MIS 3063

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is considered the single most important skill for effective collaboration?

-giving and receiving critical feedback proper division of tasks focusing on individual goals modeling the components of a system

Large carriers exchange Internet traffic freely at physical locations called ________.

-internet exchange points (IXP) peering stations digital subscriber lines routers

If a company implements a policy that states if a customer leaves their firm, they will have to pay a $1,500 penalty, the company is implementing which of Porter's competitive advantages?

-lock in customers establishing alliances lock in buyers improving customer service

All of the following are product implementations in Porter's Principles of Competitive Advantage EXCEPT ________.

-lock in customers and buyers create a new product or service enhance products or services differentiate products or services

In the ________ phase, a BigData collection is broken into pieces and hundreds or thousands of independent processors search these pieces for something of interest.

-map break crash reduce

Web applications can be developed by less-skilled, lower-paid employees; they are considerably cheaper to develop than ________ applications.

-native thin-client remote user-code

Relational databases have been the standard way of processing databases for over 30 years because ________.

-of fixed sized tables of gaining faster performance by number of servers used improved storage capabilities of the ability to have multiple primary keys

If your department collects, stores, and physically distributes products to buyers, your department is part of the ________ primary activity.

-outbound logistics customer service operations/manufacturing sales and marketing

Which of the following primary activities describes collecting, storing, and physically distributing products to buyers?

-outbound logistics operations/management sales and marketing customer service

Which of the following components distinguishes information system from information technology?

-people hardware procedure software

Amazon Redshift offers ________.

-petabyte-scale data warehouse NoSQL database service MySQL database a relational database service

Which of the following is a function of the database management system (DBMS)?

-processing a database by inserting or modifying data eliminating bottlenecks in business processes automating workflows in the databases of companies implementing lean systems in workstations

James is a manager for ABC Tech Store, Inc. James asks for a report to view which products are selling faster than others so he can decide to what to order for next quarter. James is using business intelligence (BI) in what matter?

-project management informing deciding problem solving

Joshua, the CEO of Dunk, Inc., wanted to view the sales by region. His assistant gave him a 100-page report. Joshua could not find the information because the report was not ________.

-relevant sufficient timely expensive

The goal of ________, a type of business intelligence analysis, is to create information about past performance.

-reporting analyses push publishing data mining BigData

Jupiter Shop is an online store. Customers have to create an online account to purchase products. The purchased products are delivered free of cost. The address of delivery is stored, so that customers can choose the same address for future purchases. Jupiter Shop features seasonal discounts and exchange offers. It also accumulates redeemable points for regular shoppers. Which of the following statements describes the use of information systems (IS) by Jupiter Shop to lock in customers?

-saving the delivery addresses providing free home delivery collecting feedback online offering seasonal discounts

Which of the following is NOT a major element in the mobile system?

-smart television remote mobile data

According to Porter, to be effective the organization's goals, objectives, culture, and activities must be consistent with the organization's ________.

-strategy information systems structure price of service culture

A group of components that interact to achieve some purpose is referred to as a(n) ________.

-system element entity unit

All of the following are areas of research for artificial intelligence (AI) except ________.

-the Turing Test robotics natural language processing computer vision

Machines lack all of these skills EXCEPT ________.

-the ability to learn creativity the ability to define new problems adaptability

What does the term 10/100/1000 Ethernet in most computer systems indicate?

-the rate at which data can be transmitted the number of devices that can be connected the distance over which the network signal can be transmitted the Internet protocol used by a system

Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)?

A VPC uses encrypted connections between the users and its server, while a VPN does not use such secure connections. A VPC does not facilitate data storage, while a VPN allows the storage of a user's most important data. A VPC can be accessed over the Internet, while a VPN cannot be accessed over the Internet. -A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages.

Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it?

BI analysis data mining -publish results data acquisition

The cloud-based service that provides the hardware and allows customers to load an operating system of their choice is known as ________.

application virtualization platform as a service (PaaS) -infrastructure as a service (IaaS) network functions virtualization (NFV)

Each stage of the value chain not only adds value to the product but also ________.

attracts competitors -accumulates costs devalues the final product improves supplier relationships

Data needs to be just barely ________.

available expensive -sufficient timely

A(n) ________ is a program that is used to create, process, and administer a collection of self-describing integrated records.

decision support system (DSS) -database management system (DBMS) knowledge management system (KMS) enterprise planning system (EPS)

According to Porter, the processes and systems in an organization pursuing differentiation strategy must ________ to avoid negative margins.

develop and adopt new technologies increase procurement provide products at lowest costs to customers -create sufficient value to cover their costs

All of the following are factors in the cost of acquiring data EXCEPT ________.

developing an information system -the time of day the data is produced the costs of maintaining a system the salary of the person reading the data

Which of the following factors has contributed to an increase in the popularity of cloud hosting?

development of Web services that can be accessed without meeting the service-oriented architecture specifications -development of virtualization technology that allows near-instantaneous creation of new virtual machines increase in the cost of processors, data communication, and data storage demand for services that can run without the support of the Internet

Which of the following is a process implementation principle of competitive advantage?

differentiating a service enhancing existing services -establishing alliances with other organizations creating a new product

A(n) ________ is a set of rules that programs on two communicating devices follow.

domain attribute markup language -protocol

A ________ is a networking device that detects the speed that a given device on a local area network (LAN) can handle and communicates with it at that speed.

domain hub bus -switch

All of the following are examples of SaaS EXCEPT ________.

-Outlook on the PC Office 365 Salesforce.com Google Mail

________ requires users to request business intelligence results.

-Pull publishing Data mining Push publishing Data acquisition

Which of the following is an international standard language for querying databases?

-SQL C++ Visual Basic Python

What is the smallest unit of bitcoin?

-Satoshi Bit Yen Fiat

Which of the answers below is an example of dirty data?

-526 for a customer's age Jane for a first name 0 for the number of pets 2 for the number of adults in the household

In the future, service providers may provide ________ to help companies evaluate the mountains of big data the companies they are collecting.

-Analytics as a Service (AaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS)

Which task is an example of abstract reasoning?

-Construct a model. Model systems components. Provide critical feedback. Test new alternatives.

The conversion from analog to digital equipment is known as the ________.

-Digital Revolution Digital Age Information Age Bells Law

________ are business intelligence documents that are updated at the time they are requested.

-Dynamic reports Subscriptions Static reports Third-party cookies

The IEEE 802.3 protocol standard is also known as the ________.

-Ethernet TCP/IP protocol Internet intranet

________ are reports produced when something out of predefined bounds occurs.

-Exception reports Dynamic reports Static reports Subscription reports

________ includes general management, finance, accounting, legal, and government affairs.

-Firm infrastructure Research and development Operations management Human resources

Because of Moore's law what can Watson do forever?

-Get processor upgrades on demand that are twice as fast every eighteen months. Be connected to other AI machines indefinitely. Be able to add new processes on demand. Get memory updates every year.

What is an example of a rivalry weak force in Porter's model?

-Google or Bing (expensive to develop and market a search engine) a corner latte stand professional football team used car dealers

Which of the following best describes a byte in a database?

-It is a character of data. It is a group of columns. It is a collection of data. It is a group of rows.

Which of the following is TRUE of a value chain?

-It is a network of value-creating activities It consists of only primary activities It is specific to manufacturing industries It nullifies the importance of support activities.

Which of the following statements is TRUE of Moore's Law?

-It made the cost of data processing, communications, and storage essentially zero. It is based on the technological advancements in weapon manufacturing. It states that the total number of transistors produced in the world doubles every 18 months. It has made the use of transistors obsolete.

Which of the following statements is TRUE of an Internet service provider (ISP)?

-It provides a legitimate Internet address and serves as a user's gateway to the Internet. It allows a user to communicate directly through the Internet without requiring a wireless medium of communication. It separates the phone signals from computer signals on a digital subscriber line (DSL) at a user's location. It facilitates a one-way information transfer process between a user's computer and the Internet.

Which of the following laws speaks about the storage density on magnetic disks?

-Kryder's Law Nielsen's Law Metcalfe's Law Moore's Law

When leasing EC2, Amazon preinstalls either ________ or Windows Server on the cloud hardware.

-Linux iOS Salesforce.com Office 365

Which of the following is an open source document-oriented NoSQL DBMS product?

-MongoDB SQL Server Access DB2

Sam is going to use a program that predicts the possibility of a certain outcome based on prior occurrences of related events to predict if a car is most likely to run a red light. He decides to use ________.

-Naïve Bayes Classifier a random number generator machine learning Nielson's Law

Which of the following is an impact of rapid technological change on job security?

-Nonroutine cognitive skills have gained more market value. Routine skills have more demand. Routine skills are no longer required to complete a task. Nonroutine jobs are outsourced, thus reducing the need of an in-house workforce.

Which of the following is true of peering as it relates to internet traffic?

-Some people use more bandwidth than others. Internet service provider request to much user data. The use of file transfer protocol for larger files. A carrier can choose not to participate in peering.

SQL stands for ________.

-Structured Query Language Simplified Query Language Secondary Query Language Standard Query Language

Which of the following statements is TRUE of an IP address?

-The IP address that a domain name points to can be changed. An IP address can be associated with just one domain name. An IP address commonly has either a three-decimal or five-decimal dotted notation. The use of an IP address is limited to the public Internet.

In the Digital Revolution, what new capability could devices accomplish?

-The ability to share data among themselves. The ability to be used in school. The ability to choose to send analog signals. The ability to ask for help.

Which of the following statements best defines the cloud?

-The cloud is the elastic leasing of pooled computer resources over the Internet. The cloud is the elastic leasing of in-house computer hardware. The cloud is a peer-to-peer network used to share data between users. The cloud is the network of servers hosted in-house by an organization for its own requirements.

Which of the following information examples is useless as it relates to timely data?

-The monthly January report arriving in July. A report revealing spelling errors in an ad before the ad is printed. A customer's bad credit report checked before an item is shipped out. The ability to view how often a customer clicked on a Web ad.

Which of the following statements is TRUE of cable lines?

-The signals from cable lines do not interfere with TV signals. Cable lines use the same protocols used by data transmission lines. Cable lines provide high-speed data transmission using telephone cables. Performance of cable lines is stable irrespective of the number of users sending and receiving data.

Which of the following is TRUE of push data?

-The user needs to do nothing to receive it. It is uploaded by the user onto a server. It is data that a device requests from a server. It is less impressive to users than pull data.

Which of the following statements is TRUE of Web servers?

-They send and receive Web pages to and from clients. They are part of the user tier in the three-tier architecture. They are used only to send and receive Webmail. They typically perform the functions of tracking and managing the products in a database.

Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________.

-ability to experiment routine skills ability to outsource work collaboration skills

Which of the following activities is a support activity?

-acquiring parts hiring employees customer service shipping of products

All of these are DBMS processes EXCEPT ________.

-addressing phishing attacks processing the database assisting in the administration of the database creating tables and other database structures

Georgia is attempting to solve a mathematical problem. She chooses the correct procedure or ________ that best fits the situation.

-algorithms method system classifier

What must facilitate the organization's competitive strategy?

-all information systems hardware for the company the organization's goals a few information systems

Which of the following elements of a database application provides security, data consistency, and special-purpose processing?

-application programs query applications forms reports

Web mobile applications ________.

-are limited by the capabilities of the browser are developed by professional programmers only run only on the operating system for which they are programmed are usually developed using Objective-C, Java, or VB.Net

Browser-based database applications differ from traditional applications in that they ________.

-are usually open to the public are used only by corporates have no security requirements fail to support graphical queries

Virtual reality uses ________ to create a completely immersive experience for the user.

-augmented reality a strong sense of presence mixed reality glasses

Which Porter's force is the strongest for the eHermes opening case?

-bargaining power of customers rivalry power of suppliers -threat of substitutions

Which of the following is a major element of mobile systems?

-cloud-based resources users in specific location wired connectivity stationary devices

In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test?

-collaboration systems thinking facilitation cognitive acceleration

Thin clients are sometimes called ________.

-computer terminals client-servers the cloud scalable computers

All of the following are strong nonroutine cognitive skills EXCEPT ________.

-concrete reasoning the ability to experiment systems thinking collaboration

Organizations can dynamically reuse servers that use Web services internally by ________.

-creating a private cloud making the servers elastic replicating the servers allocating different servers for different services

A ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of a business.

-data mart datasheet dataspace data room

For any new system, you will always have these obstacles EXCEPT ________.

-developing a social media page managing employees as they use the new system overcoming employee's resistance to change training tasks

Which statement is an example of the threat of substitutions force?

-frequent traveler's choice of auto rental used car dealers new car dealers Toyota's purchase of auto paint

What is Google's Project Loon?

A nickname for the Information Age. A way to deliver Microsoft Office to the major companies. -An effort to bring the Internet access to everyone on the planet. A law to describe the why processing power is so expensive.

Which protocol standard instructs hardware which wire carries which signal?

A switch -Ethernet IEEE 803.3 Bluetooth

________ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the available resources.

Abstraction -Experimentation Collaboration Systems thinking

What is the first step in modifying an existing table in a database management system (DBMS)?

Add a new row or column. Set a default value for the new row or column. Create a trouble ticket. -Open the metadata form for that table.

________ refers to the level of detail represented by data.

Aggregation -Granularity Abstraction Dimensionality

Which statement listed below is NOT a reason why business professionals should learn database technology?

Because databases are ubiquitous. -Because everyone has an information technology (IT) department. The business professional may find a the department in a material mess. A business professional should know if the database technology fits the project goals.

________ is an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce.

BigData Apache Wave Linux -Hadoop

Which of the following is a nonrelational data store developed by Amazon.com?

Bigtable -Dynamo MongoDB Cassandra

Which of the following is an example of a cryptocurrency?

Bonds -Bitcoin PayPal Euro

Which programming language is associated with Mac OS and iOS application development?

C++ C# -Swift VB.Net

Logan, a professional programmer and developer, develops a Web mobile application. The application allows users to book cabs for rides within the city. Which of the following languages is Logan most likely to have used to develop this app?

C++ Objective-C VB.Net -html5

Data should be relevant both to the ________ and ________.

CEO; manager time; cost department; division -context; subject

________ is the ability to make and manipulate models.

Cognitive acceleration Holacracy -Abstract reasoning Adaptive learning

What is the query language used in Hadoop?

Cow SQL -Pig NoSQL

Penelope's office uses a wired local area network (LAN) to connect its computers and printers over two floors. Which of the following protocols should it use for its LAN?

DSL -IEEE 802.3 WiMAX EVDO

Which of the following is not a benefit of using cryptocurrencies?

Cryptocurrencies have little to no fees. Traditional payments are faster than cryptocurrency payments. Consumers holding cryptocurrencies are protected from inflation. -Cryptocurrency is easier to use than traditional payments methods.

Which of the following is TRUE of supporting activities?

Customer service is considered as a supporting activity. -Negotiation of prices is considered as a supporting activity. Their contributions to margin can be calculated easily. Their contribution toward a product's value is negligible.

Which of the following protocols is commonly used for wireless local area networks (LANs)?

DSL IEEE 802.3 -IEEE 802.11 Distributed Data Interface

Which of the following is a database management system (DBMS) product from Microsoft?

DB2 Sybase ASE MySQL -SQL Server

Which of the following statements is TRUE of a data warehouse?

Data analysts who work with a data warehouse are experts in a particular business function. Users in a data warehouse obtain data pertaining to a business function from a data mart. A data warehouse functions like a retail store in a supply chain. -A data warehouse is larger than a data mart.

Which of the following best describes the metadata in a database?

Data that is stored in a Web site special data that is unique to a specific user -special data that describes the structure of a database programs used to process, and administer a database

________ languages can be used to create difficult, complex applications, and, if used properly, will result in high-performance code that is easy to alter when requirements change.

Data-oriented -Object-oriented Assembly Hardware description

________ occurs when users move their activities, especially long-running transactions, across devices.

Direct interaction Interfacing Cloud computing -Roaming

A(n) ________ connects computers at different geographical locations.

Econet Ethernet local area network -wide area network

________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence, and machine-learning.

Exception reporting -Data mining Pull publishing Push publishing

________ refers to the products, methods, inventions, and standards that are used to produce information.

Information processing Product specification -Information technology Simulation

________ is defined as recorded facts or figures.

Information system Procedure Information -Data

Samantha is browsing through some geological sites to collect information for a class project. She saves the address of the site she finds most helpful for future reference. The address Samantha saved is also the site's ________.

File Transfer Protocol -uniform resource locator Internet service provider digital subscriber line

________, a subset of AI, is the extraction of knowledge data based on algorithms created from training data.

Gyroscopes -Machine learning Algorithms Naïve Bayes Classifier

What is an example something that can occur in a database concerning multiuser processing?

If multiple people attempt to use the database, it will shut down. -Two people could purchase the same item at the same time. The security can be compromised because multiple people are using the database. It could be difficult to keep up with inventory.

Some mobile applications provide ________ chrome, which pops up in the display when appropriate.

data-sensitive -context-sensitive time-oriented object-oriented

Which choice is not considered a definition of "information"?

Information is a difference that makes a difference. -Information is recorded facts or figures. Information is derived from data. Information is data presented in a meaningful context.

Which of the following is the second tier in the three-tier architecture arrangement?

database tier presentation tier user tier -server tier

Which of the following is an advantage of a private cloud in an organization?

It allows the organization to repurpose its idle servers for use to other organizations. -It allows the organization to manage its servers with elastic load balancing. It eliminates the need to use an additional secure network to access this cloud from outside the organization. It reduces the complexity involved in using other publicly available cloud services.

Which of the following is a drawback of the relational database processing model?

It did not enable document piece-making via normalization. It required powerful processors to function. -It was never a natural fit with business documents. It utilized an extensive amount of storage space.

Which of the following is an advantage of a virtual private network (VPN)?

It does not depend on the Internet to function effectively. It facilitates easy access to an organization's data without requiring security access. -It helps to securely access information over the public Internet. It can be used to physically connect a client and the server.

Which of the following is an advantage of in-house hosting?

It has the ability to adapt to growing or fluctuating demands. -It gives greater control over the location of data. It eliminates the risk of obsolescence. It requires very small capital.

Which of the following is an advantage of a content delivery network?

It increases the load time of Web pages for the users. -It provides protection from denial-of-service (DOS) attacks. It increases the reliability by storing the data on a single, large server. It increases the load on the original server.

Which of the following is a characteristic of a mobile device?

It is a high power-consuming computing device. It is not capable of wireless connectivity. It restricts data entry. -It is a small and lightweight device.

What is a virtual private network?

It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser. -It is a connection that uses the Internet to create secure point-to-point connections. It is the most common language for defining the structure and layout of Web pages. It is a markup language that fixes several HyperText Markup Language (HTML) deficiencies and is commonly used for program-to-program interaction over the Web.

Which of the following statements is TRUE of cloud-based hosting?

It makes scaling up to meet the demands of increased traffic difficult. It gives greater control over physical location of data. -It gives little visibility over the security being used to protect data. It involves the risk of investing in technology that may soon become obsolete.

A cylindrical symbol labeled "database" represents ________ because databases are stored on disks.

dataflow a drum of data -a computer disk drive dataspace

What is one indication that a presented graph is information?

Line graphs always represent information. Graphs are never information. -Because the graph is in the mind of a human, it is information. If it depicts numbers, the printed graph it is information.

Users in a data mart obtain data that pertain to a particular business function from a ________.

datasheet -data warehouse data room data center

A company has offices in Los Angeles, Dallas, and New York. In order to share resources, what type of network would have to be set up?

MAN PAN -WAN LAN

The number of transistors per square inch on an integrated chip doubles every 18 months. This observation is known as ________ Law.

Metcalfe's Murphy's Amdahl's -Moore's

Which of the following will likely be an advantage of self-driving cars?

More insurance policies will be taken. Fewer cars will be shared by family members. More auto loans will be taken. -Fewer accidents will occur.

________ states that the value of a network is equal to the square of the number of users connected to it.

Nielsen's Law Kryder's Law Moore's Law -Metcalfe's Law

________ databases process databases in main memory.

NoSQL -In-memory NewSQL Relational

Which of the following is TRUE about the impact of mobile systems on data usage in information systems?

Organizations' data is securely stored. Quantity of data available has been reduced. More advertisements can be shown. -Less device real estate.

The ________ refers to the idea in which objects are becoming connected to the Internet so that they can interact with other devices, applications, or services.

Premium Internet Symbian Server Farm -Internet of Things

Which of the following statements is TRUE of private clouds?

Private clouds provide access from outside an organization that it created without requiring a person to connect to a virtual private network. Several organizations pool their resources to form a private cloud. Private clouds are easy to build and operate. -Idle servers in a private cloud cannot be repurposed for use by other organizations.

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Publish results -Data acquisition Data manipulation BI analysis

________ data is data that the device requests from the server.

Push -Pull Linear Nonlinear

Which of the following statements is TRUE of business intelligence (BI) publishing alternatives?

Push options for Web servers are manual. The skills required to create a publishing application for static content is high. -It is more difficult to publish dynamic BI than to publish static content. The skills required to publish static content are extremely high.

What is the first step when sending data through the Internet?

Put address on package. Put name on package. Look up address. -Assemble the package.

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.

metadata table -database application dimension table database hierarchy

Which of the following statements is TRUE of service-oriented architecture (SOA)?

SOA services are used only between the Web server and the users. -JavaScript is written to invoke services defined by a server application. The number of database servers and Web servers should be in a fixed ratio. Work is assigned to Web servers based on their geographical proximity to a user.

Which of the following refers to data in the form of rows and columns?

micro data -structured data coarse data granulated data

The source, format, assumptions and constraints, and other facts concerning certain data are called ________.

microdata network packets -metadata data structures

________ is a language used for transmitting documents in Web services and the cloud.

Structured Query Language HyperText Markup Language -eXtensible Markup Language Web Services Description Language

________ is an example of metadata.

Student Number: 125962 Name: Josh White -Message: Long Text Date: 01/01/2020

Which of the following statements is TRUE of Hadoop?

Technical skills are not required to run and use Hadoop. Hadoop is written in C++ and runs on Linux. Hadoop includes a query language called Big. -Hadoop is an open source program that implements MapReduce.

________ is the decentralized public ledgering system used to record cryptocurrency transactions.

The Federal Reserve method Satoshi First-In/Last-Out (FILO) -Blockchain

Which of the following is NOT a characteristic of native applications?

The cost is high. -It is browser dependent. It is developed by professional programmers only. High skill level is necessary to create applications.

Which of the following statements is TRUE of business intelligence (BI) systems?

The software component of a business intelligence system is called an intelligence database. Business intelligence systems are primarily used for developing software systems and data mining applications. -Business intelligence systems can be used for informing. The four standard components of business intelligence systems are software, procedures, applications, and programs.

Which of the following statements is TRUE of digital subscriber lines (DSLs)?

Their operations are independent of voice telephone lines. They use television lines for data transmission. They do not allow data transmission to occur when telephone conversations occur. -Their signals do not interfere with voice telephone services.

Which of the follow statements is TRUE about mobile devices and procedures?

There is an increased usage of mobile data. It is impossible to be out of the office. The reduced size of mobile devices means smaller screen spaces. -Professionals are drowning in data.

Which of the following will likely be a disadvantage of self-driving cars?

There will be more accidents. -More people will use cars and avoid planes or trains. More parking lots will have to be built. There will be more stress during commute.

Which of the following statements about native applications is TRUE?

They are developed by amateur programmers and business professionals. -They only run on the operating system for which they are programmed. They are dependent on platforms provided by browsers. They use HTML5, CSS3, and JavaScript as development languages.

Which of the following statements is TRUE of nonroutine cognitive skills?

They are usually outsourced by organizations to the lowest bidder. They do not experience the impact of technological changes. They have become less marketable. -They increase an individual's job security.

In the context of industry changes, which of the following statements is TRUE of mobile systems?

They consist of data that remove the premium for the ability to access, query, and present the data. They consist of data that create a premium on the ability to memorize vast quantities of product data. The scope of advertising is high. -The usage of mobile systems results in organizations being effective with part-time employees and independent contractors.

Which of the following is TRUE of new entrants?

They have strong customer loyalty. They can lock in suppliers to gain a competitive advantage. -They can capture the market with new and innovative services. They will have records on customers' purchase habits.

________ refers to software products that support very high transaction rates, processing relatively simple data structures, replicated on many servers in the cloud.

Traditional DBMS MySQL DBMS -NoSQL DBMS Relational DBMS

Which of the following statements is TRUE of business processes?

Value chain activities differ based on the business processes being used. -The processes implementing a value chain must create sufficient value to cover their costs. If a value chain's margin is negative, the value should be decreased. If a value chain's margin is negative, the costs of the value chain should be increased.

________ is the ability of a machine to simulate human abilities such as vision, communication and learning in order to achieve a goal.

Virtual reality -Artificial intelligence Machine learning Automation

________ process operational, social, and other data to identify patterns, relationships, and trends for by business professionals and other knowledge workers.

Virtualization techniques Live migration techniques -Business intelligence systems Windowing systems

________ systems are information systems that support users in motion.

Web-based Remote Data -Mobile

Which of the following statements is TRUE of local area network (LAN) protocols?

Wired LANs use the IEEE 802.11 protocol. -IEEE LAN protocols always start with the numbers 802. The IEEE 802.3ac is the current standard for wireless LANs. The IEEE 802.11 protocol is also called the Ethernet.

The A in ACIS means Atomic and means ________.

a transaction never goes away all of the transactions are processed the same way processed alone -either all of none of the transactions in the database are processed

In a job interview, Roy is asked to use a product that he has never used before and is unfamiliar with its functioning. Which of the following skills is the interviewer trying to test?

abstract reasoning -ability to experiment systems thinking collaboration skills

A business that selects a differentiation strategy ________.

always tries to price its products' higher than its competitors' products -adds cost to an activity, provided it has a positive margin provides essential functions at lowest costs imitates rival companies' strategy and products

All of the following are part of Porter's five forces model of Industry Structure EXCEPT ________.

bargaining power of customers threat of new entrants threat of substitutions -agreement

Why did Amanda lose her job at eHermes?

because the company moved to another city because she did not agree with Joni -because she did not experiment with any ideas because of a downturned economy

A company decides to run advertising during the NCAA Final Four tournament. They are not sure how traffic their website will get so they decide to lease what they think they need and can easily add more if necessary. This is called ________.

client-server architecture mainframe usage -resource elasticity pooled resources

According to Porter, to be effective, an organization's goals, objectives, culture, and activities must be consistent with the organization's ________.

competitors workforce -strategy functions

The bargaining power of a customer is weak if ________.

competitors offer products with same benefits at lower prices new entrants are offering a product that uses more recent technology the cost of switching to a substitute is low -the availability of a substitute is limited

The future belongs to business people who can ________.

complete routine tasks use whatever their Manager tells them to use effectively -creatively envision new applications of information systems and technology buy the most expensive data

Artificial Intelligence can be used to increase ________ or the process of making systems operation without human intervention.

completed tasks -automation understanding machine learning

What does an organization in and of itself do?

create products build information systems -nothing create services

All of the following are elements of a database application EXCEPT ________.

query applications -data reports application programs

Which of the following is considered an administrative function of the database management system (DBMS)?

creating tables, relationships, and other structures in databases using international standard languages for processing database applications testing program codes in the system for errors -adding structures to improve the performance of database applications

Conducting training to ensure that users and operations personnel know and understand recovery procedures is a task associated with the DBMS ________.

creation -administration modification processing

A ________ is designed to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools.

data center -data warehouse data room data mart

Since 1990, the most significant determinant of employment and salary is ________.

education -the nature of work performed ethical behavior industry

Benefits of using the cloud include all of the following EXCEPT ________.

elastic pooled computer resources used over the internet -use of dumb terminals

ABC Incorporated has decided to allow employees to use their mobile devices at work. They have decided to treat the devices as if they are owned by the organization and install a(n) ________ to help them install and update software.

email client mobile security monitor secure web browser -mobile device management software system

In a database, bytes are grouped into ________ or fields.

encrypting emails -administering the database encapsulating data objects testing program codes

In a database, a column or group of columns that identifies a unique row in a table is known as a ________.

field -key file record

In a database, rows are also called ________.

fields -records tables files

Lists that involve data with multiple themes require a ________.

file -database field spreadsheet

If your company's competitive strategy was focus and differentiation, then the company would be known for ________.

lowest cost across the industry better product/service across the industry -better products/service within an industry segment lowest cost within an industry segment

A firm introduces a new range of laptops that concentrate on delivering good graphics performance. Which of the following competitive strategies has the firm adopted if these laptops have relatively low prices?

focused differentiation -focused low cost industry-wide differentiation industry-wide low cost

Which of the following elements of a database application presents data in a structured manner using sorting, grouping, filtering, and other operations?

forms queries -reports application programs

All of these costs are true of human employees EXCEPT ________.

fraud unionization -not going on strike discrimination lawsuits

All of the following are TCP/IP Protocols EXCEPT ________.

ftp -xml smtp https

One of the reasons for the appearance of new styles of nonrelational database processing is the need for ________.

gaining faster performance by limiting the number of servers used -storing data types such as images, audio, and videos in organizations breaking up sales orders via normalization limiting the use of open-source document-oriented DBMS

The competitive strategy followed by an organization is derived from the ________ of its industry.

goals profits -structure function

A(n) ________ is an information system (IS) that provides computer-based activity at a distance.

indexing service system -remote action system transport driver interface content delivery network

The competitive strategy of an organization determines its ________ which, in turn, determine business processes.

industry rivals global functions -value chains strategic alliances

Strictly speaking, using Web services internally is not using the cloud because ________.

internal web services use infrastructure as a service internal web services only using Microsoft Windows Azure internal web services do not provide elasticity -internal web services use pooled resources

A personal area network ________.

is a wireless connection that connects devices belonging to two different people has a minimum range of five miles -connects devices that are located around a single person is defined as a network of networks

Whatever career you choose you must ________ systems development.

know how much it costs to create a avoid know how to create -take an active role in

Which of the following problems is particularly common for data that have been gathered over time?

lack of integration missing values wrong granularity -lack of consistency

Which of the following is considered a mobile device?

large lap-top Xbox -tablet smart television

An organization responds to the structure of its industry by choosing a ________ strategy.

leadership -competitive growth diversification

The difference between the value that an activity generates and the cost of the activity is called the ________.

liability equity -margin overhead

Which of the following is a disadvantage of employees using their mobile systems at work?

limited productivity greater need for training lower employee satisfaction -greater support costs

Which of the following is a product implementation principle of competitive advantage?

lock in customers and buyers establish alliances with other organizations -enhance existing products or services raise barriers to market entry

UTN Technologies, a software company, allows its employees to use their mobile systems at work. The management noticed a significant increase in employee satisfaction after the policy was instated. Which of the following will be an added advantage to UTN as a result of the policy?

lower compatibility problems -cost savings no risk of infection no real danger of lost or damaged data

If a company chooses a focused-differentiation competitive strategy in the Porter's model, what is the main basis of their competitive strategy?

lowest cost across the industry -better product/service within an industry segment better product/service across the industry lowest cost within an industry segment

Databases that carry their data in the form of tables and represent relationships using foreign keys are called ________ databases.

network hierarchical object -relational

Jason is looking at his budgets and decides he needs to lower labor costs. Which task is most likely to become automated with AI?

new employee trainer computer programmer -assembly line worker middle manager

Which of the following is a disadvantage of mobile systems at work?

no real danger of lost or damaged data cost savings -loss of control reduced need for training

What is a primary metric for social media companies?

number of subscribers number of active posts (NAP) advertising revenue -monthly active users (MAU)

Access and SQL Server are popular ________ DBMS products.

open source IBM Oracle Corporation -Microsoft

Which of the following primary value chain activities induce buyers to purchase a product and provide a means for them to do so?

operations/management outbound logistics inbound logistics -sales and marketing

The results generated in the map phase are combined in the ________ phase.

pig -reduce control construct

Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service.

price margin profit -value

If the price of an alternative is lower than the price of an existing product, and customers perceive similar benefits from both the products, then the ________.

price of the product should be increased to retain market share switching cost is high -threat from the substitute is strong customers' bargaining power decreases

Monitoring the performance of a database after providing solutions for improving its performance is an activity of the DBMS pertaining to ________.

processing modification creation -administration

Which of the following is least likely to be an outcome of organizations forming alliances with each other?

promotion of product awareness establishment of standards -increment of purchasing costs development of market size

All of the following are ancillary functions you may have as a manager concerning the use of information systems EXCEPT ________.

protecting the security of the system complete tasks to help recover the system should it fail -developing the code for the new system protecting the data of the system

Using a VPC, an organization can store its ________.

public documents most sensitive data -all documents private documents

Everyday at 4:30 pm. Julie has a report delivered to her email about the sales for the day. This type of report is a ________.

pull report sales report -subscription application report

Which of the following is NOT a mobile systems cloud use?

push news text Web sites -scaling

Which of the following is a fundamental category of business intelligence (BI) analysis?

push publishing data acquisition -reporting pull publishing

Problematic data are termed ________.

random data vague data -dirty data macro data

All of the following are true of experimentation EXCEPT ________.

reasonable analyze every opportunity -whenever an idea pops in your head throw lots of money at it to see if it works evaluate all of the possibilities create promising new alternatives

Which of the following statements describes a customer service activity?

receiving and storing materials transforming customers' inputs into the final product inducing buyers to purchase the product -assisting customers with the use of the product

In a database, a table is formally referred to as a ________.

record field matrix -relation

Which of the following strategies is also called establishing high switching costs?

reducing output locking in suppliers increasing production -locking in customers

Which of the following elements of a database application helps in the insertion of new data and the deletion of existing data?

reports queries -forms application programs

The five-component framework of an information system consists of computer hardware, software, data, people, and ________.

results documents -procedures objectives

Megan has downloaded a new gaming application on her smartphone. When she starts using it, she realizes that command icons and a navigation bar, intended for better user interface, block more than half the screen on her phone. Megan is disappointed with the app and immediately deletes it. With reference to this scenario, which of the following features does the gaming application need to improve?

roaming support refresh rate indirect interaction -chrome

Without ________ machines won't last long.

routine -the ability to quickly solve problems instincts processing power

In a database, bytes are grouped into ________ or fields.

rows tables -columns records

All of these costs are examples of employee fraud EXCEPT ________.

skimming cash larceny -nepotism payroll

In Porter's five forces model, the threat of new entrants concerns the danger of ________.

suppliers favoring rival companies investors refusing to back new projects -customers taking their business elsewhere employees not working toward organizational goals

Which of the following describes suppliers in a position of strong bargaining power?

temporary part-time gym instructor at a well-known gym domestic suppliers of corn in the event of removal of import duties on corn -coffee planters during a season of frost that decreases production providers of logistic support when fuel prices have been reduced

The purpose of a database is to ________.

test and troubleshoot newly installed software -store lists of data involving multiple themes describe and build computer architectures design the source code for computer programs

All of the following are reasons why organizations can be as effective with part-time employees and independent contractors EXCEPT ________.

the ability to be always connected increased usage of mobile data -mobile devices have smaller screens increasing regulatory complexity

Until about the late 1980s, organizations primarily used ________ for their internal data processing needs?

the cloud scalable computers client-servers -mainframes

The mismatch between the high level of tech skills demanded by employers and the low level of tech skills held by employees is known as ________.

the digital divide non-tech savvy abstract skills -the technology skills gap

The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon?

the tragedy of the commons the zero-sum game -the curse of dimensionality the free rider problem

In a ________ application, the browser provides a relatively consistent platform for the application.

thick-client -Web virtual native

All of these are characteristics of good data EXCEPT ________.

timely relevant -free accurate

What is the goal of strong AI?

to complete a single specific task well the capability of having more advanced intelligence than humans to assist human beings -to complete all of the same tasks as humans

A ________ is a worldwide-unique identity that is affiliated with a public IP address.

uniform resource locator -domain name tag name protocol

Jobs requiring ________ physical and mental tasks are prime candidates for automation.

unstructured strong hard -routine

Regression analysis is used in ________.

unsupervised data mining bug reporting progress reporting -supervised data mining

Cloud vendors benefit from ________ because the average cost of production decreases as the size of the operation increases.

using their own computers using Apple's web farm -economies of scale the Internet

A ________ application is a thick-client application that is designed to work with a particular operating system, and sometimes only with a particular mobile device that runs that operating system.

virtual remote browser-based -native

More data does NOT necessarily mean more ________.

working business professionals Google searches mobile devices -information


Set pelajaran terkait

Chapter 2: International Law and the World's Legal Systems

View Set

2.1 HW - Frequency Distributions and Their Graphs

View Set

SBM Chapters 11, 13, 14 ,15, 17 || Exam Review

View Set

English 1 900A Lesson 1 - Parts of Speech and Noun Types

View Set

Applied Kinesiology -- Lower leg, Ankle, and Foot

View Set

Accident & Sickness Policy Provisions, Clauses and Riders

View Set