MIS 301 exam chapters 2-5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

fulfillment processes

(1)customer purchase order (2)received by the sales department (create sales order, communicates data, tracks progress) (3)The warehouse prepares and sends shipment (4)accounting notified of shipment, creates an invoice & sends to customer (5) customer pays/accounting records

define phase

-BPI team documents existing "as is" process activities, resources, inputs and outputs (usually graphical process map/diagram) -also documents the customer and their requirements for process output, w/ description of problem to be addressed

measure phase

-BPI team identifies process metrics (time, cost) to generate one output (product/service) -collects data to understand how metrics evolve over time --Sometimes the data already exists (so extract from IS supporting the process) --usually: BPI team needs to combine operational process data already stored in the company's IS systems with other data sources (like customer and employee observations, interviews, surveys)

five key factors are contributing to the increasing vulnerability of organizational information resources, making it much more difficult to secure them:

1.Today's interconnected, interdependent, wirelessly networked business environment 2.Smaller, faster, cheaper computers and storage devices 3.Decreasing skills necessary to be a computer hacker 4.International organized crime taking over cybercrime 5.Lack of management support

_________ is a physical control. A company gate Encryption A firewall VPN

A company gate

distributed denial of service (DDoS) attack

A denial of service attack that sends a flood of data packets from many compromised computers simultaneously.

_________ is an access control. A company gate Encryption A firewall RFID

A firewall

data mart

A low-cost, scaled-down version of a data warehouse that is designed for the end-user needs in a strategic business unit (SBU) or a department.

business process management

A management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.

authentication

A process that determines the identity of the person requiring access.

knowledge management (KM)

A process that helps organizations identify, select, organize, disseminate, transfer, and apply information and expertise that are part of the organization's memory and that typically reside within the organization in an unstructured manner.

master data management

A process that provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core master data.

risk mitigation

A process whereby an organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan.

business process reengineering

A radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a "clean sheet" (i.e., from scratch).

data warehouse

A repository of historical data that are organized by subject to support decision makers in the organization.

Microsoft ________ is a popular example of a relational database. Access Excel PowerPoint Word

Access

________ controls restrict unauthorized individuals from using information resources. Access Communications Physical Useful

Access

_________ controls restrict unauthorized individuals from using information resources. Access Communications Physical Useful

Access

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Additional management support Decreasing skills necessary to be a computer hacker International organized crime taking over cybercrime Smaller, faster, cheaper computers and storage devices Today's interconnected, interdependent, wirelessly networked business environment

Additional management support

data governance

An approach to managing information across an entire organization.

_________ is an example of efficiency. Automating order entry Increasing customer satisfaction Improving product quality Reducing employee turnover Answer: a

Automating order entry

Six Sigma is a popular _________ technique. BPC BPI BPM BPR

BPI

_________ is an incremental approach that focuses on reducing variation in the process outputs by searching for the root causes of the variation in the process itself or among process inputs. BPC BPI BPM BPR

BPI

analysis phase

BPI team examines "as is" process map & collected data to identify problems with the process (e.g., decreasing efficiency or effectiveness) & root causes -- team should benchmark process; (compare its performance w/ similar processes in other companies or other areas of org. organization. -can use statistical analysis software or simulation packages

improve phase

BPI team identifies possible solutions, maps resulting "to be" process alternatives, & selects/implements the most appropriate solution. Common improvements--eliminating process activities not adding value to output, rearranging activities to reduce delay/improve resource use cannot remove controls tho that guarantee the accuracy of its financial reporting, and ensure adherence to rules and regulations.

_________ integrates disparate BPI initiatives to ensure consistent strategy execution. BPC BPM BPR BPS

BPM

Many organizations find _________ too difficult, too radical, too lengthy, and too comprehensive. BPC BPI BPM BPR

BPR

issues with big data

Big Data Can Come from Untrusted Sources. Big Data Is Dirty- inaccurate, incomplete, incorrect, duplicate, or erroneous data. Big Data Changes, Especially in Data Streams.

alien software

Clandestine software that is installed on your computer through duplicitous methods.

_________ involves companies providing standard specifications for different consumer groups. Configured mass customization Consumer segmentation Mass customization Mass production

Consumer segmentation

_________ involves companies providing standard specifications for different consumer groups. Group of answer choices Configured mass customization Consumer segmentation Mass customization Mass production

Consumer segmentation

_________ is a challenge of BYOD. Control Cost Productivity Satisfaction

Control

access controls .

Controls that restrict unauthorized individuals from using information resources and are concerned with user identification

_________ is the result of optimizing operations and supplier processes. Cost reduction Differentiation Productivity Quality

Cost reduction

Which of the following is NOT an organizational response to business pressures? Creating a digital divide Developing strategic systems Focusing on customer wants Mass customization

Creating a digital divide

identity theft

Crime in which someone uses the personal information of others to create a false identity and then uses it fraudulently.

Which of the following has the strategy "I treat my customers better than you do"? Cost leader Customer oriented Differentiation Innovation Operational effectiveness

Customer oriented

_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires. Customer satisfaction Differentiation Productivity Quality

Customer satisfaction

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Cyberterrorism Espionage Identity theft

Cyberterrorism

_________ is the result of optimizing the manufacturing and logistics processes. Cost reduction Cycle and fulfillment time reduction Productivity Quality

Cycle and fulfillment time reduction

Hackers would use a botnet to perform a _________. DDoS a logic bomb a Trojan horse virus

DDoS

A(n) _________ is located between two firewalls. anti-malware system DMZ ERP spamware detector

DMZ

relational database model

Data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data.

unstructured data

Data that do not reside in a traditional relational database.

which of the following has the strategy "I am better because I am different"? Cost leader Customer oriented Differentiation Innovation Operational effectiveness

Differentiation

_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver. Authorization Blacklisting Encryption Firewalling

Encryption

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. Alien software Espionage Identity theft Information extortion

Espionage

_________ is the second step in the general framework for ethics. Act and reflect on the outcome of your decision Evaluate alternative actions Get the facts Recognize an ethical issue

Get the facts

social engineering

Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges.

_________ is NOT an example of a data aggregator. Acxiom ChoicePoint Google LexisNexis

Google

Operational effectiveness strategy

Improve the manner in which a firm executes its internal business processes so that it performs these activities more effectively than its rivals. Such improvements increase quality, productivity, and employee and customer satisfaction while decreasing time to market.

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Increasing skills necessary to be a computer hacker International organized crime taking over cybercrime Lack of management support Smaller, faster, cheaper computers and storage devices Today's interconnected, interdependent, wirelessly networked business environment

Increasing skills necessary to be a computer hacker

_________ is a technology pressure. Globalization Information overload Protection against terrorist attacks Reducing the digital divide

Information overload

knowledge management systems (KMSs)

Information technologies used to systematize, enhance, and expedite intra- and interfirm knowledge management.

Which of the following has the strategy "I'm doing something new and you can't catch up"? Cost leader Customer oriented Differentiation Innovation Operational effectiveness

Innovation

Which of the following reduces buyer power? Globalization Loyalty programs Intermediation Internet searching

Loyalty programs

malware

Malicious software such as viruses and worms.

_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers. Group of answer choices Configured mass customization Consumer segmentation Mass customization Mass production

Mass customization

_______ are a set of core data that span the enterprise information systems. Data governance Master data Master data management Transaction data

Master data

________ are a set of core data that span the enterprise information systems. Data governance Master data Master data management Transaction data

Master data

cross-functional processes

No single functional area is responsible for a process's execution.

Which of the following is NOT an example of excellent alignment? a- Organizations view IT as an engine of innovation that continually transforms the business, often creating new revenue streams. b- Organizations view their internal and external customers and their customer service function as supremely important. c- Organizations rotate business and IT professionals across departments and job functions. d- Organizations allow IT employees to develop overarching goals for the business. e- Organizations ensure that IT employees understand how the company makes or loses money. f- Organizations create a vibrant and inclusive company culture.

Organizations allow IT employees to develop overarching goals for the business.

basic characteristics of data warehouses and data marts

Organized by business dimension or subject. Use online analytical processing Integrated Time variant. Nonvolatile (users cant update/change the data) Multidimensional

_________ are the product or service created by the process. Employees Inputs Outputs Resources

Outputs

entry barrier

Product or service feature that customers expect from organizations in a certain industry; an organization trying to enter this market must provide this product or service at a minimum to be able to compete.

_________ is the result of optimizing each individuals' work processes. Cycle and fulfillment time reduction Differentiation Productivity Quality

Productivity

_________ is a societal pressure. Globalization Information overload Protection against terrorist attacks Technological innovation and obsolescence

Protection against terrorist attacks

_________ are people and equipment that perform process activities. Employees Inputs Outputs Resources

Resources

_________ means that you accept the consequences of your decisions and actions. Accountability Answerability Liability Responsibility

Responsibility

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack. alien software espionage SCADA virus

SCADA

_________ is a deliberate act that involves defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith. Espionage Sabotage SCADA attacks Software attacks

Sabotage

_________ is an unintentional threat. Espionage Identity theft Social engineering Software attacks

Social engineering

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. Adware Marketware Spamware Spyware

Spamware

multidimensional structure

Storage of data in more than two dimensions; a common representation is the data cube.

tacit knowledge

The cumulative store of subjective or experiential learning, which is highly personal and hard to formalize.

explicit knowledge

The more objective, rational, and technical types of knowledge.

make-to-order

The strategy of producing customized products and services.

Which of the following is a property issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? How much should companies charge for permitting access to information in their databases? Under what circumstances can one use proprietary databases? What information about individuals should be kept in databases, and how secure is the information there?

Under what circumstances can one use proprietary databases?

Which of the following is a privacy issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? How much should companies charge for permitting access to information in their databases? Under what circumstances can one use proprietary databases? What information about individuals should be kept in databases, and how secure is the information there?

What information about individuals should be kept in databases, and how secure is the information there?

Careless Internet surfing is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional

a human error; unintentional

You don't lock your computer when you go to the restroom. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional

a human error; unintentional

You lose the company's USB with your sales spreadsheets on it. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional

a human error; unintentional

You never wipe the dust off your computer. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional

a human error; unintentional

You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional

a human error; unintentional

Suppose you only study two hours for your next test. You fail the test and tell the teacher that he or she obviously did a really terrible job teaching the material. This means you aren't accepting _________ for your actions. accountability answerability liability responsibility

accountability

Procurement processes completed by

accounting, purchasing warehouse

When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the _________ phase of BPI. analysis control define improve measure

analysis

Sabotage and vandalism

are deliberate acts that involve defacing an organization's website, potentially damaging the organization's image and causing its customers to lose faith

Piracy costs businesses _________ of dollars per year. hundreds millions billions trillions

billions

Which of the following is an accurate representation of the data hierarchy from smallest to largest? bit, byte, field, record, file, database bit, byte, field, file, record, database byte, bit, field, record, file, database byte, bit, field, file, record, database

bit, byte, field, record, file, database

byod

bring your own device, employees using own devices for work related things

You live in a small town with only one large retailer. This means there is low ______. buyer power supplier power threat of new entrants threat of substitutes

buyer power

A ________ is a group of eight ________. bit; bytes byte; bits field; files file; fields

byte; bits

A _________ site is the least expensive option. cold hot medium warm

cold

A _________ site provides only rudimentary services and facilities. cold hot medium warm

cold

configured mass customization

companies offer features that allow each shopper to customize his or her product or service with a range of components

In the _________ phase of BPI, the BPI team establishes process metrics and monitors the improved process after the solution has been implemented to ensure the process performance remains stable. analysis control define improve measure

control

A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period. copyright patent trade secret trademark

copyright

Walmart's strategy is _________. cost leader customer oriented differentiation innovation

cost leader

KMS cycle

create knowledge capture knowledge refine knowledge store knowledge manage knowledge disseminate knowledge

In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs. analysis control define improve measure

define

The correct order of the BPI phases is ___________. analyze, control, define, measure, improve analyze, define, control, improve, and measure define, analyze, measure, control, improve define, measure, analyze, improve, and control

define, measure, analyze, improve, and control

BPI 5 Basic Phases

define, measure, analyze, improve, and control (DMAIC).

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. common good deontology fairness rights

deontology

Authorization

determines which actions, rights, or privileges the person has, based on his or her verified identity

If you have to speak into your phone to unlock it, this is an example of something the user _________. does has is knows

does

The threat of new competitors will enter your market is high when entry is _________ and low when there are _________ barriers to entry. easy; few easy; significant hard; few hard; significant

easy; significant

Two fundamental metrics that organizations employ in assessing their processes to evaluate how well they are executing these processes

efficiency and effectiveness

The _________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource. exposure risk threat vulnerability

exposure

The debate over CEO salaries being so much higher than other employees is an issue addressed by the _________ approach. common good deontology fairness rights

fairness

A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks. anti-malware system DMZ ERP firewall

firewall

BPI- Business Process Improvement

focuses on reducing variation in the process outputs by searching for root causes of the variation in the process itself (e.g., a broken machine on an assembly line) or among the process inputs (e.g., a decline in the quality of raw materials purchased from a certain supplier).

The ________ creates links between two tables. alien foreign primary secondary

foreign

Organization's use Porter's competitive forces model to design _________ strategies; they use the value chain model to identify _________ activities to make the greatest impact. general; general general; specific specific; general specific; specific

general; specific

American companies can easily do business with Chinese companies. This is phenomenon is called ________. globalization information overload protection against terrorist attacks technological innovation and obsolescence

globalization

_________ is a market pressure. globalization information overload protection against terrorist attacks technological innovation and obsolescence

globalization

Buyer power is _________ when buyers have many choices from whom to buy and _________ when buyers have few choices. high; high high; low low; high low; low

high; low

The threat from rivalry is _________ when there is intense competition among many firms in an industry and _________ when competition is not as intense. high; high high; low low; high low; low

high; low

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. cold hot medium warm

hot

In the _________ phase of BPI, the BPI team identifies possible solutions for addressing the root causes, maps the resulting "to be" process alternatives, and selects and implements the most appropriate solution. analysis control define improve measure

improve

When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI. analysis control define improve measure

improve

Database systems minimize ________. inconsistency independence integrity security

inconsistency

_________ is an example of effectiveness. Automating order entry Increasing customer satisfaction Reducing production time by one day Using RFID to track products

increasing customer satisfaction

Intellectual property

is the property created by individuals or corporations that is protected under trade secret, patent, and copyright laws.

BPI is typically performed by ___________. clerical workers executives knowledge workers low-level managers

knowledge workers

Typing in your password to access a system is an example of something the user _________. does has is knows

knows

rights approach

maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

If there are _________ alternatives to an organization's products or services, then the threat of substitutes is high; if there are _________ alternatives, then the threat is low. few; few few; many many; few many; many

many; few

Ford's original strategy was _________. configured mass customization consumer segmentation mass customization mass production

mass production

In the _________ phase of BPI, the BPI team identifies relevant process metrics and collects data to understand how the metrics evolve over time. analysis control define improve measure

measure

Information extortion

occurs when an attacker either threatens to steal, or actually steals, information from a company

Espionage or trespass

occurs when an unauthorized individual attempts to gain illegal access to organizational information.

You decide to integrate your supply chain to cut down production time. This is an example of a(n) _________ strategy. cost leader customer oriented differentiation innovation operational effectiveness

operational effectiveness

The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. opt-in opt-out sign-up sign-out

opt-in

the _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. opt-in opt-out sign-up sign-out

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. opt-in opt-out sign-up sign-out

opt-out

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control. access communication physical useful

physical

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. piracy; legal piracy; illegal social engineering; legal social engineering; illegal

piracy; illegal

The ________ key is an identifier field that uniquely identifies a record. alien foreign primary secondary

primary

Intellectual property is NOT protected under _________ laws. copyright patent privacy trade secret

privacy

In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking. private; private private; public public; private public; public

public; private

Fulfillment processes are NOT completed by __________. accounting purchasing sales warehouse

purchasing

A ________ generally describes an entity. byte field file record

record

Procurement processes are NOT completed by _________. accounting purchasing sales warehouse

sales

The ________ key has some identifying information but does not identify the record with complete accuracy. alien foreign primary secondary

secondary

Compliance with government regulations is a _________ pressure. market societal technology nonexistent

societal

Your business manufactures motors. Based on prices and shipping, you only have one business as an option to buy bearings. This means there is high _________. buyer power supplier power threat of new entrants threat of substitutes

supplier power

control phase

team establishes process metrics and monitors improved process after the solution implemented to ensure the process performance remains stable

The BYOD phenomenon is a _________ pressure. market societal technology nonexistent

technology

A(n) _________ to an information resource is any danger to which a system may be exposed. exposure risk threat vulnerability

threat

The music and newspaper industries were hurt primarily by _________. buyer power supplier power threat of new entrants threat of substitutes

threat of substitutes

Auditing _________ the computer means auditors check inputs, outputs, and processing. around into through with

through

A _________ is an intellectual work that is not based on public information. copyright patent trade secret trademark

trade secret

A(n) _________ network is any network within your organization; a(n) _________ network is any network external to your organization. trusted; trusted trusted; untrusted untrusted; trusted untrusted; untrusted

trusted; untrusted

The relational database model is based on the concept of ________-dimensional tables. one two three four

two

If humans are careless with laptops, this is an _________ error which could cause theft of equipment or information (an _________ error) . intentional; intentional intentional; unintentional unintentional; intentional unintentional; unintentional

unintentional; intentional

Minimizing the organization's carbon footprint and otherwise striving for "green IT" is an example of a _________ approach. You Answered common good deontology rights utilitarian

utilitarian

The _________ approach states that an ethical action is the one that provides the most good or does the least harm. common good deontology fairness utilitarian

utilitarian

Big Data three distinct characteristics:

volume, velocity, and variety

An information resource's _________ is the possibility that the system will be harmed by a threat. exposure risk threat vulnerability

vulnerability

Auditing _________ the computer means using a combination of client data, auditor software, and client and auditor hardware. around into through with

with

Big Data

•Exhibit variety; •Include structured, unstructured, and semi-structured data; •Are generated at high velocity with an uncertain pattern; •Do not fit neatly into traditional, structured, relational databases; and •Can be captured, processed, transformed, and analyzed in a reasonable amount of time only by sophisticated information systems.

Big Data generally consists of the following:

•Traditional enterprise data—examples are customer information from customer relationship management systems, transactional enterprise resource planning data, web store transactions, operations data, and general ledger data. •Machine-generated/sensor data—examples are smart meters; manufacturing sensors; sensors integrated into smartphones, automobiles, airplane engines, and industrial machines; equipment logs; and trading systems data. •Social data—examples are customer feedback comments; microblogging sites such as Twitter; and social media sites such as Facebook, YouTube, and LinkedIn. •Images captured by billions of devices located throughout the world, from digital cameras and camera phones to medical scanners and security cameras.


Set pelajaran terkait

Maternity NCLEX PN, HESI: Pediatric Pharm

View Set

Ecce Romani Exercise IVe Vocabulary

View Set

Introduction to Curriculum, Instruction, and Assessment

View Set

Washington State portion (real estate exam)

View Set

AP World History 1750-1900 Vocab

View Set

Chapter 14 PrepU: Management of Anger, Aggression and Violence

View Set