MIS-Final-All Chapters

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Organizations continue to operate their businesses using integrated information systems that lead to missed opportunities, increased costs, and lost sales.

FALSE

RAM stands for random access memory; a form of memory that holds its contents even if the current is turned off or disrupted

FALSE

all of these answers

Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms?​

star

A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.

APIs today

Applications are depending on entire stack of APIs, employing 10s or 100s of API resources to deliver applications across multiple web and mobile channels.

Systems development projects should always be outsourced in order to allow an organization to focus on what it does best.

FALSE

The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession. -

FALSE

Those convicted of cyberterrorism are subject to a prison term of 6 months to 1 year.

FALSE

a business rule

Best Value Hardware Stores, a national chain, has established strict policies about the conditions under which a customer can return merchandise. These policies are an example of: __________.

In business and in life, where do most decisions fit into?

Between structured and unstructured

The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files.

False

Which of the following terms represent an organized and structured collection of information?

Database

Which application is considered the "heart and soul" of any organization?

Databases

What type of information system is built to support decisions based on problems that are not structured?

Decision support systems

Which term describes the banding together of businesses to purchase materials and services with the goal of lowering purchase prices through discounts?

Demand aggregation

The SDLC contains seven phases. Which phase builds a technical blueprint of how the proposed system will work?

Design

A(n) _____ system, also known as a knowledge-based system, is an excellent tool for diagnosing problems and providing answers to these problems.

Expert

Which of the following is an artificial intelligence system that applies reasoning capabilities to reach a conclusion?

Expert system

A. objective

Explicit knowledge has which of the following characteristics? A. objective B. personal C. slow D. costly to transfer E. ambiguous

false

Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.

"Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems.

FALSE

A collection of data fields that are all related to one object, activity, or individual is called a file.

FALSE

There is no way a manufacturing firm would implement an Internet of Things because the risk of hacking is far too high.

False

Waterfall and agile are the two types of software development processes available to organizations.

False

An employee may be authorized to use a P-card to purchase specific business items. If the analysis of P-card data shows that a purchase was made from a consumer products store, then....?

this could be an indication of an actual fraud.

The haptic interface relays the sense of _____ in the virtual world.

touch

The information about invoices to customers is tracked by ____ system.

transaction processing system

Domain names must always have at least _____ parts, with each part separated by a dot (period).

two

RESTful API: the "data store" is...?

typically a database, or database server, or some other type of server.

A small and medium-sized enterprise (SME) is a legally independent enterprise with _____ employees.

up to 500 (352)

Description of database controls: These controls include the use of...?

user authentication controls and passwords -without which a user is denied access to certain data and information.

A core _____ is the widely accepted principle that guides how employees behave and make decisions in the organization.

value

You cannot boot a computer from ____________.

wireless network (ch 4)

Backlog grooming: Product Owner gets an idea by...?

working with customers and adds one item into Product Backlog

_____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads.

z/OS (p152)

apply selected modeling techniques

​During modeling of the CRISP-DM method, we would ______.

reduce IS costs

​If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to _______.

100,000 to 200,000

​What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report?

mission and vision

​What topics are considered so important that they are placed on top of the strategic planning pyramid?

business leadership skills

​Which of the following is NOT a characteristic of a data scientist?

automated customer service

​Which of the following is NOT a commonly used BI tool?

format

​Which of the following is NOT a component of a KPI (key performance indicator)?

red hat

​Which of the following is NOT a popular vendor of firewall software?

​A teller in a bank uses a POS to withdraw money for a customer.

​Which of the following is NOT an example of a common use of a point-of-sale (POS) device?

transaction processing

​Which of the following is NOT considered business intelligence practice?​

whether only a limited number of people have access to critical data or not

​Which of the following shortcoming may be revealed during an IT security audit?

Which of the following types of credit cards is currently diminishing in popularity and being replaced by the other three types?

​magnetic stripe

Which of the following is NOT one of the four main components in Leavitt's Diamond?

​systems

What term is used to describe the distribution of information regardless of title or department?

Information sharing

What is Infrastructure as a Service (IaaS)?

Infrastructure as a Service (IaaS) is an instant computing infrastructure, provisioned and managed over the internet. Such as: Computers (virtual or on dedicated hardware), networking, and data storage space hardware.

________________________________ allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365), Salesforce.com, ERP.

Software as a Service

black hat hacker

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.

Creating an API: What are resources?

Something that can be stored on a computer and represented as a stream of bits. Ex: -A document (e.g. Purchase Order) -Row in DB (e.g. 'User Profile') -Output of executing an algorithm --like a mortgage payment calculation.

true

Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.

Dashboards: Many use software like ___________.

Tableau

The SDLC contains seven phases. Which phase verifies that the system works and meets all the business requirements developed in an earlier phase?

Testing

In Kenya and Tanzania, it is not uncommon for citizens to carry out common financial transactions using mobile phones. (p320)

True

Joint application development (JAD) sessions with a cross section of users and stakeholders in a project are an effective way to define system requirements.

True

Large organizations were the first to take on the challenge of implementing enterprise resource planning (ERP).

True

Macro viruses are called so because they are written using a macro language.

True

Natural language processing involves the computer interacting in natural languages - like spoken English.

True

Organizations invest heavily in information systems to improve customer service.

True

Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology.

True

Product lifecycle management (PLM) software provides documents required for FDA and environmental compliance.

True

Project integration management is perhaps the most important knowledge area because it requires the assimilation of all eight other project management knowledge areas.

True

The main difference between batch processing and online transaction processing is in the timely update of data.

True

The need for additional data storage capacity is one of the factors driving the growth in data centers.

True

The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance.

True

The relational database model is currently the most widely used.

True

The successful implementation for change only happens when people accept the need for change and believe that it will improve factors such as productivity and/or customer satisfaction.

True

The term data is used to label raw facts such as height and weight of a patient.

True

You have lots of images on your hard drive totaling 500 million bytes. A 2 Gigabyte storage device will be adequate to store those photos

True

You see a deceptive pop-up that says your computer is infected and that you must visit a compromised web site where you pay them to clean your computer. You have just become a victim of ransomware.

True

Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.

True

The Asia-Pacific region has overtaken North America as the region with the largest B2C sales and now accounts for over one-third of total worldwide B2C sales.

True (300)

Smaller lot sizes from vendors will help reduce the purchasing complexities for the consumer

True (362)

The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.

accredited domain name registrars

To improve traffic to your e-commerce site, _______.

acquire links to your site on other sites

There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?

activate the forensics analysis team and prepare documentation

A useful model to describe how teams develop is the forming-storming-norming-performing-___________ model

adjourning

During modeling of the CRISP-DM method, we would ______.

apply selected modeling techniques

PaaS also includes....?

development tools, business intelligence (BI) services, database management systems, and more.

Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization?

diffusion of innovation theory

The performance levels of radically new 'high-tech' products usually improve with newer versions. Such types of products are known as

disruptive innovations

A customer relationship management (CRM) system helps a company in managing ______

distribution and accounting 363

Each attribute in a relational database model can be constrained to a range of allowable values called a _____.

domain (ch 5)

Suppose you work at a business unit that has group of people who would rather wait to try a new technique. They listen to and follow the opinion leaders. They would be classified as the _________.

early majority

A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.

formation of blood clots

Dashboards: Gathering your data to feed your dashboard likely requires...

going to multiple services.

All of the following are potential drawbacks to outsourcing EXCEPT:

greater focus on core business

A hacktivist is someone who _______.

hacks computers or Web sites in an attempt to promote a political ideology

In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails?

half

Suppose you are assigned to manage a virtual team. Which of the following will you NOT do?

hold team meetings regularly - whether the team members like it or not

The world-wide-web uses _____ protocol for transmitting content.

hyper-text transfer

An embedded system is a computer system that is implanted in and dedicated to the control of another device.

True (ch 4)

An example of a common hardware function performed by the operating system is presenting information on a monitor or printer.

True (ch 4)

A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more.

True (ch4)

Symbian is an operating system used in special-purpose computers.

True (p142)

linkedin

_____ is a good site to develop your professional network.

Network-attached storage (NAS)

_____ is a hard disk drive storage device that is set up with its own network address and provides file-based storage services to other devices on the network.

extensible markup language (xml)

_____ is a markup language designed to transport and store data on the Web.

A register

_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

Operational feasibility

the process of determining how a system will be accepted by people and how well it will meet various system performance expectations

Description of Output controls: In many cases, output generated from the computer system is recorded in a file that indicates....?

the reports and documents that were generated, the time they were generated and their final destinations.

SaaS: All of the underlying infrastructure, middleware, app software, and app data are located in..... ?

the service provider's data center (IaaS and PaaS).

While performing the feasibility analysis, you should reassess.....?

the technical, economic, legal, operational, and schedule feasibility based on the results of system design findings.

Describe a modeling workshop

-Communicates the core ideas and the structure of the system. -Don't try to make the SAD complete. -"Use workshops as a way to establish a common understanding without handovers while having a rich conversation." -"Print and Draw" modeling workshops are facilitated with big paper posters on the wall (or on the table) and by doing the conversation with them. -Draw notes and comments directly on the printed poster.

What are possible actions resulting from the draft of investigation report?

-Continue on into systems analysis -Modify the project in some manner and perhaps repeat the systems investigation -Drop the project altogether

Google Analytics: Key terms?

-Conversion -Conversion Rate -Bounce -Bounce Rate -Landing Page -SEO -Organic/Natural search results -Paid search results

Examples of Lusha Uses:

-Get complete profile information on individuals for marketing purposes. -Given full name and email, the Lusha API completes the picture with phone numbers and location details. -Get rich information on company profiles for sales or marketing. You can get company logos, descriptions, location, and more -Integrate Lusha with marketing tools and sales tools.

VUI: Gain an understanding

-Get one and play around with it. -Gain an understanding of the new ecosystems, "we need to at least have a working knowledge and consider how this might impact our business." -Keep an eye on the younger generations, for whom talking to an AI-powered smart device will become commonplace.

Things to consider: Currency

-If timeliness of the information is important, is it kept up-to-date? -Is there an indication of when the site was last updated?

VUI: Strategy

-Many companies are developing apps and "skills" to keep up with the new technology. -Most are doing so without a clear strategy.

Several types of testing must be conducted before a new or modified information system is ready to be put into production. These tests include:

-integration testing -system testing -volume testing -user acceptance testing

Things to consider: Objectivity

-is the information covered fact, opinion, or propaganda? -is the authors view objective or impartial? -is the language free or emotion-rousing words or bias? -is the author affiliated with the organization? -does the authors affiliation with an institution or organization appear to bias the information? -does the content of the page have the official approval of the institution, organization, or company?

During system analysis, develop a prioritized set of requirements. Such as:

-priority categories -processes must be further defined and individuals/organizations responsible for process steps identified. -Diagrams provide a model of a proposed new system -Data modeling -Entity relationship diagrams

Scrum Framework: Artifacts

-product backlog -sprint backlog -burndown charts

Businesses rely on enterprise systems to perform daily activities in areas such as:

-product supply and distribution -sales and marketing -human resources -manufacturing -accounting and taxes

It may be necessary to write a program that can....?

-read the old data files from several sources -reformat the data to be compatible with the new system -merge data sources together

Scrum Framework: Ceremonies

-sprint planning -sprint review -sprint retrospective -daily scrum meeting

Start / Stop / Continue: Whole team gathers and discusses what they'd like to:

-start doing -stop doing -continue doing

Describe the Sprint Review.

-team presents what it accomplished during the sprint -typically takes the form of a demo of new features or underlying architecture -informal --2 hour prep time --no slides -whole team participates -invite the world

The elimination of organizations that operate between the producer and the consumer is called _____.

. disintermediation

Voice User Interface... 5points

...

Intro to SCRUM.. 10 points

....

check slide 109 & 110

....

Things to consider: Purpose

1. Knowing the motive behind the page's creation can help you judge its content. 2. Who is the intended audience? -scholarly audience or experts? -general public or novices? 3. If not stated, what do you think is the purpose of the site? Is the purpose to: -inform or teach? -explain or enlighten? -persuade? -sell a product?

Describe Sprint Retrospective

1. Periodically take a look at what is and is not working 2. Typically 15-30 minutes 3. Done after every sprint 4. Whole team participates -ScrumMaster -Product owner -Team -Possibly customers and others

RESTful API: When the client submits a request, in this case to get a resource, the RESTful API....?

1. receives that request 2. identifies the requested resource 3. figures out what data needs to be gathered & in what format 4. creates a representation of the data matching the requested format 5. Lastly, sends it all back to the client.

What are the 7 steps of the investigation phase?

1. review systems investigation request 2. identify and recruit team leader and team members 3. develop budget and schedule for investigation 4. perform investigation 5. perform preliminary feasibility analysis 6. prepare draft of investigation report 7. review results of investigation with steering team.

What are 3 intentional man-made disasters that can disrupt business operations?

1. sabotage 2. terrorism 3. civil unrest

When you use a web API, you supply a URL (possibly with some extra parameters), and you most likely get back a response. The response can be one of two things:

1. some data (which is what you want) 2. An explanation of why your request failed - this might tell you that you failed to supply a required parameter, you're over your rate limit, you need to supply authentication to make that particular request, or there was some other problem with the request.

What are the components of the feasibility analysis?

1. technical feasibility 2. economic feasibility 3. legal feasibility 4. operational feasibility 5. schedule feasibility

RESTful API: on one side is _______________. On the other side is _______________. In the middle sits the _________________.

1. the clients 2. the data store 3. RESTful API

What percentage of today's Fortune 500 companies are technology companies?

10%

The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.

128-bit

APIs (Automated Program Interface) APIs: REST and JSON

13 points -3 points on REST and JSON Watch Learning REST APIs with Morten Rand-Hendriksen

Scalability: Typical individual team is _________ people.

7 ± 2 -scalability comes from teams of teams.

The Pareto principle is also known as the

80-20 rule

A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually.

85 Billion

Ongoing research conducted by the Standish Group shows that ____% of very large, multimillion dollar software projects fail or are challenged.

94

Ongoing research conducted by the Standish Group shows that ____% of very large, multimillion dollar software projects fail or are challenged.

94% (ch1)

Definition of Scrum.

: A framework within which people can address complex adaptive problems, while productively and creatively delivering products of the highest possible value.

What is a "sticky" Web site?

A Web site that attracts consumers and encourages them to return

data center

A _____ is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services.

server

A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.

rule

A _____ is a conditional statement that links conditions to actions or outcomes.

community of practice (COP)

A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.

data mart

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

​network of computers that send out access requests to servers repeatedly

A botnet is a ____.

Bounce

A bounce is reported when a user's session only contains a single page view. The idea is that someone comes to your website and they 'bounce' away and leave after only viewing a single page.

Direct conversion is...

A cutover strategy that involves stopping the old system and starting the new system on a given date; also called plunge or direct cutover. -a high risk approach.

files

A database is a collection of integrated and related _____.

C. interface between applications and a database

A database management system is primarily a(n) _____. A. file-handling program B. data-modeling program C. interface between applications and a database D. interface between data and a database E. interface between queries and a database

Which of the following is considered a technical architecture for the proposed system?

A description of the needed hardware, software, and telecommunications equipment

enterprise system

A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business.

28) ________ refers to the process of standardizing the format of data retrieved from different systems. A) Data cleansing B) Data mining C) Normalization D) Content mining E) Clustering

A) Data cleansing

26) ________ integrates data from various operational systems. A) Data warehouse B) Metadata repository C) Data modeling D) Master data E) Data mining

A) Data warehouse

60) Which of the following is the primary goal of a knowledge management system? A) Identifying how to recognize, generate, store, share, and manage tacit knowledge. B) Continuously analyzing large data warehouses to detect changes deemed important by a user. C) Grouping related records together on the basis of having similar values for attributes. D) Allowing hypothetical changes to the data associated with a problem to observe how these changes influence the results. E) Identifying how to recognize, generate, store, share, and manage explicit knowledge.

A) Identifying how to recognize, generate, store, share, and manage tacit knowledge.

46) Which of the following statements is true about association discovery? A) It is a technique used to find correlations among sets of items. B) It is the process of grouping related records together on the basis of having similar values for attributes. C) It is the use of analytical techniques for extracting information from textual documents. D) It is a type of intelligent system that uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. E) It makes sure that each table contains only attributes that are related to the entity.

A) It is a technique used to find correlations among sets of items.

38) Which of the following statements is true about Google Sites? A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information. B) It allows users to select a custom domain name for an additional fee. C) It allows users to share events and subscribe to public calendars for new events. D) It is an instant messaging client. E) It is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application.

A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information.

71) ________ are private, third-party-managed medium-speed WANs that are shared by multiple organizations. A) Value-added networks B) Enterprise networks C) Global networks D) Local area networks E) Personal area networks

A) Value-added networks

34) Web-based collaboration tools ________. A) allow for easy transferability from one person to another B) have well-documented procedures for system complexities C) reduce the risk of exposing sensitive corporate data D) require users to frequently upgrade their software E) are complex and time-consuming to learn

A) allow for easy transferability from one person to another

59) Enterprise 2.0 is likely to fail if ________. A) an organization's workforce is dominated by baby boomers B) an organization has a flat organizational hierarchy C) an organization emphasizes open communication D) an organization's workforce is dominated by millennials E) it is integrated well with an organization's existing information systems infrastructure

A) an organization's workforce is dominated by baby boomers

28) Human resource activities ________. A) is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them B) includes the design and development of applications that support the primary business activities C) includes the purchasing of goods and services that are required as inputs to the primary activities D) integrate the internal applications with suppliers, business partners, and customers E) streamline the organization's internal value chain

A) is classified as a support activity since the primary activities cannot be accomplished without the employees to perform them

16) Which of the following uses a pull-based approach? A) make-to-order B) make-to-stock C) plan-to-produce D) account-to-report E) acquire-to-dispose

A) make-to-order

86) A ________ is a device that converts digital signals from a computer into analog signals so that telephone lines may be used as a transmission medium to send and receive electronic data. A) modem B) LAN card C) network adapter D) PCI connector E) USB port

A) modem

9) Which of the following is typically the first step in the procure-to-pay process? A) negotiate price and terms B) issue purchase order C) receive goods D) receive invoice E) settle payment

A) negotiate price and terms

3) Responding to threats and opportunities and continuous planning is based on analyzing data from the ________ level of the organization. A) operational B) executive C) tactical D) business E) strategic

A) operational

The more ______ resources available, the cooler the apps we build.

API

_______ enable websites, web and mobile applications to build applications, using resources that were completely out of reach in even the recent past.

API's

Consuming APIs aren't just for developers, and about building applications. What else are they used for today?

APIs are fueling many new trends that allow even non-developers to consume APIs and put them to use in documents and other common tools like Excel.

Parker has an Android smartphone. Which type of processor is used in his mobile device?

ARM

Information has many attributes that help define its quality. Which of the following is not one of these attributes?

Abundance

_______________ and __________ of information does NOT equal quality.

Accessibility and volume

C2C marketplaces that are supported by advertising are said to be _____.

Ad-supported

​Callie entering a customer's order into a restaurant's ordering system

All of the following are examples of someone using personal productivity software EXCEPT _________.

What does "click-and-mortar" refer to?

An organization that has a presence in the physical world and the virtual world

If you need to measure and predict customer behavior and attitudes you would most likely use this type of decision support.

Analytics

What is the first step in goals-based strategic planning?

Analyze situation

54) ________ support the important internal activities of the organization for producing their products and services. A) ERP focus components B) ERP core components C) ERP extended components D) ERP base components E) ERP covering components

B) ERP core components

53) Android is a Web service hosted by Google to ________. A) create customized search features B) build mobile phone applications C) manage personal calendars D) integrate Google's mapping system into Web sites E) allow users to build applications that work with multiple social communities

B) build mobile phone applications

48) In the 1990s, business process management was known as ________. A) business systems management B) business process reengineering C) business service reengineering D) application performance management E) application service management

B) business process reengineering

6) In the order-to-cash process, once "checking credit" is done, it is followed by ________. A) collecting payment B) creating an order C) allocating stock D) picking, packing, and shipping E) preparing and sending the invoice

B) creating an order

44) Which type of software is best suited for tasks that are unique to a particular business? A) collaborative B) custom C) groupware D) packaged E) ready-made application

B) custom

40) Applications that are designed and developed exclusively for a specific organization are known as ________. A) collaborative software B) custom software C) groupware D) ready-made application software E) packaged software

B) custom software

90) Which of the following Internet connectivity technologies enables data to be sent over existing copper telephone lines by sending digital pulses in the high-frequency area of telephone wires? A) integrated services digital network technology B) digital subscriber line technology C) dial-up service technology D) cable modem technology E) fiber to the home technology

B) digital subscriber line technology

38) A system that communicates across organizational boundaries is sometimes referred to as a(n) ________. A) legacy system B) interorganizational system C) intraorganizational system D) internally focused system E) stand-alone system

B) interorganizational system

41) Which of the following is the responsibility of an administrator in a content management system? A) editing the content into a final form B) managing account access levels to the digital information C) sharing team information D) publishing new information E) creating database applications

B) managing account access levels to the digital information

50) After identifying the ways in which information systems can be used to improve the processes, which of the following is the next step in business process management? A) identifying the critical processes that are to be redesigned B) understanding and measuring the existing processes as a baseline for future improvements C) reducing costs and shortening the time it takes to get products to market D) designing and implementing a prototype of the new process E) developing a vision for the organization that specifies the business objectives

B) understanding and measuring the existing processes as a baseline for future improvements

Which of the following applies to a company that is OK with losing 12 hours worth of newly entered data: a. RTO = 12 b. RTO = .5 c. RPO = 12 d. Data backup is done on a tape (a storage medium) at your place of business each evening e. None of the above are correct

C

82) Which of the following statements is true of a bus network topology? A) A bus network has the most complex wiring layout. B) Extending a bus network is more difficult to achieve than it is for other topologies. C) A bus network topology enables all network nodes to receive the same message through the network cable at the same time. D) The configuration of bus networks facilitates easy diagnosis and isolation of network faults. E) In a bus network, every computer and device is connected to every other computer and device.

C) A bus network topology enables all network nodes to receive the same message through the network cable at the same time.

89) Which of the following entities is responsible for managing global and country code top-level domains, as well as global IP number space assignments? A) American Registry for Internet Numbers (ARIN) B) World Wide Web Consortium (W3C) C) Internet Assigned Numbers Authority (IANA) D) Internet Governance Forum (IGF) E) European Organization for Nuclear Research (CERN)

C) Internet Assigned Numbers Authority (IANA)

70) A(n) ________ is a wide area network connecting disparate networks of a single organization into a single network. A) value-added network B) global network C) enterprise network D) local area network E) personal area network

C) enterprise network

31) Information and knowledge discovery tools are used primarily to ________. A) standardize the format of data retrieved from different systems B) reduce the complexity of the data to be analyzed C) extract information from existing data D) discover "hidden" predictive relationships in the data E) allow managers to learn query language for the effective maintenance of the database

C) extract information from existing data

6) An attribute is also referred to as a(n) ________. A) form B) record C) field D) query E) bot

C) field

20) Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as ________. A) tag clouds B) podcasts C) folksonomies D) geospatial metadata E) microblogs

C) folksonomies

10) In the procure-to-pay process, the negotiation of price and terms is followed by ________. A) settling the payment B) creating the customer record C) issuing the purchase order D) receiving the goods E) receiving the invoice

C) issuing the purchase order

41) In online analytic processing systems, ________ are the values or numbers the user wants to analyze. A) dimensions B) forms C) measures D) queries E) entities

C) measures

21) Which of the following is a core activity? A) human resource activities B) technology development C) operations and manufacturing D) administrative activities E) infrastructure activities

C) operations and manufacturing

3) Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the customer's credit card. This process of selling a product or service is known as the ________ process. A) make-to-order B) time-to-market C) order-to-cash D) procure-to-pay E) make-to-stock

C) order-to-cash

29) Designing and developing applications that support the primary business activities are a part of the ________ activities. A) operations and manufacturing B) outbound logistics C) technology development D) procurement E) inbound logistics

C) technology development

27) Which of the following is a support activity? A) outbound logistics activities B) operations and manufacturing activities C) technology development activities D) customer service activities E) marketing and sales activities

C) technology development activities

Which of the following e-commerce business models is considered very small?

C2G

A(n) _____ can replace many applications with one unified set of programs, this system can then be used to manage all its vital business operations. a. materials resource planning system b. management information system c. enterprise resource planning system d. decision support system e. None of them

C; ERP system

What is the title for the person responsible for overseeing every aspect of an organization's information resource?

CIO (chief information officer)

What is the title of the person responsible for overseeing both the underlying IT infrastructure within an organization and the user-facing technologies?

CTO (chief technology officer

Someone who attempts to destroy the infrastructure components of governments is known as a ______________ .

CYBERTERRORIST

A. They cost less.

Compared to data warehouses, data marts have which one of the following characteristics? A. They cost less. B. They have longer lead times for implementation. C. They provide for central rather than local control. D. They contain more information. E. They are more difficult to navigate.

A business intelligence (BI) predictive model that predicts whether a student accepted to the Tippie COB will actually enroll in the Tippie COB; might use: a. Structured Data only b. Unstructured Data only c. Internal Unstructured Data only d. Structured and Unstructured Data e. None of the above are used in a BI model

D

After assessing security threats and procedures for IT Systems: a. Applications and endpoints will always share the same risk level b. Applications and servers will always share the same risk level c. Servers and endpoints will always share the same risk level d. Servers and endpoints might have different security risk levels e. All parts of an IT system share the same risk level if they are networked

D

Multi-valued fields in relational databases are: a. Allowed in line item tables b. Allowed because they make update queries faster c. Allowed because they make the retrieving of data in a query faster d. Not allowed e. 2 of the above are correct

D

Which of the following is true about structured data from an Online Transaction Processing System? a. Data is batched, and transactions are created once a day b. Transactions are typically stored in a NoSQL database c. Involves unstructured data about 80% of the time d. Point of Sale system that reads a UPC code is an example e. 2 of the above are correct

D

65) While using digital dashboards, pull reporting is conducted to ________. A) alert the user of any items that require immediate attention B) provide the decision makers with a quick overview of key performance indicators C) discover "hidden" predictive relationships in the data D) analyze the root causes of an exception E) extract textual information from Web documents

D) analyze the root causes of an exception

8) In DBMS, data are kept separate from the applications' programming code. This means that ________. A) an application cannot be changed without making changes to the database B) an application's programming code needs to be updated continuously to keep up with the database C) an application needs to be changed when database is changed D) database does not need to be changed if a change is made to an application E) database needs to be changed when a change is made to an application

D) database does not need to be changed if a change is made to an application

52) Applications that integrate business activities across departmental boundaries are often referred to as ________ systems. A) manufacturing resource planning B) computer-integrated manufacturing C) capacity requirement planning D) enterprise resource planning E) materials requirement planning

D) enterprise resource planning

25) Administrative activities focus on the ________. A) design and development of applications that support the primary business activities B) hardware and software that must be implemented to support the applications that the primary activities use C) business activities associated with employee management D) processes and decision making to orchestrate the day-to-day operations of an organization E) purchasing of goods and services that are required as inputs for the primary activities

D) processes and decision making to orchestrate the day-to-day operations of an organization

11) Which of the following explains the term "blogosphere?" A) the movement against blogs B) the amateurization of blogs C) the revolution against microblogging D) the community of all blogs E) the movement against discussion forums

D) the community of all blogs

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

DATAMART

A database management system contains five important software components. Which of the following components accepts and processes requests from the other four database components?

DBMS engine

Which database management subsystem is responsible for backup and recovery, security management, query optimization, concurrency control, and change management?

Data administration

Which group of employees most often uses data administration subsystems?

Data administrators or database administrators

A. Providing information on each record

Data dictionaries perform all of the following functions except: A. Providing information on each record. B. Providing information on why attributes are needed in the database. C. Defining the format necessary to enter data into the database. D. Providing information on the name of each attribute. E. Providing information on how often attributes should be updated.

E. All of the above

Data dictionaries provide which of the following advantages to the organization? A. They reduce data inconsistency. B. They enable faster program development. C. They make it easier to modify data and information. D. Only B and C E. All of the above

If you needed to store facts about information that you were collecting, you would store these facts in the _____.

Data dictionary

Which of the following contains a subset of a data warehouse in which only a focused portion of the data is kept?

Data mart

used to explore large amounts of data for hidden patterns to predict future trends.

Data mining

false

Data rot refers to the quality of the data itself.

What is information?

Data that has a particular meaning within a specific context

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?

Data visualization tool

Which type of environment allows you to go beyond operational database systems to support business intelligence?

Data warehouses

Which organizational function is responsible for developing security procedures for an organization?

Database administration

Data used in business intelligence (BI) analysis could come from which of the following sources: a. An OLTP internal system b. Unstructured data from sources outside the company c. Unstructured data from sources inside the company d. 2 of the above are correct e. All of the above are correct

E

NoSQL databases require a company to: a. Model a business process prior to building the database and then not allow changes to the database b. Specifically define the data type for each attribute in the NoSQL table c. Store data in rows and columns d. All of the above are correct e. None of the above are correct

E

37) ________ is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. A) Gmail B) Google Talk C) Google Sites D) Google Calendar E) Google Docs

E) Google Docs

91) Computers working as servers on the Internet are known as ________. A) network adapters B) modems C) network switches D) Ethernet hubs E) Internet hosts

E) Internet hosts

25) Which of the following statements is true about informational systems? A) Its primary purpose is to run the business on a current basis. B) It is primarily used by online customers, clerks, salespersons, and administrators. C) It consists of narrow and simple updates and queries. D) Its goal is to enhance performance. E) Its goal is to enhance ease of access and use.

E) Its goal is to enhance ease of access and use.

34) Which of the following statements is true about exception reports? A) They help analyze why a key indicator is not at an appropriate level or why an exception occurred. B) They are produced at predefined intervals to support routine decisions. C) They answer unplanned information requests to support a nonroutine decision. D) They provide a summary of critical information on a recurring schedule. E) They highlight situations that are out of the normal range.

E) They highlight situations that are out of the normal range.

14) ________ take the concept of real-time communication a step further by allowing people to communicate using avatars. A) Blogging B) Microblogging C) Instant messaging D) Discussion forums E) Virtual worlds

E) Virtual worlds

74) The high-speed central networks to which many smaller networks can be connected are known as ________. A) last-mile networks B) ISPs C) Internet exchange points D) private branch exchanges E) backbones

E) backbones

19) Podcasting is a misnomer because podcasts ________. A) are concerned with the dissemination of information to a narrow audience B) cannot be played on Apple's iPods C) are not related to distribution of digital media for digital devices D) are concerned with outsourcing tasks to a large group of people or community E) can be played on a variety of devices in addition to Apple's iPods

E) can be played on a variety of devices in addition to Apple's iPods

44) Which of the following occurs during wiki wars? A) editors do not agree with the creators of the content B) participants debate on a particular topic before creation C) administrators refuse to publish a creator's content D) guests edit the creator's content without permission E) contributors continuously edit or delete each others' posts

E) contributors continuously edit or delete each others' posts

57) Specifically, ERP extended components focus primarily on ________. A) customer relationship management and product lifecycle management B) product lifecycle management and supply chain management C) customer relationship management and human capital management D) human capital management and supply chain management E) customer relationship management and supply chain management

E) customer relationship management and supply chain management

13) Once the data model is created, the format of the data is documented in a(n) ________. A) data warehouse B) data mart C) expert system D) data type E) data dictionary

E) data dictionary

15) In the ________ process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received. A) order-to-cash B) procure-to-pay C) make-to-stock D) acquire-to-dispose E) make-to-order

E) make-to-order

23) Assembly processes are ________ activities. A) outbound logistics B) marketing and sales C) customer sales D) administrative E) operations and manufacturing

E) operations and manufacturing

8) The processes associated with the acquiring of goods from external vendors are together referred to as the ________ process. A) make-to-stock B) make-to-order C) order-to-cash D) plan-to-produce E) procure-to-pay

E) procure-to-pay

What is the market space called that allows for interactive e-commerce between multiple buyers and sellers?

E-marketplace

How do you apply the "one primary action per screen" principle?

Every screen should support a single action of the real value to the user.

Dashboards: You can build an effective KPI dashboard in ________.

Excel -how do you update the data on the dashboard?

​leveraging the expertise of people across the organization

Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system?​

Which of the following methodologies breaks a project into tiny phases; programmers must develop the code for each phase before they can continue to the next phase?

Extreme programming

It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.

FALSE

Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.

FALSE

Network management software is a system software that controls the computer systems and devices on a network and allows them to communicate with each other.

FALSE

Organizations cannot have many value chains.

FALSE

Primary memory, which holds program instructions and data, is not associated with the central processing unit (CPU).

FALSE

Some companies offer health and wellness programs that require employee participants to share personal data. This data is protected under the same HIPAA privacy regulations as data shared with health insurance companies and doctors.

FALSE

Spam emails do not add to costs because nobody reads them anyways.

FALSE

Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and inventory management. She would need to purchase separate software to meet each functional requiremenT

FALSE

Companies usually follow the ____________________________ set forth by the Federal Trade Commission (FTC)

Fair Information Practices Principles (FIPP)

A sustaining innovation is one that initially provides a lower level of performance than the marketplace has grown to accept.

False

Cybercriminals are hackers who try to steal business information or government data related to a nation's infrastructure, all for personal gain.

False

DBMS's are used primarily for modeling data

False

Data cubes can be created on an ad hoc basis. There is no need to create them ahead of time.

False

Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.​

False

In some organizations, strategic planning is focused inward only.

False

In the context of the relational database model, selecting involves combining two or more tables.

False

When a business finds that many of its business applications have to be updated or rewritten, it will be better if they replace them with an ERP system.

False (ch 1)

Each programming language has a set of rules, called the program code of the language.

False (ch 4)

Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system.

False (ch 5)

Today, most organizations use the traditional approach to data management, where multiple information systems share a pool of related data.

False (ch 5)

Two sets of fields can have a common primary key.

False (ch 5)

Either system software or application software, but not both, are needed for all types of computers.

False (ch1)

Information systems applications help sales and marketing professionals with computer-assisted manufacturing

False (ch1)

In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence.

False (only where they have a physical presence. Pg 302)

Cache memory is available in two forms: level 1, which is found on the CPU chip, and level 2, which can be accessed over a high-speed dedicated interface.

False (there are 3 forms)

Using the hosted software model implies that a small business firm needs to employ a full-time IT person to maintain key business applications

False 360

Implicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.

False P. 325

An advantage of the hosted software model?

Faster system start-up (p 373)

Which of the following occurs when developers and end users add extra features that were not part of the initial requirements?

Feature creep

all of these answers

Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically _______.

At lower organizational levels, information exhibits _____ granularity.

Fine

weighing options

Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend​ and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

Grid computing

_____ is a visa program that allows skilled employees from foreign lands into the United States.

H-1B

carpal tunnel syndrome (cts)

Heavy computer users who experience red, dry, itchy eyes should _____.

consider the use of artificial tears

Heavy computer users who experience red, dry, itchy eyes should _____.

What is the difference between information and business intelligence (BI)?

Information is about a specific situation; business intelligence is about internal and external conditions and how they will affect strategy

Dashboards: Create a spreadsheet and map out the data behind your most important _____.

KPIs -each KPI you track will have at least one data point originating from one system or another.

tacit

Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.

Which of the following is an IT system that supports the capturing, organization, and dissemination of knowledge?

Knowledge management system

data steward

Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______.

This harmful malware is triggered by a specific event, such as Friday the 13th.

LOGIC BOMB

Which application supports the manipulation of information to support decision making?

Online analytical processing (OLAP)

true

Online analytical processing (OLAP) involves the analysis of accumulated data by end users

What term is used to describe the small advertisements that appear on other Web sites?

Online or banner ads

Which system allows your organization to gather, process, and update transactional information?

Online transaction processing (OLTP)

_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.

Optical mark recognition (OMR) systems

Organic/natural search results

Organic refers to people clicking on a free link from a search results page. For example, people clicking through to your website from a free result on a Google search results page.

This type of strategic planning defines the organization's vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values.

Organic strategic planning

What formal business plan maps out your customer base and your strategy for reaching them?

Path-to-profitability (P2P)

batch processing

Payroll transactions and billing are typically done via _____.

_____ is/are considered to be the most important element in computer-based information systems.

People

Flexibility is a major component of ergonomic design, mainly because: _______.

People come in a wide range of shapes and sizes, have their own preferences and need to be able to position equipment in different ways for best results

What is the type of field, or group of fields, that can uniquely identify each record in a database?

Primary key

What is Web Scrapping?

Process of extracting data from websites.

Which person leads the SDLC?

Project manager

An expert system is capable of all but which of the following?

Providing conclusive answers

materials requirement plan

Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers.

If you were able to quickly pull information from student records with course records to build students' schedules, you would be using a _____ tool.

Query-by-example

REST and API are acronyms for.....?

REST = Representational State Transfer API = Application programming interface

APIs that use the REST architecture pattern are said to be ____________.

RESTful

A. to process transactions faster

Refer to IT's About Business 5.3 - Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: A. to process transactions faster. B. to provide a complete view of the customer. C. to enhance its marketing campaigns D. to provide business users access to business-wide data. E. to determine where to place its slot machines.

A. The data is not reliable.

Refer to Opening Case - Big Data. Which of the following is not a problem created by "Big Data"? A. The data is not reliable. B. The amount of data exceeds the available storage. C. The existing networks can't handle the volume. D. It is more difficult to protect the data. E. The vast amounts of data make decision making more complicated.

_____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU).

Register

Which type of database is used when you want to create ties in the information that show how the files relate to each other?

Relational

Which type of database model organizes and accesses information according to its logical structure rather than its physical structure?

Relational

What is the most popular model for creating databases?

Relational database

perceptive

Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system.

Tier III vendors such as Abas or Bluebee software.

Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution. Which ERP vendor will have the most appropriate solution for them?​

create the entity-relationship model

Suppose a new tech startup wants to define the data model. They would then ____.

employing full-time IT professionals to manage its resources

Suppose a small business is using the hosted model for its enterprise software. Which of the following will not be an issue they will he worried about?

virtualization software

Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.

SWAPI Authentication

Swapi is a completely open API. No authentication is required to query and get data. This also means that we've limited what you can do to just GET-ing the data.

_____ are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output.

System operators

_____ is the process of analyzing systems to make sure they are operating as intended.

System review

_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.

System testing

Power Pivot and Power Query are components of Microsoft's Power BI tool .-

T

________ fraud total losses can represent a significant sum for a company.

T&E

What data should be compared when analyzing for fraud?

T&E payment data compared to HR records. This will show if there are instances in which an employee has been using a P-card or claiming expenses while on vacation.

Any Internet traffic that is not explicitly permitted into the internal network is denied entry through a firewall.

TRUE

Data mining is used to explore large amounts of data, looking for hidden patterns that can be used to predict future trends and behaviors.

TRUE

Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time.

TRUE

If an attack is dangerous enough, it may warrant shutting down or disconnecting critical systems from the network.

TRUE

In OLAP data cubes, you would likely find numeric measures categorized by time and geography.

TRUE

JavaScript can be used to validate data entry in a Web form.

TRUE

Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online.

TRUE

Mobile commerce (m-commerce) is the use of mobile, wireless devices to place orders and conduct business.

TRUE

One idea for reducing cyberloafing is to develop software that recognizes and categorizes Internet sites into sites that employees can always visit, sometimes visit, and never visit.

TRUE

PayPal enables any person or business with an e-mail address to securely, easily, and quickly send and receive payments online

TRUE

Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees

TRUE

Suppose you are good in math and statistics. Adding programming to your skill-set will be necessary if you want to be a data scientist

TRUE

The use of computers in the workplace is a double-edged sword for workers. While they help to increase productivity and efficiency, they can also raise concerns about privacy and health issues.

TRUE

Two primary causes of computer-related health problems are a poorly designed work environment and failure to take regular breaks to stretch the muscles and rest the eyes.

TRUE

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack.

TRUE

Whenever there is a computer security incident, it is not recommended that the organization reveal all they know in public forums.

TRUE

C. unstructured

Tacit knowledge has which of the following characteristics? A. codified B. objective C. unstructured D. rational E. technical

false

Tacit knowledge is the more objective, rational, and technical types of knowledge

the arpanet

The ancestor of the Internet was _____.

hot spot

The area covered by one or more interconnected wireless access points is commonly called a(n) _____.

A. They are organized by subject.

The data in a data warehouse have which of the following characteristics? A. They are organized by subject. B. They are coded in different formats. C. They are updated in real time. D. They are typically retained for a defined, but limited, period of time. E. They are organized in a hierarchical structure.

C. are not updated.

The data in a data warehouse: A. are updated constantly in real time. B. are updated in batch mode, approximately once per day. C. are not updated. D. are purged constantly as new data enter. E. are available for MIS analysts, but not users.

What are business requirements?

The detailed set of requests that the proposed information system must meet to be successful

backbone

The fiber-optic cables that span the globe over land and under sea make up the Internet _____.

What does it mean for a data warehouse to be multidimensional?

The files stored in a warehouse contain multiple layers of columns and rows

Landing Page

The landing page is the first page viewed during a session, or in other words, the entrance page. It can be useful to review your landing pages to understand the most popular pages people view as they navigate to your website. This can be used to identify potential opportunities to cross-promote or feature other content from your website.

What is the difference between the implementation phase and the maintenance phase?

The maintenance phase monitors and adjusts new and existing systems; the implementation phase places new systems into operation

B. They make best practices available to employees.

The most important benefit of knowledge management systems is: A. They improve customer service. B. They make best practices available to employees. C. They enable the organization to retain scarce knowledge when employees retire. D. They improve employee morale. E. They make product development more efficient.

relevant

The use of so-called SMART goals has long been advocated by management consultants. What does the R in SMART stand for​?

hyper-text transfer

The world-wide-web uses _____ protocol for transmitting content​.

A(n) _____ IT structure develops from a centralized IT department; one that serves the whole organization and not just a piece of it.

Top-down silo

The structure of IT develops from the culture within that organization and can develop into what type of approach?

Top-down silo, matrix, or fully-integrated

A traditional view of information systems holds that organizations use them to control and monitor processes and ensure effectiveness and efficiency.

True

A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.

True

A zombie computer would send requests to access to the target site again and again.

True

According to Lewin's Change Model, an organization must deliberately change old habits, learn new work methods, and accept the new work methods as parts of the job.

True

Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.​

True

Components of a computer-based information system include people such as the CIO (chief information officer) and end-users.

True

Conversion to an e-commerce or m-commerce system enables organizations to increase the accuracy of order processing and order fulfillment.

True

Data governance involves identifying people who are responsible for fixing and preventing issues with data

True

Data represents real-world things including raw facts such as image and audio data.

True

Deepak's team is in charge of conducting a review of their company's waste/mistake prevention policies and procedures. Part of this review should also evaluate how upcoming changes in information systems will affect business activities.

True

Downloading games from unknown websites can be risky. The software may be a Trojan horse.

True

During drill-down, you go from high-level summary data to detailed levels of data.

True

Each central processing unit (CPU) produces a series of electronic pulses at a predetermined rate, called the clock speed, which affects machine cycle time.

True

Electronic business (e-business) goes beyond e-commerce and e-procurement by using information systems and the Internet to perform business-related tasks and functions.

True

In OLAP data cubes, you would likely find numeric measures categorized by time and geography.

True

In the context of the relational database model, projecting involves eliminating columns in a table

True

It is possible to restrict access to data depending on the database user's privileges.

True

Since the 1950s, computers have been used to perform common business applications.

True

Smart cards can be used for a variety of purposes, including storing a user's financial facts, health insurance data, credit card numbers, and network identification codes and passwords. They can also store monetary values for spending.

True

Some smartphones allow you to take notes and to "write" emails or text messages by speaking into the phone​. These are examples of speech-recognition technology.

True

Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing.​

True

Spear-phishing is when the phisher sends fraudulent emails to a certain organization's employees.

True

System testing is often done by independent testers who are not involved in developing program code.

True

The Cloud: Quickly scale up and down with demand, and pay only for what you use. (T/F)?

True

The Institute of Electrical and Electronics Engineers (IEEE) is a leading standards-setting organization whose IEEE network standards are the basis for many telecommunications devices and services.

True

The computer is running, but not responding to your keyboard inputs. You find that the network activities are running very slowly. You have probably been hit by a rootkit.

True

The diffusion of innovation theory can be useful in planning the rollout of a new information system. ​

True

When organizational learning occurs, what is revealed can be small, incremental adjustments known as continuous improvement.

True

When you point the remote control to turn on/off the TV, the remote is using radio frequency.

True

When you use your lab computer to access a printer, you are using the local area network (LAN).

True

Whenever there is a computer security incident, it is not recommended that the organization reveal all they know in public forums.

True

While information systems were once primarily used to automate manual processes, they have transformed the nature of work and the shape of organizations themselves.

True

The domain expert is the person with the expertise the expert system is trying to capture

True (pg 427)

Money from the budget for one type of cost cannot be used to pay for an item associated with another type of cost

True (pg 473)

An organization uses buy-side e-commerce to purchase goods and services from its suppliers.

True - 299

If a hotel wishes to determine where to spend resources on renovations - on interior decor or on curb appeal or on recreational facilities - they would use business intelligence to make the decision.

True - Rationale: They would use a decision support system (ch1)

Retargeting employs personalized ads to direct shoppers back to a retailer's Website they previously abandoned.

True 318

Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and knowledge management systems.

True 346

The bill of materials (BOM) serves as a recipe of ingredients needed to make each item an organization manufactures

True 362

With network-management software, a manager on a networked personal computer can scan for viruses.

Which of the following statements is true of network-management software?

It provides documents required for FDA and environmental compliance.

Which of the following statements is true of product lifecycle management (PLM) software?

Describe web query in Excel.

You can use Excel to import data appearing on a web page. 1. Use "Data" ribbon in Excel and then choose "From Web" Option. 2. Next, you provide a URL in a dialog box that looks like a web browser. 3. A box with an arrow appears next to html tables on the page. 4. You can select a table on the page by clicking on the arrow next to it. 5. You can now import data from the selected table into Excel by clicking on the "import" button. 6. Next, provide where toy would like your imported data to appear. *you can click Properties to modify Refresh frequency.

a wireless network

You cannot boot a computer from ____________.

true

You would be an instance of your university's STUDENT class

B. Secondary keys

_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. A. Primary keys B. Secondary keys C. Duplicate keys D. Attribute keys E. Record keys

supercomputers

_____ are the most powerful computers with the fastest processing speed and highest performance.

Optical mark recognition (OMR) systems

_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.

Workstations

_____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor.

A. Knowledge, information

_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. A. Knowledge, information B. Data, information C. Information, data D. Information, knowledge E. Data, knowledge

neural networks

_____ can process many pieces of data at the same time and learn to recognize patterns.

the web

_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.

A. Transaction data, master data

_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. A. Transaction data, master data B. Source data, transaction data C. Operational data, master data D. Master data, source data E. Business dimensional data, databases

system testing

_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.

systems operation

_____ involves using a new or modified system under all kinds of operating conditions.

z/OS

_____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads.

the internet protocol (ip)

_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.

D. Data governance

_____ is a formal approach to managing data consistently across an entire organization. A. Database management B. Enterprise information management C. Data warehousing D. Data governance E. Data mart

game theory

_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.

spreadsheet

_____ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations.

B. Knowledge management

_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. A. Discovery B. Knowledge management C. Decision support D. Online analytical processing E. Data mining

Green computing

_____ is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.

Magnetic tape

_____ is a storage technology that is primarily used only for backups.

Enterprise data modeling

_____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.

Microsoft Office

_____ is an example of a popular general purpose software suite for personal computer users.

agile development

_____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months.

Linux

_____ is an open-source operating system whose source code is freely available to everyone.

system review

_____ is the process of analyzing systems to make sure they are operating as intended.

big data

_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.

grid computing

_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

computer-aided design

_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.

tacit

_____ knowledge is hard to measure and document and typically is not objective or formalized.

A. Data isolation

_____ occurs when applications cannot access data associated with other applications. A. Data isolation B. Data integrity C. Data consistency D. Data redundancy E. Application/Data dependence

System construction converts the system design into....?

an operational system.

Mission-critical processes play a critical role in...?

an organizations continued operations and goal attainment

The fiber-optic cables that span the globe over land and under sea make up the Internet _____.

backbone

Payroll transactions and billing are typically done via _____.

batch processing

Sprints: constant duration leads to...?

better rhythm.

The smallest piece of data used by a computer is a(n) _____.

bit (ch 5)

Once a _____ is installed, the attacker can gain full access to the computer. (rootkit, botnet, zombie, or worm)

botnet

In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.

bus network

Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of _________.

business analytics

Which of the following is NOT true about linear regression? a. consists of finding the best-fitting straight line through a set of observations b. the line minimizes the sum of the squared errors of prediction c. the technique implies causality between the independent and the dependent variables d. both of the variables must be quantitative variables

c. the technique implies causality between the independent and the dependent variables

How to create an API: step 1 Identify all the... ?

conceptual entities that we want to expose as services. Ex. resources such as: parts list, detailed part data, purchase order)

Authentication technologies are used by many organizations to _____.

confirm the identity of a user requesting access to information or assets

The idea of _____ is a form of innovation that constantly seeks ways to improve business processes and add value to products and services.

continuous improvement

Suppose a new tech startup wants to define the data model. They would then ____.

create the entity-relationship model (ch 5)

Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.

cybercriminals

A ___________ should be informative and geared towards monitoring and tracking KPIs.

dashboard

The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.

data administrator (ch 5)

Description of telecommunications controls: These controls provide accurate and reliable __________ and ___________ transfer among systems.

data and information

REST isn't a specific technology, but rather a _____________________________________ that produces predictable and consistent outputs and behaviors by receiving a set of standard methods and returning standardized structured data, typically JSON or XML, called the resource.

data architecture and design methodology

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

data mart (ch 5)

Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______.

data steward (ch 5)

Description of Input Controls: Input controls range from using standardized input forms to eliminating.....?

data-entry errors and using tight password and identification controls.

In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.

data-flow line

Description of database controls: Many of these controls are provided by....?

database management systems.

-URLs should be....?

descriptive and have structure. (Ex: http://www.ex.com/software/releases/latest.tar.gz)

System _____________ creates a complete set of technical specifications that can be used to construct the information system.

design

Product is ______, ________, and ________ during the sprint.

designed, coded, and tested

Economic feasibility

determines whether the expected benefits associated with the project outweigh the expected costs sufficiently to make the project financially attractive

Stateless

each request from client to server must contain all the information necessary to understand the request, and can NEVER rely on information from prior requests

Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.

false

The information necessary for personalizing web pages for individual customers _________.

is primarily gathered by analyzing users' past transactions on the website

A key feature of an enterprise system is that _________.

it employs a database of key operational and planning data that can be shared by all

For the ____ operation, it is required that the two tables have a common attribute.

join (ch 5)

The _____ is the heart of the operating system and controls its most critical processes.

kernel (ch 4)

These metrics are also called ___________________________ and consist of a direction, measure, target, and time frame

key performance indicators (KPIs)

The process of defining relationships among data to create useful information requires ______.

knowledge (ch 1)

Integration testing involves...

linking all of the individual components together and testing them as a group to uncover any defects between individual components.

The syllabus is a ______________________________.

living document and subject to change

Entity-relationship diagrams show...

logical relationships among data entities

A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles.

low earth orbit (LEO)

The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for?

measurable

A(n) _____ is an HTML code, not visible on a displayed Web page, that contains keywords representing the Website's content, which search engines use to build indexes pointing to the Website.

meta tag

Dashboards: Measures are ________ that track progress in executing chosen strategies to attain organizational objectives and goals.

metrics

A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.

metropolitan area network (MAN) (Ch 6)

The organization's _____ is stated in a challenging manner to inspire employees, customers, and shareholders.

mission statement

_____ is a means of acquiring data about a group of people (such as location, noise level, and pollution levels) through sensor-enhanced mobile devices.

mobile crowd sensing (mcs)

POST is generally used when you need to...?

modify data in a database.

Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?

presentation graphics

Daily scrum meetings are not for..?

problem solving. -whole world invited -Only team members, ScrumMaster, product owner, can talk

Description of processing controls: Deal with all aspects of....?

processing and storage

Security consists of the ________________________________ to secure protected information. It requires that administrative, technical, and physical safeguards are developed and used.

protections or safeguards put in place

Description of Input Controls: Their purpose is to...?

reduce errors while protecting the computer system against improper and fraudulent input.

Which of the following is NOT a potential drawback to downsizing?

reduced payroll costs

​Which of the following is NOT a potential drawback to downsizing?

reduced payroll costs

In a manufacturing enterprise resource planning (ERP) system, demand management _______.

refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products 362

Effective controls in both areas usually depend upon....?

regular approvals by appropriately authorized individuals.

Suppose the customer data analysis software used was significantly changed, but no new features were added. This type of maintenance is called a _______.

release

By using the Cloud, you don't need to worry about...?

resource procurement, capacity planning, OS software maintenance and patching, or any of the other undifferentiated heavy lifting involved in running your application.

Confidentiality relates to the _____________________________________ of their information during storage, transfer, and use, in order to prevent unauthorized disclosure of that information to third parties.

right of an individual to the protection

A _____ is a conditional statement that links conditions to actions or outcomes.

rule

What is pilot start-up?

running a complete new system for only one group of users.

Sequential vs. overlapping development: rather than doing one thing at a time....

scrum teams do a little bit of everything at the same time.

The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.

service-oriented architecture (ch 4)

_____ involves using a new or modified system under all kinds of operating conditions. page 534

systems operation

Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.

tacit

When coding software components, what is required?

technical and user documentation

What is unit testing?

testing that ideally forces an individual program to execute all of its various functions and user features

The ___________ cannot be used as a reference for discussion forum assignments.

textbook for this course

A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities.

thin client

For other sites, a good mobile experience means....?

trimming down on content and features.

Scrum has been used on multiple 500+ person projects. (T/F)?

true

3D printing is ________.

used to make solid products

Description of Personnel Controls: these can involve the use of....?

user authentication controls and passwords that allow only certain people access to certain information and particular data.

Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.

virtualization software (ch 4)

With _____, a software engineer drags and drops graphical objects such as buttons and menus onto an application form.

visual programming (ch 4)

How to create an API: step 3 Categorize resources according to....?

whether clients can just receive a representation of the resource (using an HTTP GET), or whether clients can modify (add to) the resource using HTTP POST.

The Internet of Things connects wireless identifiable objects ________.

with each other, to their owners, and with a central server (ch1)

User documentation is defined as:

written descriptions developed for people who use a program; in easy-to-understand language, it shows how the program can and should be used to meet the needs of its various users.

You would use Query by Example, if _____.

you wish to use a visual approach to query building (ch 5)

all of the above

​A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?

summarized

​Data within the data cube has been ______ by specific dimensional values.

instructs the zombie computers to send simple access requests to target computers

​In a denial-of-service (DDoS) attack, the perpetrator ____.

data-flow line

​In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.

potential entrants

​Which of the five forces in Michael Porter's model refers to entry barriers and the relative threat of new competitors?

cognos

​Which of the following is IBM's BI product?

​the technique implies causality between the independent and the dependent variables

​Which of the following is NOT true about linear regression?

​Can lead to over spending on unapproved data sources and business analytics tools.

​Which of the following is a potential disadvantage with self-service BI?

It is a software and hardware combination that limits the incoming and outgoing Internet traffic.

​Which of the following is the correct description of a firewall?

Fraud and Related Activity in Connection with Access Devices Statute

​Which of the following laws covers false claims regarding unauthorized use of credit cards?

The toughest challenge in designing a processor for a smartphone or tablet is balancing _____________.

​performance and power consumption

An RPO is: a. The same for all systems at a business as all data is backed-up b. Different depending on each system at a business c. Equal to the RTO for a business d. Always less than the RTO for a business e. None of the above are correct

B

While using data analysis to identify employee fraud, you should...?

1. Analyze entire populations of transnational data. -Look for various forms of anomalies. 2. Analyze transactions for indicators of known fraud risks. 3. Compare data across different databases and systems

41) Customers can purchase ________ software off the shelf to help them with their personal documents and communications. A) personalized B) tailored C) packaged D) custom E) bespoke

C) packaged

72) A(n) ________ is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication, typically within an area of 10 meters. A) value-added network B) local area network C) personal area network D) enterprise network E) campus area network

C) personal area network

83) As per the Open Systems Interconnection (OSI) model, which of the following layers defines the way data is formatted, converted, and encoded? A) application layer B) transport layer C) presentation layer D) data link layer E) session layer

C) presentation layer

92) A(n) ________ is a unique identifier that should be created and used when designing a database for each type of entity, in order to store and retrieve data accurately. A) foreign key B) surrogate key C) primary key D) superkey E) candidate key

C) primary key

Which of the following is a potential disadvantage with self-service BI?

Can lead to over spending on unapproved data sources and business analytics tools.

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

Entity Symbol Page 517

false

Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.

Bioprinting, which uses 3D printers to build human parts and organs from actual human cells, is widely considered to be unethical.

False

Business analytics can be used only for forecasting future business results.

False

Cache memory is available in two forms: level 1, which is found on the CPU chip, and level 2, which can be accessed over a high-speed dedicated interface.

False

Chip-and-PIN cards employ a computer chip that communicates with a card reader using infrared frequencies so that the cards do not need to be swiped at a terminal.

False

Disk mirroring is a method of storing data that generates extra bits of data from existing data, allowing the system to create a "reconstruction map" so that if a hard drive fails, it can rebuild lost data.

False

Each programming language has a set of rules, called the program code of the language.

False

Since the 1950s, computers have been used to perform common business applications.

False

The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management.

False

While discussing the preliminary feasibility of a project, your colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon.

False

Cybercriminals are hackers who try to steal business information or government data related to a nation's infrastructure, all for personal gain.

False (ch 1)

Organizations can collect many types of data from a wide variety of sources, but typically they only collect structured data that fits neatly into traditional relational database management systems.

False (ch 5)

UAT must be completed successfully before newly developed software can be rolled out to the market.

True

XYZ Inc. assigned a part-time mid-level manager to supervise the implementation of an enterprise resource planning (ERP) system. The project has a high risk of failure.

True 371

The operating system's application programming interface (API) provides software developers with tools they use to build application software without needing to understand the inner workings of the operating system and hardware.

True.

According to a study by the Standish Group, approximately 70% of the IS projects do not succeed.

True. pg 471

What is this an example of? you use MailChimp to manage all of your mailing lists. You want to be able to automatically add and remove people from lists when certain things happen instead of someone having to manually manage those lists.

Using APIs as a more direct interface for reading and writing data to a service.

Having access to credible information is an example of the _____ quality attribute of information.

Validity

Wikipedia.org is a contemporary Web site providing definitions and descriptions of many concepts. Wikipedia is not peer-reviewed (a group of peers or experts do not verify the quality of information). Because of this, Wikipedia may not demonstrate which of the following quality attributes?

Validity

google

Which Internet business has "Do the right thing; don't be evil." as one of its values?​

agile

Your new software project manager is OK with requirements that are not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _______ approach to software development.

If you wanted to ensure that your business maintains a desirable return on your investment with technology, what should be one of your main concerns?

Your technology helps streamline costs without sacrificing quality

knowledge users

_____ do not need any previous training in computers or expert systems.

cloud computing

_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.

code of ethics

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

A. Primary keys

_____ tell the database management system which records are joined with others in related tables. A. Primary keys B. Secondary keys C. Common attributes D. Common files E. Common fields

XP; extreme programming

______ stands for __________ and is a form of agile software development.

self-service analytics

_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.​

direct conversation

__________ is a high-risk cutover strategy because of the potential for errors and problems when the old system is turned off and the new system is turned on at the same time.

API's came into existence to satisfy...?

a demand for access to valuable content, data and resources.

The US-CERT incident reporting system is used to ____.

alert the Department of Homeland Security about information security incidents

When the IS organization and its resources are focused on efforts that support the key objectives defined in the managers' strategic plan for the business, the organization is in _________.

alignment (ch1)

Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML)

applets

Description of Personnel Controls: These ensure that....?

authorized personnel have access to certain systems to help prevent computer-related mistakes and crime.

In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:

finance and accounting

Description of telecommunications controls: Network controls include....?

firewalls and encryption to ensure correct communication while eliminating the potential for fraud and crime.

A _____ is a simple database program whose records have no relationship to one another.

flat file (ch 5)

A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is ___________.

flexible

The value of information is directly linked to how it helps decision makers achieve their organization's _____.

goals

The value of information is directly linked to how it helps decision makers achieve their organization's _____.

goals (ch1)

The second phase of an Advanced Persistent Threat attack is _____.

incursion

The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

knowledge base

A scrum team usually consists of _________.

less than a dozen people

A botnet is a ____.

network of computers that send out access requests to servers repeatedly

Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals to study, change, and improved it. Their software is an example of ________

open source software

Description of Output controls: These ensure that...?

output is handled correctly.

Which law requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use

p 607: Gramm-Leach-Bliley Act of 1999

RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted_____

p 612: In children to enable parents to find them if lost, in criminals to allow law enforcement agents to find them if needed, and in all humans to give medical professionals instant access to medical records and conditions

In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?

personal cell phone use and Internet surfing

The ancestor of the Internet was _____.

the ARPANET

Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.

the agreement is to reimburse the costs plus a fixed amount as fee

You manage ____________________________________, and the cloud service provider typically manages everything else.

the applications and services you develop

Often, unstructured data is ultimately related back to....?

the company's structured data records.

All of the following are examples of ethical issues related to data and information systems EXCEPT__________.

the cost of system development

Your ex-colleague was apprehended based on the "Fraud and Related Activity in Connection with Access Devices Statute" Act. He was caught using unauthorized or stolen _________.

CREDIT CARDS

All of the following are examples of someone using personal productivity software EXCEPT _________.

Callie entering a customer's order into a restaurant's ordering system

What is a potential disadvantage with self-service BI?

Can lead to over spending on unapproved data sources and business analytics tools.

Suppose, you need to advise someone about getting a certification. Which of the following will be appropriate advice?

Certifications are vendor-specific

Network management software is a system software that controls the computer systems and devices on a network and allows them to communicate with each other.

False (NOS is) (Ch 6)

The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but does not offer cloud computing capabilities.

False (ch 1)

Using a computer to forecast future sales and order more inventory before a shortage can occur is an example of information system feedback.

False (ch 1)

Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rather than local computers.

False (ch 4)

What type of system is often referred to as a predictive system because it sees patterns in vast amounts of information?

Neural network

f you were using your PDA and it was analyzing and reacting to a word you wrote on the pad, what type of system would you be using?

Neural network

What type of system is known for finding and differentiating patterns?

Neural networks

_____ can process many pieces of data at the same time and learn to recognize patterns.

Neural networks

As the difference among computer manufacturers in the areas of price and performance narrows, support for green computing is emerging as a new business strategy for these companies to distinguish themselves from the competition.

True

Assistive technology systems help people overcome disabilities and perform various tasks.

True

Bioinformatics has been used to help map the human genome and conduct research on biological organisms.

True

JavaScript can be used to validate data entry in a Web form.

True

Massively parallel processing systems are a form of multiprocessing that speeds processing by linking hundreds or thousands of processors to operate at the same time.

True

Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.

True

One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically.

True

Operational feasibility takes into account the need to meet certain system performance requirements that are considered important to system users and stakeholders.

True

Organic strategic planning defines the organization's vision and values and then identifies projects and initiatives that will achieve the vision while adhering to the values.

True

Organizations that are concerned about the security of their data should not use public cloud computing.

True

Responsive design helps to avoid an inconsistent experience for users on different devices. (T/F)?

True

The three basic components of a successful e-commerce model include content, commerce, and community.

True

The use of e-mail among public officials might violate "open meeting" laws.

True

There are a number of compact disk devices including read-only, recordable, and rewritable.

True

There are bots that can sign up for thousands of email accounts.

True

There are laws that require businesses to prove that their data is secure.

True

To solve the product mix problem that will maximize the profits, you can use Excel's Solver add-in.

True

To successfully implement a supply chain management system, an organization must be able to integrate its systems with its suppliers.

True

Twitter is a microblogging service.

True

Usability and user-interface design are key factors in delivering apps that business users will adopt and use.

True

Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.​

True

When a customer buys products using the company's website, it results in transactions that are recorded for later use by management information systems.

True

When an organization hires another firm in another country to perform a specific function on its behalf, it is known as offshoring.

True

An example of the concept of feedback is a factory information system that is programmed to alert the manager if there is any decrease in productivity so the manager can take corrective steps to improve productivity.

True (ch 1)

Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.

True (ch 4)

Suppose a stock analyst wants to automate the retrieval of stock trade data, process the data, and produce analysis reports. His requirements can be met by writing custom software.

True (ch 4)

The operating system converts a basic user request into the set of detailed instructions that the computer hardware requires, thus acting as an intermediary between the application and the hardware.

True (ch 4)

Utility programs are used to perform system maintenance, such as repairing errors on a hard drive, improving system security, and optimizing sluggish system processes.

True (ch 4)

Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.

True (ch 4)

A database helps companies analyze information to open new market opportunities.

True (ch 5)

A database management system (DBMS) serves as an interface between an application program and a database.

True (ch 5)

A database, a database management system, and the application programs that use the data, make up a database environment

True (ch 5)

A field is typically a name, number, or combination of characters that describes an aspect of a business object.

True (ch 5)

A relational model splits the information up into many two dimensional data structures.

True (ch 5)

For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item.

True (ch 5)

If "color" is an attribute, then "green" is a data item.

True (ch 5)

In the context of the relational database model, projecting involves eliminating columns in a table.

True (ch 5)

One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically.

True (ch 5)

Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corrected or deleted through data cleansing.

True (ch 5)

The relational database model is currently the most widely used.

True (ch 5)

Unstructured data comes from sources such as word-processing documents and scientific research.

True (ch 5)

A neural network relies on massively parallel processing to enable a computer to simulate the function of a human brain

True (p 430)

A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects.

True (pg 424)

stakeholder analysis matrix

Which tool is useful in identifying the interests and information needs of the stakeholders?​

gathering information

While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson?

Provide an example of transactional data analysis that would warrant further investigation.

Why would one employee with the same job responsibilities as a hundred others claim 50% more travel expenses?

Leaving laptop computers unattended in public spaces

​You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern?

only those projects that are tied to specific organizational goals

​You have observed that it is possible that some of your organization's projects may end up having little or no value after they are completed. You are tasked with selecting potential future projects. Which type of projects would you recommend the organization consider?

before starting any new project, try to build on expertise and knowledge of others in the organization

​You joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means _______.

your non-work related use of the laptop could increase vulnerability

​You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is ______.

Assign roles and privileges to users so that only job-relevant data is accessible to the user.

​You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?

Install a Business Rules management system and interface it to the Supply chain management system.

​You work for a manufacturing business. Your employer uses a model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation?

systems design

​_____ creates a complete set of technical specifications that can be used to construct an information system.

communication managment

​_________ involves the generation, collection, dissemination, and storage of project information in a timely and effective manner.

Which of the following is NOT a task typically associated with the systems analyst role?

​collaborating with others to build a software product from scratch

​Which of the following is NOT a task typically associated with the systems analyst role?

​collaborating with others to build a software product from scratch

​Harrison works at a nationally known grocery store chain. He is analyzing sales data from the past five years to determine which low-selling products should be discontinued. Harrison is most likely a(n) ________.

​data scientist

All of the following are potential drawbacks to outsourcing EXCEPT:

​greater focus on core business

There are two graded ______ in this course.

ELAs

The Lusha Contacts API uses a...

RESTful architecture.

What is data?

Raw facts that describe some phenomenon

In the regression line Y = a+ bX + e, Y is the value of the independent variable.

False

Information is simply a collection of raw facts such as an employee number or the total hours worked in a week.

False

Daily scrum meetings help avoid....?

other unnecessary meetings

What is parallel start-up?

running both the old & new systems and comparing outputs.

Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _______ to develop an estimate of future customer demand

sales forecasting 361

A _____ is a description of the logical and physical structure of data and the relationships among the data for each user

schema

Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____.

schema (ch 5)

Should you create a dedicated mobile site or use a responsive site? What is the right answer?

(For many sites) Content and feature parity. -accommodate both

In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.

BUS NETWORK

Which systems are typically used to fulfill and support customer orders?

Back office systems

Which DSS component stores and maintains the information you want your DSS to use?

Data management

Dr. Fulk's office phone number is __________.

(254) 968-1977

With _____, business transactions are accumulated over a period of time for processing in a single unit.

Batch processing p 347

Completing an instruction involves two phases—instruction and execution—which are each broken down into two steps for a total of four steps. What are the four steps?

(pg 87 Instruction: Fetch, Decode; Execution: Execute instruction, store results)

What does the ScrumMaster do?

-Represents management to the project -Responsible for enacting -Scrum values and practices -Removes impediments -Ensure that the team is fully functional and productive -Enable close cooperation across all roles and functions -Shield the team from external interferences

What's a dashboard? *think of ClubReady system when @ Club Pilates.

*think of ClubReady system when @ Club Pilates.

The ______ is the agency tasked with the goal of providing for a safer, more secure America, making it resilient against terrorism and other potential threats.

- Department of Homeland Security

Things to consider: Author

-Is the name of the author/creator on the page? -Are his/her credentials listed (occupation, years of experience, position or education)? -Is the author qualified to write on the given topic? Why? -Is there contact information, such as an email address, somewhere on the page? -Is there a link to a homepage? -If there is a link to a homepage, is it for an individual or for an organization? -If the author is with an organization, does it appear to support or sponsor the page? -What does the domain name/URL reveal about the source of the information, if anything? -If the owner is not identified, what can you tell about the origin of the site from the address?

What kind of tests are run on an information system?

1. unit 2. integration 3. system 4. volume 5. user acceptance

Responsive design helps to furnish:

- a full experience at the mobile level. - a full experience at the desktop level. - a full experience at the mobile level only. - site design changes as the display used by the user increases in screen size.

_______ tools can present data in an easy-to-understand fashion via formatted data, graphs, and charts.

- reporting & query

If consumer data is stolen from a business's computers, ________.

- the customers can file a class-action law suit agains the business

"Big Picture" models to keep and maintain:

-"Architecture" of the system for the team to get a rough idea of the whole system structure. -"Domain Model" to help the team to understand the concepts used in the problem domain. -"Key Use Cases " to understand the typical users of the system, and how they benefit from the system.

Explain how Alexa works

-Alexa is the intelligent voice assistant for Amazon. -Beyond its voice interaction abilities programmed by Amazon, third party organizations may also introduce a specialized set of questions and responses (known as a "Skill"). -The system that allows these skills to function begins with the question, or invocation, asked by the user. -These invocations correspond to intents which are part of the skill.

What does the product owner do?

-Define the features of the product -Decide on release date and content -Be responsible for the profitability of the product (ROI) -Prioritize features according to market value -Adjust features and priority every iteration, as needed -Accept or reject work results

Describe the FIPP

-FIPP are guidelines that represent widely accepted concepts concerning fair information practice in an electronic marketplace. -Provide guidance for how to deal specifically with personal information.

What type of services might you go to?

-SLQ queries for your structured data. -Maybe using APIs to automate data retrieval from other sources like social media -Tableau can connect to your TPS database and get real-time data, and it can blend data from sources such as Excel, Google Analytics and APIs.

Describe sprint planning:

-Team selects items from the product backlog they can commit to completing -Sprint backlog is created --Tasks are identified and each is estimated (1-16 hours) --Collaboratively, not done alone by the ScrumMaster -High-level design is considered -Establish the first "seed" architecture Version 1.0 as SAD (Software Architecture Document). -Think of these models not as a specification, but as common ground to create understanding.

Explain what happens when Reviewing Results of System Design with Steering Team

-The systems design report is presented to the project steering team with a recommendation to stop, revise, or go forward with the systems development project -At the end of the design phase, organizations employing the waterfall system development process freeze the scope and the user and business requirements --Any potential changes must go through a formal scope change process

Describe Burndown chart

-Visualize the correlation between the amount of work remaining and the progress in reducing the work -- x: date -- Y: hours of work remaining -Update according the sprint backlog

Scraping with the Google Chrome Extension:

-Web Scraper is an extension for the Chrome browser made exclusively for web data scraping. -You can setup a plan (sitemap) on how to navigate a website and specify the data to be extracted. -The scraper will traverse the website according to the setup and extract the relevant data. -It lets you export the extracted data to CSV.

Responsive Design: Describe Card & Card-like Layouts design pattern

-cards are a way of organizing different topics -card layouts respond well to responsive designs. -smaller screens have helped the web to become more responsive. -pages can be broken up into constituent parts, and reordered on the fly, depending on browser and screen sizes. -cards work for displaying information in bite-sized chunks. -cards often include information such as title, a username, a picture, and various icons, a brief amount of text (like a product description).

Backlog Grooming: groomed through several rounds, consider:

-consider priority -acceptance criteria may be drafted

The 3 priority categories are?

-critical -medium priority -low priority

What are the daily scrum meeting parameters?

-daily -15-minutes -stand-up

Data modeling defines...

-databases the system will draw from -new databases the system will create

Scrum is:

-lightweight -simple to understand -difficult to master

What is the product backlog?

-the requirements -a list of all desired work on the project -ideally expressed such that each item has value to that users or customers product -prioritized by the product owner -reprioritized at the start of each sprint

Description of processing controls: What are examples of processing and storage controls?

-the use of passwords and user authentication controls. -backup copies of data -storage rooms that have tight security systems

Scalability: factors in scaling

-type of application -team size -team dispersion -project duration

In terms of information systems, Wikipedia would be an example of _________.

. a group IS (ch 1)

check slide 19

..

What are 6 factors to consider when evaluating information quality.

1. Author 2. Purpose 3. Objectivity 4. Accuracy 5. Reliability and Credibility 6. Currency

What are the most commonly occurring types of employee fraud? (2)

1. Fraudulent use of purchasing or procurement cards (P-cards). 2. Fraudulent claims for travel and entertainment expenses (T&E).

Web Scraping process

1. Go to desired web page 2. Press F12 or right-click & select inspect. 3. In the developer tools, you will find a new tab named 'Web Scraper' as shown in the screenshot below. Click on that tab. 4. Click on "create new sitemap" and then select "create sitemap" 5. Give sitemap a name, (icddstores) and copy/paste the URL of the site in the start URL field. 6. Click on "create sitemap" 7. Click on the Sitemap (icddstores ddl) and select Selectors. 8. Click on blue Add new selector button link to take you to this screen. *check slides for more.

What are the 8 steps in the system analysis phase?

1. Identify and recruit team leader and team members 2. Develop budget and schedule for systems analysis activities 3. Study existing system 4. Develop prioritized set of requirements 5. Identify and evaluate alternative solutions 6. Perform feasibility analysis 7. Prepare draft of systems analysis report 8. Review results of systems analysis with steering team

What are the 9 steps in the system design phase? (very similar to system analysis)

1. Identify and recruit team leader and team members 2. Develop schedule and budget for systems design activities 3. Design user interface 4. Design system security and controls 5. Design disaster recovery plan 6. Design database 7. Perform feasibility analysis 8. Prepare draft of systems design report 9. Review results of systems design with steering team

flat file

A _____ is a simple database program whose records have no relationship to one another.

Designing the site with a mobile-first approach requires:

1. Prioritizing what content goes on the site. 2. Taking your existing website, using software; converting it to a mobile site while keeping the existing content. 3. A stripped down site with little functionality provided. 4. A careful analysis of the functionality needed by users.

Organizations can use several different approaches when developing their software. Name 2 of them.

1. The waterfall 2. Agile software development

How to web scrape

1. You could go website to website and copy and paste data into Excel or Word; clean it; then use it. 2. You could automate the extraction with software; clean it; then use it.

What are 4 accidental man-made disasters that can disrupt business operations?

1. auto accident knocks down power lines to a data center 2. backhoe digs up a telecommunications line 3. operator error 4. fire

What are the 3 steps of the system construction phase?

1. code software components 2. create and load data 3. perform unit testing

What are 6 system controls used to enhance security?

1. input controls 2. processing controls 3. output controls 4. database controls 5. telecommunication controls 6. Personnel controls

What are the 6 phases of the Waterfall system development process?

1. investigation 2. analysis 3. design 4. construction 5. integration 6. testing and implementation

What kind of information might you Scrape?

1. product prices from your competitors. 2. a listing of real estate agents with phone number and email for marketing your Home Selling Software Product. 3. A list of all retail stores in a city for a location analysis project; where might I open my new business? 4. A list of last months restaurant inspections for a research project. 5. A list of all apartment buildings in a city. 6. A list of all products that large e-commerce sites sell that are Made-In-USA; where might I sell my Made-In-USA product? Does it fit within their product lines? Is my pricing reasonable?

Scrum Framework (3)

1. roles 2. ceremonies 3. artifacts

What are the disadvantages of the waterfall system?

1. users get a system that meets the needs as understood by the developers; however, this might not be what the users really need. 2. Often, user needs go unstated or are miscommunicated or misunderstood. 3. Users cant easily review intermediate products and evaluate whether a particular product (ex. a data flow diagram) will lead to a system that meets their business requirements.

What are the 3 questions everyone answers in daily scrum meetings?

1. what did you do yesterday? 2. what will you do today? 3. is anything in your way?

Exam 1 Review Questions

10 points

Enterprise Systems & the Cloud

10 points Ch. 8 (356-367) Ch. 6 (279-284)

Employee Fraud & Data Analysis...

10 points...

Quality Info and Web Scraping Scraping Web Data with Chrome Web Scraper Extension Cleaning the Data

10 points...

43) Which of the following statements is true about peer production? A) The creator is responsible for publishing new information. B) Only editors have the right to develop new content. C) It is also known as enterprise content systems. D) Anyone can help in producing or improving the final outcome. E) The guest is a person who can only view the digital information.

?

A company buys and receives products from suppliers that they will sell on their e-commerce site. Once they receive the products from the suppliers and record it in their Purchasing System; they create a spreadsheet of products and quantities received; and then manually update the quantity available for sale in their ecommerce system. Real-time system integration might enable them to: a. Sell more products by having more accurate and real-time data b. Avoid using a database and instead, rely on integration software for better control c. Avoid using a spreadsheet and instead, rely on an Access database for data entry and control d. Avoid using a spreadsheet and instead, rely on ETL for weekly data transfers e. 2 of the above are correct

A

What is a Wiki?

A Web site that allows you to create, change, or eliminate content

record

A collection of fields all related to a single object, activity, or individual is a(n) _____.

What is a mashup?

A combination of information and applications originating from different sources being displayed on one computer screen

What is a digital dashboard?

A computer screen that provides tailored, current snapshots of information and trends

Conversion

A conversion is reported whenever a user completes a goal or makes a purchase during a session. Each goal will report a maximum of one conversion per session, while every transaction is reported.

distribution and accounting

A customer relationship management (CRM) system helps a company in managing ______.

What is a disaster recovery plan?

A documented process to recover an organization's business information system assets including hardware, software, data, networks, and facilities in the event of a disaster

2012

A friend's computer came with Windows 8 operating system. Which of the following years was the computer most likely bought in?

theory of evolution

A genetic algorithm is an approach to solving problems based on the _____.

embedded system

A global positioning system (GPS) device uses a(n) _____ to help people find their way around town or more remote areas.

formation of blood clots

A job that requires sitting at a desk and using a computer for many hours a day can lead to _______.

it employs a database of key operational and planning data that can be shared by all

A key feature of an enterprise system is that _________.

What is a data warehouse?

A logical collection of information gathered from many different operational databases to create business intelligence

true

A negative value for a student's grade point average is an example of a data integrity problem

version

A new _____ is a major program change, typically encompassing many new features.

What is a project scope document?

A one-paragraph statement about the scope of the proposed project

Client-Server

A pull-based interaction style (client requests data from servers as when needed).

What is the waterfall methodology?

A sequential, activity based SDLC

Describe the waterfall system development process.

A sequential, multistage system development process. -Work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified if necessary.

What is Enterprise Resource Planning (ERP)?

A set of integrated programs that manage a company's vital business operations for an entire organization. -leading provider is: SAP and Oracle

What is the sprint goal?

A short statement of what the work will be focused on during the sprint

up to 500

A small and medium-sized enterprise (SME) is a legally independent enterprise with _____ employees.

What is the difference between a social networking site and a social networking system?

A social networking site is a virtual place to socialize; a social networking system is the tools that link you to people

What are the pros of buying software?

A software solution can be acquired and deployed relatively quickly. An organization can "test drive" software before acquiring it.

What is SQL?

A standardized fourth generation language found in most DBMSs

D. structured query language

A standardized language used to manipulate data is _____. A. MS-Access B. Oracle C. query-by-example language D. structured query language E. data-manipulation language

JSON is a (mostly) language-independent way of specifying objects as name-value pairs. A "value" can be:

A string, a number, true, false, null, an object, or an array.

What is the systems development life cycle (SDLC)?

A structured approach for developing information systems

Prepare Draft of Investigation Report

A systems investigation report that summarizes the results of the systems investigation and recommends a course of action

Which of the following is NOT an example of a common use of a point-of-sale (POS) device?

A teller in a bank uses a POS to withdraw money for a customer.

Why is prototyping a valuable tool?

Because it allows users to evaluate and enhance requirements

input/output

A(n) _____ device provides data and instructions to the computer and receives results from it.

primary key

A(n) _____ is a field or set of fields in a record that uniquely identifies the record.

B. Field

A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. A. Byte B. Field C. Record D. File E. Database

C. Record

A(n) _____ is a logical grouping of related fields. A. Byte B. Field C. Record D. File E. Database

D. File

A(n) _____ is a logical grouping of related records. A. Byte B. Field C. Record D. File E. Database

1) Traditionally, companies are organized around four distinct functional areas. Which of the following is one of those four areas? A) supply chain management B) risk management C) technology management D) communication management E) systems management

A) supply chain management

57) Which of the following is a role of monitoring and sensing agents? A) tracking inventory levels B) sending a report at the first of the month C) assembling customized news D) analyzing data warehouses to detect changes deemed important to a user E) finding the best price for a particular product the user wants to purchase

A) tracking inventory levels

42) Packaged software is ________. A) used for standardized, repetitive tasks B) developed exclusively for a specific organization C) unique to a particular business or organization D) an application that needs to be maintained internally when changes are required E) used to accommodate a customer's particular preferences and expectations

A) used for standardized, repetitive tasks

Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system? a. All of them b. 1 and 3 only c. 1 only d. None of them

A; All

An ______ is very much the same thing as a UI (user interface), except that it is geared for consumption by software instead of humans.

API

If you created links on your personal Web site that connected your visitors to businesses with the goal that you would earn a fee for purchases made by your visitors, what type e-commerce model are you creating?

Affiliate programs

release

After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.

Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system?

All of them (Rationale: A transaction is any business-related exchange of information) (ch 1)

SWAPI: JSON Schema

All resources support JSON Schema

true

An attribute is any characteristic or quality that describes a particular entity

true

An entity is a person, place, thing, or event about which information is maintained

For a moment, imagine yourself visiting your local florist to order flowers for a party you were preparing for. The florist, however, did not have the type of flower arrangement you hoped for but the florist was able to immediately find, order and deliver this arrangement directly to your home from their supplier. What kind of relationship does this represent?

An information partnership

workgroup

An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.

What is an enterprise resource planning (ERP) system?

An integrated software system for every functional area within an organization

enterprise search

An international package shipping company like FedEx needs to be able to track the location of every package at every stage in the process, from pick-up to delivery.​ Which specific type of software would be useful in this situation?

multitasking

An operating system with _____ capabilities allows a user to run more than one program concurrently.

false

An organization's data warehouse generally maintains its operational data.

Which of the following DBMS components allows you to quickly develop computer routines or tasks that will process your business transactions?

Application generation subsystem

Authentication

Application or developer keys to be able to talk with APIs.

Which of the following is the science of making machines imitate human thinking and behavior?

Artificial intelligence

_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.

Artificial intelligence systems (pg 422)

A. instance

As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. A. instance B. individual C. representative D. entity E. relationship

accounts payable

As an organization's purchasing systems generate purchase orders and the items ordered are received, information is sent to the _____ system to manage the amounts owed by the organization.

79) ________ is a commonly used method of random access control, in which each workstation "listens" to traffic on the transmission medium (either wired or wireless) to determine whether a message is being transmitted. A) Code division multiple access B) Carrier sense multiple access C) Hybrid coordination function D) Group packet radio service E) Point coordination function

B) Carrier sense multiple access

20) ________ are performed by the functional areas that process inputs and produce outputs. A) Base activities B) Core activities C) Support activities D) Extended activities E) Focus activities

B) Core activities

true

Data marts are designed for the end-user needs in a strategic business unit or department.

Your student ID is an example of a(n) _____.

Attribute

_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.

Augmented reality

What is an example of (API): You want your Super Bowl coverage to include a live stream of every Instagram photo taken near the stadium.

Automating a news app that needs live data from other sources.

23) ________ is the data that is deemed most important in the operation of a business. A) Metadata B) Master data C) Reference data D) Query data E) Tactical data

B) Master data

54) The processing in an ES is called ________. A) clustering B) inferencing C) normalization D) recommending E) data cleansing

B) inferencing

2) Which of the following is a core business process? A) time-to-purchase B) make-to-stock C) plan-to-produce D) account-to-report E) hire-to-retire

B) make-to-stock

PaaS: Big Data Analysis

Big data is a popular term for massive data sets thsat contain potentially valuable patterns, trends, and associations. Mining data sets to locate or tease out these hidden patterns requires a huge amount of processing power, which IaaS economically provides.

When you connect your computer to a printer using _____, the distance between them cannot be longer than 30 feet.

Bluetooth

Who must formally approve of any changes?

Both the project sponsor and the steering team.

What is the term used when businesses employ GIS software to generate maps showing information of interest to them?

Business geography

To succeed in business and to enable your organization to extract meaningful information from its information repositories, you need which type of application?

Business intelligence

How is data analysis effective in identifying employee fraud?

By analyzing millions of transactions and looking for a variety of indicators of fraud, data analysis can make up for control weaknesses and rapidly identify where fraud has occurred.

API: How can clients modify (add to) the resource?

By using HTTP POST.

A company buys and receives products from suppliers that they will sell on their e-commerce site. Once they receive the products from the suppliers and record it in their Purchasing System; they create a spreadsheet of products and quantities received; and then manually update the quantity available for sale in their ecommerce system. Options for real-time system integration software are: a. Design and build integration software that automates ETL for weekly data transfers b. Avoid using a database and instead, rely on integration software for better control c. Buy real-time system integration software from a software provider and implement it d. Design and build a new Purchasing System that uses larger relational database software e. 2 of the above are correct

C

Big and unstructured data is often stored in a NoSQL database for which of these reasons: a. It needs a tabular row and column structure b. It needs a relationship structure with key fields and foreign keys c. Data is spread over multiple servers leading to better response times for queries d. Data is concentrated in one server leading to a better reporting response time e. 2 of the above are correct

C

When assessing security threats and procedures for endpoints; which of the following is True: a. All endpoints have the same risk level b. All endpoints implement the same standard security procedures c. All endpoints should have an up-to-date Operating System installed d. All endpoints should have data encrypted e. 2 of the above are True

C

85) According to the OSI model, the physical layer defines ________. A) the protocols for data routing to ensure that data arrives at the correct destination B) the way data is formatted, converted, and encoded C) the mechanism for communicating with the transmission media and interface hardware D) the way that application programs such as electronic mail interact with the network E) the protocols for structuring messages

C) the mechanism for communicating with the transmission media and interface hardware

26) Which of the following is one of the uses of geotagging? A) to use avatars while chatting online B) to create categorization systems for social cataloging C) to know the location of a person sending out a breaking news update D) to create folksonomies for social bookmarking E) to use syndicate feeds while sharing media

C) to know the location of a person sending out a breaking news update

84) According to the OSI model, the ________ layer defines the protocols for structuring messages. A) physical B) session C) transport D) data link E) network

C) transport

46) The features and modules that an enterprise system comes with out of the box are referred to as the ________. A) best-practices version B) reengineered version C) vanilla version D) customized version E) modified version

C) vanilla version

18) Which of the following goods are typically produced under a make-to-order approach? A) expensive high-volume goods B) cheap low-volume goods C) very expensive low-volume goods D) mass-produced goods E) goods from external vendors

C) very expensive low-volume goods

In what type of e-commerce do the consumer drive supply and the business drive demand?

C2B

Which question does not support a business' efforts to support and maintain a competitive edge?

Can this technology make the company look better?

The ______ is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards.

Card Verification Number

nettops

Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying?

Which of the following is a markup language for defining the visual design of a Web page or group of pages?

Cascading Style Sheets (CSS)

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

Code of Ethics

Which of the following is not a major tool for self-sourcing?

Collaboration software

Which type of system improves the performance of teams by supporting the sharing and flow of information?

Collaborative

What is business intelligence?

Collective information about a business' customers, competitors, partners, environment, and operations

_________ involves the generation, collection, dissemination, and storage of project information in a timely and effective manner.

Communication management

What must you have before you can effectively use a DSS?

Considerable knowledge or expertise

How do you apply the "strive for consistency" principle?

Consistent sequences should be required in similar situation; identical terminology should be used in prompts, menus, and help screens; and consistent commands should be employed throughout.

Which form of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites?

Consumer-to-consumer (C2C) e-commerce

What type of analytics mines audio, video, or graphical content to identify underlying meaning?

Content

Paid Search

Cost-per-click or CPC can be seen in the Acquisition reports and typically refers to people clicking through to your website from paid ads. This includes traffic from linked Google AdWords accounts and campaign tagged URLs where the medium has been defined as 'cpc' or 'paid'.

_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

Critical analysis

Which of the following is a characteristic of a proposed system that is essential to the success of your organization?

Critical success factor

What is the name of the non-paid, non-employee business model of collaboration used by Goldcorp a Toronto-based gold mining company in Canada?

Crowdsourcing

20) A query is used to ________. A) organize and sort the data in a database B) allocate storage space for a database C) eliminate data duplication D) retrieve information from a database E) prevent illegal or illogical entries from entering the database

D) retrieve information from a database

Which of the following systems uses information about customers to gain insights into their needs, wants, and behaviors in order to serve them better?

Customer relationship management (CRM)

Which of the following systems can be used to gain insights into the needs, wants, and behaviors of customers?

Customer relationship management systems (CRM)

On which group of people does business intelligence collect knowledge?

Customers and business partners, Competition and competitive environment, Internal Operations

What are the pros of building software?

Customized software is more likely to be a good match to an organization's needs. A custom application provides the potential to achieve competitive advantage.

Which of the following subject areas does the USA Patriot Act cover?

Cyberterrorism

24) Outbound logistics activities focus on the ________. A) processing of orders B) distribution of end products within the order-to-cash business process C) pricing of goods and services D) transformation of raw materials into end products E) receiving and stocking of raw materials, parts, and products

D) transformation of raw materials into end products

30) A(n) ________ information flow consists of information that is received from another organization. A) stand-alone B) legacy C) packaged D) upstream E) downstream

D) upstream

27) Which of the following is an example of synchronous communication? A) online reviews B) work flow automation systems C) intranets D) videoconferencing E) collaborative writing tools

D) videoconferencing

50) Which of the following analysis are you conducting to make hypothetical changes to the data associated with a problem and observe how these changes influence the results? A) predictive analysis B) time-series analysis C) linear regression analysis D) what-if analysis E) multivariate analysis

D) what-if analysis

Similar to what you find in a car, a business _____ provides rapid access to information, in an easy-to-interpret and concise manner, which helps organizations run more effectively and efficiently.

DASHBOARD

A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

DATA DICTIONARY

_____ involves reentering data that was not typed or scanned correctly.

Data correction (355)

If you were the marketing director and involved in the design and development of a new marketing application, which phase would your responsibilities begin to lessen with this new project?

Development

In contemporary business, success depends on minimizing the _____ in an attempt to reduce the costs of producing and selling products or services.

Distribution chain

_____ involves reducing the number of employees to cut costs.

Downsizing

Before importing data into Access from another source; like Excel; the data should be cleaned. Converting multi valued columns in Excel into multiple columns in Excel prior to moving to Access: a. Is not necessary as Access uses multi-valued fields b. Is not necessary as Access converts multi-valued Excel columns into multiple columns when you run a Make Table query c. Is not necessary as Access converts multi-valued Excel columns into multiple columns when you run an Append Table query d. Is necessary only if you have more than 1 table in Access e. None of the above are correct.

E

Types of data that can be moved from the source to Access include: a. Transaction data b. Unstructured data like web ad data c. Data stored in a different relational database d. Sentiment Analysis customer scores stored in your ERP system e. All of the above

E

Which of the following is an example of unstructured data: a. University of Iowa course registrations b. Social media posts c. University of Iowa payment amounts received for tuition d. Clickstream data e. 2 of the above are examples

E

5) An online retailer has finished creating a customer record. What should the retailer do next in an order-to-cash process? A) create order B) allocate stock C) pick, pack, and ship D) prepare and send invoice E) check customer credit

E) check customer credit

5) A major benefit of social software is the ability to harness the "wisdom of crowds," which is also referred to as ________. A) collaborative filtering B) preference elicitation C) creative commons D) consensus democracy E) collective intelligence

E) collective intelligence

_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.

Economic feasibility

_____ are people who work directly with information systems to get results.

End Users (ch1)

In the world of e-commerce, your business should be able to distinguish between which of the following?

End consumers and other businesses

What group of people knows little about IT but a lot about domain knowledge?

End users

_____ are people who work directly with information systems to get results.

End users

What does an Enterprise Resource Planning System do?

Ensures the information can be shared across all business functions and all level of management to support the running and managing of business.

A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization

FALSE

A marketing manager who does not have deep knowledge of information systems or data science, willNOT be able to use BI tools

FALSE

A personal area network (PAN) is a wireless network that connects information networking devices within a small area, such as an office, home, or several floors of a building.

FALSE

A podcast is a video broadcast over the Internet.

FALSE

A strong security program begins by assessing the backgrounds of the employees in the organization.

FALSE

A wide area network (WAN) is a telecommunications network that connects users and their computers in a geographical area that spans a campus or business park, but not beyond the city limits.

FALSE

As the complexity of a network increases, the possibility of security breaches decreases.

FALSE

Children and young adults under 18 can easily become the victims of crimes due to their use of social media, but adults are entirely safe in using social media.

FALSE

Chip-and-PIN cards employ a computer chip that communicates with a card reader using infrared frequencies so that the cards do not need to be swiped at a terminal.

FALSE

Cybercriminals are hackers who try to steal business information or government data related to a nation's infrastructure, all for personal gain.

FALSE

Data cubes can be created on an ad hoc basis. There is no need to create them ahead of time. -

FALSE

Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.

FALSE

Educational institutions' Websites are the most commonly targeted sites by phishers

FALSE

If an activity is defined as legal then it is ethical.

FALSE

In linear regression, you are to find a line that best fits the data. Sometimes the line may be curved.

FALSE

In the past, market segmentation has been easy for B2B marketers because firmographic data was easy to obtain

FALSE

It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.

FALSE

A database administrator (DBA) is an important nontechnical position responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization

False

the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used.

False

A designer would use computer aided manufacturing (CAM) to create, analyze, and modify the design of a component

False (CAD would be used. pg 367)

"Adapting" is the second stage in Lewin's Change Model, which involves learning new work methods, behaviors, and systems.

False (Change Model = Unfreezing, Moving, Refreezing)

Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.

False (Identifies a business problem and then...) ch 5

If 10 users can run programs at the same time on the same computer, it is known as multi-tasking.

False (Multi-User) p 144

DBMSs are used primarily for modeling data.

False (ch 5)

all of these answers

Flexibility is a major component of ergonomic design, mainly because: _______.

A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is ___________.

Flexible (pg 7)

How do you apply the "offer informative feedback" principle?

For every user action, there should be some system feedback. For frequent and minor actions, the response can be modest, while for infrequent and major actions, the response should be more substantial.

join

For the ____ operation, it is required that the the two tables have a common attribute.

Every primary key can also be a(n) _____ key.

Foreign

Having access to information in a usable form is an example of the _____ quality attribute of information.

Form

Having an audio file that describes current environmental factors that you can listen to while walking to a meeting is an example of the _____ quality attribute.

Form

In a downward information flow, how is data passed?

From management to operations

Which systems are typically used to support customers or sales?

Front office systems

What are a set of steps that relate variables representing inexact information or personal perceptions?

Fuzzy logic algorithms

Which type of e-commerce refers to the electronic commerce activities performed within a nation's government or between governments?

G2G

Data _____ is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted.

GOVERNANCE

Which of the following is an optimizing system; one that continues to process your information until it discovers the best solution for your problem?

Genetic algorithm

If you needed to analyze the bear population in Maine and their interactions with humans located in towns and cities, what type of computer application should you use?

Geographic information system

Which type of DSS allows you to analyze spatial information?

Geographic information system

Which Internet business has "Do the right thing; don't be evil." as one of its values?

Google

nettop

Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) ________.

PaaS: High-performance computing

High performance computing (HPC) on supercomputers, computer grids, or computer clusters helps solve complex problems involving millions of variables or calculations. Examples include: earthquake and protein folding simulations, climate and weather predictions, financial modeling, and evaluating product designs.

B. explicit

Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. A. tacit B. explicit C. managerial D. geographical E. cultural

In addition to the intellectual assets that are needed to succeed in today's competitive environment, what do contemporary organizations need?

IT systems capable of capturing, organizing, and disseminating these assets

_____ is the standard page description language for Web pages.

Hypertext Markup Language (HTML)

Description of Personnel Controls: ____________ and other security devices (such as smart cards) can prevent unauthorized people from entering strategic areas in the information systems facility.

ID badges

You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is ______.

INCREASE VULNERABILITY

You are part of an Information Systems project team. Your job is to ensure that the technology and vendor suggested for use in the project are consistent with the IS strategy. Your role in the project steering team is _____.

IS Manager

Which of the following statements successfully differentiates the term MIS from IT?

IT is a component of MIS

false

It is easy to manage all the data coming into an organization.

internet of things

If your home air conditioner has an IP address, it is part of the ____​.

In which SDLC phase should you create user documentation?

Implementation

Customer Relationship Management

In Book....

false

It is important for applications and data to be dependent on each other.

false

In a data warehouse, existing data are constantly purged as new data come in

D. uniquely identify a record

In a database, the primary key field is used to _____. A. specify an entity B. create linked lists C. identify duplicated data D. uniquely identify a record E. uniquely identify an attribute

personal cell phone use and internet surfing

In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace?​

B. record

In a relational database, every row represents a(n) _____. A. file B. record C. attribute D. primary key E. secondary key

A. attribute

In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): A. attribute. B. entity. C. primary key. D. object. E. file.

some time later than

In batch processing systems, data processing is done _______ data capture.

E. Product, store, and week

In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart's sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? A. Customer, product, and month B. Customer, product, store C. Customer, product, store, and month D. Customer, product, store, and week E. Product, store, and week

sharing and selling

In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT ________.

invoice

In the context of purchasing systems involved in the traditional transaction processing systems, when a(n) _____ arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent.

B. Bit.

In the data hierarchy, the smallest element is the _____. A. Record. B. Bit. C. Byte. D. Character. E. File.

about half

In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails?​

true

Increasing amounts of external data need to be considered in making organizational decisions.

What is an advantage of being an early adopter of technology?

Increasing the competitive advantage of the organization

Maintenance, repair, and operations (MRO) materials refer to which type of material?

Indirect materials

_____ is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society.

Informatics pg 441

What is external information?

Information about the environment

Compared to the agricultural age where the work force focused on the production of food, we now work in the _____ where the focus has shifted to the production of knowledge.

Information age

Which of the following systems development techniques requires IT specialists that are in-house to develop business applications?

Insourcing

You work for a manufacturing business. Your employer uses a model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation?

Install a Business Rules management system and interface it to the Supply chain management system.

Which type of online environment supports virtual teams and the online activities they complete?

Integrated collaboration environments (ICEs)

Which type of constraint ensures the quality of information in a relational database?

Integrity constraint

To be successful in today's competitive environment, what must a company have?

Intellectual assets

In what decision making phase do you recognize a problem, need, or opportunity?

Intelligence

____________ as a Service (SaaS) provides you with a completed product that is run and managed by the service provider.

Software

You wish to learn a programming language that can be used on any computer. What language would it be? (Java, php, JavaScript, ASP.Net)

Java

applets

Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document.

What is JSON?

JavaScript Object Notation; a minimal, readable format for structuring data. It is used primarily to transmit data between a server and web application, as an alternative to XML.

When IT specialists and end users meet in one location to define and review the business requests for a proposed system, the meetings is called a _____?

Joint application development session

If you were to purchase a car before it was manufactured and the assembly of that car was dictated by your requirements, you would be utilizing which type of manufacturing process?

Just-in-time manufacturing

________ have specific targets that directly impact business outcomes.

KPI's

schedule feasibility

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.

Which of the following activities is not part of component-based development?

Learning and using new technologies to enhance existing information systems

involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation.

Libel p 613

_____ is an open-source operating system whose source code is freely available to everyone.

Linux

_____ is an open-source operating system whose source code is freely available to everyone.

Linux (ch 4)

This harmful malware is triggered by a specific event, such as Friday the 13th.

Logic Bomb

What is Lusha?

Lusha is a platform which locates business and individual profile information, such as emails and phone numbers, and it is used for recruitment, marketing, and sales purposes.

A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.

MAN

What coordinates and uses three organizational resources; information, people, and IT?

MIS

_____ issues deal with what is generally considered right or wrong.

MORAL

The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.

Main memory

The SDLC contains seven phases. Which phase monitors and supports the new system to ensure it continues to meet your business goals?

Maintenance

Which of the following deals with the planning for, development, management, and use of information technology?

Management information systems

sales forecasting

Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with _______ to develop an estimate of future customer demand.

_____ divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics.

Market segmentation

What is the set of marketing tools that your organization will use to pursue its marketing objectives of reaching and attracting customers?

Marketing mix

Which type of marketing is used to discover small pockets of people within a larger group?

Micro targeting

_____ is an example of a popular general purpose software suite for personal computer users.

Microsoft Office

a repetitive strain injury

Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with _______.

What topics are considered so important that they are placed on top of the strategic planning pyramid?

Mission and vision

Which term describes a business' approach to offering multiple ways in which customers can interact with it?

Multi-channel service delivery

Which data warehouse tools are slice-and-dice techniques that allow you to view multidimensional information from different perspectives?

Multidimensional analysis

_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards.

Near field communication (NFC)

_____ is a hard disk drive storage device that is set up with its own network address and provides file-based storage services to other devices on the network.

Network-attached storage (NAS)

an embedded system

New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____.

Is transaction processing considered a business intelligence practice?

No

Should a business' decisions about its technology drive its business strategy?

No, business strategy should drive decisions about its technology

_____ is/are considered to be the most important element in computer-based information systems.

People (ch 1)

B. Data integrity.

Not including alphabetic characters in a Social Security Number field is an example of _____ . A. Data isolation. B. Data integrity. C. Data consistency. D. Data redundancy. E. Application/data dependence

consulting with stakeholders to establish future needs

Once new software has been selected, implementation will include all of these tasks EXCEPT _________.

the software provides a company a competitive advantage by solving problems in a unique manner

One advantage of proprietary software versus off-the-shelf software is that _____.

it can take a long time and significant resources to develop the required software features

One of the disadvantages of proprietary software is that ______________.

​present the results in an easy to understand manner

One of the goals of business intelligence is to _________.

B. They are responding to federal regulations.

Organizations are turning to data governance for which of the following reasons? A. They have too little data. B. They are responding to federal regulations. C. Their data are typically structured. D. Their data are usually located in the organization's databases. E. Data across their organizations are generally consistent.

Which of the following systems development techniques delegate development tasks to a third party for a specified cost, period of time, and level of service?

Outsourcing

If a business sends information to its partners, suppliers, or distributors, what type of information flow is this considered?

Outward/inward

Which of the following statements is true of the E-Government Act of 2002? a. It renews the U.S. government's authority to monitor electronic communications of foreigners abroad and authorizes foreign surveillance programs by the National Security Agency (NSA). b. It defines procedures to request judicial authorization for electronic surveillance of persons engaged in espionage against the United States on behalf of a foreign power. c. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people. d. It restricts government access to certain records held by financial institutions.

P 607: c. It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.

API: _______ is a way to send hidden data as part of a request, data that doesn't get listed as part of the URL.

POST

PaaS: Development Framework

PaaS provides a framework that developers can build upon to develop cloud-based applications.

You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?

Parallel start up

If you were a programmer and needed to view information as it was stored by the database, what type of database view would you see?

Physical view

_____ involves running a complete new system for one group of users rather than all users.

Pilot Startup

D. Bit - byte - field - record - file - database

Place the following members of the data hierarchy in their correct order: A. Bit - byte - field - record - database - file B. Bit - field - byte - record - file - database C. Byte - bit - record - field - database D. Bit - byte - field - record - file - database E. Bit - record - field - byte - file -- database

The SDLC contains seven phases. Which phase is devoted to creating a solid plan for developing your information system?

Planning

__________ as a Service (PaaS) includes IaaS (the infrastructure)

Platform

What term is used to describe a small Web page containing an advertisement that appears on your screen, outside the current Web site loaded into your browser?

Pop-up ads

If your phone number was used in a clothing store to uniquely identify you as a customer, the phone number would be considered a(n) _____.

Primary key

To use SaaS, simply.....?

Rent the use of an app for your organization, and your users connect to it over the Internet, usually with a web browser.

What data manipulation tool allows you to create intermediate subtotals and grand totals?

Report Generator

___________ is a solid KPI for every business.

Revenue

What is the process in which a buyer posts its interest in buying a certain quantity of items with specified purchasing requirements and suppliers then compete for this business?

Reverse auction

Which of these organizations offers guidelines on developing security policies?

SANS

Which organization offers guidelines on developing security policies?

SANS

A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.

SERVER

Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are constantly changing. As a result, Pinterest has turned to Amazon for _______. as

STORAGE AS A BUSINESS

Which of the following is a vendor of popular anti-virus software?

SYMANTEC

A common example of a _________ application is web-based email where you can send and receive email without having to manage feature additions to the email product or maintaining the servers and operating systems that the email program is running on.

SaaS

_______ provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider.

SaaS

_________ allows your organization to get quickly up and running with an app at minimal upfront cost.

SaaS

Customer relationship management (CRM) systems include which of the following functions?

Sales force automation, Customer service and support, and Marketing campaign management and analysis.

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.

Schedule feasibility

What is scrum?

Scrum is a framework for developing and sustaining complex products

Which of the following is NOT one of the four most common issues related to the storage and use of personal data? Notice, Knowledge, Consent, Security

Security

_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.

Self-service analytics

A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications.

Server

The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.

Service-oriented architecture

Which of the following focuses on the development, use, and reuse of small self-contained blocks of code to meet all the application software needs of an organization?

Service-oriented architecture

How to apply the "provide progressive disclosure" principle?

Show only what is necessary on each screen. If the user is making a choice, show enough information to allow the user to choose and then display details on a subsequent screen.

may not be as reliable as mainstream media sources

Social journalism or citizen journalism ​________.

​may not be as reliable as mainstream media sources

Social journalism or citizen journalism ​________.

If you were to create, read, or respond to a blog on Facebook, you would be working with which of the following applications?

Social networking site

What is the difference between multidimensional analysis and statistical analysis?

Statistical analysis is a mathematical approach to understanding information; multidimensional analysis is a way of viewing information from different perspectives

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

Structured Query Language (SQL) (ch 5)

What is structured data?

Structured information is information easily displayed in tilted columns and rows which can easily be ordered and processed. TPS --> Relational Database

_____ encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. ​

Supply chain management

Which of the following activities tracks inventory and information among business processes and across companies?

Supply chain management (SCM)

_____includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers.

Supply chain management (SCM) 361

If you were developing a new information system using selfsourcing, what should be a key consideration of yours?

Supporting the changing requirements and needs of others who uses the new information system

A business-to-business (B2B) market is considerably larger than a business-to-consumer (B2C) market.

TRUE

A client is any computer on a network that sends messages requesting services from the servers on the network.

TRUE

A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.

TRUE

A field is typically a name, number, or combination of characters that describes an aspect of a business object.

TRUE

A software suite is a collection of programs packaged together as a bundle and typically includes a word processor, spreadsheet program, graphics program, and more.

TRUE

A traditional view of information systems holds that organizations use them to control and monitor processes and ensure effectiveness and efficiency.

TRUE

A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.

TRUE

A zombie computer would send requests to access to the target site again and again.

TRUE

An embedded system is a computer system that is implanted in and dedicated to the control of another device.

TRUE

What type of analytics detects patterns in grammar, syntax, and structure?

Text

What is the major difference between B2B and B2C e-commerce?

The B2B marketplace does not involve consumers, just business partners; the B2C marketplace involves consumers

SWAPI: Base API URL

The Base URL is the root URL for all of the API methods

accredited domain name registrars

The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.

_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.

The Internet Protocol (IP)

128-bit

The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.

_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.

The Web

projecting

The action of including only some columns for output while retrieving data is known as ____.

Average visit duration

The average length of time a visitor stays on your website. This number isn't entirely accurate for a few reasons, but can be useful as a way of comparing page performance relative to other pages.

true

The best way to capture the data in an organized format is to use a database.

main memory

The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.

IT supports CRM with front and back office systems. Which statement describes a front office system?

The computer interfaces that collect customers' information and sends it to the main information system

What are the cons of building software?

The cost to build a system can be quite costly compared to the cost of purchasing off-the-shelf software. Custom software can take months or even years to deploy.

true

The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.

support and improve decision making

The goal of business intelligence is to _____.

volume testing

The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

How to apply "strive for aesthetic integrity" principle?

The graphic design elements used in an interface should be simple and clean, pleasant to look at and easy to understand.

In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why?

The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work.

transaction processing system

The information about invoices to customers is tracked by ____ system.

Bounce Rate

The percentage of users that arrive on your landing page and leave your website without viewing any additional pages. A lower bounce rate is generally the goal.

% new visits

The percentage of visitors that have not previously visited your website.

data administrator

The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.

Legal feasibility

The process of determining whether laws or regulations may prevent or limit a system development project.

B. extracting, transforming, and loading.

The process of moving data from various sources into the data warehouse is called: A. uploading. B. extracting, transforming, and loading. C. online transaction processing. D. master data management. E. online analytical processing

cutover

The process of switching from an old information system to a replacement system is called _____.

Even if unit testing is successful, developers cannot assume they can combine individual components into a working system without any problems.

True

Even legitimate organizations sometimes use email spam for promoting products.

True

If an organization considers its IS organization as a game changer, then its strategy would be to use IS to achieve competitive advantage

True

For each data item, a data dictionary usually contains information such as the name of the data item, the range of values that can be used, and the amount of storage needed for the item.​

True

If a worker is seated at a desk using a keyboard, the height of the surface holding the keyboard and mouse should be 1 or 2 inches above the worker's thighs so that his or her wrists are nearly straight.

True

According to the classification of enterprise resource planning (ERP) vendors, _____ vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations

Tier II 360

Having access to information that spans a period of time is an example of the _____ quality attribute of information.

Timeliness

all of these answers

To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________.

What is the objective of business intelligence (BI)?

To provide timely and quality information to decision makers

One function in CRM is the sales force automation (SFA) system. What is its purpose?

To track all the steps in the sales process

natural user interface

Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.

PaaS: Analytics or Business Intelligence

Tools provided as a service with PaaS allow organizations to analyze and mine their data, finding insights and patterns and predicting outcomes to improve forecasting, product design decisions, investment returns, and other business decisions.

Which of the following is an example of commodity like merchandise?

Toothpaste

_______________ ________ ________ does not necessarily prove that fraud has occurred, but it can be a very effective way of highlighting a situation that just does not seem to make sense and warrants further investigation.

Transactional data analysis

4G will deliver 3 to 20 times the speed of 3G networks for mobile devices.

True

A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.

True

A database must reflect the business processes of an organization.

True

A relational model splits the information up into many two dimensional data structures.

True

A senior manager from the business unit most affected by a project and who ensures the project will indeed meet the needs of his or her organization is known as the project sponsor.

True

A slipstream upgrade is a minor upgrade—typically a code adjustment or minor bug fix.

True

What is User Acceptance Testing?

UAT is testing performed by trained systems users to verify that the system can complete required tasks in a real-world operating environment and perform according to the system design specifications

____ is the first phase of the cross-industry process for data mining (CRIPS-DM).

UNDERSTANDING

How to create an API: step 2 Create a ______ to each resource.

URL

What are the cons of buying software?

Unmodified, the software may not be a good match to an organizations needs. Maintenance and support costs can become excessive.

Within an organization information will flow in four basic directions. Which of the following describes the movement of data from operations to management?

Upward

What is e-government?

Use of digital technology to transform government operations

Data ______ tools can take raw data and immediately provide a rich visual image.

VISUALIZATION

A new _____ is a major program change, typically encompassing many new features

Version

Which of the following is an electronic marketplace that connects buyers and sellers in a given industry?

Vertical e-marketplace

What data manipulation tool allows you to see the contents of a database file?

View

web browsers

Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____.

_____ consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes.

Web services

Which of the following results from a well-designed supply chain management system?

Well-designed SCM systems can enhance any of these stated activities

RESTful API: "clients" are ....?

Whatever interfaces use access to data. Ex: -web application -mobile app -doorbell -smartwatch, etc.

false

When data are normalized, attributes in the table depend on the primary key and any secondary keys.

C. primary key

When data are normalized, attributes in the table depend only on the _____. A. secondary key B. common attribute C. primary key D. common row E. common record

streaming video

When video files are played while being downloaded from the Internet, it is called _____.

a wireless access point

When you are looking for a 'hotspot', you are searching for _____​.

You use POST all the time when you use the web. For example,....

When you fill out a form to buy something online, it submits your payment information using POST, because it would be bad if you loaded a URL that put that information out in the open

false

When you start a job, you are given an employee handbook which contains the company's tacit knowledge.

true

When you start a job, you watch what other employees are doing and ask them to explain why they do it in a particular way. They are sharing their tacit knowledge.

C. Decisions about data

Which of the following has (have) the broadest impact on an organization? A. Decisions about hardware. B. Decisions about software C. Decisions about data D. A and B E. All of the above have an equal impact.

process for gathering BI requirements

Which of the following is NOT a core process associated with data management?​

online transaction processing

Which of the following is NOT considered a BI and analytics tool?​

economic fluctuations

Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs?​

schema

Which of the following is NOT one of the parameters that define a project?

mishandling computer outputs

Which of the following is a computer-related mistake?

Users should implement proper procedures to ensure correct input data.

Which of the following is a useful policy to minimize waste and mistakes?

E. All of these are reasons why managing data is difficult over time.

Which of the following is not a reason why managing data is difficult over time? A. New systems are developed. B. The media the data are stored on becomes problematic. C. New sources of data are created. D. The amount of data increases exponentially. E. All of these are reasons why managing data is difficult over time.

It requires federal agencies to post machine-readable privacy policies on their Web sites and to perform privacy impact assessments on all new collections of data of ten or more people.

Which of the following statements is true of the E-Government Act of 2002?

UAT must be completed successfully before newly developed software can be rolled out to the market.

Which of the following statements is true of user acceptance testing (UAT)?

stock investments

Which of the following transactions definitely require online transaction processing and cannot work on batch processing approach?

B. Data inconsistency

You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? A. Data redundancy B. Data inconsistency C. Data isolation D. Data security E. Data dependence

visual programming

With _____, a software engineer drags and drops graphical objects such as buttons and menus onto an application form.

batch processing systems

With _____, business transactions are accumulated over a period of time for processing in a single unit.

data as a service

With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.

Which type of system facilitates the automation and management of business processes?

Workflow

PaaS: Additional service components can be incorporated into your application. Such as:

Workflow, directory, security, and scheduling.

Technical documentation is defined as:

Written details used by computer operators to execute the program and by analysts and programmers to solve problems or modify the program

java

You wish to learn a programming language that can be used on any computer. What language would it be?​

Do businesses use social networking systems?

Yes, to connect to influential people from outside your immediate environment or organization

volume testing

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.

parallel start up

You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?

Evaluating Information quality

You can find information related to companies, products, people, governments, research, etc. that is readily available through the Internet For example: You can find many sites that rank high schools. -What data do they use? -Where is the data from? -Does the information truly represent the overall population? -Is there a potential bias?

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.

a denial-of-service attack

System analysis concludes with...?

a formal analysis report summarizing the findings of this phase of the project (Prepare draft of system analysis report)

The coefficient of determination, r squared, is ____.

a number that indicates how well data fits the statistical model

API is often explained as...?

a technology that allows applications (software programs) to talk with one another. -the terms "software", "applications", "machines", and "computers" are virtually interchangeable.

Which of the following does not influence IT organizational strategies? a. Government regulations b. Innovative thinking c. Business unit strategies d. Technology innovations

a. Government regulations

Suppose a goal your employer sets reads as "95% of our customers will be happy with our product." For which of the following characteristic is this goal inadequate? a. Measurable b. Relevant c. Specific d. Achievable

a. Measurable (pg 464

As an organization's purchasing systems generate purchase orders and the items ordered are received, information is sent to the _____ system to manage the amounts owed by the organization.

accounts payable (Fig 8.4- 350)

Important functions of the chief information officer include a. ​employing an IS department's equipment and staff to help the organization reach its goals b. monitoring the financial considerations of the IS department, such as return on investment c. ensuring the organization complies with laws and regulations d. ​all of these

all of these

In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: _________.

all of these

The Internet of Things connects wireless identifiable objects ________.

all of these

​One method an IS professional might use to find a new job would be ____________.

all of these

Unlike B2C sites, some B2B sites ________.

allow price negotiations

You are to advise XYZ so that their BI efforts are fruitful. Which among the following is the most crucial advice of all? a. You need good data governance practices b. There must be strong commitment from the management c. You need good data management practices d. You need creative data scientists

b. There must be strong commitment from the management

Which of the following is NOT one of the three basic components of a successful e-commerce model? a. community b. capital c. content d. commerce

b. capital P.322

Which of the following is NOT an organizational complement? a. well-trained workers b. familiar processes c. system support d. new decision rights

b. familiar processes (ch 1)

After entering data into a relational database, users can make all of the following basic data manipulations except: a. projecting b. organizing c. joining d. selecting

b. organizing (ch 5)

Authoritarian regimes sometimes limit citizens' access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of ___________.

censorship

Authoritarian regimes sometimes limit citizens' access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of ___________.

censorship (ch1)

VUI: No clear strategy in VUI can also be said about....?

chatbots, VR, and social media. -Many chatbots were created and then abandoned because they on a checkbox list of customer experience "must-haves" rather than part of a strategy.

Suppose a business wishes to move away from hosting its own applications, the recommended solution is to use ______.

cloud computing

Suppose a business wishes to move away from hosting its own applications, the recommended solution is to use ______.

cloud computing (ch 4)

A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.

community of practice (COP)

Which of the following statements is true of network-management software? a. Network-management software allows software to be copied, modified, or downloaded legally or illegally. b. One of the disadvantages of network-management software is the large amount of time spent on routine tasks. c. Network-management software complicates the process of updating files and programs on computers on the network. d. With network-management software, a manager on a networked personal computer can scan for viruses.

d. With network-management software, a manager on a networked personal computer can scan for viruses.

The Internet of Things connects wireless identifiable objects ________. a. with each other b. to their owners c. with a central server d. all of these

d. all of these

The members of an organization who are most likely to contribute to organizational learning are _________. a. hourly employees b. mid-level managers c. executives d. all of these

d. all of these

When an organization wants to develop a new information system to meet its needs, it can _________. a. buy software off the shelf b. build a custom application c. ​choose a software service provider d. all of these answers

d. all of these answers

In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT ________. a. choice b. updates c. access d. sharing and selling

d. sharing and selling

All of the following are examples of ethical issues related to data and information systems EXCEPT _________. a. job losses due to humanlike technologies b. invasion of privacy through technology c. freedom of expression vs. censorship d. the cost of system development

d. the cost of system development

Suppose you work at a business unit that has group of people who would rather wait to try a new technique. They listen to and follow the opinion leaders. They would be classified as the _________.

early majority (Innovators > Early Adopters> Early Majority> Later Majority>Laggards)

A global positioning system (GPS) device uses a(n) _____ to help people find their way around town or more remote areas.

embedded system (ch 4)

In most cases, people referring to Software as a Service are referring to _______-_______ applications.

end-user

You might be an information systems worker if you _________.

enjoy learning new techniques and enjoy working with people

Suppose a small manufacturing business wishes to have a system to manage all its vital business operations, they should go for a(n) _______.

enterprise resource planning (ERP) system

A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective.

enterprise resource planning system

An international package shipping company like FedEx needs to be able to track the location of every package at every stage in the process, from pick-up to delivery. Which specific type of software would be useful in this situation?

enterprise search

Volume testing involves....?

evaluating the performance of the information system under varying yet realistic work volume and operating conditions.

Amy is doing some online research for a term paper. She'd like to access some information on a particular website, but the website is asking her to put in her email address before allowing her to view the information. She wonders what the website owner will do with that information, but there is never any way for her to know how data collected via a website will be used.

false

A deep _________ ____________ doesn't translate well on mobile; it often forces the user to take too many steps to reach the content.

information architecture -which is often supported by cascading menus on the desktop.

Like IaaS, PaaS includes...?

infrastructure ---- servers, storage, and networking.

​According to the diffusion innovation theory, _____ are the risk takers, always the first to try new products and ideas.

innovators

Description of Input Controls: They maintain...?

input integrity and security

A(n) _____ device provides data and instructions to the computer and receives results from it.

input/output

In a denial-of-service (DDoS) attack, the perpetrator ____.

instructs the zombie computers to send simple access requests to target computers

With cloud computing, you don't need to ......?

make large upfront investments in hardware and spend a lot of time on managing that hardware.

The "create and load data" step involves....?

making sure that all files and databases are populated and ready to be used with the new information system.

Some businesses outsource their security management to MSSPs. MSSP stands for ________.

managed security service provider

A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) __________.

management information system (MIS)

A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) __________.

management information system (MIS) (ch1)

Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers.

materials requirement plan 362

A Cloud services platform such as Amazon Web Services owns and maintains the ___________________________________ required for these application services, while you provision and use what you need via a web application.

network-connected hardware

historical data is examined for patterns that are then used to make predictions

neural computing

A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____.

nonvolatile

CPU clock speed is the _______________ at a predetermined rate.

number of electronic pulses created

In most large organizations, the IS department is divided into the following functions __________.

operations, development, and support

​In most large organizations, the IS department is divided into the following functions __________.

operations, development, and support

Which type of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms?

online transaction processing (OLTP) 348

When choosing from various types of flat panel display, choose _______ for low power consumption.

organic LED

These days, the biggest threats to IT security are from ________.

organized groups that have ample resources, including money and sophisticated tools, to support their efforts

Buying ____________________ software is less risky and leads to quicker deployment.

off-the-shelf

Instead, you can..... _____________________________________________ .......to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.

provision exactly the right type and size of computing resources you need

The concept of _______, in connection with IS security, recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

reasonable assurance

The API's job is to....?

receive requests, process data, and send responses.

The RESTful API is doing what?

receiving, processing, and handling requests and responses.

A collection of fields all related to a single object, activity, or individual is a(n) _____.

record (ch 5)

The phase-in approach involves...

slowly phasing the new systems components as the old systems components are phased out.

VUI uses ___________________ technology to enable users to interact with technology using just their voices.

speech recognition Ex: Siri, Alexa

Scrum projects make progress in a series of ________.

sprints

Providing value to a _____ is the primary goal of any organization.

stakeholder

A _____ network is one in which all network devices are connected to one another through a single central device called the hub node.

star

Define policy statement.

statement that describes what the organization's practices are.

The purpose of Advanced Persistent Threat (APT) usually is to

steal data

Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are constantly changing. As a result, Pinterest has turned to Amazon for _______.

storage as a service

Data within the data cube has been ______ by specific dimensional values.

summarized

The goal of business intelligence is to _____.

support and improve decision making

Blend this data with _______________________________ so that employees have more complete information at their fingertips.

systems of record transactional data

presentation graphics

​Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?

verify the card is legitimate and not a stolen card number

​On the back of a credit card the three-digit number above the signature panel is used to _____.

ARM

​Parker has an Android smartphone. Which type of processor is used in his mobile device?

may 13th

​Suppose Task C has Task A and Task B as its predecessor tasks. Task A ends on May 10th and Task B ends on May 12th. When can Task C begin?

​the agreement is to reimburse the costs plus a fixed amount as fee

​Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____.

80-20 rule

​The Pareto principle is also known as the _____.

​alert the Department of Homeland Security about information security incidents

​The US-CERT incident reporting system is used to ____.

conversion funnel

​The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.

IS organization

​The members of the _______ review and consider the corporate objectives, goals, and strategies, and they can generate many ideas for IS projects that support corporate objectives and goals.

mission statement

​The organization's _____ is stated in a challenging manner to inspire employees, customers, and shareholders.

steal data

​The purpose of Advanced Persistent Threat (APT) usually is to ____.

incursion

​The second phase of an Advanced Persistent Threat attack is _____.

activate the forensics analysis team and prepare documentation

​There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?

issues-based strategic planning

​This type of strategic planning defines the organization's vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values.

the spreadsheets "what-if" capability

​To analzye various alternative scenarios, a manager would use _______.

The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is ________.

0.11 to 0.40

A. Byte

A(n) _____ represents a single character, such as a letter, number, or symbol. A. Byte B. Field C. Record D. File E. Database

42) ________ is the creation of goods or services by self-organizing communities. A) Peer production B) A folksonomy C) Creative commons D) Groupware E) Social software

A) Peer production

Examples of well-defined KPIs:

-For a university. Increase (direction) the five-year graduation rate for incoming freshman (measure) to at least 80 percent (target) starting with the graduating class of 2022 (time frame) -For a customer service department. Increase (direction) the number of customer phone calls answered within the first four rings (measure) to at least 90 percent (target) within the next three months (time frame) -For an HR organization. Reduce (direction) the number of voluntary resignations and terminations for performance (measure) to 6 percent or less (target) for the 2018 fiscal year and subsequent years (time frame)

VUI: Your company need to understand its consumers

-What do they want to do on the VUI? -Set a kitchen timer? -Check the weather forecast? -Add an item to their grocery list? -Skip a song on Spotify

Things to consider: Reliability and Credibility

-Why should anyone believe information from this site? -Does the information appear to be valid and well-researched, or is it unsupported by evidence? -Are quotes and other strong assertions backed by sources that you could check through other means? -What institution (company, government, university, etc.) supports this information? -If it is an institution, have you heard of it before? Can you find more information about it? -Is there a non-web equivalent of this material that would provide a way of verifying its legitimacy.

VUI: Limitations

-Will your customers actually use it? -Users have to follow a script -Natural Language Processing

The review system investigation request typically includes what information?

-a preliminary statement of the problem or opportunity to be addressed. -a brief discussion of how this effort aligns with previously defined company and organization objectives, goals and strategies. -Identification of the general areas of the business and business processes to be included in the scope of study.

Scrum Framework - Roles

-product owner -ScrumMaster -team

Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization?

. diffusion of innovation theory

E-Business and Privacy

......

Structured & Unstructured Data........

.......

What are 5 natural disasters that can disrupt business operations?

1. flood 2. tsunami 3. hurricane/cyclone 4. earthquake 5. volcanic erruption

What are advantages of the waterfall system?

1. formal review at the end of each phase allows maximum management control. 2. This approach requires creation of considerable system documentation so that system requirements can be traced back to stated business needs. 3. Approach produces many intermediate products that can be reviewed to measure progress toward developing the system.

What are the 6 principles of good user interface design?

1. strive for consistency 2. offer informative feedback 3. offer simple error handling 4. one primary action per screen 5. provide progressive disclosure 6. strive for aesthetic integrity

T&E frauds alone account for about ___% of all frauds uncovered.

16%

Sprints: typical duration is.....?

2-4 weeks or a calendar month at most.

A friend's computer came with Windows 8 operating system. Which of the following years was the computer most likely bought in?

2012

There are _____ major exams in this course.

3

How long did it take for iPod to penetrate a market audience of 50 million people?

3 years

used to make solid products

3D printing is ___________.

Most companies will not succeeded without having a balanced portfolio of acquisition channels. Show a good balance (%).

40% Search 20% Direct 30% Referring Sites 10 % Ad/Email Campaigns Strengths and Weaknesses?

Dashboards.....

5 points..... Book: Chapter 9 (395-397)

To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: ________.

603: The use of data editing to ensure data accuracy and completeness, the assignment of clear responsibility for data accuracy within each information system, and the implementation of source data automation

Which of the following is true about structured data from an Online Transaction Processing System? a. Each transaction is processed at the time of entry b. Is based upon Business Intelligence analysis c. Data is always captured with a paper document d. Involves unstructured data about 80% of the time e. 2 of the above are correct

A

thin client

A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities.

data definition language

A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

filtering software

Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in _______.

How do you apply the "simple error handling" principle?

As much as possible, design the system so the user cannot make serious error. If an error is made, the system should be able to detect the error and offer simple, comprehensible instructions for handling the error.

According to Lewin and Schein's 3-stage model of organizational change, which of the following tasks would be found in the 'unfreezing' stage?

Assign leaders and implementation team

_____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing.

Assistive technology

data lifecycle management

At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________.

D. many-to-many

At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? A. one-to-one B. one-to-many C. many-to-one D. many-to-many E. some-to-many

17) Business rules are captured by the designers of the database and included in the data dictionary to ________. A) organize and sort the data, complete calculations, and allocate storage space B) prevent illegal or illogical entries from entering the database C) eliminate data duplication D) make sure that each table contains only attributes that are related to the entity E) capture the structure of the database

B) prevent illegal or illogical entries from entering the database

60) By breaking down business processes into individual services, organizations can react more swiftly to changing business needs. To achieve these benefits, services have to follow three main principles: A) reusability, interoperability, and reliability B) reusability, reliability, and componentization C) reusability, interoperability, and componentization D) reusability, interoperability, and accessability E) reusability, accessability, and componentization

C) reusability, interoperability, and componentization

81) Which of the following network topologies is capable of covering the largest distance? A) star network B) bus network C) ring network D) mesh network E) tree network

C) ring network

Transaction processing system output might be used for: f. Developing a predictive model for future student enrollment a. Reporting for evaluating revenue in an e-commerce sales system b. Input into a separate system c. 2 of the above are correct d. All of the above are correct.

D

Transaction processing systems that support a large enterprise typically store data in a: a. NoSQL database b. Excel sheet c. Access database d. Relational database e. None of the above

D

Which of the following is NOT considered a business intelligence (BI) practice or tool? a. Data extraction b. Visualization c. Predictive Modeling d. Transaction processing controls e. All of the above are BI related

D

27) The purpose of a data warehouse is to ________. A) standardize the format of data retrieved from different systems B) allow managers to run queries and reports themselves without having to know query languages or the structure of the underlying data C) provide capabilities for discovering "hidden" predictive relationships in the data D) put key business information into the hands of more decision makers E) reduce the complexity of the data to be analyzed

D) put key business information into the hands of more decision makers

22) Inbound logistics involves business activities associated with ________. A) distributing end products within the order-to-cash business process B) creating marketing literature C) communicating with potential and existing customers D) receiving and stocking raw materials, parts, and products

D) receiving and stocking raw materials, parts, and products

66) Which of the following statements is true about hard data? A) It involves the use of text mining technologies. B) It includes nonanalytical information. C) It involves input from dedicated personnel. D) It includes textual news stories. E) It includes facts and numbers.

E) It includes facts and numbers.

29) A ________ is a data warehouse that is limited in scope. A) metadata repository B) master data C) data model D) data reduction E) data mart

E) data mart

_______ removes the need for organizations to manage the underlying infrastructure (usually hardware and operating systems) and allow you to focus on the deployment and management of your applications.

IaaS

D. columns

In the relational database model, related tables can be joined when they contain common _____. A. primary keys B. rows C. records D. columns E. files

Which of the following is NOT a popular vendor of firewall software? (Red Hat, Check Point, Total Defense, Kaspersky)

Red Hat

When you make a choice that may not necessarily be the best choice but it meets your needs, you're making a(n) _____ choice.

Satisficing

_____ are the most powerful computers with the fastest processing speed and highest performance.

Supercomputers

An enterprise system ensures that information can be shared with all authorized users in different functional.

True

Data represents real-world things including raw facts such as image and audio data.

TRUE

Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which events occurs first?

The network router sends traffic to the firewall as well as to the IDS

false

The relational database model is based on the concept of three-dimensional tables

false

The secondary key is a field that identifies a record with complete uniqueness.

SaaS: _______________________ manages the hardware and software, and with the appropriate service agreement, will ensure the availability and the security of the app and your data as well.

The service provider

bit

The smallest piece of data used by a computer is a(n) _____.

performance and power consumption

The toughest challenge in designing a processor for a smartphone or tablet is balancing _____________.

service-oriented architecture

The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called _____.

measurable

The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for​?

An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.

True

Suppose you are assigned to manage a virtual team. Which of the following will you NOT do? a. be aware of team members cultural sensitivity b. hold team meetings regularly - whether the team members like it or not c. ensure the team members are familiar with each other at a personal level d. define goals, and set expectations

b. hold team meetings regularly - whether the team members like it or not

In the context of enterprise resource planning (ERP) systems, the most efficient and effective ways to complete a business process are called _____.

best practices

_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.

big data (ch 5)

IaaS helps you avoid the expense and complexity of...?

buying and managing your own physical servers and other datacenter infrastructure.

E-commerce sites are able to keep the amount of data entry errors to a minimum ________.

by having the buyers enter products information themselves

Which of the following is considered an "expense" among typical IS project-related costs? a.Software license b. Employee effort c. Consultant charges d. Cost of data entry equipment

c. Consultant charges

One method an IS professional might use to find a new job would be ____________. a. searching and applying for open positions on Internet job sites b. seeking referrals from colleagues, friends, and family members c. all of these d. networking through an IS professionals' organization

c. all of these

A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

data definition language (ch 5)

The process of converting human-readable data into machine-readable form is called _____.

data entry

At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in ___________.

data lifecycle management (ch 5)

Which of the following is NOT an organizational complement?

familiar processes

An in-depth ______________ __________ is done for each of the candidate solutions the team wants to consider.

feasibility analysis

A database is a collection of integrated and related _____.

files (ch 5)

Concerns about what your teens might see online could cause you to invest in

filtering software

Organizations cannot have many value chains.

False

An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.

workgroup (ch 4)

adjourning

​A useful model to describe how teams develop is the forming-storming-norming-performing-___________ model.

SAP

​From which vendor is the BI product Business Objects available?

Over time, disruptive innovation tends to become less attractive to users in a new market.

False

As a Google user, your search history data can be accessed by the NSA and the FBI without obtaining court orders.

True

Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.

. alpha testing

E-Business; Mobile Design; and Privacy

.........

SDLC: Waterfall 5 points Cross reference notes to book Chapter 12 504 - 512; 514 - 519; 521 - 534; 542 - 546 Economic Feasibility Analysis 3 points Spreadsheet

..........

Things to consider: Accuracy

-Are the sources for factual information clearly listed so that information can be verified? -Is it clear who has the ultimate responsibility for the accuracy of the content of the material? -Can you verify any of the information in independent sources or from your own knowledge? -Has the information been reviewed or refereed? -Is the information free of grammatical, spelling, or typographical errors?

Mobile E-Commerce: Cyber Monday

-cyber Monday 2017, Mobile saw its first $2 Billion. -claiming just under 1/3 of the money spent online. -Smartphones accounted for 37.6% of retail visits and 21% of the revenue on Cyber Monday. -Smartphone conversion rates were up by roughly 10%

The goals of volume testing are to:

-determine the work load at which systems performance begins to degrade. -eliminate issues that prevent the system from reaching its required performance.

The overall emphasis on system analysis is on:

-gathering data on the existing system -determining requirements for the new system -considering alternatives within identified constraints -investigating the feasibility of alternative solutions.

Specific security and controls include:

-hardware -software -database systems -telecommunications -internet operations

The Agile Manifesto

-individuals and interactions over process and tools -working software over comprehensive documentation -customer collaboration over contract negotiation -responding to change over following a plan

What need/problem do API consumers need to solve?

-they want to provide a feature in their website, or mobile application. -often times people just want two systems to talk to each other. -or be able to analyze and visualize information in a particular way, to accomplish a business objective.

What other needs do API consumers have?

-to get information that would be time-consuming to get there otherwise. -to get information that you can't get otherwise. -To automate a news app that needs live data from other sources. -To use it as a more direct interface for reading and writing data to a service.

Describe the Team

-typically 5-9 people -cross-functional (programmers, testers, user experience designers, etc.) -members should be full-time --may be exceptions (ex. database admin) -teams are self-organized (ideally no titles, but rarely possible) -membership should only change between sprints

Federal Express (FedEx) was one of the first large companies to empower customers to serve themselves at their convenience through the use of _____.

. a corporate extranet

Name 4 advantages of ERP

1. Improved access to quality data for operational decision making 2. Elimination of costly, inflexible legacy systems. 3. Improvement of work processes. 4. Opportunity to upgrade and standardize technology infrastructure. --Why build and re-invent the wheel, when you can buy it?

33) Which of the following statements is true about key-indicator reports? A) They provide a summary of critical information on a recurring schedule. B) They help analyze why a key indicator is not at an appropriate level or why an exception occurred. C) They are produced at predefined intervals to support routine decisions. D) They highlight situations that are out of the normal range. E) They answer unplanned information requests to support a nonroutine decision.

A) They provide a summary of critical information on a recurring schedule.

40) How do online analytical processing systems improve performance? A) They preaggregate data so that only the subset of the data necessary for the queries is extracted. B) They use reasoning methods based on knowledge about a specific problem domain. C) They make hypothetical changes to the data associated with a problem. D) They allow for multiple dimensions to be added to a traditional two-dimensional table. E) They provide capabilities for discovering "hidden" predictive relationships in the data.

A) They preaggregate data so that only the subset of the data necessary for the queries is extracted.

value

A core _____ is the widely accepted principle that guides how employees behave and make decisions in the organization​.

47) ________ is a systematic, structured improvement approach by all or part of an organization whereby people critically examine, rethink, and redesign business processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle time, or cost. A) Business process management B) Business activity monitoring C) Business service management D) Application performance management E) Application service management

A) Business process management

34) Legacy systems can prove problematic when information from multiple departmental systems is required to support business processes and decision making. Which of the following is most similar to the above scenario? A) Chuck's is a retail chain that has an inventory management system which is tied to an RFID system. This system notifies Chuck's managers when the inventory in its stores fall below a certain level. B) Quick Software Solutions has an automated system to track employee absence. It also uses a non-automated system like attendance registers that employees sign everyday. This information is updated to Quick's database management system on a weekly basis. C) Nuok Tires supplies its products to Fresto, an automobile manufacturer. Nuok Tires' factories are located close to Fresto's factories to minimize transportation costs. D) Fender, a guitar manufacturer, allows customers to design their guitars online. Potential buyers need to send this design with the order to receive their customized guitars. E) Jsutmi successfully pursues a just-in-time inventory system. Recently, however, it has not been able to meet demand due to labor problems.

A) Chuck's is a retail chain that has an inventory management system which is tied to an RFID system. This system notifies Chuck's managers when the inventory in its stores fall below a certain level.

58) Which of the following is true regarding the formula for success of an enterprise system? A) Enterprise systems implementations should include personnel from different departments. B) The success of an enterprise system depends directly on the support received from middle-management. C) Enterprise systems are simple to understand and implement when compared to stand-alone systems. D) Using outside consultants tends to complicate the implementation of an enterprise system. E) Once enterprise systems go live, employees experience an immediate growth in productivity.

A) Enterprise systems implementations should include personnel from different departments.

18) ________ are used to capture data to be added, modified, or deleted from the database. A) Forms B) Reports C) Queries D) Bots E) Layers

A) Forms

53) ________ allows expert system rules to be represented using approximations or subjective values in order to handle situations where information about a problem is incomplete. A) Fuzzy logic B) Normalization C) Clustering D) What-if analysis E) Stickiness

A) Fuzzy logic

10) Keith Norat, the Chief Technology Officer of Kender Internationals, relies on blogs while making decisions. In his words, "Blogs are an important part of our purchase decisions. In todays environment, blogs provide diverse information that help us to make good decisions." Which of the following is an underlying assumption? A) Information in blogs is accurate. B) Some of the blogs are not written well. C) Blogs are company sponsored. D) Professional bloggers rely heavily on advertisements to sustain their operations. E) Blogs lead to the "amateurization" of journalism.

A) Information in blogs is accurate.

15) Which of the following statements is true about virtual worlds? A) It allows people to communicate using avatars. B) Small firms have not been successful in consumer-oriented virtual worlds. C) It is designed for short "status updates." D) It is the process of creating an online text diary made up of chronological entries that comment on everything. E) Large companies have been able to realize the potential of consumer-oriented virtual worlds.

A) It allows people to communicate using avatars.

21) Which of the following statements is true about query by example capabilities in a database? A) It helps to create a query quickly and easily. B) It refers to immediate automated responses to the requests of users. C) It is designed to handle multiple concurrent transactions from customers. D) Its primary use is gathering new information. E) It prevents illegal entries into a database.

A) It helps to create a query quickly and easily.

67) Which of the following explains the phrase "data is geocoded"? A) It is transformed into coordinates. B) It is shared in the Internet. C) It is used to create Web pages. D) It is compared with similar historical data. E) It is converted into soft data.

A) It is transformed into coordinates.

48) Which of the following statements is true about viral marketing? A) It uses the network effect to increase brand awareness. B) It uses everyday people as a cheap labor force. C) It is the dissemination of information to a narrow audience. D) It enables people to work in more flexible ways on a variety of Internet-related projects. E) It is used to market a product without the audience realizing it.

A) It uses the network effect to increase brand awareness.

78) ________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data. A) Media access control B) Logical link control C) Hypertext transfer protocol D) File transfer protocol E) Internet control message protocol

A) Media access control

17) ________ is a cooperative Web 2.0 application making use of the network effect. A) Media sharing B) RSS C) Tagging D) Instant messaging E) A discussion forum

A) Media sharing

39) ________ are applications written by third-party vendors for the needs of many different users and organizations. A) Packaged software B) Custom software C) Bespoke software D) Personalized software E) Tailored software

A) Packaged software

22) ________ is the creation of a categorization system by users. A) Social cataloging B) Podcasting C) Social blogging D) Netcasting E) Crowdsourcing

A) Social cataloging

50) ________ attempts to provide relevant search results by including content from blogs and microblogging services. A) Social search B) OpenSearch C) Enterprise search D) Metasearch E) Netsearch

A) Social search

51) How is business process management similar to total quality management? A) They are intended to be cross-functional approaches to improve an organization. B) They focus on radical redesign and drastic improvement of processes. C) They focus on incremental change of processes. D) They focus on the activities typically occurring at the operational level of the organization. E) They focus on providing capabilities for discovering "hidden" predictive relationships while conducting a forecast.

A) They are intended to be cross-functional approaches to improve an organization.

57) Which of the following is a reason for the development of semantic Web? A) Web pages can be understood by people but not by computers. B) Users should be able to use any device in any network for any service. C) Users give a lot of unnecessary personal information to social networking sites. D) Widgets cannot be integrated into Web pages. E) Users are skeptical while making purchases online due to the fear of getting cheated.

A) Web pages can be understood by people but not by computers.

52) For companies operating in the digital world, online collaboration with suppliers, business partners, and customers is crucial to being successful. ________ allow(s) data to be accessed without intimate knowledge of other organizations' systems, enabling machine-to-machine interaction over the Internet. A) Web services B) Widgets C) RSS feeds D) Social search E) Peer production

A) Web services

5) Taking entities as tables, each column is a(n) ________. A) attribute B) record C) form D) bot E) query

A) attribute

9) Which of the following Web 2.0 applications has been classified as the "amateurization" of journalism? A) blogs B) discussion forums C) social presence tools D) instant messaging E) online chats

A) blogs

59) In service-oriented architecture, ________. A) business processes are broken down into individual components or services B) business processes of an organization are standardized C) business processes of an organization are integrated from individual components D) business processes are shared with channel partners E) business processes are modified to prevent illegal activities within the process

A) business processes are broken down into individual components or services

19) Which of the following goods are produced using the make-to-order approach? A) commercial aircraft B) shampoos C) lipsticks D) televisions E) refrigerators

A) commercial aircraft

31) Which of the following is an electronic communication tool that allows users to files, documents, and pictures to each other and share information? A) e-mail B) instant messaging C) application sharing D) electronic calendars E) knowledge management systems

A) e-mail

12) In DBMS, normalization helps to ________. A) eliminate data duplication B) retrieve information C) format data D) present the data in a useful format E) allocate storage space

A) eliminate data duplication

9) A common way to represent a data model is a(n) ________. A) entity-relationship diagram B) normalization diagram C) report-query diagram D) form-record diagram E) report generator

A) entity-relationship diagram

28) Which of the following is an example of asynchronous communication? A) group calendars B) videoconferencing C) online chatting D) shared whiteboards E) electronic meeting support system

A) group calendars

13) Which of the following facilitates real-time written conversations? A) instant messaging B) discussion forums C) status updates D) blogs E) tagging

A) instant messaging

4) For most businesses, the ________ process entails subprocesses such as creating a customer record; checking the customer's creditworthiness; creating an order; checking and allocating stock; picking, packing, and shipping; invoicing; and collecting the payment. A) order-to-cash B) make-to-order C) procure-to-pay D) make-to-stock E) plan-to-produce

A) order-to-cash

43) Which of the following software is very cost effective since the vendor that builds the application spreads out the development costs by selling them to a large number of users? A) packaged software B) bespoke software C) adapted software D) corrected software E) custom software

A) packaged software

93) In which of the following database models does the DBMS view and present entities as two-dimensional tables, with records as rows, and attributes as columns? A) relational database model B) hierarchical database model C) network database model D) object-oriented database model E) semantic database model

A) relational database model

Parallel start-up involves running a complete new system for one group of users while the rest of the users still run an old system.

False

16) The network effect refers to the notion that the value of a network is dependent on ________. A) the speed of the network B) the number of other users C) the knowledge of the users D) the commitment of the users E) the technical expertise of the moderators

B) the number of other users

88) A(n) ________ is a piece of networking hardware that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points. A) router B) wireless controller C) network switch D) modem E) network interface card

B) wireless controller

76) WLANs based on a family of standards called 802.11 are also referred to as ________. A) Bluetooth B) wireless fidelity C) ethernet D) personal area networks E) infrared line of sight

B) wireless fidelity

35) Which of the following statements is true about Gmail? A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information. B) It allows users to select a custom domain name for an additional fee. C) It allows users to share events and subscribe to public calendars for new events. D) It is an instant messaging client. E) It is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application.

B) It allows users to select a custom domain name for an additional fee.

30) Which of the following statements is true about a data mart? A) It standardizes the format of data retrieved from different systems. B) It contains selected information from the data warehouse. C) It stores master data only. D) It is is a compilation of data from the database that is organized and produced in printed format. E) It helps to eliminate data duplication.

B) It contains selected information from the data warehouse.

4) Which of the following statements is true about Web 1.0? A) It helps users share information. B) It helps users find information. C) Users rule these applications. D) Users receive and give recommendations to friends. E) It helps connect ideas and people.

B) It helps users find information.

63) Which of the following statements is true about digital dashboards? A) It is the combination of various analysis techniques and interactive visualization to solve complex problems. B) It supports usage models like push reporting, exception reporting and alerts, and pull reporting. C) It can visualize features and relationships between features drawn from an underlying geographic database. D) Analysts can combine geographic, demographic, and other data for locating target customers. E) It a system for creating, storing, analyzing, and managing geographically referenced information.

B) It supports usage models like push reporting, exception reporting and alerts, and pull reporting.

37) ________ refers to the process of quickly conducting complex, multidimensional analyses of data stored in a database that is optimized for retrieval, typically using graphical software tools. A) Inferencing B) Online analytical processing C) Normalization D) Data mining E) Predictive analysis

B) Online analytical processing

25) ________ refer(s) to a way of visualizing user generated tags or content on a site. A) Crowdsourcing B) Tag clouds C) Phishing D) Podcasting E) Pharming

B) Tag clouds

23) ________ refers to manually adding metadata to media or other content. A) Phishing B) Tagging C) Crowdsourcing D) Podcasting E) Netcasting

B) Tagging

45) Which of the following is true regarding packaged software and custom software? A) Packaged software are applications that are designed and developed exclusively for a specific organization. B) The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them. C) Packaged software is well suited for tasks that are unique to a particular business. D) Custom software is cost effective since the vendor that builds the application can spread out development costs through selling to a large number of users. E) Custom software is highly useful for standardized, repetitive tasks, such as writing a report or preparing a presentation.

B) The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them.

8) Which of the following statements is true about blogs? A) They emulate traditional bulletin boards and allow for threaded discussions between participants. B) They allow individuals to express their thoughts in a one-to-many fashion. C) They are dedicated to specific topics, and users can start new threads. D) They are moderated so that new postings appear only after they have been vetted by a moderator. E) They enable people to voice their thoughts through short "status updates."

B) They allow individuals to express their thoughts in a one-to-many fashion.

30) In today's business environment, project teams comprise highly specialized members, many of whom are not colocated. ________ are comprised of members from different geographic areas. A) Work groups B) Virtual teams C) Work teams D) Task forces E) Command groups

B) Virtual teams

62) ________ refers to the display of complex data relationships using a variety of graphical methods. A) Normalization B) Visualization C) Clustering D) Inferencing E) Textual mining

B) Visualization

13) In the ________ process, goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from the inventory. A) configure-to-stock B) make-to-stock C) make-to-order D) engineer-to-order E) assemble-to-order

B) make-to-stock

55) Together, Web services and widgets enable the creation of ________. A) protocols B) mashups C) codecs D) folksonomies E) tag clouds

B) mashups

11) To finalize the data model in order to actually build the database, a process called ________ is used to make sure the database will operate efficiently. A) slicing and dicing B) normalization C) clustering D) visualization E) inferencing

B) normalization

17) Which of the following is typically the first step in the make-to-stock process? A) scheduling production B) procuring inputs C) processing sales orders D) negotiating price and terms E) creating customer records

B) procuring inputs

44) Data mining complements online analytic processing in that it ________. A) finds associations or correlations among sets of items B) provides capabilities for discovering "hidden" predictive relationships in the data C) extracts textual information from Web documents D) groups related records together on the basis of having similar values for attributes E) analyzes different dimensions of data beyond simple data summaries

B) provides capabilities for discovering "hidden" predictive relationships in the data

4) Taking entities as tables, each row is a ________. A) field B) record C) attribute D) form E) query

B) record

1) Which of the following is a basic concept associated with Web 2.0? A) shift in users' preference from online sites to encyclopedias as sources of unbiased information B) shift in users' role from the passive consumer of content to its creator C) shift in users' interest from sharing information to finding information D) shift in users' lifestyle due to increased purchasing power E) shift in users' preference to environment-oriented products

B) shift in users' role from the passive consumer of content to its creator

Posting information to the Internet using anonymous email accounts or screen names makes it impossible to identify a libeler.

False

If your company sold widgets to the automobile industry and these sales were conducted through the Internet, what type of e-commerce model would you be using?

B2B

Which type of e-commerce occurs when a business sells products or services to customers who are primarily other businesses?

B2B

When you purchase your books for this course from an online source such as Amazon.com, you are conducting which type of e-commerce?

B2C

Which type of e-commerce occurs when a business sells products and services to customers who are primarily individuals?

B2C

When assessing security threats and procedures for servers; which of the following is True: a. All servers have the same risk level if they are networked b. All servers implement the same standard security procedures c. All servers should have an up-to-date Operating System installed d. All servers should have data encrypted e. 2 of the above are True

C

94) ________ is a technique to make complex databases more efficient and more easily handled by the DBMS. A) Assertion B) Exception handling C) Normalization D) Model elimination E) Structural induction

C) Normalization

Primary memory, which holds program instructions and data, is not associated with the central processing unit (CPU).

False

47) ________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate. A) Crowdsourcing B) Social cataloging C) Social networking D) Social bookmarking E) Media sharing

C) Social networking

49) ________ is the ability to attract and keep visitors. A) Normalization B) Inferencing C) Stickiness D) Crowdsourcing E) Visualization

C) Stickiness

47) ________ is the process of grouping related records together on the basis of having similar values for attributes. A) Normalization B) Data mining C) Clustering D) Inferencing E) Slicing and dicing

C) Clustering

45) ________ is a phenomenon where companies use everyday people as a cheap labor force. A) Nearshoring B) Phishing C) Crowdsourcing D) Narrowcasting E) Pharming

C) Crowdsourcing

35) ________ help analyze why a key indicator is not at an appropriate level or why an exception occurred. A) Ad hoc queries B) Exception reports C) Drill-down reports D) Scheduled reports E) Key-indicator reports

C) Drill-down reports

55) Financial management, operations management, human resource management, and other important internal activities require the support of ________. A) ERP essence components B) ERP exterior components C) ERP core components D) ERP extended components E) ERP basis components

C) ERP core components

36) Which of the following Google Apps is an instant messaging client? A) Gmail B) Google Calendar C) Google Talk D) Google Sites E) Google Docs

C) Google Talk

40) Which of the following statements is true about content management systems? A) It is the creation of goods or services by self-organizing communities. B) The creation of the goods or services is dependent on the incremental contributions of the participants. C) It allows the assignment of different roles for different users. D) Anyone can help in producing or improving the final outcome. E) It is a family of syndication feeds used to publish the most current blogs, podcasts, videos, and news stories.

C) It allows the assignment of different roles for different users.

55) Which of the following statements is true about neural networks? A) It allows multiple dimensions to be added to a traditional two-dimensional table. B) It works in the background to provide some service when a specific event occurs. C) It attempts to approximate the functioning of the human brain and can learn by example. D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. E) It helps analyze why a key indicator is not at an appropriate level or why an exception occurred.

C) It attempts to approximate the functioning of the human brain and can learn by example.

24) Which of the following statements is true about tagging? A) It is the process of creating a categorization systems by users. B) It is the process of distributing digital media for playback on digital media players. C) It is the process of adding metadata to pieces of information. D) It is the process of of creating avatars and syndication feeds. E) It is the process of creating an online text diary.

C) It is the process of adding metadata to pieces of information.

1) Which of the following statements is true about business intelligence? A) It is the act of outsourcing tasks, traditionally performed by an employee or contractor, to an undefined, large group of people or community, through the use of information technology. B) It is the process by which a customer-owned mutual organization or co-operative changes legal form to a joint stock company. C) It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions. D) It is an organization's process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people. E) It is the use of human resources to gather and analyze information from external sources in order to make better business decisions.

C) It is the use of information systems to gather and analyze information from internal and external sources in order to make better business decisions.

59) Which of the following statements is true about explicit knowledge assets? A) It reflects the processes and procedures that are located in a person's mind on how to effectively perform a particular task. B) It reflects the person's ability to effectively solve a problem without external help. C) It reflects knowledge that can be documented, archived, and codified, often with the help of information systems. D) It reflects an individual's special knowledge about a new-to-the-world product. E) It reflects the strategies that are located in a person's mind on how to effectively perform a particular task.

C) It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.

51) Which of the following statements is true about expert systems? A) It is composed of a network of processing elements that work in parallel to complete a task, attempt to approximate the functioning of the human brain and can learn by example. B) It is a program that works in the background to provide some service when a specific event occurs. C) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. D) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results. E) It groups related records together on the basis of having similar values for attributes.

C) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.

73) ________ are network services that include the storing, accessing, and delivering of text, binary, graphic, and digitized video and audio data across a network. A) Print services B) File services C) Message services D) Application services E) Software services

C) Message services

16) Treston, an automobile manufacturer, has recently implemented a new database system. It is confident that this system will help enhance the company's internal (employees) and external (customers and channel partners) communication. Treston is planning to pursue a just-in-time inventory system soon after the database system is implemented. After the implementation of the database system, however, Treston realized that the database system was not effective. Which of the following, if true, can be cited as a reason for the failure of Treston's database system? A) Microsoft launched a new version of Enterprise Microsoft Access which is better than Treston's database system. B) The maintenance cost of Treston's new database system was three times more than the one it was previously using. C) Treston's new database system was not supported by the database system of its suppliers and distributors. D) Treston's competitors implemented its database a few days prior to Treston's implementation date. E) Treston had to hire specialized personnel to manage its new database system, which added to its costs.

C) Treston's new database system was not supported by the database system of its suppliers and distributors.

3) The use of ________ within a company's boundaries or between a company and its customers or stakeholders is referred to as Enterprise 2.0. A) Web 1.0 techniques and intranet B) extranet and intranet C) Web 2.0 techniques and social software D) extranet and Web 1.0 techniques E) social software and extranet

C) Web 2.0 techniques and social software

7) An online retailer has just finished creating an order for a customer. In an order-to-cash process what should the retailer do next? A) collect payment B) create customer record C) allocate stock D) pick, pack, and ship E) prepare and send invoice

C) allocate stock

10) Data type helps the DBMS ________. A) present the data in a useful format B) format data C) allocate storage space D) eliminate data duplication E) retrieve information

C) allocate storage space

38) Online analytical processing tools enable users to ________. A) discover "hidden" predictive relationships in the data B) find associations or correlations among sets of items C) analyze different dimensions of data beyond simple data summaries D) group related records together on the basis of having similar values for attributes E) extract textual information from Web documents

C) analyze different dimensions of data beyond simple data summaries

6) The concept of ________ is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts. A) cognitive dissonance B) creative commons C) collective intelligence D) consensus democracy E) preference elicitation

C) collective intelligence

29) Which of following factors differentiates asynchronous communication from synchronous communication? A) language B) network speed C) coordination in time D) expertise E) distance

C) coordination in time

49) Which of the following is a critical factor in the success of a viral marketing campaign? A) restricting access to viral content B) doing what the audience expects C) making sequels D) restricting easy distribution E) distributing products for free

C) making sequels

14) A data dictionary is also known as ________. A) data mart B) data warehouse C) metadata repository D) entity-relationship diagram E) clickstream data

C) metadata repository

12) Social presence tools are also known as ________ tools. A) social bookmarking B) instant chatting C) microblogging D) videoconferencing E) geotagging

C) microblogging

22) The systems that are used to interact with customers and run a business in real time are called ________. A) tactical systems B) strategic systems C) operational systems D) informational systems E) executive systems

C) operational systems

32) Systems that focus on the specific needs of individual departments and are not designed to communicate with other systems in the organization are referred to as ________. A) internally focused applications B) externally focused systems C) stand-alone applications D) enterprise-wide systems E) enterprise-information systems

C) stand-alone applications

80) In a(n) ________ network all nodes or workstations are connected to a central hub, or concentrator, through which all messages pass. A) ring B) bus C) star D) mesh E) tree

C) star

Project management is the application of knowledge, skills, and techniques to project activities so that the allotted budget can be spent.

False

Quality management is the set of activities designed to make the most effective use of the people involved with a project.

False

What is the title of the person responsible for ensuring that information is used in an ethical way and that only the right people have access to certain types of information?

CPO (chief privacy officer)

Information systems applications help sales and marketing professionals with all of the following EXCEPT __________.

COMPUTER MANUFACTURING

RAM stands for random access memory; a form of memory that holds its contents even if the current is turned off or disrupted.

False

What is the Cloud?

Cloud computing is the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the internet with pay-as-you-go pricing.

Which of the following is an example that would need to use an ETL process: f. Moving data from the old system into a newly developed and deployed system a. Entering a Sale Order in the transaction processing system b. Entering a Car Rental in an ERP system c. Merging sales data with advertising data and deploying the merged data into a business intelligence tool d. 2 of the above are correct

D

2) Which of the following is a consequence of the use of social software? A) People are using encyclopedias as sources of unbiased information. B) People are using environmentally-friendly products. C) People have increased purchasing power. D) People are sharing more personal information. E) People have become passive consumers of content.

D) People are sharing more personal information.

32) ________ are produced at predefined intervals to support routine decisions. A) Ad hoc queries B) Exception reports C) Drill-down reports D) Scheduled reports E) Key-indicator reports

D) Scheduled reports

36) Which of the following statements is true about ad hoc queries? A) They are produced at predefined intervals to support routine decisions. B) They provide a summary of critical information on a recurring schedule. C) They help analyze why a key indicator is not at an appropriate level or why an exception occurred. D) They answer unplanned information requests to support a nonroutine decision. E) They highlight situations that are out of the normal range.

D) They answer unplanned information requests to support a nonroutine decision.

Reengineering and continuous improvement have the same definition.

False

56) Which of the following statements is true about user agents? A) They are also known as Web spiders. B) They are agents that search to find the best price for a particular product you wish to purchase. C) They are agents that continuously analyze large data warehouses to detect changes deemed important by a user. D) They are agents that automatically perform a task for a user. E) They are agents designed by spammers and other Internet attackers to farm e-mail addresses off Web sites or deposit spyware on machines.

D) They are agents that automatically perform a task for a user.

54) Which of the following statements is true about widgets? A) They can be placed on a desktop, but cannot be integrated into a Web page. B) They can integrate two or more Web services. C) They are created by the integration of Web services and mashups. D) They are small interactive tools used for a single purpose. E) They can be integrated into a Web page, but cannot be placed on a desktop.

D) They are small interactive tools used for a single purpose.

Security and control considerations are a negligible part of the entire system development process.

False

15) Bringes, a retail chain, has retail stores across three states. With its current legacy system, Bringes is having problems tracking the inventory levels for its stores. It is planning to implement Oracle database systems to replace this legacy system. Which of the following most supports Bringes' decision to replace its legacy system with an Oracle database system? A) Implementing Oracle database system means hiring additional specialized personnel to manage it. B) Partial implementation of the Oracle database system can create more problems than it solves. C) Conversion cost required for the implementation of Oracle database system is supported by IT budgets. D) Bringes' channel partners use a database system that supports the Oracle database system. E) Maintenance cost of an Oracle database system is more than the legacy system presently in use.

D) Bringes' channel partners use a database system that supports the Oracle database system.

45) ________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals. A) Data cleansing B) Normalization C) Clustering D) Data reduction E) Inferencing

D) Data reduction

68) ________ is a computer networking model in which multiple types of computers are networked together to share data and services. A) Centralized computing B) Mainframe computing C) Task computing D) Distributed computing E) Serial computing

D) Distributed computing

46) ________ enables people to work in more flexible ways on a variety of Internet-related projects. A) E-filing B) E-auction C) E-tailing D) E-lancing E) E-timing

D) E-lancing

56) ________ support the primary external activities of the organization for dealing with suppliers and customers. A) ERP components B) ERP aggrandized components C) ERP abridged components D) ERP extended components E) ERP core components

D) ERP extended components

11) ________ immediately after the purchase order is issued in the procure-to-pay process. A) Payment is settled B) Price and terms are negotiated C) Credit is checked D) Goods are received E) Invoices are received

D) Goods are received

21) Which of the following statements is true about social bookmarking? A) It is the distribution of digital media. B) It allows netcasters to publish and push current shows to the watchers/listeners. C) It allows people to communicate using avatars. D) It allows users to create folksonomies. E) It allows users to post short "status updates."

D) It allows users to create folksonomies.

24) Which of the following statements is true about an operational system? A) Its primary purpose is to support managerial decision making. B) It consists of historical or point-in-time data. C) Its goal is to enhance ease of access and use. D) It consists of narrow and simple updates and queries. E) It is primarily used by managers.

D) It consists of narrow and simple updates and queries.

43) Which of the following statements is true about the online analytic processing cube? A) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results. B) It groups related records together on the basis of having similar values for attributes. C) It understands how data is organized in the database and has special functions for analyzing the data. D) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table. E) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice.

D) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table.

7) Which of the following statements is true about a discussion forum? A) It started out as a novice's way of expressing themselves using very simple Web pages. B) It is the process of creating an online text diary made up of chronological entries that comment on everything. C) Rather than trying to produce physical books to sell or use as gifts, users merely want to share stories about their lives or voice their opinions. D) It is dedicated to a specific topic, and users can start new threads. E) It enables a person to voice his/her thoughts through short "status updates."

D) It is dedicated to a specific topic, and users can start new threads.

52) Which of the following statements is true about a rule in expert systems? A) It groups related records together on the basis of having similar values for attributes. B) It makes sure that each table contains only attributes that are related to the entity. C) It allows multiple dimensions to be added to a traditional two-dimensional table. D) It is typically expressed using an "if--then" format. E) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results.

D) It is typically expressed using an "if--then" format.

18) ________ is the distribution of digital media, such as audio or video files via syndication feeds for playback on digital media players. A) Narrowcasting B) Crowdsourcing C) Blogging D) Netcasting E) Phishing

D) Netcasting

49) After deciding to focus on business process management, the management of a company has just finished developing a vision for the organization. This vision specifies the company's business objectives. Typically, what should be the management's next step? A) They should identify the ways in which information systems can be used to improve the various business processes. B) They should design and implement a prototype of the new processes. C) They should manage the information technology to be used from a business transaction perspective. D) They should identify the critical processes that are to be redesigned. E) They should understand and measure the existing processes as a baseline for future improvements.

D) They should identify the critical processes that are to be redesigned.

58) Which of the following is a role of data mining agents? A) tracking inventory levels B) sending a report at the first of the month C) assembling customized news D) analyzing data warehouses to detect changes deemed important to a user E) finding the best price for a particular product the user wants to purchase

D) analyzing data warehouses to detect changes deemed important to a user

48) Which of the following is a recording of a user's path through a Web site? A) clustering B) normalization C) slicing and dicing D) clickstream data E) inferencing

D) clickstream data

39) A(n) ________ system allows users to publish, edit, version track, and retrieve digital information. A) social presence B) collective intelligence C) application sharing D) content management E) peer production

D) content management

77) Which of the following is a characteristic of terrestrial microwave communication? A) high attenuation B) speeds up to 16 Mbps C) low expense D) high susceptibility to eavesdropping E) low electromagnetic interference

D) high susceptibility to eavesdropping

2) "Backward looking" budgets are typically based on ________. A) forecasts B) marketing research C) future trends D) historical data E) current market conditions

D) historical data

75) Which of the following wireless communication technologies uses high-frequency light waves to transmit data on an unobstructed path between nodes—computers or some other device such as a printer—on a network at a distance of up to 24.4 meters? A) Bluetooth B) wireless LAN C) high-frequency radio D) infrared line of sight E) microwaves

D) infrared line of sight

32) Which of the following is an electronic conferencing tool that facilitates information sharing and rich interactions between users? A) e-mail B) wikis C) blogs D) instant messaging E) online document systems

D) instant messaging

36) An internally focused system helps an organization coordinate with ________. A) its suppliers B) its business partners C) the government D) its departments E) its customers

D) its departments

33) Stand-alone systems are also known as ________. A) ethernet systems B) automated business systems C) peripheral systems D) legacy systems E) converter systems

D) legacy systems

69) A(n) ________ is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers. A) enterprise network B) wide area network C) campus area network D) local area network E) value-added network

D) local area network

14) Which of the following uses a push-based approach? A) order-to-cash B) procure-to-pay C) production-to-order D) make-to-stock E) make-to-order

D) make-to-stock

87) A ________ is a PC expansion board that plugs into a computer so that it can be connected to a network. A) transceiver B) multiport repeater C) cable router D) network interface card E) modular connector

D) network interface card

Sensors that can monitor and report on data about traffic and parking conditions are part of a network of physical objects known as the Internet of Technology.

False

Laws and regulations have thoroughly addressed concerns about privacy and data management in private organizations and federal agencies.

False

39) Which of the following statements is true about online analytical processing server? A) It is a data structure allowing for multiple dimensions to be added to a traditional two-dimensional table. B) It groups related records together on the basis of having similar values for attributes. C) It allows you to make hypothetical changes to the data associated with a problem and observe how these changes influence the results. D) It uses reasoning methods based on knowledge about a specific problem domain in order to provide advice. E) It understands how data is organized in the database and has special functions for analyzing the data.

E) It understands how data is organized in the database and has special functions for analyzing the data.

Many organizations actively attempt to convert explicit knowledge to tacit knowledge.

False

56) Which of the following statements is true about a mashup? A) It is a small interactive tool used for a single purpose. B) It is used to increase brand awareness through the network effect. C) It is the process of allowing companies to use everyday people as a cheap labor force. D) It is used to disseminate information to a narrow audience. E) It is an application or a Web site that integrates one or more Web services.

E) It is an application or a Web site that integrates one or more Web services.

51) Which of the following statements is true about Real Simple Syndication (RSS)? A) It is used to increase brand awareness through the network effect. B) It is used to disseminate information to a narrow audience. C) It is used to market the product without the audience realizing it. D) It is used to enable people to work in more flexible ways on a variety of Internet-related projects. E) It is used to publish the most current blogs, podcasts, videos, and news stories.

E) It is used to publish the most current blogs, podcasts, videos, and news stories.

53) Which of the following is true regarding enterprise resource planning (ERP)? A) It stores data in different locations. B) It is an older version of materials requirement planning. C) It helped in developing the manufacturing resource planning package. D) Stand-alone applications are a developed version of ERP. E) It makes the process of sharing information between business activities easier.

E) It makes the process of sharing information between business activities easier.

58) Which of the followings is NOT true about an Enterprise 2.0 strategy? A) Web 2.0 sites base their success on user-driven self-expression. B) Enterprise 2.0 applications are not suited to traditional top-down organizational structures. C) Enterprise 2.0 applications should be driven by a specific usage context. D) Organization-wide Enterprise 2.0 implementations typically need changes in terms of organizational culture. E) Within organizations, the critical mass needed for an Enterprise 2.0 application is often easily achieved.

E) Within organizations, the critical mass needed for an Enterprise 2.0 application is often easily achieved.

42) In online analytic processing systems, ________ provide a way to summarize the data. A) forms B) measures C) facts D) records E) dimensions

E) dimensions

31) A(n) ________ information flow relates to the information that is produced by a company and sent along to another organization. A) stand-alone B) legacy C) packaged D) custom E) downstream

E) downstream

35) A(n) ________ is an integrated suite of business applications for virtually every department, process, and industry, allowing companies to integrate information across operations on a company-wide basis using one large database. A) legacy system B) management information system C) decision support system D) distributed system software E) enterprise system

E) enterprise system

37) A(n) ________ coordinates business processes with customers, suppliers, and business partners of an organization. A) internally focused system B) legacy system C) stand-alone system D) intermediary system E) externally focused system

E) externally focused system

61) Social network analysis is a technique that attempts to ________. A) analyze large data warehouses to detect changes deemed important by a user B) analyze why a key indicator is not at an appropriate level or why an exception occurred C) discover "hidden" predictive relationships in the data D) allow hypothetical changes to the data associated with a problem to observe how these changes influence the results E) find experts in particular subject areas

E) find experts in particular subject areas

26) The hardware and software that must be implemented to support the applications that the primary activities use are a part of the ________ activities. A) human resources B) technology development C) procurement D) inbound logistics E) infrastructure

E) infrastructure

33) Which of the following is a collaboration management tool that is used to facilitate virtual or colocated meetings ? A) Internet forums B) videoconferencing C) wikis D) fax E) intranets

E) intranets

64) Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational statistics and trends. This usage model is known as ________. A) exception reporting B) pull reporting C) ad hoc reporting D) drill-down reporting E) push reporting

E) push reporting

12) Receiving the goods is immediately followed by ________ in the procure-to-pay process. A) settling the payment B) negotiating the price and terms C) issuing the purchase order D) creating the order E) receiving the invoice

E) receiving the invoice

7) A(n) ________ is a collection of related attributes about a single instance of an entity. A) bot B) form C) query D) field E) record

E) record

19) A(n) ________ is a compilation of data from the database that is organized and produced in printed format. A) form B) attribute C) field D) entity E) report

E) report

Small and medium size organizations do not employ enterprise systems.

False

For the "determine data needs" activity of a project, the optimistic estimated duration is 10 days, the pessimistic estimated duration is 20 days, the most likely time is 15 days. What is the expected duration of completing this activity?

Expected Time to complete = (Optimistic Time + (4*Most likely Time)+ Pessimistic time)/6 = 15 days (pg478)

One of the final steps in installing and using a large database involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user.

False

Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as well as other users' resources if those resources are beneficial.

False

_____ is a markup language designed to transport and store data on the Web.

Extensible Markup Language (XML)

A computer-based information system (CBIS) is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, and process data into information, but the CBIS does not include software.

FALSE

Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted.

FALSE

Suppose your university administrators wish to summarize student GPA on Major, Gender, High School, Home City and ZIP Code dimensions. This cannot be done with one data cube.

FALSE

In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT:

FINANCE AND ACCOUNTING

Which legislation is designed to combat the growing crime of identity theft?

Fair and Accurate Credit Transactions Act of 2003

A 'virus signature' contains the email ID of the virus developer.

False

A computer-based information system (CBIS) is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, and process data into information, but the CBIS does not include software.

False

A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.

False

A liquid crystal display (LCD) functions by exciting organic compounds with electric current to produce bright and sharp images.

False

A procurement card is an attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or a Web site.

False

A redundant array of independent/inexpensive disks (RAID) is a method of storing data so that data can be accessed more quickly.

False

A set of random or unrelated tasks performed to achieve a definite outcome is called a process.

False

A strong security program begins by assessing the backgrounds of the employees in the organization.

False

A tablet computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage.

False

A vehicle routing optimization system helps in maximizing the number of drivers being assigned.

False

A virus can reside in a file (or many files) on the hard drive, but it would not be active in memory. As such, it is not as important to scan live memory as it is to scan the hard drive.

False

Agile is better suited for developing larger information systems than smaller ones.

False

All software licenses qualify as capital expenses.

False

An attribute is a general class of people, places, or things for which data is collected, stored, and maintained.

False

An increase in customer satisfaction is considered a tangible benefit.

False

An intranet is a network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company's extranet.

False

Another name for the World Wide Web is the Internet of Things.​

False

As a project manager, you would use the stakeholder analysis matrix to manage communications with external entities such as customers, vendors, and regulatory bodies.

False

As the CEO of an organization, it is acceptable for you to delegate long-term decisions about the organization to a subordinate.

False

Enterprise resource planning (ERP) systems work directly with manufacturing machines on the production floor.

False

For someone to be a good CIO, technical ability is the most important characteristic.

False

If you wish to work as an IS professional in a construction business, it does not matter if you cannot communicate with the business managers in their business terms.

False

In linear regression, you are to find a line that best fits the data. Sometimes the line may be curved.

False

In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.

False

In spite of the recent economic downturn, Website operators have shunned the idea of bartering for goods and services.

False

It is illegal for companies to buy and sell personal data collected through marketing and sales efforts.

False

It's safe for you to input personal data into your Facebook profile because Facebook is not allowed to share this information with law enforcement officials or third parties for any reason.

False

Software developers have created filtering software that blocks children from viewing inappropriate or harmful Internet sites at home or school, but to date developers have been unsuccessful in creating a similar software for use in the workplace.

False

Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips.

False

Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system.

False

Suppose your university administrators wish to summarize student GPA on Major, Gender, High School, Home City and ZIP Code dimensions. This cannot be done with one data cube.

False

Systems software consists of programs that help users solve particular computing problems.

False

The Federal Commerce Commission is responsible for enforcing consumer protection laws that prevent fraud, deception, and unfair business practices.

False

The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional.

False

The concept of a value chain is not significant to organizations unless they manufacture products.

False

The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population.

False

The diffusion of innovation theory states that adoption of any innovation happens all at once for all members of the targeted population.​​

False

The length of sales process for a typical business-to-business (B2B) e-commerce is shorter than that for a typical consumer-to-consumer (C2C) e-commerce.

False

The market for m-commerce in North America is maturing much earlier than in Western Europe and Japan.

False

Today, most organizations use the traditional approach to data management, where multiple information systems share a pool of related data.

False

Two sets of fields can have a common primary key.

False

Typically, information systems planning is not tied to overall strategic planning.

False

Users still need help from the IT function of the organization to create customer reports using modern reporting tools.

False

When a business finds that many of its business applications have to be updated or rewritten, it will be better if they replace them with an ERP system.

False

When making hardware decisions, the overriding considerations of a business should be technology cost and currency.

False

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely seeing a vishing attack.

False

While using your smart card at a store's checkout terminal, you are prompted to enter your PIN. The PIN is then sent on the network to compare with the stored PIN for authorization.

False

With an online transaction processing (OLTP) system, each transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions.

False

If the marketing department were to pass information to the finance department, what type of information flow is this considered?

Horizontal

What term refers to the electronic integration of government agencies across specific levels of government?

Horizontal government integration

false

Master data are generated and captured by operational systems.

English

Mastery over which subject is NOT required for being a data scientist?​

The complexity of SCM is supported by technology. Which intricate SCM activity needs strong monitoring by SCM systems?

Inter-modal transportation

If your home air conditioner has an IP address, it is part of the ____.

Internet of Things

Which of the following is not a key resource of MIS?

Methods

There are methods to designing and developing business applications. Which of the following is not one of these methods?

Networking

An example of a common hardware function performed by the operating system is presenting information on a monitor or printer.​

True

An integrated database for the entire organization makes it easier to share data among different business units.

True

E. All the above

Refer to Closing Case - CoStar Group. The target audience for CoStar's aggregated commercial real estate data was A. banks. B. building owners. C. real estate agents. D. builders. E. All the above

E. A and B

Refer to IT's About Business 5.2. - Cell phone owners in Mexico: The cell phone registry is useless because: A. data for some cell phones are missing. B. data for some cell phones are inaccurate. C. very few Mexicans can afford cell phones. D. All the above E. A and B

Downloading games from unknown websites can be risky. The software may be a Trojan horse.

TRUE

During drill-down, you go from high-level summary data to detailed levels of data.

TRUE

If you wish to have a visual depiction of relative frequencies of words in a document, a word cloud would be an appropriate option .

TRUE

There are bots that can sign up for thousands of email accounts.

TRUE

Management information systems (MIS) focuses on which of the following?

Tasks related to information processing and management

How does technology affect ethics?

Technology increases the complexity of ethical dilemmas faced by our society

Why do we consider technology invasive?

Technology is an integral part of our personal, as well as our professional lives

What are the four main components in Leavitt's Diamond?

Technology, People, Task or Structure

_____________________ dictate how developers can use APIs, and the end-users can take advantage of services on the platform.

Terms of Service (TOS)

To ensure that the newly developed information systems functions properly, what should you create that lists the expected steps that the system should perform and expected results from these steps?

Test conditions

What is system testing?

Testing the complete, integrated system to validate that the information system meets all specified requirements.

explanation facility

The _____ allows an expert system user to understand how the system arrived at its results.

gramm-leach-bliley act of 1999

The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use.

usa patriot act of 2001

The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation.

knowledge base

The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

If you wanted to ensure that your business maintains a competitive edge, what should be one of your main concerns when purchasing technology?

The new technology enables you to be innovative and move into new markets

Pages/Visit

The number of pages that a user visits after landing on the initial page. The higher the number, the more engagement your landing page is promoting.

online transaction processing

Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms?

​historical data is examined for patterns that are then used to make predictions

Which of these analysis methods describes neural computing?​

faster system start-up

Which of these is an advantage of the hosted software model?

What type of analytics is used to detect the value of e-mail advertising to customers or potential customers?

Web

B. Corporate databases

Which of the following is not a source for external data? A. Commercial databases B. Corporate databases C. Sensors D. Satellites E. Government reports

A single computer with a single user is typical of a mainframe computer.

Which of the following statements is NOT true about a mainframe computer?

It helps companies analyze information to open new market opportunities.

Which of the following statements is true of a database?

you wish to use a visual approach to query building

You would use Query by Example, if _____.

augmented reality

_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.

artificial intelligence systems

_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.

data correction

_____ involves reentering data that was not typed or scanned correctly.

pilot start-up

_____ involves running a complete new system for one group of users rather than all users.

B. Normalization

_____ is a method for analyzing and reducing a relational database to its most streamlined form. A. Structured query B. Normalization C. Query by example D. Joining E. Relational analysis

structured query language (sql)

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

near field communication (nfc)

_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards.

D. Data redundancy

_____ occurs when the same data are stored in many places. A. Data isolation B. Data integrity C. Data consistency D. Data redundancy E. Application/Data dependence

C. Data consistency

_____ occurs when various copies of the data agree. A. Data isolation B. Data integrity C. Data consistency D. Data redundancy E. Application/Data dependence

D. Master data management

_____ provide(s) companies with a single version of the truth for their data. A. Data warehouses B. Data marts C. Databases D. Master data management E. Enterprise information management

Design of System Security and Controls: Specific system security and controls must be developed for.....?

all aspects of the information system.

​The members of an organization who are most likely to contribute to organizational learning are _________.

all of these

Over the next few years, it is expected that many organizations will focus on projects that _________.

all of these answers

When an organization wants to develop a new information system to meet its needs, it can _________.

all of these answers

A single computer can be used by a single user or by multiple, simultaneous users.

allowing a user to do word processing

Description of database controls: These deal with ensuring....?

an efficient and effective database system.

New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____.

an embedded system

New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____.

an embedded system (ch 4)

Privacy refers to....?

an individuals right to control both access to and use of his or her information.

SANs

​Which of these organizations offers guidelines on developing security policies?

Through e-government, _____.

any government unit, business or individual can interact with the government

A small business is currently using a paper-based system for billing, which is slow and error-prone. Which system upgrade will make the process faster and have fewer errors? a. Enterprise resource planning system b. Source data automation c. Scanning hand-written bills d. Manual entry of data into spreadsheet system

b. Source data automation p. 353

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n)

black hat hacker

Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________.

can use a hosting service to set up the site

Liesel is an entrepreneur, and she'd like to publish a website for her small business. Liesel ____________.

can use hosting services

A building, office equipment, computer hardware, and network equipment are examples of _____.

capital assets

Suppose a business wishes to have access to servers, and storage devices, but does not want to buy them. What is their best choice?

cloud computing - infrastructure as a service

User interface design integrates concepts and methods from ________________, _________________, and __________________ to build interfaces that are accessible, easy to use, and efficient.

computer science, graphic design, and psychology

Information systems applications help sales and marketing professionals with all of the following EXCEPT __________.

computer-assisted manufacturing

Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task?

create vision/mission statement

​Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.

cybercriminals

Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are _________.

cybercriminals (ch1)

Technical feasibility

examines whether a project is feasible within the current limits of available technology

When analyzing transactions for indicators of fraud, you should identify...?

expenses relating to airfares and hotels in non-standard locations. (ex. Exotic resorts)

During unit testing, each program is also tested with abnormal input to determine....?

how it will handle erroneous input.

Elaborate on "Design User Interface"

how the user experiences the information system determines whether the system will be accepted and used.

With a SaaS offering you do not have to think about how the service is maintained or how the underlying infrastructure is managed; you only need to think about.......?

how you will use that particular application software.

IS manager

​You are part of an Information Systems project team. Your job is to ensure that the technology and vendor suggested for use in the project are consistent with the IS strategy. Your role in the project steering team is _____.

​Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) __________.

knowledge management system

Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) __________.

knowledge management system pg 25

An operating system with _____ capabilities allows a user to run more than one program concurrently.

multitasking

Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying?

nettops

The term "ethics" refers to an individual's personal beliefs about right and wrong, whereas the term "morals" describes standards or codes of behavior expected of an individual by a group, such as a nation, organization, or profession.

p 622 - False

Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system.

perceptive

The toughest challenge in designing a processor for a smartphone or tablet is balancing _____________.

performance and power consumption

To develop software you need all these except ​________.

personal application software

A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product.

personalized

Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls?

pg 615 The Federal Trade Commission

In a supply chain, _____ involve the transformation, movement, and storage of supplies and raw materials.

physical flows

One of the goals of business intelligence is to _________.

present the results in an easy to understand manner

identity theft

​You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.

If consumer data is stolen from a business's computers, ________.

the customers can file a class-action law suit against the business

In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is__________.

the information systems security analyst

​In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is__________.

the information systems security analyst

In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is__________.

the information systems security analyst (p68)

System investigation is....?

the initial phase in the development of a new or modified business information system whose purpose is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address.

Schedule feasibility

the process of determining whether a project can be completed within a desired time frame

What is cutover?

the process of switching from an old information system to a replacement system.

Web scraping

the process of using computer software to extract large amounts of data from websites

The system analysis report is presented to.....?

the project steering team with a recommendation to stop, revise, or go forward with the systems development project.

procurement management

​Activities related to the acquisition of goods and/or services for a project from sources outside the organization make up _______.

allowing a user to do word processing

​All of the following are examples of activities performed by an operating system EXCEPT ________.

The network router sends traffic to the firewall as well as to the IDS

​Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?

preparing alternative courses of action

​Experienced project managers would manage risk by ______.

currency

​To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties?

cyberterrorism

​Which of the following subject areas does the USA Patriot Act cover?

magnetic stripe

​Which of the following types of credit cards is currently diminishing in popularity and being replaced by the other three types?


Set pelajaran terkait

Unit 4 - cule, ose, ulent, let, ling

View Set

Chapter 5 - Real Estate Exam Review

View Set

AD Banker Chapter 3 Exam Questions

View Set

Ch. 12- Closing and settlement words and quiz

View Set