MIS MC

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

the _______ are prioritized inventory of present applications and a detailed plan of projects to be developed or continued during the current year; it is managed by __________ people

application portfolio, business

______ confirms the identity of a person requiring access; _____ determines what privileges the person has

authentication, authorization

RPA is a system that enables enterprises to ______ business processes and tasks that were historically carried out by employees; this is an example of _______.

automate, BPI

_________ is your best defense against ransomware

backing up your data

________ feasibility addresses the human issues of the systems development project; it is a __________ measure of feasibility

behavioral, qualitative

email spam detection is an example of ______ classification

binary

which of the following is true

business strategy drives IT strategy

you live in a small town with only one large retailer. This means there is low _____

buyer power

deep learning systems ____ solve complex problems and ___ need to be exposed to labeled historical/training data

can; do not

is one of the primary techniques in supervised learning

classification

__________ is an example of semi-supervised learning

classifying text documents

The IT ________ is the IT platform; it consists of ________.

components; hardware, software, databases, and networks

the term homo conexus refers to people who practice _________

continuous computing

which of the following is not an advantage of VPN

cost

which of the following is not an organizational response to business pressure

creating a digital divide

which of the following is an informed user concept

critical thinking

streamlining is a ___________ activity managed by _______ level managers

cross-functional; middle

amazons strategy is _______________

customer orientation

you see a sign on my door that says 55. This is _______

data

In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs.

define

___________ analytics answers the question what has happened

descriptive

thinking about the feasibility options, _______ is most closely associated with BPR

developing a new system

____________ is the business strategy that leverages IT to dramatically improve employee, customer, and business partner relationships

digital transformation

the divide refers to the gap between people who have access to modern information and communications technologies and those who do not; this phenomenon _______ exists in the US

digital; does

_____ focuses on doing things right; _____ is an example

efficiency, not wasting resources

SMTP is an ___ protocol that runs on the _____________

email; internet

You have to offer online banking if you want to operate a bank. This is a(n) ________.

entry barrier

______ require human experts; _____ Must be formally structured in the form of rules

expert systems; expert systems

strategic decisions are ________-focused and address ______ issues

externally; long-term

supplier power is a high when buyers have _________ choices from whom to buy and low when buyers have ______ choices

few; many

_________ costs are that remain the same regardless of any change in the company's activity level. the CIO's salary is an example of a _____ cost

fixed;fixed

The threat of new competitors will enter your market is _____when entry is easy and _____ when there are significant barriers to entry.

high; low

a ______ site is the most expensive option

hot

suppose you confronted an acquaintance about posting inappropriate things about you online. You are in __________ phase of IDC.

implementation

which of the following does not contribute to increasing vulnerability of organizational information resources?

increasing skills necessary to be computer hacker

reasoning is programmed into the computer in the knowledge ______ stage

inferencing

knowledge workers create _________

information and knowledge

we choose for technology to handle which of the following managerial roles

informational

salesforce is a common ___________ software package

inside sales

suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the ________ phase of IDC.

intelligence

the first stage of the SDLC is _____; it is managed by ________

investigation; business

which of the following is true of open source software

it is covered by the fair use doctrine

which of the following is not an objective of the IT strategic plan

it must meet the needs of every functional area

your company hires Avast to install security. This is an example of risk ________

limitation

the biggest challenge to outsourcing is _________

loss of competitive advantage

which of the following reduces buyer power

loyalty programs

middle managers are typically have to deal with _________ decisions

management control and semistructured

powerful customers are a ______ pressure

market

a company wants to develop a few, related BI applications. It should invest in a data _____ which is most similar to an ______

mart; FAIS

________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control.

middle managers

ad hoc decisions are typically handled by _______ and are _________

middle managers, cross functional

strategic systems decrease threat of ______ when companies use ______

new entrants, technology in a unique way

considering the nature of decisions executing specific tasks efficiently on a daily basis is _________

operational control

the cost leadership strategy is most commonly combined with the _________ strategy

operational effectiveness

threat of substitute products or services refers to companies _____ the industry; rivalry refers to companies ____ the industry

outside; inside

a _________ conversion introduces components of the new systems in stages

phased

you received an email that claimed to be from your bank. This is an example of a ______________

phishing attack

You would use optimization or simulation for ______ analytics.

prescriptive

learning MIS this semester is an example of _________ level data

process

the ________ is a stakeholder in the scrum approach using the _______ methodology

product owner, agile

iCloud is a type of ________ cloud

public

in public key encryption, the _________ key is used for locking and the _______ is used for unlocking

public, private

machine learning is still not as good as people in most cases but in some cases better than people in regard to ______

recognizing patterns and relationships

amazons recommender systems is a type of _______ learning

reinforcement

you decide to sleep rather than study for your test. This is an example of ______ in the __________ stage of the IDC

satisfying,choice

is a popular BPI technique

six sigma

compliance with government regulations is a ___________ pressure

societal

__________ is a traditional function of the MIS department

staffing, training, and developing

________ learning is the most similar to traditional programming

supervised

with __________ learning, humans know pattern in the data and can program the system to recognize those patterns

supervised

IT is a _________ activity; management is a _______ activity

support; support

the business case approach is necessary when addressing Porters __________

threat of new entrants

which of porters five forces addressed the disadvantages of WIFI for businesses

threat of new entrants

liability is an issue in the knowledge _____ stage

transfer

an _______ network is any network within your organization, an internal network that is only accessible by employees is called an _________

trusted, intranet

__________ decisions deal with "fuzzy", complex problems such as ______

unstructured; deciding where to open a new franchise

the commonly used "bystander at the switch" dilemma where the bystander has to choose between letting the train hit 5 people or flip the switch and hit one person is an example of the _______ approach

utilitarian

convolutional neural networks are used in application such as __________

video analysis

current AI systems are considered ________ AI

weak

you assume the inflation rate will remain constant over the next few years. You double check the assumption with a _______ analysis.

what-if

the focus of globalization _______ is companies

2.0

GO _______ is VMIs electronic surveillance policy

50

data mining is most similar to _______ in functionality

AI

___________ is the final step in the general framework for ethics; this matches the _________ stage in the IDC

Act and reflect on the outcome of your decisions, implementation

____ is most closely related to strategic nature of decisions performed by ____ level managers

BRP; c

_________ are informed users that _______ come from the business side

CIO; can

if a company wants to outsource its payroll process that company should use _______ cloud computing services

FaaS

______ is a capability of dashboards that are specific measures of CSFs

KPI

______ is a systems development method that combines JAD, prototyping, and ICASE tools

RAD

________ is a part of the CPU and a type of primary storage

Registers

______ is a major vendor of BI tools; BI is primarily a(n)_________

SAP, application and process

a URL that begins with the http uses _________

SSL

______ is a result that indicated that a given condition exists when it in fact does not; this is the opposite of the data

a false positive; poisoning

_________ means that you accept the consequences of your decisions and actions

accountability

you check on your credit report annually for free. This allows you to catch identity theft. This is an example of what ethical issue that falls into the category of _______

accuracy

joseph and his marketing team want to create a new app. They have 2 weeks. This would be done best using _________ development.

agile

the first step in the information systems planning systems is to ___________

analyze the organization strategic plan

an _______ is considered critical/foundational to success of any enterprise because they support core operations

TPS

H&R Block uses

Watson

_________ is an electronic profile of you and your habits; the business goal is ___________

a digital dossier, customer intimacy


Set pelajaran terkait

intro to nursing - culture (week 4 ch 9)

View Set

Chapter 1 Lesson 3 Health risks and behavior

View Set

Module 2: Engagement Planning, Obtaining an Understanding of the Client and Assessing Risks

View Set

Level 2 - RNSG 1443 - Diabetes Complications

View Set

BIOL252 07: Chpt 10 appendicular skeleton

View Set