MIS Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Robert Johnson works for the Chambers County Library as an events coordinator. He is responsible for coordinating the annual book drive with several other agencies in the area as well as various book clubs. Which of the following would enable Robert to establish a meeting schedule for everyone involved in the planning​ process? (1)IM (2)iCalendar (3)hCard (4)Email (5)Wiki

iCalendar

In comparison with primary​ storage, hard drives are​ ________. .(1)more volatile (2)more expensive (3)smaller in storage capacity (4)slower in processing digital information (5)faster than random access memory

slower in processing digital information

An ethical system that judges whether an act is right or wrong by considering the consequences of the action, weighing its positive effects against its harmful ones. EX: When doctors in crisis situations form a triage that assigns degrees of urgency to wounds or illnesses to decide the order of treatment of a large number of patients or​ casualties, they are using the​ ________ framework. (1)medical diagnosis (2)medical​ decision-making (3)utilitarianism (4)natural laws and rights (5)rule of law

utilitarianism

Netflix uses customer surveys to identify delivery delays caused by the U.S. Postal Service. The surveys give Netflix valuable information and improve the​ company's ________. (1)customer feedback rate (2)ability to charge for premium shipping (3)selection of movies (4)profits (5)visibility in the supply chain

visibility in the supply chain

Mead Corporation has recently approved the purchase of a new ERP system for its paper processing plant in​ Valley, Alabama. To ensure that all​ stakeholder's requirements are collected and​ documented, form​ a(n) ________ approach during the planning and analysis phase of the process. (1)cross-functional team (2)unified procurement (3)SaaS (4)custom system development (5)best of breed procurement

​cross-functional team

The processes by which electronic data that might be used as legal evidence are requested, secured, and searched. EX: The Montana Mining Company was required to produce emails and other electronic documents as part of a civil lawsuit over a dispute with landowners. The process by which these documents can be requested and used as legal evidence is called​ ________.

​e-discovery

Hanover Pretzels recently implemented a new wireless network with coverage for all its plant operations and administrative offices. The fixed cost of the project was​ $180,000. What is the savings of the project if it returns the investment in three​ years? (1)$15,000 in six months (2)$40,000 per year (3)$10,000 per quarter (4)$5,000 per month (5)dash​$10,000

$5,000

A company strategy that involves offering a similar product at a lower price compared to competitors EX:Walmart has followed this theory by focusing its strategy on dominating a broad market.

Low cost Leadership

Joe​ Roberts, a senior at Georgia State​ College, is the group leader for an important class project. Group members have difficult schedules to​ coordinate, so Joe decides to conduct most meetings in a virtual environment. Joe knows that to compensate for the weak norms common in virtual​ teams, he must make group expectations very clear. Which of the following would best help Joe clarify​ expectations? (1)A team charter (2)A wiki (3)A shared workspace (4)A blog (4)A legal contract

A Team Charter

Web software frequently used to build knowledge bases that allows users to add and edit interlinked web pages. EX: Best Buy is expanding its retail outlets to include smaller​ kiosk-type stores that will be located inside malls. They are recruiting a number of​ young, tech-savvy employees to work at the kiosks. The company wants to create knowledge storehouses that employees can edit as​ needed, adding contributions from their own personal experiences with products or updating existing information. Which of the following can the company use to help it organize​ how-to guides and create a substantial base of knowledge for its new​ employees? (1)Virtual world (2)GDSS (3)Microblogging (4)A wiki (5)Twitter

A Wiki

Michael Rainer is a systems integrator who works for Allied Technologies. This means that Michael offers what type of expertise to companies that have purchased software from several different​ vendors? (1)A project manager who oversees the purchase of new software (2)A manager​ who, through​ leadership, prepares the organization for change to become dynamic (3)A manager who inspires employees to work together and provide resources the project team needs (4)A consultant who ensures that employees are making the best use of information systems (5)A consultant who ensures that hardware and software components of an IS work together

A consultant who ensures that hardware and software components of an IS work together

The Zip Right In convenience store recently upgraded its stores with new paint and lighting. The customer checkout​ system, however, was still slow and inefficient. What is the most likely consequence of this​ situation?

A negative impact on the customer relationship

Government funding for​ technology-based innovation is often the only source of funding available for​ high-risk projects that private investors may avoid. For which of the following projects is government funding most​ critical? (1)A project to develop a more​ disease-resistant orange tree (2)A scheme to improve the financial status of a company. (3)A project to launch a​ new, low-cost and​ fuel-efficient car (4)An infrastructure project that should be completed in one year (5)A research project on hybrid oil

A research project on hybrid oil

Knowledge management is a broad term used by​ organizations, academic​ institutions, and governments to describe which of the​ following? (1)Organizational strategies developed to increase market share (2)Processes that experts use to categorize public assets (3)Strategies that organizations use to understand the responsibility they have toward society (4)A set of strategies and practices organizations use to become more systematic about managing intellectual capital (5)Practices that customers use to understand products prior to purchasing

A set of strategies and practices organizations use to become more systematic about managing intellectual capital

Dow Chemical launched a social​ "alumni" network to tap the knowledge and skills of its​ retirees, employees on maternity​ leave, and others no longer working at the company by using an internal social network. Which of the following is one of the driving forces behind the increasing use of social networks by​ organizations? (1)A shortage of chemical engineers (2)A decrease in the number of baby boomers retiring (3)A shortage of skills and organizational knowledge as baby boomers retire (4)A lower level of education among new employees (5)A lack of pension plans for new employees

A shortage of skills and organizational knowledge as baby boomers retire

EDP Corporation requires that employees sign​ a(n) ________, which encompasses services each employee will be​ provided, whether and how much they can utilize company resources for personal​ use, the kinds of surveillance that are in​ place, and it reinforces legal​ requirements, such as prohibitions against unauthorized copying. (1)acceptable-use policy (2)intellectual property disclaimer (3)Fair Information Practices policy (4)ethical conduct policy (5)Internet usage policy

Acceptable Use Policy

Which of the following is an example of an executing process in project​ management? (1)Fixing project schedules (2)Selecting the project team (3)Defining milestones and goals (4)Turning over system documentation to the IT department (5)Allocating work assignments

Allocating Work Assignments

Which of the following best describes change​ management? (1)An approach to the transition employees make as they switch from existing work processes to new ones (2)An approach to streamlining work processes to maintain universal codes (3)An approach to project management that ensures that project stakeholders do not deviate from the defined project objectives (4)An approach that brings new employees in an organization up to date with work processes (5)An approach to get rid of employees no longer needed as a result of the project

An approach to the transition employees make as they switch from existing work processes to new ones

A roadmap created by an organization to describe its current situation and where it should head to achieve its mission, focusing on business strategy and the technology infrastructure required to achieve it. EX:GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its annual strategic planning​ process, GenXTech is analyzing its current situation and where it should head to achieve its mission. Its focus is on business strategy and the technology infrastructure required to achieve it.. They are creating this...

An enterprise architecture

In a recent meeting with the top executives in the​ company, the​ CEO, Dan​ Klippinger, was given a ballpark figure to implement a new customer relationship management system that was predicted to save the company​ $5 million dollars over the next few years. Although the requirements for the system had not been determined and the numbers were just​ estimates, the CEO used the amount he initially heard in all his future discussions about the system. The tendency for the CEO to rely too heavily on this single piece of information is called​ ________. (1)confirmation bias (2) anchoring (3) availability bias (4) overconfidence (5) a planning fallacy

Anchoring

The type of software that controls basic computer operations such as file management, disk storage, hardware interfaces, and integration with the application software. EX: Christy works as an executive assistant to the president of Wykoff Industries. She spends the majority of her time answering​ emails, composing​ letters, and preparing estimates. What type of software is Christy using to complete the tasks in her​ job?

Application Software

In the music​ industry, why were innovations like​ Apple's iTunes considered to be disruptive​ innovations -A new product or service, often springing from technological advances, that has the potential to reshape an industry.? (1)Because these innovations were illegal (2)Because Apple had the support of music company executives (3)Because these innovations had higher operational costs (4)Because these innovations reduced​ Apple's supplier power in the music industry (5)Because these innovations had a negative effect on existing competitors in the music industry

Because these innovations had a negative effect on existing competitors in the music industry

A reference point used as a baseline measurement. An activity would you perform to measure and compare your business processes to similar processes of other companies within your​ industry

Benchmarking

An approach used by organizations in which they procure the best systems for each application, regardless of the vendor, and then build interfaces among them. EX: Capital One has different vendor software for each of its main enterprise systems including an ERP​ system, an SCM​ system, and its customer relationship management system. The company uses only the best system for each of its primary functions and then builds interfaces among them to unify the system architecture. Capital One is using​ a(n) ________ approach to software procurement. (1)custom system development (2)best of breed (3)unified (4)Software as a Service (5)request for information

Best of Breed

The​ "Internet of​ Things" is often considered a major contributor to​ ________, which also includes information collected from​ wikis, blogs, social networking​ sites, and discussion forums. (1)a data warehouse (2)business intelligence (3)Web 2.0 (4)big data (5)bots

Big data

​iTicket, an online​ event-ticketing site, recently discovered that most of its good seats for a widely anticipated concert were preemptively booked in bulk by brokers. This action resulted in a shortage of tickets that the public could have bought themselves. Which of the following most likely enabled the brokers to book tickets in such large​ numbers? (1)Neural networks (2)Mashups (3)Big data (4)Dashboards (5)Bots

Bots

Kyle Albright is a database administrator at Regions Bank in Atlanta. He is currently working on problems of information overload on the​ bank's operational systems. Which of the following actions would BEST help Kyle to speed up the systems and prevent information​ overload? (1)Storing critical data on email or locally on workstations (2)Building a data warehouse optimized for complex queries (3)Housing all transactional data on a common server (4)Creating a process of running system queries simultaneously (5)Transferring all the company data to the cloud

Building a data warehouse optimized for complex queries

The accounting department is conducting a series of data​ back-ups in preparation for​ year-end reports and audits. This activity is considered a​ ________ that involves information technology resources. (1)financial transaction (2)deliverable (3)project (4)audit (5)business process

Business Process

How can human resources professionals use information systems to increase efficiency and​ effectiveness? (1)By formulating an​ e-commerce strategy for the organization (2)By developing products to better meet customer needs (3)By developing a website to answer routine customer questions (4)By creating online training manuals and​ e-learning modules for employees (5)By using information collected from customer surveys to determine how to spend advertising dollars

By creating online training manuals and​ e-learning modules for employees

When Stan​ Copelan, a staff accountant at a large brokerage​ firm, decided he had had enough of seeing customers lose their life savings from corruption in his​ company, he posted information on a blog about the​ company's unethical business practices. The company fired​ Stan, which resulted in the blogging community reposting information about the corruption and damaging the​ company's reputation. In what way did ICT play a role in this​ situation? ICT is Info and Com Technology - The term encompasses the broad collection of information processing and communications technologies, emphasizing that telecommunication technology is a significant feature of information systems (1)By providing a way for the company to defend its reputation (2)By helping legal officials build a case against the company (3)By providing a viral reach that amplified the effects of the corruption (4)By limiting the amount of corruption at the company (5)By providing a cover for Stan

By providing a viral reach that amplified the effects of the corruption

An important feature of unified communications is the​ ________, which lets senders know whether the individual is available to communicate at the moment and which mode he or she prefers. (1)hashtag (2)context indicator (3)IM (4)tag cloud (5)GDSS

Context Indicator

When established companies fail to respond to disruptive innovations that capitalize on new​ technologies, they can become victims of​ ________.

Creative Destruction

(Commercially available computer software that is ready to buy, install, and use.) Software products such as Microsoft​ Office, Quicken, Adobe​ Premiere, and Eudora Pro are also called​ ________. (1)legacy software (2)utility software (3)COTS (4)software as a service (5)open source software

COTS (Commercial Off the Shelf)

NOAA.org is a website that allows visitors to search an extensive knowledge database for information about hurricanes and other extreme weather events. It contains frequently asked questions and is continually updated as new information becomes available. Which step of the knowledge management process has NOAA successfully accomplished by developing its massive searchable​ database? (1)Locating sources (2)Capturing knowledge (3)Identifying the goal (4)Distributing reports E. Verifying information

Capturing Knowledge

Which of the following is responsible for overseeing an​ organization's information systems and ensuring that information systems support the organizational​ strategy? (1)Chief Information Officer​ (CIO) (2)Chief Executive Officer​ (CEO)(3)Chief Information Security Officer​ (CISCO) (4)Chief Operations Officer​ (COO) (5)Chief Privacy Officer​ (CPO)

Chief Information Officer​ (CIO)

Which of the following​ real-life functions does an intelligent agent​ perform? (1)Monitoring the Internet to screen out malicious software and viruses (2)Collecting and sorting a​ company's sales data (3)Classifying and indexing web pages for search engines (4)Tracking Internet usage patterns of a​ company's employees (5)Loading data into data warehouses

Classifying and indexing web pages for search engines

Business intelligence data that includes every click by every visitor on a website, along with associated data such as time spent on the page and the visitor's IP address EX: Travels by​ Donna, a travel agency in​ Georgia, recently created a website to attract travel clientele for the company. It is vital that the company be able to track the time that visitors spend on each page to understand the destinations and offers that interest potential customers. Which of the following will BEST help the company understand customer behavior patterns as well as the URL the visitor just​ left? (1)Clickstream data (2)​Pop-up ads (3)Real-time data (4)Keystroke logging (5)IP addres

Clickstream Data

Joe Roberts is finalizing the project management plan for the Wild River Social Media​ project, which will describe the components needed to ensure the success of the project and serve as a​ high-level road map for the project team. Which of the following project management planning documents is NOT a key part of the​ plan? (1)Closing documents (2)​Risk-management plan (3)Quality management plan (4)Project charter (5)Project schedule

Closing Documents

Which of the following enables users to access software applications and information systems remotely over the​ Internet, rather than locally on an individual PC or from servers in the​ organization's data​ center?

Cloud Computing

Which of the following statements about​ e-learning methods is​ FALSE? (1)Corporate​ e-learning modules are often​ self-paced, and educational​ e-learning is based on the university calendar with defined start and end dates. (2)Corporate​ e-learning modules are professionally developed using excellent production tools or commercial software. (3)College-based e-learning systems lack​ wikis, blogs, and other collaborative tools due to their lack of validity. (4)Corporate​ e-learning consists of modules employees can take on their own time to improve their skills or achieve certification. (5)College-based e-learning systems are developed​ in-house by instructors who focus on the content of the course more than the visual elements.

College-based e-learning systems lack​ wikis, blogs, and other collaborative tools due to their lack of validity

The CIO at Bank of America recently decided that all bank operations should be moved to the cloud in order to save money and ensure that the bank uses the most current technology available. To make the​ decision, the CIO used only data that supported his plans and failed to consider studies that pointed to the risks and vulnerabilities in​ cloud-based computing. In this​ example, the CIO was exhibiting​ ________ in his​ decision-making process. (1)hindsight bias (2) a planning fallacy (3) overconfidence (4)confirmation bias (5)availability bias

Confirmation Bias

Companies with disparate databases that are not shared among employees or departments within the organization often experience​ ________. (1)more ownership challenges (2)faster response time (3)fewer reporting formats (4)conflicting information (5)higher reliability in the data

Conflicting Information

When aggregate or summarized information is in agreement with detailed​ information, it has which characteristic of​ high-quality information? (1)Consistency (2)Timeliness (3)Bias (4)Uniqueness (5)Completeness

Consistency

The project dashboard for the Wild River Social Media Project indicates that the project is behind schedule in several key activities that require Joe​ Roberts, the project​ manager, to reallocate resources to stay on schedule. In this​ example, Joe is performing which project management​ process? (1)Planning (2)Initiating (3)Controlling (4)Executing (5)Closing

Controlling

James Key is a corporate trainer at Regions Bank in Atlanta. The bank is developing a new business intelligence department and will using​ web-based analytics to track customer use of online banking services and other functions available on the company website. James is designing a course for employees to teach them about​ web-based analytics. Which of the following strategies should James use to engage employees and help them understand and apply the concepts of​ web-based analytics? (1) Create a company blog to highlight how course topics apply to current events in the company (2)Have employees write a research paper on​ web-based analytics (3)Form a focus group to discuss the course concepts (4)Provide PowerPoint slides and chapter readings for each class (4)Give​ multiple-choice quizzes to test​ employees' knowledge of the course concepts

Create a company blog to highlight how course topics apply to current events in the company

​AFLAC, Inc. is implementing a new sales program to encourage customer service representatives to offer additional insurance products to customers who call for service. This is an example of a CRM (Customer Relationship Management) strategy to earn more revenue from existing customers by​ ________. (1)cross-selling (2)promoting permission marketing (3)implementing sales force automation (4)using a​ foot-in-the-door technique (5)using predictive analytics

Cross-Selling

The collection and analysis of vast amounts of customer data that enable companies to target market their products to specific customers has created concerns about the use and misuse of customer information. Which of the following is NOT a reason for the increase in the use of​ "Big Data" by​ companies? (1)Data storage costs have decreased significantly. (2)Customers have complete knowledge about the data that is collected about them. (3)Your answer is correct.C. Federal regulations fail to prevent companies from mining transaction data collected from customers. (4)Data mining techniques have become very sophisticated. (5)Targeted marketing reduces advertising costs.

Customers have complete knowledge about the data that is collected about them.

Individual facts or pieces of information. EX: Jackson walks into the ACE​ After-Hours Care clinic complaining of a fever. The nurse takes his temperature and enters the number into the patient information system.​ John's temperature reading represents a piece of​ ________.

DATA

Which of the following is a type of intelligence gathering that uses statistical techniques to explore records in a data​ warehouse, hunting for hidden patterns and relationships that are undetectable in routine​ reports? (1)Data mining (2)Normalizing (3)Transforming (4)Forecasting (5)Data extracting

Data Mining

A model used for planning the organization's database that identifies what kind of information is needed, what entities will be created, and how they are related to one another. EX:Devon Degosta is planning the​ organization's database. The model Devon is developing to identify what kind of information is​ needed, what entities will be​ created, and how they are related to one another is called​ a(n) ________. (1)archiving model (2)hierarchical model (3)process model (4)data model (5)functional model

Data Model

The confusion created by​ ________ makes it difficult for companies to create customer relationship​ management, supply chain​ management, or enterprise systems that integrate data from different sources. (1)data independence (2)data redundancy (3)data modeling (4)online processing (5)batch processing

Data Redundancy

Craigslist.com is an example of a​ ________, whereby the company owns the actual database but the records are created and managed by customers. (1)shadow system (2)data warehouse (3)database without boundaries (4)database management system (5)data mart

Database Without Boundaries

A central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning. EX: Realtree​ Outdoors, Inc. maintains a centralized repository of information from internal​ sources, competitor​ information, census​ reports, metadata from documents and​ multimedia, and other information. This repository is known as a​ ________. (1)data dictionary (2)data mart (3)data warehouse (4)shadow system (5)operational database

Data Warehouse

Why do data ownership issues often arise in the​ workplace? (1)The quality of data varies across departments. (2)Data security and compliance controls are well enforced. (3)Data is often taken from external sources. (4)Data is shared by all the stakeholders in the organization. (5)Data is stored in databases on external servers.

Data is shared by all the stakeholders in the organization.

An integrated collection of information that is logically related and stored in such a way as to minimize duplication and facilitate rapid retrieval Example: Professor Jones is accessing information about students currently enrolled in her Management Information Systems course. She wants to print out a class listing so she can take attendance each day. The information about the students in her class is stored in a​ ________. (1)student enrollment system (2)record (3)data dictionary (4)data mart (5)database

Database.

A wireless provider is currently offering customers who buy a new iPhone with a​ two-year contract a special package that includes a leather​ case, extra car​ charger, and earphones. In terms of​ Porter's Five​ Forces, what is this company trying to do with this special​ promotion? (1)Increase buyer power (2)Increase the threat of new entrants (3)Increase the threat of substitutes (4)Decrease buyer power (5)Decrease the power of suppliers

Decrease buyer power

The Internet is a disruptive innovation that has affected​ Porter's Five Forces in all of the following ways EXCEPT​ ________. (1)eliminating switching costs B. lowering barriers to entry C. increasing rivalry among competitors D. increasing the power of buyers E. decreasing the threat of substitutes

Decreasing the threat of new substitutes

The marketing department has defined several key​ ________ related to the Wild River Social Media Project including the creation of a new user interface that lets customers purchase photos taken on the ride and a feedback function where riders can post information about what they learned on the ride. (1)milestones (2)resources (3)constraints (4)benchmarks (5)deliverables

Deliverables

Dan Womack is an internal auditor who specializes in risk management audits for an​ organization's data assets. He has been hired by Wachovia Bank to perform a formal risk assessment for the company. Which of the following steps should Dan undertake first in order to assess the​ firm's readiness to face any potential security​ breaches? (1)Assessing threats from inside or outside the organization (2)Predicting future risks and devising strategies to prevent them (3)Recovering existing systems from damage (4)Evaluating controls and filling in security gaps (5)Determining which information assets need protection

Determining which information assets need protection

The International Accounting Standards Board​ (IASB) plays an important role in global trade and investment by doing which of the​ following? (1)Developing and promoting a single worldwide set of financial reporting standards (2)Representing accountants employed in the public and private sectors in the United States (3)Providing professional accountants worldwide with access to a wide range of resources (4)Establishing international tax laws and codes (5)Establishing international standards on ethics in auditing and public sector accounting

Developing and promoting a single worldwide set of financial reporting standards

Technologies that software developers, publishers, media companies, and other intellectual property owners use to control access to their digital content EX: Technologies that software developers, publishers, media companies, and other intellectual property owners use to control access to their digital contentune Bug​ Books, an​ e-publisher of rare and​ out-of-print books, uses an information system that administers the way its customers access online publications of digitized books. The system assigns each customer with a unique​ ID, maintains records of the books purchased by​ customers, encrypts electronic documents for​ transmission, and includes options to order hard copies of electronic documents. Which of the following terms describes the technology used in this​ case? (1)Customer relationship management system (2)Digital rights management (3)Inventory management (4)Internet resource management (5)Online identity management

Digital rights management

At a recent mock drill held at the headquarters of Pratt​ & Whitney, department managers used the​ company's ________ to guide their actions following the simulated disaster that destroyed their network access and technology resources. (1)due diligence plan (2)emergency evacuation plan (3)business continuity plan (4)business automation plan (5)disaster recovery plan

Disaster Recovery Plan

Brad Wallace conducts several online sales meetings a year as the district manager for Provident Insurance Company. During the​ meetings, Brad often comes across to his sales team as​ arrogant, blunt, and aggressive. This has had a negative impact on morale and increased turnover in his sales force. Brad is exhibiting a characteristic common in online environments know as​ ________. (1)telepresence (2)presence awareness (3)collaboration (4)media richness (5)disinhibition

Disinhibition

An economic community that includes the related industries making complementary products and services, the competitors themselves, the suppliers, and also the consumers.

Ecosystem

A powerful technique that protects sensitive data is​ ____________. (1)phishing (2)encryption (3)surfing (4)hacking (5spamming

Encryption

Amy Neff wishes to enroll for​ Hotmail's free email service. Which of the following would BEST help Hotmail establish that Amy is not a software​ bot? (1)Entering a sequence of letters and numbers from an image (2)Using biometric identification (3)Providing an alternative email address (4)Providing her contact details and Social Security number (5)Uploading her photo and providing visible identification marks

Entering a sequence of letters and numbers from an image

The tendency to continue investing in a​ project, despite mounting evidence that it is not​ succeeding, often comes about because people mistakenly let sunk costs affect decision making rather than weighing the value of further investment is known as​ ________. (1)post-purchase rationalization (2)progress trap (3)escalation of commitment (4)​buyer's remorse (5)zero-profit condition

Escalation Commitment

When Apple took steps to identify and correct questionable employment practices on the part of some of its​ suppliers, it demonstrated​ ____________ practices across its supply chain. (1)ethical (2)predatory (3)temporary (4)mandatory (5)revisionary

Ethical

The office manager for Freeman and Associates is concerned that subcontractors are billing the company twice for work that is performed. Which of the following reports would help the manager identify fraudulent​ transactions? (1)Routine report (2)Exception report (3)Compliance report (4)Non-compliance report (5)General ledger report

Exception Report

Audrey Tillman is head of HR for a large​ Chicago-based real estate and property management firm with offices located throughout the northeast. She is trying to identify a potential candidate in the company to manage a complex new property the company was recently hired to manage. The position requires extensive expertise in the field and experience working with executives. Which of the following tools would help Audrey identify the best candidate for the​ position? (1)Neural network (2)Expert locator tool (3)Content management system (4)Social network analysis (5)Knowledge management system

Expert Locator Tool

Knowledge that can be documented and codified, which is often stored in information systems, on websites, in spreadsheets, or in handbooks and manuals. EX: Consumer Reports is a magazine that tests consumer products in its labs and disseminates information on the results so consumers can compare brands. The information that is analyzed and published by Consumer Reports can be accessed by consumers from the​ publisher's website, and it is also sent to subscribers in the form of a printed magazine. The product information is an example of​ ________. (1)explicit knowledge (2)tacit knowledge (3)financial capital (4)structural capital (5)intellectual capital

Explicit Knowledge

Which part of the SDLC planning process examines whether an initiative is viable from​ technical, financial, and legal​ standpoints? SDLC (Systems Development Life Cycle) - The process that describes the seven steps in the life of an information system: planning, analysis, design, development, testing, implementation, and maintenance. (1)Brand assessment (2)Feasibility study (3)Business process reengineering (4)Market share analysis (5)Procurement analysi

Feasibility study

One of Porter's three basic strategies. A company strategy that involves differentiating a product or service for a particular market niche. EX: In the highly competitive cell phone​ market, BlackBerry has positioned its smartphone by focusing its product on the needs of government and corporate business users.

Focused Niche Strategy

A statistical decision support tool used to analyze historical trends and other business intelligence to estimate some variable of interest, such as customer demand. EX: The business analysts at Blue​ Bell, a brand of ice​ cream, recently were asked to assess revenue generated over the past five years to observe seasonal and historical trends. After extensive​ analysis, they arrive at the conclusion that the sales were highest during the months of July and​ August, the summer months in the​ country, and an​ all-time low during​ January, the peak of winter. Which of the following tools would have BEST helped them arrive at this​ conclusion? (1)Goal-seek analysis (2)Forecasting (3)​What-if analysis (4)Optimization analysis (5)Market basket analysis

Forecasting

Primary keys that appear as an attribute in a different table are a foreign key in that table. They can be used to link the records in two tables together. EX:In Valdosta State​ University's database, student records in the student table are linked to the​ university's academic majors table through a common​ field, which is the major code. In the student​ table, the major code is a​ ________ (1)primary key (2)foreign key (3)record (4)functional key (5)complex key

Foreign Key

Virtual teams are increasingly common in organizations as new collaborative technologies allow companies to draw on​ employees' expertise regardless of physical location and also reduce the number of physical meetings that require travel. A key drawback to virtual​ teams, however, is the lack of nonverbal communication to convey group norms. This can often lead to problems such as​ ________. (1)impression management (2)groupthink (3)missed deadlines (4)bias (5)free riding

Free Riding

Which of the following is a ​web-based e-mail service that was built from the ground up to work within the browser rather than with client software installed on a​ computer? (1)Lotus Notes (2)Gmail (3)Scribd (4)IM (5)Groupwise

Gmail

Columbus Flight​ Services, Inc. offers charter flights serving small to medium cities. They are evaluating the possibility of expanding into the corporate jet leasing industry. As part of the planning​ process, they are using​ Porter's Five Competitive Forces model to evaluate the​ ________. (1)product (2)industry (3)investment (4)market (5)competition

Industry

The success of the 419 scam is based on the human frailty of​ __________. (1)poor memory (2)laziness (3)helpfulness (4)greed (5)fear of authority

Greed

EX: Robert works for CHS Computer​ Specialists, which focuses on helping small business owners fix their company computers. Robert works primarily on PC components such as hard​ drives, DVDs, and monitors. Which of the following does Robert focus on​ repairing? (1)Hardware. (2)Disaster recovery (3)Software (4)Backup systems (5)Data

Hardware

At a conference of music​ professors, users were instructed to use the​ #musicedu symbol to preface their comments about the conference topics on Twitter so other attendees could easily locate information. This is an example of using​ a(n) ________. (1)tag cloud (2)hashtag (3)wiki (4)mashup (5)microblog

Hashtag

ETX Enterprises offers Software as a Service​ (SaaS) to companies that lack​ in-house IT departments. Which of the following describes​ SaaS? .(1)Managing​ applications, networks,​ storage, and security and providing website performance monitoring to subscribers over the Internet (2)Installing​ commercial, off-the-shelf software (3)Hosting and managing access to software applications delivered over the Internet on a subscription basis. (4)Supplying online access over networks to storage devices and storage area network technology (5)Developing proprietary software

Hosting and managing access to software applications delivered over the Internet on a subscription basis

Professor Dunlap is developing a new online course called​ "The History of​ Religion." Which of the following factors should he take into account as he develops his online​ course?

How students interact in a virtual classroom environment

​The competencies and knowledge possessed by the organization's employees. EX:Chick-fil-A is opening a new store in​ Sacramento, California, that will be run by a new franchise owner. The company has asked Josh​ Carter, a manager with more than ten years with the​ company, to help open the store and teach the new owner how to run the business. What type of intellectual capital is​ Chick-fil-A leveraging by sending Josh to help open the new​ store? (1)Social capital (2)Structural capital (3)Human capital (4)Equity capital (5)Financial capital

Human Capital

Progressive Insurance recently deployed Salesforce.com for its sales​ agents; it provides​ real-time web-accessible metrics showing the number of new accounts for each​ rep, and it automatically sends​ e-mails to the whole organization to recognize and congratulate the top performers. This approach is based on which of the​ following? (1)Human motivation (2)Team dynamics (3)Pay-for-performance (4)Social comparison (5)Self-determination theory

Human Motivation

John Finley teaches an international business course by using a combination of traditional lectures in class twice a week and an online discussion and quiz that his students must complete for each chapter. He also posts all his course​ materials, such as PowerPoint​ slides, on his course website so students can access them at any time.​ John's approach is known as​ a(n) ________ model of​ e-learning. (1)self-paced learning (2)instructor-led (3)learning management system (4)hybrid (5)​Internet-based

Hybrid

Which of the following statements about Internet Mail Access Protocol​ (IMAP) is​ TRUE? (1)IMAP deletes indicators regarding the status of​ emails, such when a user has replied or read an email. (2)IMAP requires the installation of client software and cannot work on web browsers. (3)IMAP is an outdated protocol for organizing outgoing mail. (4)IMAP allows access to email only from a single​ device, ensuring privacy. (5)IMAP maintains emails on a server instead of on a single machine.

IMAP maintains emails on a server instead of on a single machine.

Which of the following is NOT one of the criteria commonly used to determine the value of an IT​ project? (1)Return on investment (2)Contribution to competitive strategy (3)Improvement in customer satisfaction level (4)Payback period (5)Compliance and risk reduction

Improvement in customer satisfaction level

Jamal uses Endnote software to create and format the bibliography for his research paper. Jamal is using information systems to do which of the​ following?

Increase his personal productivity

Iron Bank Coffee has three retail​ stores, each operating independently with their own database of customers and products. The​ owner, Richard​ Smith, has decided to consolidate the databases of the three stores into a single database. Which of the following is NOT a benefit Mr. Smith will realize by consolidating the​ databases? (1)Makes performing information updates easier (2)Increases the number of customers for the coffee shops Your answer is correct.C. Improves information quality (3)Uses less hard disk space (4)Reduces data redundancy

Increases the number of customers for the coffee shops

Which one of the following statements is NOT an amplification effect of information​ systems? An Amplification effect is When small events within an information system have far-reaching effects (1)An individual sends emails to more people than intended.. (2)Data from an email or photo can be forwarded or uploaded for millions to view. (3) Information stored in the cloud can be easily hacked and stolen by anyone. (4)Information posted on a​ person's social networking site can be easily distributed to a wider audience than the​ person's own network. (5)A negative video about a company is spread virally through YouTube

Information stored in the cloud can be easily hacked and stolen by anyone.

Which phase of the project management process involves identifying the project​ sponsor, the project​ manager, and team​ members? (1)Initiating phase (2)Monitoring phase (3)Controlling phase (4)Planning phase (5)Executing phase

Initiating Process

​AFLAC, Inc. recently implemented a company policy that all new IT projects must be coordinated and approved by the project management office. Which of the following endeavors would this new policy apply​ to? (1)Updating software programs (2)Performing information system maintenance (3)Backing up organizational data (4)Installing a wireless network in a branch office (5)Setting up new employees with systems access

Installing a wireless network in a branch office

Which of the following is the primary function of unified​ communications? (1)Integrating multiple applications and communications channels into a single interface (2)Collecting and storing data from multiple users and building a database (3)Allowing a company to communicate with all its customers at the same time (4)Providing a virtual environment for employees to collaborate (5)Maintaining a record of individual changes made on shared documents through version control

Integrating multiple applications and communications channels into a single interface

Freeman and Associates is a​ medium-sized construction company specializing in​ high-end custom homes. The bookkeeper handles all​ orders, approvals,​ invoices, and payments manually. Which of the following will help the company implement a more streamlined and faster approval system for its financial​ activities? (1)Monitoring cash management and budget planning (2)Analyzing customer information (3)Integrating the modules in the financial system (4)Increasing financial analytics and financial reporting (5)Implementing a supply chain management system

Integrating the modules in the financial system

Innovative​ Solutions, a patent law​ firm, provides client services such as drafting​ patents, filing patent​ applications, and managing intellectual property rights. The company is planning to build an electronic database of the patent applications it has filed for its clients over the years.​ However, most of its clients are not​ tech-savvy and often rely on handwritten notes for their reference. Which of the following software tools would enable the company to convert the large number of​ paper-based notes from its clients into electronic records that can be easily searched and​ referenced? (1)Image recognition (2)Knowledge management program (3)Intelligent character recognition (4)semantic mapping (5)Optical mark recognition

Intelligence Character Recognition

HR​ Solutions, Inc. provides human resource technology solutions to companies that are seeking ways to reduce costs and improve efficiencies in their operations. Which one of the following functions is NOT a human resource function that would benefit from a​ technology-based solution? (1)Interviewing potential job candidates (2)Processing timesheets electronically (3)Developing a website to answer routine HR questions (4)Implementing direct deposit for all payroll processing (5)Implementing an online application process

Interviewing Potential Job Candidates

An organization's private web space. It relies on TCP/IP and web browsers, but it is password-protected and accessible only to authorized individuals through the organization's portal. EX: Total Service​ Group, LLC is an information technology firm that uses its own private web space to organize and distribute employee forms and announcements. It has recently begun using the same web space to manage its​ knowledge-related initiatives as well. The​ company's employees are able to access information about​ HR, procedure​ manuals, and frequently asked questions. The private web space is an example of​ a(n) ________. (1)content management system (2)wiki (3)local area network (4)knowledge management system (5)intranet

Intranet

Which of the following functions does a firewall​ perform? (1)It ensures that routine​ back-ups of sensitive data are completed. (2)It encodes sensitive data to ensure safe transmission across unsecured networks. (3)It attracts malicious attacks to study their properties and origins. (4)It ensures security by using multiple authentication strategies for employees. (5)t defines which IP addresses or domains should be blocked.

It defines which IP addresses or domains should be blocked.

The waterfall or traditional software methodology is considered by many to have exceeded its useful life and inappropriate for modern development projects.​ Surveys, however, show that the method is still widely used in many organizations. Which of the following reasons explains why it is still considered a viable methodology in​ today's fast-paced development​ environment? (1)It adapts quickly to inevitable changes in a project. (2)It has a logical and familiar​ structure, which is comfortable to use. (3)It is more iterative and allows developers to rapidly build workable components. (4)Organizations need time to adjust to its​ team-oriented approach. (5)It has a strong track record of delivering quality software on time

It has a logical and familiar​ structure, which is comfortable to use.

Which of the following is a drawback of the waterfall​ method - Method in which the systems development life cycle tasks occur sequentially, with one activity starting only after the previous one has been completed? (1)Its SDLC tasks occur in a​ non-sequential manner. (2)It estimates deliveries based on the time and requirements available. (3)It does not address testing very well. (4)It is unable to adapt to changes of the business landscape. (5)Its activities occur at the same​ time, which makes it hard to monitor them.

It is unable to adapt to changes of the business landscape.

The executive team at​ AFLAC, Inc. wants to encourage more productive brainstorming in its product development meetings. Several employees have complained that their opinions are not captured in the minutes of the meetings and that certain individuals dominate the discussions. It has decided to begin using a new group decision support system to facilitate the process. What is one of the key advantages AFLAC will realize using group decision support​ systems? (1)It will give​ high-status individuals within the group additional influence on decisions. (2)It will allow users to express independent viewpoints that may differ from those of others in the group. (3)It will not support anonymity and require users to use their real​ names, to increase accountability. (4)It will promote​ "groupthink." (5)It will allow users to collaborate with each other​ asynchronously, saving time and effort in coordination.

It will allow users to express independent viewpoints that may differ from those of others in the group.

Delta Airlines recently updated its​ ________ to include new measures related to airline safety and customer satisfaction with its online reservation system. These updated and quantifiable metrics will be used by Delta to evaluate its organization against industry standards. (1)key performance indicators (2)social media (3)strategic goals (4)dashboard (5)portal

Key Performance Indicators

The Blue Door is a new​ high-end clothing store catering to college students in a small southern city. It recently launched a new line of accessories with the college logo imprinted. The company has set up a Google Ad account to deliver the link to its website as the top search result to Internet users when they search for words such as​ "scarves" and​ "collegiate accessories." Which of the following does this situation​ illustrate? (1)Direct marketing (2)Product placement (3)Conversion rate (4)Keyword advertising (5)​E-commerce

Keyword Advertising

A network that connects devices such as computers, printers, and scanners in a single building or home EX: Abercrombie Financial Consultants is planning to install a network in its office so employees can work together on client files and​ documents, manage tax​ records, access the​ Internet, and share the​ company's new​ printer/copier. The company wants to have control over which employees have access to​ files, so it will need to have a central server. Which type of network would be most appropriate for​ Abercrombie?

LAN (Local Area Network)

The Acme​ Company's payroll office maintains its employee pay records within its own computer​ files, each containing information that is required for processing monthly payroll checks. A separate area of the company handles employee benefits with its own computer system and employee records. Acme Company is limited to comparing and analyzing employee information in these files for which of the following​ reasons? (1)Data independence (2)Data integrity (3)Lack of data integration (4)Consistent data definitions (5)Complicated tables and fields

Lack of Data Integration

Which of the following businesses is an example of where rivalry among existing competitors is strong and buyers have​ power? (1)Dude ranch vacation (2)Lawn care business (3)English antiques store (4)Commercial-grade kitchen appliances (5)Customized motorcycles

Lawn Care Business

A self-contained digital resource embedded in an e-learning course that can be edited and reused for other purposes. EX: The Chicago Culinary School uses an​ e-learning system for students to watch​ videos, learn​ terminology, and master the fundamentals of cooking. When developing the course for the culinary​ school, the course designers decided to create​ ________ with all digital resources about each topic organized in one place. This approach lets students access and complete just the learning modules they need to complete each class and also allows the course designers to easily update and reuse the learning material. (1)learning objects (2)a semantic web (3)a knowledge repository (4)chapters (5)cookies

Learning Obects

Cambridge Landscape Architects is evaluating a new CAD system to assist with landscape design projects in its new urban garden design center. As a general​ rule, the company should consider buying the CAD software versus developing a custom system​ in-house under what​ circumstances? (1)Licensed software meets 75 to 80 percent of its requirements (2)The cost to develop the software is very reasonable. (3)Organizations need to retain the same business processes. (4)Customer demands emphasize customization of a product. (5)Software needs to fit the enterprise architecture perfectly

Licensed software meets 75 to 80 percent of its requirements

The head of information security for TIC Credit Union recently suggested that the company increase the level of online surveillance of employees to reduce the risks of employee theft and violations of customer privacy laws. Which of the following negative impacts should the bank president be concerned about regarding the​ recommendation? (1)Compromised company security (2)Increased pressure on corporate​ e-mail systems (3)Increased instances of plagiarism (4)Lowered productivity of employees (5)Increased levels of cyberslacking

Lowered productivity of employees

Malicious software designed to attack computer systems. EX: Lynn Brown is a contract underwriter who does freelance work for a local insurance company. Her desktop computer has been infected with a software program that installed itself without her knowledge. The program monitors the websites she visits and her​ e-mail communications. Data gathered from the monitoring activity is sent to a remotely placed hacker. Which of the following threats most likely has infected​ Lynn's computer? (1)A web crawler (2)A Trojan horse (3)A worm (4)A firewall 5)Malware

Malware

Which of the following disciplines studies how​ people, technology,​ processes, and data work​ together, and is also used to describe a type of information system that supports decision making by​ supervisors? (1)Collaborative information systems (2)Operations management systems (3)Management information systems (4)Executive information systems (5)Business intelligence systems

Management information systems

Paula Watkins was surprised when a job position that she interviewed for and felt sure she had never materialized. She later heard that the company had conducted a search of her social networking profile that made them reconsider hiring her for the position. What should Paula have considered prior to applying for a new​ job? (1)Securing good references (2)Creating a new resume (3)Making sure she had a good interview suit (4)Communicating her work experience (5)Managing her online impression

Managing her online impression

James Coburn is a business analyst at​ Dillard's, a​ high-end retail store. James is preparing a report to assess customer data to understand the buying patterns of customers when they purchase multiple items. Which of the following will BEST help James analyze the purchasing habits of customers who bought rain boots along with​ umbrellas, ties along with​ shirts, and hair clips along with headbands among other related​ products? (1)Online analytical processing (2)Forecasting (3)What-if analysis (4)Goal-seek analysis (5)Market basket analysis

Market Based Analysis

Tom Tebeau is a web designer at a publishing firm in Atlanta where he is currently using a process to aggregate a wide array of information like book​ reviews, customer​ feedback, awards​ won, and company details on its public website. Which of the following is he using to bring together all this information from multiple internal and external sources onto the​ company's customizable web​ pages? (1)Dashboard (2)Middleware (3)Virtualization software (4)Mashup (5)Portal

Mashup

Data about data that clarifies the nature of the information EX: The search function of major​ photo-sharing websites such Flickr.com depend on information that is tagged with each photo including the​ photographer's name, contact​ information, release and copyright​ status, as well as caption and location data. This information is collectively known as​ ________.

Metadata

Brasfield and​ Gorie, Inc., a large advertising company with offices across the​ country, began an employee discussion forum on its website to allow employees to develop a sense of identity and solidarity. There were no restrictions on employee postings to allow employees to interact freely.​ However, a few months​ later, a few employees began criticizing the company on the forum and undermining morale. The company does not want to limit employee​ interaction, but at the same​ time, it would like to limit what employees can write. Which of the following features of a discussion forum will help them achieve this​ goal? (1)telepresence (2)Moderators (3)Version control (4)Anonymity (5)Forum leaders

Moderators

In the​ ________ phase, project managers pay close attention to reports and dashboards that might show early warning signs that some tasks have fallen behind. (1)planning (2)executing (3)initiating (4)closing (5)monitoring

Monitoring

A principle named for computer executive Gordon Moore, which states that advances in computer technology, such as processing speed or storage capabilities, doubles about every 2 years.provides an understanding of why computing resources today are more available than in previous​ decades?

Moore's Law

Which of the following statements is NOT a key reason that information technology​ (IT) is essential to managing nonprofit​ organizations? (1)Some nonprofit organizations engage in sales and marketing activities. (2)Operational requirements for nonprofits are similar to​ for-profit businesses. (3)Nonprofits often require extensive human resources to operate effectively. (4)Nonprofits need to communicate and collaborate extensively with other organizations. (5)Most nonprofit organizations have a concealed profit motive

Most nonprofit organizations have a concealed profit motive

Which ethical framework judges the morality of actions based on how well the actions adhere to broadly accepted rules regardless of actual​ consequences? (1)Social engineering (2)The rule of law (3)Utilitarianism (4)Intellectual property (5)Natural laws and rights

Natural Laws & Rights

Which type of network treats all processors equally and allows sharing of printers and files without the use of a central​ server?

Peer-to-Peer

A process that refines entities and their relationships to help minimize duplication of information in tables. EX:Devon Degosta is finalizing the database for​ DD-Designs. The last process involves minimizing the redundant information in the database and eliminating any awkward​ many-to-many relationships. Which process is Devon​ performing? (1)Data modeling (2)Data recovery (3)Data scrubbing (4)Normalization (5)Data mining

Normalization

​Realtree, Inc. is in the process of launching a knowledge management system and needs to capture tacit knowledge from experienced employees that has been never documented. Which of the following approaches should Realtree use to get employees to share acquired​ information? (1)Offering inconsequential rewards for sharing information (2)Setting up an anonymous information sharing website to collect information (3)Offering monetary awards and public recognition (4)Threatening to fire any employees who do not participate (5)Promoting employees who share information

Offering monetary awards and public recognition

The employee database of Synovus Financial Company needs to store the birth date of each employee. In the context of database​ architecture, this is an example of​ ________. (1)one-to-one (2)​one-to-many (3)data integrity (4)many-to-many (5)a hierarchical database

One-to-One

Rodney​ Perkins, who works in the marketing department of the Fairfield​ Inn, has been given the responsibility of identifying patterns in the preferences of guests who have repeatedly visited the hotel in the past ten years. Which of the following would BEST help him categorize the massive amounts of data to reveal preferences of​ guests, such as room type and room​ service? (1)What-if analysis (2)Forecasting analysis (3)Online analytical processing (4)Optimization analysis

Online analytical processing

A type of software whose licensing terms comply with criteria such as free distribution, so other people can access the source code to improve it, build upon it, or use it in new programs. EX: The city government of Los Angeles recently upgraded its information technology infrastructure​ and, for the first​ time, implemented software in the human resources department that is freely distributed along with the code underlying the program. The type of software the city has implemented in HR is called​ ________.

Open Source Software

Emily Robertson is an employee at Regions Insurance​ Company, the largest insurance company in Texas. What type of decisions will she undertake if her responsibilities include receiving customer​ queries, setting appointments for sales​ representatives, updating customer​ records, and tracking potential clients through call​ records? (1)Strategic decisions (2)Unstructured decisions (3)Tactical decisions (4)Directional decisions (5)Operational decisions

Operational Decisions

Business intelligence is said to be used at the​ ________ if companies use it to bring​ meaningful, performance-related information to all employees. (1)strategic level (2)tactical level (3)directional level (4)executive level (5)operational level

Operational Level

The area of management concerned with the design, operation, and improvement of the systems and processes the organization uses to deliver its goods and services.

Operations Management. Kia Motor Company is performing a key function of operations management when it​ [purchases new parts and supplies] for its new line of automobile

Electronic devices that capture text or images and convert them to digital format EX:When Kayla goes through the checkout line at the local grocery​ store, a(n)​ ________ captures the barcodes of her groceries and converts them to a digital format to generate the total amount of her groceries

Optical Scanner

Web 2.0 and​ user-generated content​ (UGC) characterize the​ ________ component of an information system. Web 3.0 and the​ "Internet of​ Things" rely on the​ ________ component of an information system.

People / Technology

Chancellor's is a​ high-end men's clothing store that frequently resorts to discount blowouts to get rid of excess merchandise. Which of the following best explains the reason for these​ sales? (1)A decrease in inventory costs (2)An increase in the price of raw materials (3)Ineffective tracking of the inventory (4)Increased competition in the local market (5)Overestimating demand

Overestimating Demand

Which of the following is typically NOT included in a​ full-featured financial management​ system? (1)Procurement (2)Payroll (3)Cash management (4)Budgeting (5)General ledger

Payroll

An attempt to steal passwords or other sensitive information by persuading the victim, often in an email, to enter the information into a fraudulent website that masquerades as the authentic version. EX: Janie Mount received an​ e-mail that contained a link to a website that appeared to be the website of her bank. The​ e-mail directed her to open the link and update her personal information including her credit card​ number, her Social Security​ number, and her date of birth. She later found that her credit card was fraudulently charged for transactions she never made. This is an example of Janie being a victim of​ ________. (1)keylogging (2)a phishing attack (3)pharming (4)spam (5)a worm

Phishing Attack

William​ Hart, a freelance writer and expert in rose​ gardening, recently updated his gardening website with an instructional manual for cultivating a new type of rose. One website visitor copied​ William's manual and posted it on her own blog and passed it off as her original work. This is an example of​ ________. (1)attribution (2)plagiarism (3)cybersquatting (4)bootlegging (5)online identity theft

Plagiarism

Michael Holliday is a business systems analyst who is working on a feasibility study for a new​ e-911 system for the city of Memphis. Which of the following phases is he working on as he determines if the system will provide a good return on investment for the​ city? (1)Design (2)Testing (3)Requirements analysis (4)Development (5)Planning

Planning

Brian Abeyta is responsible for the office that oversees all the projects going on throughout the organization. His office provides project management​ training, software, and support. What type of office does Brian​ manage? (1)Records management office (2)Business process management office (3)Procurement office (4)Product development office (5)Program management office

Program Management Office

A gateway that provides access to a variety of relevant information from many different sources on one screen; for an enterprise, the portal provides a secure gateway to resources needed by employees, customers, and suppliers. EX: Macon State University recently implemented a​ ________ designed to provide a central location for students and faculty to access university information needed for​ registration, grades, and financial​ aid, and to provide access to​ courses, email, and other secure resources. (1)mashup (2)dashboard (3)database (4)website (5)portal

Portal

Which of the following terms refers to a gateway that provides access to a variety of relevant information from many different sources on one​ screen? (1)Decision support system (2)Portal (3)Dashboard (4)Data warehouse (5)Mashup

Portal

​The advantage sellers have when there is a lack of competition and they can charge more for their products and services. This is one of Porter's five competitive forces. EX: Pharma, Inc. recently started selling a​ new, patented drug for high cholesterol called Terazatin. Sales of Terazatin are so successful that Pharma has decided to raise the price from​ $12 a pill to​ $20 a pill. Which of the following forces is Pharma using to increase the price of​ Terazatin?

Power of Suppliers (Supplier Power)

Informal social networks of professionals and employees within and outside the firm who have similar​ work-related activities and interests are called communities of​ ________. (1)interest (2)knowledge (3)executives (4)practice (5)experts

Practice

Sally Weathers is a student at Valdosta State University. Her student ID number is the main number she uses for her​ school-related activities such as enrollment and meal charges.​ Sally's student ID number in a table of student records would be referred to as a​ ________. (1)foreign key (2)unique ID (3)normal key (4)primary key (5)secondary key

Primary Key

A company requires that all technology purchases be approved by IT and must conform to company standards. This is an example of​ a(n) __________ that ensures a consistent enterprise architecture. (1)intellectual property disclaimer (2)Internet usage policy (3)ethical conduct policy (4)procurement policy (5)​acceptable-use policy

Procurement Policy

Haliburton Manufacturing Corporation makes industrial air conditioning units for large organizations. Last year the company spent more than​ $5 million on new technology designed to make its employees more productive and streamline its business processes. The expected return on​ investment, however, was much lower than the company​ expected, and production of new air conditioners was not improving. What economic theory helps explain the reason Haliburton is not getting an immediate return on its IT​ investment? (1)Productivity paradox (2)This is the correct answer.B. (3)Business performance theory (4)Productivity theory (5)Agency theory (6)Rational choice theory

Productivity Paradox

Blackhawk Security​ Systems, Inc. is a government contractor that handles highly sensitive information for overseas military operations. Which of the following security controls is the company most likely to implement to ensure the safety of its​ high-level sensitive​ data? (1)Restricting employee access to official mails (2)Prohibiting entry of employees in shared workspaces (3)Requiring employees to update their passwords every few months (4)Prohibiting public access to the​ company's website (5)Prohibiting the downloading of data to USB drives

Prohibiting the downloading of data to USB drives

In order to begin work on the Wild River Social Media​ Project, the director of marketing must first obtain a​ ________, which authorizes the project and includes a clear statement of​ objectives, estimated start and end​ dates, the names of the relevant people and their​ roles, a tentative​ budget, criteria for​ success, and other pertinent information. (1)Gantt chart (2)project charter (3)project management plan (4)work breakdown structure (5)business case

Project Charter

Which of the following represents procurement as part of the support value activities in a value chain​ analysis? (1)Providing technical support for the manufacturing processes (2)Creating a new advertising campaign for the​ company's products (3)Purchasing inputs such as raw​ materials, resources, equipment and supplies (4)Hiring new employees (5)Distributing goods and services to customers

Purchasing inputs such as raw​ materials, resources, equipment and supplies

Which of the following BEST describes a key performance​ indicator? (1)Quantifiable metrics most important to the​ individual's role and the​ organization's success (2)Abstract qualitative metrics to measure an​ individual's role and the​ organization's success (3)Strategic goals of the organization (4)Qualitative metrics to measure growth indicators of a country (5)Abstract qualitative metrics to measure and compare the success of industries

Quantifiable metrics most important to the​ individual's role and the​ organization's success

Direct TV captures customer transactions and streams the data instantly to its data warehouse where it can be used to develop targeted promotions to new customers or ones who may be considering canceling their service. This process represents a growing need for​ ________ to make faster business decisions. (1)internal company information (2)knowledge management systems (3)real-time business intelligence (4)big data (5)web-based information

Real-time business intelligence

The technology project steering committee at Wolf Camera approved the expenditure of​ $50,000 for the development of a new​ photo-refinishing program for customers to use on its website. The project manager has estimated that the system according to the requirements will cost​ $100,000 to develop. In this case what should the project manager suggest to the committee to keep the project within their​ budget? (1)Reduce the scope of the project (2)Use consultants for the project (3)Buy an​ off-the-shelf system (4)Outsource the project (5)Increase the amount of time to develop the system

Reduce the Scope of the Project

Projects focused on explicit knowledge and structural​ capital, much of which is in electronic form and scattered across different formats and media​ types, are hampered by the ease of copying and editing electronic files so that different versions contain inconsistent information. This problem is referred to as​ ________. (1)exclusivity (2)scalability (3)reliability (4)redundancy (5)accessibility

Redundancy

A database model that organizes information into tables of records that are connected to one another by linking a field in one table to a field in another table with matching data is called​ a(n) ________ database. (1)network (2)hierarchical (3)web-enabled (4)object-oriented (5)relational

Relational

Raymond James Investment Services recently completed its requirements definition document and provided the information to several software vendors so they can describe the software products they have that may fit. The document Raymond James has sent out is called​ a(n) ________. (1)request for application (2)request for quotation (3)request for information (4)request for proposal (5)unified procurement document

Request for Information

Kennesaw State​ University's technology steering committee has decided to pursue the purchase of​ data-analytics software based on their research and information from vendors. They invited software companies to provide a detailed description of their​ products, services, and costs to implement the new system. The responses from the​ ________ will help the committee select the best vendor that meets their software requirements. (1)procurement document (2)request for information (3)request for application (4)request for proposal (5)request for quotation

Request for Proposal

EX: Amy Palmer is a systems analyst who is working on the analysis phase of a project to implement a new​ web-based analytics dashboard for all department heads and managers in her company. She is helping the managers prioritize the functions of the dashboards into categories according to whether they are​ mandatory, preferred, or nonessential. Amy is working on​ a(n) ________ analysis. (1)competitive (2)probabilistic (3)requirement (4)market share (5)amortized

Requirement Analysis

Which of the following is part of the XML family of standards that is used to describe online resources and their properties for the semantic​ web? (1)Resource description framework (2)Optical character recognition (3)SMTP (4)Extensible Markup Language (5)ICR

Resource Description Framework

Greystone Properties has learned that one of its property managers is collecting and downloading confidential data about apartment residents. According to the​ company's incidence response​ plan, which of the following actions should Greystone follow to best contain any damage caused by the information security​ threat? (1)Preserve evidence of damage done (2)Recover the data (3)Investigate system logs for evidence (4)Restrict systems access (5)Reevaluate the risk matrix

Restrict systems access

All of the following are examples of human capital management metrics that can provide a company with valuable information about how well the organization is managing its human capital EXCEPT​ ________. (1)human capital return on investment (2)turnover costs (3)retention rates (4)turnover rates (5)employee satisfaction levels

Retention Rates

Which of the following situations is representative of the​ "last mile" issue in​ telecommunications? (1)Smartphone owners working in remote countries are unable to use features such as 4G and​ Wi-Fi because those countries do not yet have the relevant infrastructure. (2)An​ e-commerce site is available in only two language​ versions, and customers speaking neither language cannot browse through the site while shopping. (3)Rural subscribers of an Internet Service Provider​ (ISP) complain of poor Internet speeds compared to those enjoyed by downtown users. (4)Students find that the farther they are from their university​ building, the harder it is to connect to the Internet with their laptops. (5)Emergency medical personnel are unable to receive calls during emergencies due to high cell phone usage

Rural subscribers of an Internet Service Provider​ (ISP) complain of poor Internet speeds compared to those enjoyed by downtown users.

Mail server using the simple mail transfer protocol; handles outgoing email. EX: Chandler Wright is a student at Georgia Tech University. She is setting up her email for outgoing email using her university email​ address, which is hosted by Georgia Tech. To set it​ up, she would enter the name of the​ ________ server so when she sends an outgoing​ email, it will first be transmitted to a port on the​ university's server. (1)TCP/IP (2)IMAP (3)POP (4)IM (5)SMTP

SMTP server Mail server using the simple mail transfer protocol; handles outgoing email.

​Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions are referred to as​ ________.

Software Packages

Blue Hen Organic Foods has decided to use a​ cloud-computing service to manage the​ company's computer processing and data storage needs. Blue​ Hen's risk-management team has identified several concerns with implementing a​ cloud-based computing architecture. Which of the following is NOT a risk associated with cloud​ computing? (1)Data security (2)Scalability of the system to meet customer demand. (3)Reliability of the​ company's Internet connection (4)Capability to use virtualization software (5)Loss of control over​ mission-critical systems and data

Scalability of the system to meet customer demand

Al Johnson develops condominium communities in central Florida for the senior living market. In a recent development​ project, Al found he continually added square footage and features to the​ units, causing considerable delays and added expense.​ Al's rationale is consistent with the idea of​ ________. (1)scope creep (2)​buyer's remorse (3)​post-purchase rationalization (4)escalation of commitment (5)progress trap

Scope Creep

Julie Van Horn is a human resource manager at the Intuit Software Development Center in San​ Jose, California. She monitors the flow of people coming in and going out of the organization and coordinates the level of access for each employee. Which of the following requirements is she focusing on while tracking the authentication of employees to ensure the privacy and safety of​ data? (1)Usability requirement (2)Security requirement (3)Functional requirement (4)Interface requirement (5)Language requirement

Security Requirement

Mead Industries recently implemented a new enterprise resource planning​ (ERP) system in its Alabama production plant. It must quickly train its managers and floor supervisors on how to use the new system and each of the components. Because the managers work in​ shifts, Mead is evaluating various ways to administer the training to ensure all employees have the required knowledge. Which type of training approach would be most suitable for​ Mead? (1)Hybrid learning (2)Wiki-based training (3)Self-paced learning (4)Learning management system (5)Instructor-led training

Self Paced Learning

Smaller databases developed by individuals outside of the IT department that focus on their creator's specific information requirements. Ex: To support an innovative idea for an important business​ project, a manager creates a separate database system that is not integrated into the enterprise database. This is an example of​ a(n) (1)shadow system (2)data mart (3)data warehouse (4)excessive documentation method (5)foreign database

Shadow System

Bainbridge Property Management Company employees must access several different software systems to coordinate​ vendors, manage customer rental​ agreements, and schedule maintenance updates to their apartment communities. The company implemented a​ ________ for their employees so they can access the systems they use most often with a specific user ID and password. (1)single​ sign-on (2)shadow password (3)token ID (4)pre-shared key (5)canonical account

Single Sign On

The number and quality of all the relationships an organization's employees maintain, not just with one another, but with clients, customers, suppliers, and prospective employees. EX:Lynn Brown is widely known as the one of the best customer relationship managers in her company. Over the years she has developed and maintained strong relationships with the​ company's customers and suppliers that have enabled the company to gain market share and profits in a competitive market. The type of intellectual capital that Lynn contributes to her company is known as​ ________. (1)human capital (2)structural capital (3)social capital (4)equity capital (5)financial capital

Social Capital

Zara, a clothing company based in​ Spain, wants to increase its online presence through online interconnections with a community of its customers. The company would like to create groups of customers who interact with each other as well as the company and generate information that can be used in future products. Which of the following will BEST help them reach out to people who may be interested in their products and tailor ads to reach precise target groups based on their​ members' profiles? (1)Wiki (2)Instant messaging system (3)Social networking system (4)Video conferencing system (4)Electronic mail system

Social networking system

​________ is a type of agile method that offers a framework for software development that relies on tightly​ knit, cohesive teams that do sprints of two to four weeks each. (1)Rapid application development (2)Spiral model (3)Extreme programming (4)Scrum (5)Waterfall

Srum

As organizations move more of their​ mission-critical applications to the​ cloud, they find that security concerns​ __________. (1)are unchanged (2)are eliminated (3)are reduced (4)are borne entirely by the cloud provider (5)still persist

Still Persistent

The knowledge stored as documentation, often electronically, about business processes, procedures, policies, contracts, transactions, patents, research, trade secrets, and other aspects of the organization's operations. EX: Morgan and​ Morgan, a law​ firm, documents​ client-related data each day in an electronic database. The data includes the type of legal advice​ sought, revenue generated by each​ client, and progress on each​ case, among others. What type of intellectual capital does this data represent to the​ firm? (1)Structural capital (2)Human capital (3)Social capital (4)Venture capital (5)Financial capital

Structural Capital

Facts and data that are reasonably ordered, or that can be broken down into component parts and organized into hierarchies EX:Amazon.com stores all transaction data about its customers with clearly defined fields for customer​ name, items​ purchased, order​ history, amount​ spent, etc. This is an example of​ ________.

Structure Information

A standard query language, widely used to manipulate information in relational databases EX: Taxpayers who move and do not leave a forwarding address may never receive their tax refunds because the check is returned as undeliverable. To address this​ problem, the IRS has implemented a process where taxpayers can go online and key in their​ name, state, and tax year to see if they have a refund that was undeliverable. This is an example of using a​ ________ to retrieve information from the IRS database (1)relational database (2)SQL query (3)table (4)web search tool (5)Primary key

Structured Query Language (SQL)

In an ERP suite that includes modules specialized for higher​ education, which of the following would be used by students to register for​ classes, check for​ prerequisites, and obtain course​ information? (1)Student resources (2)Student academic records (3)Financial aid (4)Institutional advancement E(5)E-learning

Student Academic Records

The person on an e-learning development team who knows what content should be included in the course and possesses the content expertise. EX: Brice Bishop is the senior environmental engineer for Energy​ Savers, LLC. The company is developing an​ e-learning system that will include modules for new engineers to complete as part of the company training on environmental engineering processes specific to the company. Brice has been asked to decide what needs to be included in the modules because he has the most knowledge in the company on engineering topics.​ Brice's role in developing the​ e-learning system is called​ a(n) ________. (1)knowledge engineer (2)​e-learning instructor (3)subject matter expert (4)​e-learning specialist (5)instructional designer

Subject Matter Expert

Cingular​ Cell, Inc. charges its customers a high contract termination fee if they cancel their cell phone contract before the expiration date. The termination fee is an example of a​ ________ (1)switching cost (2) customer retention fee (3) loyalty cost (4)customer service fee (5)customer service penalty

Switching Costs

Which type of software controls basic operations such as file​ management, disk​ storage, hardware​ interfaces, and​ security

System Software

Eversen Energy Partners works in remote areas of Alaska trying to identify renewable sources of energy and educating locals on conservation and alternative sources of fuel. The employees of Eversen have been with the company since its inception and have spent many years learning the local culture and how to communicate well with the village residents. Which of the following do Eversen employees use when working in this​ environment? (1)Meta knowledge (2)Documented knowledge (3)Explicit knowledge (4)Tacit knowledge (5)Intellectual capital

Tactic Knowledge

Emily​ Harris, a marketing manager at a major advertising​ firm, undertakes decisions on promotional​ campaigns, Internet​ marketing, and brand awareness. At which level of decision making is Emily​ involved? (1)Tactical (2)Strategic (3)Administrative (4)Executive (5)Operational

Tactical

The general manager for Freeman and Associates is reviewing monthly project management reports to determine the best course of action for the next phase of the building project he manages. The types of decisions he is making are​ ________ decisions. (1)unstructured (2)structured (3)strategic (4)tactical (5)operational

Tactical

Organizations are increasingly using​ e-learning approaches to train employees and help build intellectual capital. Which of the following statements about​ e-learning is​ FALSE? (1)E-learning systems are generally web based and can operate on any platform. (2)Technological glitches are reduced because employees use their own computers. (3)​E-learning systems can accommodate courses in several languages. (4)Companies can reduce the cost of holding physical classes for employees. (5)E-learning can occur without the constraints of time or space.

Technological glitches are reduced because employees use their own computers

John Finley is an account executive for Wellington​ Industries, which has subsidiaries around the world. He is planning his annual sales​ meeting, which is held online via the Internet. Which of the following technologies will enhance his meeting with media richness and interactivity among the​ participants? (1)Telepresence technologies (2)Virtual reality (3)Instant messaging (4)Mashups (5)Microblogging

Telepresence technologies

Jonathan Hudson is responsible for analyzing web metrics for Blockbuster​ Video's online movie rental business. Which of the following metrics would he analyze to determine the depth of each visit to the​ website? (1)The number of page views per visit (2)The comparison between page visits made in the past and current year (3)The conversion rate (4)The forecasted number of page visits estimated around peak hours (5)The number of page views at a​ competitor's website

The Conversion Rate

​Xerox, a company that sells business services and document technology​ products, sustains its investment in technological​ innovation, particularly in areas such as color​ science, digital​ imaging, and nanotechnology. These strategic​ investments, made only in specific​ areas, keep the company ahead of the competition. Which of the following messages does this example​ convey? (1)Large IT investments are essential for the success of a company in​ today's business environment. (2)IT investments must be made on the most modern technology available in the market. (3)IT investments should not be focused on certain aspects and should have a broad outlook. (4)Xerox will not be able to compete effectively without IT investments in all areas of the company. (5)The ability to extract the value of technology requires human imagination and innovation

The ability to extract the value of technology requires human imagination and innovation

Which of the following is NOT a reason that organizations choose an operating​ system? (1)The market share of the operating system (2)The availability of technical support for the system (3)The selection of​ business-oriented applications available to run on it (4)The amount of storage capacity it has (5)The compatibility of the system

The amount of storage capacity it has

When a customer uploads a video on YouTube about their negative experience with a​ company's product or​ service, which of the following is responsible for addressing the online threat to the​ company's reputation?

The crisis management team

Microformats introduce meaning to information by attaching semantics to it. Which of the following describes the function of microformats like the hCard in the business​ world? (1)The maintenance of a database of a​ user's web history (2)The electronic exchange of business card information (3)The storage and retrieval of incoming​ e-mails (4)The creation of a database of company products (5)The creation of multimedia files for wikis

The electronic exchange of business card information

Which of the following is NOT a reason that fiber optic cables are ideal for​ long-distance transmission? (1)They carry many more channels simultaneously. (2)Fiber optic cable is secure. (3)Light signals do not attenuate as much as electrical signals. (4)They are cheap and easy to install. (5)They are very durable

They are cheap and easy to install

A small​ start-up business offering system development services and website hosting has decided to adopt an agile software development method in its development projects. Which of the following statements about agile software development methods is​ true? These are Development strategies involving cohesive teams that include end users and in which many activities occur simultaneously rather than sequentially to accelerate delivery of usable software. (1)They involve agile members being individually responsible for delivery. (2)They involve developers who are less disciplined. (3)They stress on agile teams undertaking sequenced tasks. (4)They involve developers who are resistant to changes in requirements. (5) They involve characteristics of cohesiveness and trust.

They involve characteristics of cohesiveness and trust.

Which of the following statements about modern​ web-based point-of-sale​ (POS) technology is​ TRUE?

They often mimic the​ brick-and-mortar versions

Which of the following is NOT a reason that IT and group collaboration is a key research​ topic? (1)The​ "people" component of information systems is becoming less important in​ today's business environment (2)Virtual teams are becoming increasingly more common in the workplace. (3)Group collaboration tools and processes are becoming more advanced and used in the workplace more often. (4)Students increasingly engage in virtual​ teamwork, especially those who take some or all of their courses online (5)The psychology of group dynamics often changes when team members use online tools.

The​ "people" component of information systems is becoming less important in​ today's business environment.

The______ into an industry pose to existing businesses; high when start-up costs are very low and newcomers can enter easily. This is one of Porter's five competitive forces. EX: high when it is easy for competitors to enter a market and low when there are high capital investment costs to compete in the​ market?

Threat of New Entrants

Which of the following is a key advantage of using​ twisted-pair wires to transmit​ data? (1)They are resistant to interference. (2)They are sturdy and durable. (3)They are resistant to wiretapping. (4)They offer the highest rates of data transmission. (5)They are thin and highly flexible.

Thy are thin and highly flexible

Rail Europe is a company that promotes and sells European train travel tickets in the North American market. The company was not achieving good results from its​ website, and visitors rarely stayed on the website long or purchased a ticket. To increase the​ ________ of its​ website, the company added more​ travel-related advice, interactive​ maps, and other content to its website. (1)time spent on site (2)clickthrough rate (3)cost per clickthrough (4)cost per impression (5)bounce rate

Time Spent on Site

EX: Customers at Morgan Financial Services pay a monthly fee to access​ real-time stock prices for their brokerage accounts. This is an example of which of the following characteristics that makes information​ valuable? Suitability, Reliability, Safety, Scalability, orTimeliness

Timeliness

John Monfort has been hired by Daniel Appliance Company to collect data from customers who returned appliances over the past ten years. The survey asked for the​ customer's opinion about the kind of service they received.​ John's survey results are likely to be of little use to the company because the information lacks which of the following characteristics of​ high-quality information? (1)Timeliness (2)Logical (3)Duplication (4)Completeness (5)Bias

Timeliness

To compete against larger athletic stores and Internet retailers selling running shoes and​ equipment, the Big Dog Running Company recently created a Facebook page. Which of the following objectives is Big Dog trying to achieve with the use of a social networking​ site? (1)To document complaints (2)To buy products at a cheaper rate (3)To connect with customers and announce new products (4)To integrate clients in strategizing​ long-term visions (5)To formulate marketing and organizational plans

To connect with customers and announce new products

Blue Cross Insurance Company recently implemented software to track online communications of its customer service employees who have unlimited access to the Internet. Why do employers like Blue Cross adopt such​ tools? (1)To enable efficient data mining (2)To protect employee privacy (3) To increase employee productivity (4)To facilitate faster communication (5)To prevent data redundancy

To increase employee productivity

For what reason would the Payless Shoe​ Store, which follows a​ low-cost leadership​ strategy, post an​ "All Sales​ Final" sign on its​ products? (1)To increase the sale of its products (2)To reduce the costs incurred in the supply chain (3)To streamline financial workflows (4)to increase supplier power (5)To make it easy for managers to track inventories

To reduce the costs incurred in the supply chain

Companies are most likely to use internal social networking sites for which of the following​ reasons?

To share organizational information and collaborate on projects

​"The value chain does not end when the buyer pays for the product or​ service." Which of the following statements contradicts this​ judgment? (1)Total value transfer of tangible goods happens at the point of sale. (2)Customer orientation is the key to success in modern business. (3)Customer reviews of products and services can help companies identify areas of improvement. (4)Marketing success should be measured in terms of customer satisfaction. (5)The value chain includes all components that add value to a product or service.

Total value transfer of tangible goods happens at the point of sale

radio frequency identification (RFID) A technology placed on tags with small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history. What are RFID tags typically used​ for? (1)Processing checks in banks (2)Storing smartphone data (3)Tracking shipments of physical goods (4)Monitoring ATM machines (5)Capturing data on weather systems

Tracking shipments of physical goods

Alyssa Meade is the database administrator for Realtree​ Outdoors, Inc. She is updating the data warehouse by using zip codes to add demographic data from the U.S. Census Bureau to the​ company's customer records before loading them into the data warehouse. What is this process​ called? (1)Data-mining process (2)Normalization process (3)Assimilation process (4)Transformation process (5)Extraction process

Transformation Process

Which of the following is not an example of a sustaining​ technology?Technologies that offer improvements to streamline existing processes and give companies marginal advantages. (1)Digital cameras with larger LCD screens (2)portable DVD players with longer battery (3)Uber (4)Smart phones with larger displays (5)Newly designed side airbags in the latest model Ford Taurus

Uber

unified procurement An approach used by organizations in which they prefer systems from a single vendor, especially to avoid the need to build interfaces. EX: Automated Business Machines recently implemented a new enterprise resource planning system from SAP. They are evaluating additional modules from the same vendor for their supply chain management and customer relationship management systems. They are concerned that going with a different vendor will result in integration problems. This approach to purchasing software is called​ a(n) ________. (1)request for information (2)RFP (3)best of breed procurement (4)green public procurement (5)unified procurement

Unified Procrement

Pam Flowers is a production assistant for a company that makes documentary films for nonprofit organizations. Pam uses a​ ________ on her desktop and smart phone to provide quick access to her​ emails, IM, RSS​ feeds, conference​ calls, and video​ calls, which allows her to be in constant touch with her colleagues. (1)portal (2)shared workspace (3)universal dashboard (4)context indicator (5)virtual world

Universal Dashboard

Information that has no inherent structure or order and the parts can't be easily linked together. EX: Martin​ & Martin, LLC is a nonprofit organization offering​ pro-bono legal services using a network of lawyers. The basement of their office is filled with boxes containing the files of hundreds of cases completed over the past ten years. The legal documents stored in the file boxes are an example of​ ________.

Unstructured Information

Megabank, a large investment​ bank, experienced a security breach involving sensitive personal information about customers. The crime was committed by a bank​ employee's friend who accessed a bank computer in the lobby of a branch office by simply downloading information on a USB drive. Which of the following authentication​ strategies, if used by​ Megabank, most likely facilitated the security​ breach? (1)Iris configuration (2)User knowledge (3)Voice pattern recognition (4)RFID chip (5)Fingerprint recognition

User Knowledge

The content contributed to a system by its users. EX: TripAdvisor.com specializes in providing unbiased customer reviews of travel destinations and encourages customers to post their vacation photos. Which of the following does this situation​ illustrate?

User-generated content

The Blue Door is an online apparel retailer that has a low rate of customer retention. Which of the following can help increase its customer​ retention? (1)Streamlining the Blue Door supply chain (2)Building seamless financial workflows at Blue Door with ERP (3)Promoting the Blue Door website in magazines to gain visibility (4)Using CRM to track customer behavior on the Blue Do5)r site (4Using uninvited​ pop-ups to chat with Blue Door customers

Using CRM to track customer behavior on the Blue Door site customer relationship management (CRM) - Encompasses the strategies, processes, and information systems an organization uses to build and maintain relationships with its current and prospective customers.

An objective vendor selection process that evaluates each vendor on how well its proposal meets the stated requirements is​ termed_______. (1)Custom system development approach (2)Unified procurement approach (3)Using a weighted scoring model (4)The least expensive vendor approach (5)Best of breed approach

Using a weighed scoring model

Andy heads the IT department of a small company based in Chicago that sells customized​ T-shirts and corporate incentive items over the Internet. The company has seen a surge in popularity and is planning to expand its operational base to four more cities.​ However, Andy is directed to come up with a strategy to cut down on the costs incurred in maintaining multiple servers in different cities to host the marketing and​ e-commerce sites. Which of the following measures will help Andy achieve his​ objective? (1)Using virtualization software to run multiple OSs on a single server system (2)Procuring server hardware from multiple​ vendors, instead of just one (3)Outsourcing all computer processing to another company in each location (4)Leasing private lines to transmit information between the corporate sites (5)Isolating each of the​ cities' servers and running dedicated operating systems on them

Using virtualization software to run multiple OSs on a single server system

Ford Motor Company recently introduced a new app that lets potential customers test drive new models in a graphic​ 3-D environment using their personal computers. The new application uses​ ________ to let customers experience many of the​ car's features in a simulated environment. (1)virtual reality (2)hashtags (3)a mashup (4)a tag cloud (5)a wiki

Virtual Reality

Which of the following enables computers to run multiple operating systems and multiple software applications at the same time and creates what seems to be multiple independent machines all on a single computing​ device? (1)Software as a Service (2)Private branch exchange (3)Availability (4)Cloud computing (5)Virtualization

Virtualization

Which of the following refers to the technologies that make voice communications across networks using packets​ feasible, including over the​ Internet?

VoIP

Inexpensive podcast using video. EX: Non-profits organizations such as UNICEF use​ web-based information systems to create inexpensive video messages that relay the plight of children in troubled parts of the world

Vodcasts

At the headquarters of CitiBank in New York​ City, the strategic planning department has implemented a new process of​ co-locating all the team members working on its strategic projects so they are better able to collaborate and work together using white boards and other technologies that facilitate meetings and communication. This is known as​ a(n) ________. (1)project team (2)community room (3)war room (4)orientation room (5)hub

War Room

A tiny, invisible image, typically a single pixel with a unique identifier, used on websites to track visitors. EX: TracSoft is a website development company that creates websites for small companies that focus on​ e-mail marketing. The company uses​ e-marketing information systems that provide extensive tracking capabilities for their clients by embedding in the HTML​ e-mail a​ ________, which is a​ tiny, invisible​ image, typically a single pixel with a unique identifier. (1)web analytic (2)pop-up ad (3)web beacon (4)web Trojan (5)tracking device

Web Beacon

Wells Fargo Bank is considering a new software tool that will help bank executives collaborate synchronously and facilitate online meetings with their branch office via the Internet. Which of the following would meet the​ company's needs? (1)GDSS (2)Microblogging (3)Instant messaging (4)Emailing (5)Web conferencing

Web Conferencing

Sloan Academy is preparing a presentation about quality in online course design and wants to make the information available online to a large number of participants with asynchronous interaction. Which of the following would be most appropriate for Sloan​ Academy? (1)Virtual classrooms (2)Laptops at every desk (3)Webcasting (4)Audio conferencing (5)Collaborative groupware

Webcasting

The adult education director at St. Francis Hospital uses ​________ to evaluate the interactions of variables that contribute to the profitability of various potential seminars. (1)what-if analysis (2)forecasting (3)optimization analysis (4)predictive analysis (5)scheduling

What-if Analysis

Information privacy is most difficult to achieve under which of the following​ circumstances? (1)When information is stored on highly interconnected systems (2)When information is maintained on isolated systems (3)When information is converted to code form using mathematical equations (4)When information is mainly on paper (5)When information is housed in secure corporate databases

When information is stored on highly interconnected systems

​________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from their own personal experience to update existing articles with current information. (1)Monster.com (2)Amazon.com (3)Wikipedia (4)Match.com (5)Ebay

Wikipedia

Acme Pest Control is considering implementing cloud computing to link its three locations to the main office where there is currently just a single PC. The company​ owner, Mr.​ Greenleaf, has little technical knowledge and does not have the capital to invest a large amount in technology. Which statement will be true if Mr. Greenleaf implements cloud computing for his​ company? (1)With cloud computing you pay only for what you​ use, so a small business will save money. (2)With cloud computing there is a need for a big investment of capital to access computers in the​ company's other locations. (3)With cloud computing a company needs to have dedicated experts to manage the technology. (4)With cloud computing increased customer demands can easily be met by internal enterprise architecture. (5)With cloud computing it is harder to​ store, process, and analyze information from any location because it is so far away.

With cloud computing, you pay only for what you use, so a small business will save money

As part of the HCM system, ______ helps track time and attendance, sick leave, vacation leave, and project assignments. EX:Delta Airlines uses an Operational Flight Attendant Scheduler to manage its workforce of flight attendants and to ensure all flights are adequately staffed. Which of the following terms describes this​ tool? (1)Customer service system (2)Talent management system (3)Human resources management system (4)Workforce management module (5)Customer relationship management system

Workforce management module

Part of the XML family of standardized languages specialized for accounting and business reports; tags identify data elements to make them transparent and also computer-readable. EX:The Securities and Exchange Commission​ (SEC) implemented electronic reporting based on​ ________ to develop a common language for financial​ reporting, improve​ transparency, and help eliminate manual processes. (1)IASB (2)XBLR (3)HTML (4)Java (5)XML

XBLR

​Tom's Food Company recently experienced a complete crash of its website that prevented customers from accessing the website and employees from using the system to process new orders. The information security officer traced the problem to an attack by a botnet triggered outside the company. The disruption to the​ company's website is called​ ________. (1)a computer virus (2)a cyber attack (3)a phishing attack (4)a distributed denial of service (5)malware

a distributed denial of service

Columbus Financial Consultants​ (CFC) is evaluating various options for its enterprise resource planning system. The company has systems running on different platforms and would like to connect the systems and improve consistency. The integration approach that best meets​ CFC's needs is​ ________. (1)a​ vendor-branded suite (2)an engineered suite (3)an unlinked suite (4)a suite with synchronized modules (5)a best of breed suite

a suite with synchronized modules

When Verizon software developers created​ web-based "services" for each of its business processes using​ interfaces, they were using a​ service-based architecture. This means that​ systems: (1)are created with overlapping components that are used in slow moving companies. (2)are assembled from relatively independent software components. (3)were purchased from an external vendor. (4)are created with mutually dependent software components. (5)are created from interconnected subsets of its software components.

are assembled from relatively independent software components.

Joe​ Roberts, the project manager for the Wild River Social Media​ project, is creating the work breakdown structure for the project so he can develop a time frame for the project. All of the following are features included in project management software that will help Joe manage the project EXCEPT​ ________. (1)a work breakdown structure (2)resource allocation (3)a​ requirement's definition document (4)a digital dashboard (5)a project baseline schedule

a​ requirement's definition document

The information managers use to make decisions, drawn from the company's own information systems or external sources. EX: Robert owns and operates a franchise of restaurants that specializes in​ high-quality organic food. The demand for organic food is​ growing, and he plans to add a new store. The information he is using to decide where his new store will be located includes customer records combined with external demographic information such as income levels and age. Robert is using​ ________.

business intelligence

A set of activities designed to achieve a task; organizations implement information systems to support, streamline, and sometimes eliminate business processes. EX: When students use an enrollment system to select and register for​ classes, they are completing a​ ________

business process

The​ ________ refers to a process that organizations put into place coordinate and prioritize software bug fixes and feature enhancements. (1)feasibility study (2)BPR (3)code review process (4)change control process (5)requirement analysis process

change control process

A key concern in IT departments is that recent trends in​ ________ will affect how decisions about systems development and procurement are made and who makes them. (1)website development (2)project management (3)green computing (4)smart phones (5)cloud computing and SaaS

cloud computing and SaaS

To increase the probability that the Wild River Media Project will be successful and managed​ efficiently, Joe Roberts should ensure that​ he: (1)communicates the​ time, cost, and scope constraints clearly as the project unfolds. (2)allows users to make unlimited changes in the project deliverables. (3)allows end users to learn from their mistakes instead of​ hand-holding after launch. (4)avoids making unpopular decisions that might dismay the sponsor or clients. (5)commits to delivering features that stakeholders are expecting even if timelines are narrow.

communicates the​ time, cost, and scope constraints clearly as the project unfolds.

Anything that gives a firm a lead over its rivals; it can be gained through the development and application of innovative information systems. EX: Apple​ iPhone's intelligent personal​ assistant, Siri, helped Apple get a jump on market share over other smartphone competitors. This is an example of Apple gaining​ ________

competitive advantage

An information system used to build customer relationships, enhance loyalty, and manage interactions with customers. EX: Amazon.com offers customers customized recommendations based on previous purchases.

customer relationship management (CRM)

Amy​ Thornton, an instructional designer at Troy State​ University, works with professors who teach online courses or are developing online programs for their departments.​ Amy's primary role as an instructional designer is to​ _______. (1)provide technical support for Internet connection problems (2)develop a new pay structure for faculty who teach online (3)manage and track budgets for the​ e-learning process (4)develop the best strategies for the​ e-learning course or program (5)decide on the content of the course or program

develop the best strategies for the​ e-learning course or program

Recent research suggests that college students increasingly consider cheating on​ tests, copying intellectual​ property, or plagiarizing information for term papers to be more acceptable when they use a computer or the Internet to do it. These findings suggest that students become more​ ________ when they interact online and the physiological distance is​ greater, thereby minimizing the harm. (1)socially irresponsible (2)utilitarian (3)ethical (4)guarded (5)disinhibited

disinhibited

An electronic bridge between partner companies in a supply chain that is used to transmit​ real-time information about​ orders, inventories,​ invoices, and other data is known as​ a(n) ________. (1)financial network (2)​Internet-based e-market (3)electronic market (4)dot-com market (5)electronic data interchange

electronic data interchange

To implement the​ organization's five-year strategic​ plan, Dick's Sporting Goods has decided to invest in a system that will support its core functional departments including financial and asset management and human resources functions. The type of system​ Dick's is planning to invest in is called​ a(n) ________ (1)customer relationship management system (2)data warehouse (3)decision support system (4)supply chain management system (5)enterprise resource management system

enterprise resource management system

Integrated application suite to support the whole enterprise that includes modules to manage financials, human resources, supply chain, customer relationships, and other business processes. EX: Wells Fargo Bank recently implemented an integrated application suite to support the whole organization that includes modules to manage​ financials, human​ resources, supply​ chains, customer​ relationships, and other business​ processes, creating a​ "suite of​ suites" called​ ________. (1)supply chain management (2)customer relationship management (3)enterprise resource planning (4)business process reengineering (5)total quality management

enterprise resource planning

A team-based agile method that features frequent releases of workable software, short time boxes, programmers who work in pairs, and a focus on testing. EX: Cary Brown works in the IT department at​ Zappos, an online retailer of clothes and shoes. The department is constantly developing new functionality on its website to personalize a​ shopper's experience. Because the developers work under pressure to produce quality software​ quickly, they have adopted a development method of working in​ pairs, reviewing one​ another's work, providing each other with​ feedback, and testing the code as it is written. This method is an example of​ ________. (1)rapid application development (2)scrum (3)the agile method (4)the waterfall method (5)extreme programming

extreme programming (XP)

The expertise a systems integration consulting firm brings to an organization​ is: (1)giving the company access to experts who know the software well and how to implement it most effectively. (2)managing the employees working on a software project. (3)ensuring the best prices for purchasing software. (4)understanding privacy laws for different states. (5)knowing how to program the new software.

giving the company access to experts who know the software well and how to implement it most effectively.

When​ Pepsi's Chinese operations decided to grow its own potatoes to ensure a reliable supply of potatoes for its​ Lay's potato​ chips, which in turn helped sales of its​ sodas, the company was extending its operations by​ ________. (1)contracting with external potato growers (2)importing potatoes from the United States (3)going downstream in the supply chain (4)implementing a new technology (5)going upstream in the supply chain

going upstream in the supply chain

Which of the following governmental actions will increase the threat of new entrants in a​ market?The threat new entrants into an industry pose to existing businesses; the threat is high when start-up costs are very low and newcomers can enter easily. This is one of Porter's five competitive forces. (1)There is a decrease in enforcement of​ anti-trust laws that prevents monopolies. (2)The government squeezes money from the market through​ open-market operations. (3)The Department of Commerce offers a patent to an existing player. (4)The Federal Reserve increases the cash reserve ratio to tackle inflation. (5)The Federal Reserve reduces the interest rates on credit for small businesses.

he Federal Reserve reduces the interest rates on credit for small businesses.

Delta Airlines suffered a lengthy and embarrassing service disruption of flights when a fire forced it to rely on backup power systems and it discovered that some of its essential servers were not connected to backup power supplies. This situation more likely resulted from a failure to test its​ ______________. (1) firewalls (2) phishing plan (3) encryption scheme (4)surveillance techniques (5)incident response plan

incident response plan

Data or facts that are assembled and analyzed to add meaning and usefulness. EX: When the number of gallons of milk sold each day by a grocery store is combined with other​ data, such as the type of milk or quantity of milk​ sold, and then processed and​ analyzed, it becomes​ ________.

information

Joe Roberts is the project manager for the Wild River Social Media Project. As part of the​ ________, he is establishing the groundwork for the project by clarifying the value it will bring to the​ organization, setting its​ objectives, and estimating the​ project's length,​ scope, and cost. (1).testing process (2)controlling process (3)initiating process (4)planning process (5)executing process

initiating process

In an organization where the culture welcomes and encourages ideas from all​ employees, ________. (1)it is harder to implement new information systems (2)innovative new information systems can come from all levels (3)information systems are not widely used (4)cross-functional teamwork is not highly valued (5)user-generated content is less accepted

innovative new information systems can come from all levels

​Movies, books, research​ studies, music, and software are examples of​ ________, which are intangible assets. (1)intellectual property (2)freehold property (3)public property (4)immovable property (5)tangible property

intellectual property

Information technology​ (IT) is a strategic enabler when​ ________. Strategic Enabler is The role information systems play as tools to grow or transform the business, or facilitate a whole new business model.

it focuses on the growth of an organization

Strategies that compress the time horizon for software development, partly to reduce the impact of changing business needs and the resulting rework. They focus on the time available until the next release, or iteration, and the development team determines how many of the requirements it can deliver in that timeframe. EX: Farid Nia is the Application Development manager for Nexus Corporation. He is working on a project to design and build a new​ web-based time management system where employees can use their smartphones to log the number of hours they work. The time horizon for the deliverables depends on when the next release is due and what the development team determines they can deliver in that time frame. This is an example of​ a(n) ________ approach to software development. (1)scrum (2)extreme (3)iterative (4)waterfall (5)agile

iterative

The unique characteristics of a project that distinguish it from routine business processes included all the following EXCEPT​ ________. (1)it is temporary (2)it​ doesn't require resources from different areas (3)it has metrics for success (4)it has a primary customer or project sponsor (5)it may have an element of uncertainty

it​ doesn't require resources from different areas

A pharmaceutical company that invests heavily in research and development​ (R&D) and has several​ new, patented products ready for market would be operating in an industry with​ ________. (1)high buyer power (2)high threat of new entrants (3)low threat of new entrants (4)low supplier power (5)high threat of substitute products

low threat of new entrants

Hibbett Sports offers a reward card that gives customers coupons and incentives for store purchases that they can redeem for additional merchandise. This is an example of a​ ________. (1)marketing program (2)digital coupon (3)loyalty program (4)customer service system (5)bonus program

loyalty program

An online course usually offered by a college or university through a third party for free or very low cost, with open enrollment and often very large volume. EX: MIT Open Courseware is a new type of college level​ e-learning that is offered free to a large number of participants around the world. The courses allow anyone to enroll and generally offer​ certificates, but not college credit. These courses rely on​ computer-based testing and feedback as opposed to feedback directly from an instructor largely due to the sheer number of the participants. This emerging model of​ e-learning is known as​ a(n) ________. A. massive open online course Your answer is correct.B. Khan Academy program C. social learning platform D. learning information system E. hybrid course

massive open online course

Sun Microsystems uses the​ ________ feature introduced by instant messaging to show whether technology experts in each of the various divisions of the company are logged in and available to answer a​ question, pick up the​ phone, or stop by for a brief meeting. (1)war room (2)presence awareness (3)telepresence (4)telecommuting (5)media richness

presence awareness

Big Dog Running Company uses​ ________ to analyze data collected from each of its three stores by product line and​ date, which allows the company to better design its marketing and promotion campaigns. (1)OLAP (2)goal seeking (3)what-if analysis (4)market basket analysis (5)forecastin

online analytical processing (OLAP) Software that allows users to "slice and dice" or drill down into massive amounts of data stored in data warehouses to reveal significant patterns and trends.

Devon Degosta is updating the employee database with information on a new employee. She enters the employee information into the employee table and then tries to add a department ID for a department that does not exist in the Departments table. The system does not allow her to add the employee record until she creates a Department ID first in the Department table so the employee can then be assigned to it. This is an example of the system enforcing a​ ________. (1)business rule (2)referential integrity constraint (3)scalability constraint (4)data model (5)database constraint

referential integrity constraint

The Project Management Office​ (PMO) at Regions Bank in Atlanta recently received approval to begin a project to develop a new benefits administration system for the human resources department. The next step will be to analyze and document what the system should do from a business perspective. To begin this stage of the​ process, the PMO needs to understand the business process and identify any opportunities to optimize or streamline existing processes. This stage of the SDLC is known as​ ________. (1)design (2)testing (3)requirement analysis (4)business process reengineering (5)development

requirement analysis

One of the most significant adjustments needed by information systems professionals when changing from traditional development methods to agile​ is...Agile Strategies are Development strategies involving cohesive teams that include end users and in which many activities occur simultaneously rather than sequentially to accelerate delivery of usable software. (1)requiring employees to record time on the project. (2)changing from a we to a me mindset. (3)resistance to requirements changes. (4)expanding the team size. (5)prohibiting users access to progress reports.

resistance to requirements changes.

A web with meaning, in which online resources and their relationships can be read and understood by computers as well as human beings. EX: Tulane Medical School recently implemented a new​ web-based resource that was designed to integrate multiple sources of information about health and medical issues for its medical students and teaching faculty. The system encompasses a collection of online medical resources that can be read and understood by computers as well as the medical students and staff. The new system is an example of​ a(n) ________. (1)wiki (2)knowledge management system (3)enterprise information system (4)digital dashboard (5)semantic web

semantic web

A Shadow System is Smaller databases developed by individuals outside of the IT department that focus on their creator's specific information requirements. When employees create a shadow​ system, organizations are often faced with many​ issues, including: .(1)higher levels of productivity from employees. (2)not having to use IT staff to manage the shadow systems. (3)better response time to customers. (4)several versions of the​ "truth." (5)faster and more efficient work being completed

several versions of the​ "truth."

TracSoft is a web design and hosting company that caters to​ small- and​ medium-sized businesses with a variety of different​ e-commerce solutions. One the most popular solutions for its clients with limited IT budgets is the use of​ ________, in which the company pays a subscription fee to access a​ vendor's software remotely via the Internet. (1)virtualization (2)middleware (3)ERP (4)CRM (5)software-as-a-service

software-as-a-service

Visualization and charting tools provide managers with an effective way to envision future talent​ needs, termed​ __________________. (1)employee projections (2)scheduling applications (3)human capital adjustment (4)succession planning (5)FTE planning

succession planning

Photo-tagging is an increasingly common practice that has raised concerns about privacy for all of the following reasons​ EXCEPT: (1)old and unflattering photos may be found by an employer or potential employer. (2)uploaded photos often contain metadata that can​ "geotag" a photo with GPS data. (3)people can be tagged without their knowledge or consent. (4)facial-recognition software is becoming increasingly advanced. (5)tags in photos of old friends can help a person remember names better.

tags in photos of old friends can help a person remember names better.

EX: Amy Smith is a recruiter at Total Service​ Corporation, which handles customer service functions for a credit card processing company. The company recently implemented a system that allows Amy to track each​ employee's training, performance​ evaluations, and career development progress. She is also able to help managers with succession planning and training needs. The system Amy is using is known as​ a(n) ________. (1)employee relationship management system (2)human resources management system (3)workforce management system (4)employee loyalty system (5)talent management system

talent management system

Although societies and governments have developed a multitude of copyright​ laws, patents, and other legal statutes to protect intellectual property​ rights, they have found that enforcing intellectual property laws becomes difficult​ when: (1)the protection of intellectual property involves personal property. (2)the intellectual property is used for commercial purposes. (3)the intellectual property consists of tangible assets. (4)the intellectual property is digitized. (5)the protection of intellectual property involves immovable assets.

the intellectual property is digitized.

One of the critical factors that contribute to the failure of projects is​ ________. (1)excessive communication from the project manager (2)the lack of executive support for the project (3)too much stakeholder involvement in the project (4)the limited scope of the project (5)the low requirement for customization

the lack of executive support for the project


Set pelajaran terkait

PSYCH 101 - Psychology Chapter 1 & 2

View Set

AWS Certified Cloud Practitioner - Quiz

View Set