MIS Test 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When ordering a pizza online, which of the following elements in the business process would be considered the output?

desired pizza

A business process includes three elements. Which of the following describes materials, services, and information that flow through and are transformed as a result of the process activities?

inputs

Biometrics is an example of something the user _____.

is

Passwords are examples of something the user _____.

knows

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is ___________ and is ___________.

piracy; illegal

Intellectual property is NOT protected under ______ laws.

privacy

Information systems can help to evaluate if a business process is on target. These evaluations can be performed at two different levels. Which level would assess a process from order to delivery?

process level

Which of the following is a way to measure competitive performance?

productivity customer satisfaction quality All of these are measures

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _____________.

tailgating; an unintentional threat to your organization

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.

transference

__________ is a physical control.

A company gate

Fundamental tenet of Responsibility

Acceptance

What is one of the major concerns about information you provide that is stored in databases? (Hint: use a one word answer)

Accuracy

___________ causes pop-up advertisements to appear on your screen.

Adware

When business processes are not on target, we can choose different approaches to fix the problem. If the company is not concerned with cost or much lower-level employee input and decides to take a radical approach that involves a high risk and a lot of time, which approach have they decided to use?

Business Process Reengineering (BPR)

Information systems help employees within the organization. Certain workers help certain managers and different systems help these managers make their specific decisions. Which system supports complex, non-routine decisions that typically middle managers and knowledge workers make?

Business intelligence systems

The greatest good for all involved

Common Good

_____________ is any asset that provides an organization with an edge against its competitors.

Competitive advantage

While Walmart may use more than one competitive strategy, according to your notes, which is most dominant?

Cost leadership

An Information system collects, processes, stores, analyzes, and disseminates information for a specific purpose. It's intended to supply useful information for decision making. When deciphering what is being recorded or stored, we must differentiate between a few terms. Starting with the most elementary and unorganized term, choose the correct flow of how they build on each other.

Data, information, knowledge

________ is the principle of right and wrong that individuals use to make choices that guide their behavior.

Ethics

Equality or fairness based on a realistic standard

Fairness

As strategies are chosen to gain a competitive advantage, a company may use more than one. However, there is one that is more dominant. If a company is able to create products/services that no one else can or just create faster and better, what strategy are they using?

Innovation

Globalization is a __________ pressure.

Market

Homo Conexus refers to the most connected generation in history so far. According to the text, who is this informed user referring to?

Me

Information systems includes:

People, Processes, and Information Technology

_________ is the right to be left alone.

Privacy

Refer to Question 6 on Chapter 1 Quiz

Question 6 is Done

All of the following are examples of transactions that flow through a Transaction Processing System (TPS), except:

Registering for a class Swiping an item across the bar code reader at the U-scan station in Walmart Making a payment on your charge account (All of these are examples of transactions)

Fundamental tenet of Liability

Right to recover

Careless internet surfing is ____________ and is an ____________ mistake.

a human error; unintentional

Assessing a company's competitive situation can be done through the use of Porter's 5 forces model. Which force is being assessed if a company discusses the need for companies to offer pay-at-the-pump options if they want to compete in the gas station market?

Threat to entry of new entrants

This communication control shows a padlock in the web address bar when a credit card transaction is being made online.

Transport Layer Security

My right to privacy can be violated if the need for society to know something about me is present. (T or F)

True

Right/wrong based on the action rather than the circumstances

Utilitarianism

Fundamental tenet of Accountability

Who is responsible


Set pelajaran terkait

Chapter 13: Chief Executives and Bureaucracies

View Set

Chapter 1 Introduction to Systems Analysis and Design

View Set

California Permit Test Practice (Part 9)

View Set

CH 16: Multijurisdictional Taxation

View Set

Bio 1407 Ch. 14: Speciation and Extinction

View Set

Psych Ch 27: Community Mental Health Nursing

View Set

SkillsUSA 2020 Graphic Communications

View Set

Entrepreneurial Small Business Final

View Set

Ch. 14 Using Visual Aids, Public Speaking Chapter 1 Review Questions., Public Speaking Ch.2, Chapter 4, Chapter 3 Public Speaking, Chapter 10 Public Speaking, Chapter 13 Public Speaking

View Set

Principles of Marketing Final-CH 10.12.15.16.17

View Set