MIS MC
the _______ are prioritized inventory of present applications and a detailed plan of projects to be developed or continued during the current year; it is managed by __________ people
application portfolio, business
______ confirms the identity of a person requiring access; _____ determines what privileges the person has
authentication, authorization
RPA is a system that enables enterprises to ______ business processes and tasks that were historically carried out by employees; this is an example of _______.
automate, BPI
_________ is your best defense against ransomware
backing up your data
________ feasibility addresses the human issues of the systems development project; it is a __________ measure of feasibility
behavioral, qualitative
email spam detection is an example of ______ classification
binary
which of the following is true
business strategy drives IT strategy
you live in a small town with only one large retailer. This means there is low _____
buyer power
deep learning systems ____ solve complex problems and ___ need to be exposed to labeled historical/training data
can; do not
is one of the primary techniques in supervised learning
classification
__________ is an example of semi-supervised learning
classifying text documents
The IT ________ is the IT platform; it consists of ________.
components; hardware, software, databases, and networks
the term homo conexus refers to people who practice _________
continuous computing
which of the following is not an advantage of VPN
cost
which of the following is not an organizational response to business pressure
creating a digital divide
which of the following is an informed user concept
critical thinking
streamlining is a ___________ activity managed by _______ level managers
cross-functional; middle
amazons strategy is _______________
customer orientation
you see a sign on my door that says 55. This is _______
data
In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs.
define
___________ analytics answers the question what has happened
descriptive
thinking about the feasibility options, _______ is most closely associated with BPR
developing a new system
____________ is the business strategy that leverages IT to dramatically improve employee, customer, and business partner relationships
digital transformation
the divide refers to the gap between people who have access to modern information and communications technologies and those who do not; this phenomenon _______ exists in the US
digital; does
_____ focuses on doing things right; _____ is an example
efficiency, not wasting resources
SMTP is an ___ protocol that runs on the _____________
email; internet
You have to offer online banking if you want to operate a bank. This is a(n) ________.
entry barrier
______ require human experts; _____ Must be formally structured in the form of rules
expert systems; expert systems
strategic decisions are ________-focused and address ______ issues
externally; long-term
supplier power is a high when buyers have _________ choices from whom to buy and low when buyers have ______ choices
few; many
_________ costs are that remain the same regardless of any change in the company's activity level. the CIO's salary is an example of a _____ cost
fixed;fixed
The threat of new competitors will enter your market is _____when entry is easy and _____ when there are significant barriers to entry.
high; low
a ______ site is the most expensive option
hot
suppose you confronted an acquaintance about posting inappropriate things about you online. You are in __________ phase of IDC.
implementation
which of the following does not contribute to increasing vulnerability of organizational information resources?
increasing skills necessary to be computer hacker
reasoning is programmed into the computer in the knowledge ______ stage
inferencing
knowledge workers create _________
information and knowledge
we choose for technology to handle which of the following managerial roles
informational
salesforce is a common ___________ software package
inside sales
suppose you are failing one of your classes. If you don't know what the problem is, you need to enter the ________ phase of IDC.
intelligence
the first stage of the SDLC is _____; it is managed by ________
investigation; business
which of the following is true of open source software
it is covered by the fair use doctrine
which of the following is not an objective of the IT strategic plan
it must meet the needs of every functional area
your company hires Avast to install security. This is an example of risk ________
limitation
the biggest challenge to outsourcing is _________
loss of competitive advantage
which of the following reduces buyer power
loyalty programs
middle managers are typically have to deal with _________ decisions
management control and semistructured
powerful customers are a ______ pressure
market
a company wants to develop a few, related BI applications. It should invest in a data _____ which is most similar to an ______
mart; FAIS
________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control.
middle managers
ad hoc decisions are typically handled by _______ and are _________
middle managers, cross functional
strategic systems decrease threat of ______ when companies use ______
new entrants, technology in a unique way
considering the nature of decisions executing specific tasks efficiently on a daily basis is _________
operational control
the cost leadership strategy is most commonly combined with the _________ strategy
operational effectiveness
threat of substitute products or services refers to companies _____ the industry; rivalry refers to companies ____ the industry
outside; inside
a _________ conversion introduces components of the new systems in stages
phased
you received an email that claimed to be from your bank. This is an example of a ______________
phishing attack
You would use optimization or simulation for ______ analytics.
prescriptive
learning MIS this semester is an example of _________ level data
process
the ________ is a stakeholder in the scrum approach using the _______ methodology
product owner, agile
iCloud is a type of ________ cloud
public
in public key encryption, the _________ key is used for locking and the _______ is used for unlocking
public, private
machine learning is still not as good as people in most cases but in some cases better than people in regard to ______
recognizing patterns and relationships
amazons recommender systems is a type of _______ learning
reinforcement
you decide to sleep rather than study for your test. This is an example of ______ in the __________ stage of the IDC
satisfying,choice
is a popular BPI technique
six sigma
compliance with government regulations is a ___________ pressure
societal
__________ is a traditional function of the MIS department
staffing, training, and developing
________ learning is the most similar to traditional programming
supervised
with __________ learning, humans know pattern in the data and can program the system to recognize those patterns
supervised
IT is a _________ activity; management is a _______ activity
support; support
the business case approach is necessary when addressing Porters __________
threat of new entrants
which of porters five forces addressed the disadvantages of WIFI for businesses
threat of new entrants
liability is an issue in the knowledge _____ stage
transfer
an _______ network is any network within your organization, an internal network that is only accessible by employees is called an _________
trusted, intranet
__________ decisions deal with "fuzzy", complex problems such as ______
unstructured; deciding where to open a new franchise
the commonly used "bystander at the switch" dilemma where the bystander has to choose between letting the train hit 5 people or flip the switch and hit one person is an example of the _______ approach
utilitarian
convolutional neural networks are used in application such as __________
video analysis
current AI systems are considered ________ AI
weak
you assume the inflation rate will remain constant over the next few years. You double check the assumption with a _______ analysis.
what-if
the focus of globalization _______ is companies
2.0
GO _______ is VMIs electronic surveillance policy
50
data mining is most similar to _______ in functionality
AI
___________ is the final step in the general framework for ethics; this matches the _________ stage in the IDC
Act and reflect on the outcome of your decisions, implementation
____ is most closely related to strategic nature of decisions performed by ____ level managers
BRP; c
_________ are informed users that _______ come from the business side
CIO; can
if a company wants to outsource its payroll process that company should use _______ cloud computing services
FaaS
______ is a capability of dashboards that are specific measures of CSFs
KPI
______ is a systems development method that combines JAD, prototyping, and ICASE tools
RAD
________ is a part of the CPU and a type of primary storage
Registers
______ is a major vendor of BI tools; BI is primarily a(n)_________
SAP, application and process
a URL that begins with the http uses _________
SSL
______ is a result that indicated that a given condition exists when it in fact does not; this is the opposite of the data
a false positive; poisoning
_________ means that you accept the consequences of your decisions and actions
accountability
you check on your credit report annually for free. This allows you to catch identity theft. This is an example of what ethical issue that falls into the category of _______
accuracy
joseph and his marketing team want to create a new app. They have 2 weeks. This would be done best using _________ development.
agile
the first step in the information systems planning systems is to ___________
analyze the organization strategic plan
an _______ is considered critical/foundational to success of any enterprise because they support core operations
TPS
H&R Block uses
Watson
_________ is an electronic profile of you and your habits; the business goal is ___________
a digital dossier, customer intimacy
