information Systems

what is the business function that utilizes systems thinking to move information throughout an organization to help users make informed decisions and create competitive advantages?

Management information systems

You are a new manager at an assembly plant. Over the last few months you've noticed that orders have increased, and there is one portion of the assembly line that can't assemble the parts as quickly as they come, leaving the stations after waiting and limiting the total daily output. You decide to create an addditional, identical station to eliminate the hold-up, which increases the possible total daily output. This is a simple example of what type of process improvement? Strategic reengineering Dynamic Operational automation Managerial streamlining

Managerial streamlining

Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike's ebusiness strategy? Mass customization Interactivity Information richness Personalization

Mass customization

When a customer places an order online with Amazon it creates a lot of data, including product(s) ordered, price, shipping address, and payment type. The capture of data from transactions based on business process rules is called what? Outsourcing Sourcing Online transaction processing Benchmarking

Online transaction processing

This image is from an iPhone's Maps app. This app tracks users' location and speed data. The collected data is then displayed as traffic information in the maps for all users to view, and is updated almost continuously. This is an example of which kind of Web 2.0 characteristic? Open source content sharing User-generated content Internal organizational collaboration External organizational collaboration

Open source content sharing

Information systems often support processes such as inventory management, daily production schedules and scheduling hourly employees. What level of decision-making are these types of information systems supporting? Managerial Operational Strategic Structural

Operational

Why is understanding the Information Age and technology so important in the business world? Only technical positions are financially lucrative These days everyone needs to be a technical expert Small businesses must utilize complex information systems in order to operate Technology can be utilized to support and innovate businesses in every industry

Technology can be utilized to support and innovate businesses in every industry

What is the main purpose of using information systems in any organization? To utilize information to facilitate decision making in order for the organization to achieve its goals To ensure that everyone in an organization has access to all of an organization's data To replace all manual processes within an organization and increase efficiency To modernize an organization and keep it up-to-date with its competitors

To utilize information to facilitate decision making in order for the organization to achieve its goals

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user? cookie spyware adware worm

adware

Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance Ski Resort, and he is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having larger number of threats and breaches of company information. He suspects that this may be the cause of an internal employee. He needs to clarify and establish what type of plan to help reduce further problems? an anti-virus plan an ethical information policy an information security plan a social media policy

an information security plan

organizations try to make informed decisions to reduce risk and make the most of the current opportunities. BI information systems can be utilized to capture, organize, and assist those analyzing the data. the science of fact-based decision making and a new minor being offered in the analytics and information system (AIS) is called what?

analytics

which of the following is a good choice for an actor in a process diagram? customer chubb hall driving pack the box

customer

which of these is an example of Web 2.0 rather than Web 1.0? ordering clothes from a retailer's website customers posting reviews about clothes they purchased on the retailer's website reading a retailer's product description of the items on its website

customers posting reviews about clothes they purchased on the retailer's website

huge amounts of data are captured in many organizations. why is data itself not helpful?

data must be put into an understandable context to make it useful information

information security plans have multiple steps and phases. what part of a plan should organizations have, but never want to use?

detection and response

ideally every information system would be efficient and effective. which correctly describes the difference between MIS efficiency metrics and effectiveness metrics?

efficiency metrics measures the performance of the information system itself, while effectiveness metrics measure the impact that system has on processes and activities

What scrambles information into an alternative form that requires a key or password to decrypt?

encryption

eBusiness comes with many advantages, but there are also challenges. what is one of the challenges faced by eBusinesses?

ensuring privacy and security for customers

an organization, at its very least, should have one of these, because its serves as the foundation and umbrella for all computer policies the company creates

ethical computer use policy

what type of system helps with strategic decision-making utilizing high-level data of course granularity?

executive information systems

Janet is a financial aid counselor at a local community college and she shares an office with her three coworkers. Janet feels safe in her office environment and frequently leaves her username and password on a sticky note next to her computer. Without realizing it Janet is creating the potential for which type of information security breach to occur? insiders can hack the college system dumpster diving to find usernames and passwords worms to spread through the college system viruses to spread through the college system

insiders can hack the college system

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents? intellectual property ethics confidentiality privacy

intellectual property

what is an intangible creative work that is embodies in physical form and includes trademarks and patents?

intellectual property

information systems often support processes such as inventory management, daily production schedules and customers purchasing. what level of decision-making are these types of information systems supporting? managerial strategic operational structural

operational

what are the first two lines of defense a company should take when addressing security risks, in order of importance?

people first, technology second

what is the biggest source of information security breathes?

people misusing organizational information

analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry.

porter's five forces model

a firewall is hardware and/or software that protects computer networks by screening all the network traffic and only allowing access to transmissions that have already been authorized. firewalls are considered to be in which of the three technology-based defense categories?

prevention and resistance

A company is deciding whether or not to take on a large project that would automate several of its core business processes. The management determines that the automation project will cost will be about $2 million and estimates that it could save the company $4 million over the next 3 years if implemented and used properly. This means that the project would 'make' the company money, specifically about two times the cost of the project in just 3 years. This is an example of calculating what? critical success factor (CSF) effectiveness metric return on investment (ROI) efficiency metric

return on investment (ROI)

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________. the individual user the email service provider the individual user's department the company

the company

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________?

the employees' company

how can organizations tell if a MIS project is successful?

they measure key performance indicators to check progress toward their critical success factors

chooses a business focus that is neither organization nor industry specific so that it can be applied to any business, product, or service

three generic strageties


Set pelajaran terkait

BIO 354 Human Anatomy (Exam 6: Digestive, Urinary, Endocrine, and Reproductive Systems)

View Set

Sling Load Inspector Certification Course

View Set

Theology chapter 5 Judges & Kings

View Set

Basic Vehicle Technologies 2: Engines

View Set

The Carolingian Achievement and Legacy

View Set