MIS 2
In 2014, approximately ________ Americans shopped online.
196 Million
Officially, E-Commerce began in _____
1995
According to Panorama Consulting Solutions, the average cost of an ERP project is approximately ________.
2.8 million dollars
Bluetooth is another name for the _____ wireless networking standard
802.15
Microsoft's DBMS that includes built-in report generation and reporting is called _____
Access
Apple Pay for the iPhone __________.
Allows user to charge to their credit cards
Amazon is one of the first to provide cloud computing relational databases. This effort is called _____
Amazon Relational Database Service
Enterprise applications have drawbacks mainly because they _____
Are expensive
An information system's _____ examines a firm's overall security environment and determines if the organization is properly prepared.
Audit
_____ is used to ensure a person is who they claim to be
Authentication
________ targeting techniques include banners, rich media, and video ads.
Behavioral
Using your handprint to access a safe is _____ authentication
Biometric
When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________
Bullwhip Effect
_____ in enterprise applications provides features for managers to obtain meaningful info from massive amounts of sources
Business Intelligence
BarnesandNoble.com is an example of ________ electronic commerce
Business to Consumer (B2C)
According to your text, ChemConnect's Web site for buying and selling chemicals is an example of ________ electronic commerce.
Business to business (B2B)
viruses differ from worms because worms _____
Can operate on their own without attaching to other files
Customer relationship management primarily includes _____
Capturing and integrating customer data
A(n) ________ is an Internet business model that provides an online meeting place where people with similar interests can communicate and share information.
Community Provider
Buying a silver coin from an individual on eBay is an example of ________ electronic commerce.
Consumer-to-consumer (C2C)
An example of _____ includes someone taking out a loan and then being sold a checking account as well.
Cross-selling
For DBSM's that do NOT include a reports generator, _____ is a popular option for large corporate DBMS
Crystal Reports
Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called ________.
Customer Lifetime Value
A ______ is a collection of data organized to serve many applications efficiently.
Database
SQL injection attacks are related to _____
Databases
iTunes has dramatically ________ illegal music downloads.
Decreased
Regarding IS Security, DoS represents _____
Denial of Service
_____ are data files used to protect and identify online transactions using a trusted third party
Digital Certificates
Downloading a movie to watch is an example of acquiring a ________.
Digital Good
_____ improved gold-mining operations by adding _____
Dundee Precious Metals;RFID
If a Web site changes its prices based on the demand characteristics (e.g., concert tickets), this is called _____
Dynamic Pricing
________ enables the computer-to-computer exchange between two organizations
EDI
According to the E-Commerce Presence Map, activities including newsletters are a(n) ________ type of presence.
_____ help businesses become more productive by integrating processes focusing on management services such as sales, marketing, and accounting.
Enterprise Resource Planning (ERP) systems
SAP is the best selling
Enterprise Software
SAP is the best-selling _____
Enterprise Software
A(n) _____is the most popular method to model a database
Entity-relationship (ER) model
A _____ is a component in the computer system data hierarchy that includes content such as student ID 100, Course IS 101, and Grade A.
Field
In an enterprise system, the integrated software modules that focus on customer credit are related to ________.
Finance and Accounting
IS security firewalls are an example of a _____
Gatekeeper
If a supply chain includes organizations from the US and China, it is a(n) _____
Global Supply Chain
_____ was passed in 1996 to protect medical records
HIPAA
What is the most popular NoSQL DBMS?
Hadoop
An intrusion detection system (IDS)
Helps protect a system using full-time monitoring tools
In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to _____
Human Resources
A(n) _____ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.
Information Policy
_____ deals with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by management and employees.
Information Systems (IS)
The _____ is the most extensive public communication system
Internet
The world's largest network is the _____
Internet
A spyware program that tracks every key you type is a _____
Key Logger
_____ includes computer viruses, worms, and Trojan Horses
Malware
In an enterprise system, the integrated software modules that focus on production capacity are related to _____
Manufacturing and Production
Customer relationship management apps that track campaign data are related to the _____ aspect of customer relationships.
Marketing
A broad term to describe extending a marketplace beyond traditional boundaries is called ________.
Marketspace
The fastest growing type of B2C e-commerce is ________.
Mobile
________ is another name for e-hubs.
Net Marketplaces
The beginning of e-commerce occurred when ________ accepted the first ads from major corporations.
Netscape
An emerging non-relational database management system is called _____
NoSQL
The formal process to remove data problems such as repeating groups is called _____
Normalization
According to the E-Commerce Presence Map, activities such as education and branding are considered a(n) ________ type of presence.
Offline Media
More advanced CRM apps include _____ and _____.
Partener Relationship Management (PRM); Employee Relationship Management (ERM)
Someone sending you an email to appear as a site you commonly visit, they are _____
Phishing
_____ is the fastest growing website in history
A(n) ________ is an Internet business model that creates a destination site and is provided by companies such as Yahoo, Bing, and Google.
Portal
Another name for a key field is a _____
Primary Key
The field that uniquely identifies a row in a relational database table is called a _____
Primary Key
A supply chain management system using a(n) _____ model bases production schedules on actual customer orders.
Pull-based
A supply chain management system using a(n) ________ model bases production schedules on forecasts.
Push-based
_____ are used to track movements of products though the supply chain
RFIDs
The primary benefit of disintermediation to the consumer is ________.
Removing layers and reducing cost
_____ is a method for encrypting network traffic on the web
SSL
Customer relationship management applications that track Web sales and retail store sales are related to the ________ aspect of customer relationships.
Sales
In an enterprise system, the integrated software modules that focus on return requests are related to ________.
Sales and Marketing
In 2002, the _____ act was passed to help protect investors with new financial statement reforms
Sarbanes-Oxley
On a client/server system, most of the powerful processing is handled by the _____
Server
Customer relationship management apps that track social networking data are related to the _____ aspect of customer relationships.
Service
In information systems, SaaS stands for ________.
Software as a Service
A ________ is a network of organizations for obtaining raw materials.
Supply Chain
A _____ is a software program that mimics another to cause damage
Trojan Horse
Public key encryption uses _____ keys.
Two
802.11 Is also known as _____
Wi-Fi
A(n) _____ outlines acceptable uses of information system assets
acceptable use policy
A(n) _____ signal is represented by a continuous wave form that passes through a communication device
analog
Another name for a database field is a(n) _____
attribute
A _____ is the smallest component in the computer system data hierarchy
bit
Digital information transfer speeds are measured in _____
bits per second
A _____ is a component in the computer system data hierarchy that represents an ASCII character.
byte
A(n) ________ is an Internet business model which includes companies such as iTunes and WSJ.com
content provider
Data Cleansing, working to identify and fix correct data, is also called _____
data scrubbing
Software that allows an organization to manage and provide access to data is a _____
database management system (DBMS)
MasterCard having a duplicate computer center in multiple cities is an example of _____
disaster recovery planning
The Domain Name System (DNS) converts _____ to _____
domain names;IP addresses
A(n) ________ is an Internet business model that sells products directly to consumers
e-tailer
The number of cycles per second that can be sent through a network medium is calculated in _____
hertz
An internet protocol address (IP) address ______
is a 32 bit number assigned to every computer on the internet
Slicing digital messages into parcels is called _____
packet switching
The most commonly used authentication technique used for end users is a(n) _____
password
Although "Big Data" doesn't refer to a specific amount of data, it usually does involve _____
petabytes
If a computer is sending a file, and a packet being sent is damaged, the ____ computer asks the ____ computer to retransmit it.
receiving;sending
A network that spans between Montana and Washington is a(n) _____
wide area network