MIS Test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Wi-Fi

802.11 is also know as

information policy

A (n) ___ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data

file

A ___ is a component in the computer system data hierarchy consists of multiple records of the same type

field

A ___ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A

byte

A ___ is a component in the computer system data hierarchy that represents an ASCII character

supply chain

A ___ is a network of organizations for obtaining raw materials

Trojan horse

A ___ is a software program that mimics another program and often causes damage

network

A ___ links two or more computers which enable the sharing of information

foreign key

A ___ provides the link from one table to another table's primary key

bit

A ____ is the smallest component in the computer system data hierarchy

wide area network

A network that spans between Montana and Washington is a(n)

packets of data

A router is a communications processer used to route ___ through different networks.

pull-based

A supply chain management system using a(n) ___ model bases production schedules on actual customer orders

push-based

A supply chain management system using a(n) ___ model bases production schedules on forecasts

database

A(n) ___ is a collection of data organized to serve many applications efficiently

portal

A(n) ___ is an Internet business model that creates a destination site and is provided by companies such as Yahoo, Bing, and Google

content provider

A(n) ___ is an Internet business model which includes companies such as iTunes and WSJ.com

entity-relationship(ER) model

A(n) ___ is the most popular method to model a database

digital

A(n) ___ signal is a discrete, binary waveform

analog

A(n) ___ signal is represented by a continuous waveform that passes through a communications medium

virtual private network (VPN)

A(n) ___ uses the Internet to create a secure network connection

2.8 million dollars

According to Panorama Consulting Solutions, the average cost of an ERP project is approximately

offline media

According to the E-Commerce Presence Map, activities such as education and branding are considered a(n) ___ type of presence

RFID

According to your reading, Dundee Precious Metals improved gold-mining operations by adding ___ technology to track workers, equipment, and vehicles.

business-to-business (B2B)

According to your text, ChemConnect's Web site for buying and selling chemicals is an example of ___ electronic commerc

petabytes

Although "Big Data" doesn't refer to a specific amount of data, it usually does involve

Amazon Relational Database Service

Amazon is one of the first to provide cloud computing relational databases. This effort is called

NoSQL

An emerging non-relational database management system is called

cross-selling

An example of ___ includes someone taking out a loan and then being sold a checking account as well

audit

An information systems ___ examines a firm's overall security environment and determines if the organization is properly prepared to address threats

helps protect a system using full-time monitoring tools

An intrusion detection system (IDS)

analyze customer data for improving business performance

Analytical CRM includes applications that

primary key

Another term for a key field is a

record

Another term for database row is

allows users to charge items to their credit cards

Apple Pay for the iPhone

customer lifetime value

Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called

bits per second

Digital information transfer speeds are measured in

digital good

Downloading a movie to watch is an example of acquiring a

are very expensive to purchase and implement

Enterprise applications have drawbacks mainly because they

Crystal Reports

For DBMS's that do NOT include a reports generator, ___ is a popular option for large corporate DBMS

gatekeeper

IS security firewalls are an example of a

pull-based

If a company produces a custom-made automobile only after a customer has placed an order, it is an example of a ___ production model

receiving, sending

If a computer is sending a file, and a packet being sent is damaged, the ___ computer asks the ___ computer to transmit it

global supply chain

If a supply chain includes organizations from the United States and China, it is considered a(n)

click fraud

If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to commit

key logger

If someone loads a program that tracks everything you type, the specific spyware is a

phishing

If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are

Sarbanes-Oxley Act

In 2002, the ___ was passed to help protect investors with new financial statements reforms

196 million

In 2014, approximately ___ Americans shopped online

finance and accounting

In an enterprise system, the integrated software modules that focus on customer credit are related to

human resources

In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to

manufacturing and production

In an enterprise system, the integrated software modules that focus on production capacity are related to

social CRM

Incorporating applications that allow customers to chat with one another about company products is an example of

disaster recovery planning

MasterCard having a duplicate computer center in multiple cities is an example of ___ in case operations at one location are disrupted

access

Microsoft's DBMS that includes built-in report generation and reporting is called

SQL Server

Microsoft's most powerful DBMS is

partner relationship management (PRM), employee relationship management (ERM)

More advanced CRM applications include ___ and ___

server

On a client/server system, most of the powerful processing is handled by the

two

Public key encryption uses ___ key(s)

denial of service

Regarding IS securities, DoS represents

enterprise software

SAP is the best-selling

databases

SQL injection attacks are related to

Structured Query Language

SQL stands for

packet switching

Slicing digital messages into parcels is called

hacker

Someone who intends to gain unauthorized access to a computer system is considered to be a

domain names, IP addresses

The Domain Name System (DNS) converts ___ to ___

JOIN

The SQL___ statement allows you to combine two different tables

Internet

The ___ is the world's most extensive, public communication system

upstream

The ___ portion of the supply chain includes organizations that supply materials

Netscape

The beginning of e-commerce occurred when ___ accepted the first ads from major corporation

the US Military

The domain extension .mil represents

mobile

The fastest growing type of B2C e-commerce is

primary key

The field that uniquely identifies a row in a relational database table is called a

normalization

The formal process to remove data problems such as repeating groups is called

password

The most commonly used authentication technique used for end users is a(n)

hertz

The number of cycles per second that can be sent through a network medium is calculated in

removing layers and reducing costs

The primary benefit of disintermediation to the consumer is

Internet

The world's largest network is the

biometric

Using your handprint to access a safe deposit box is an example of ___ authentication

can operate on their own without attaching to other computer program files

Viruses differ from worms because worms

bullwhip effect

When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a

Digital certificates

___ are data files used to identify and protect online transactions using a trusted third party.

RFIDS

___ are used to track movements of products through the supply chain.

Information systems (IS)

___ deal(s) with both behavioral and technical issues regarding information systems, and focuses on the development, use, and impact of systems by managers and employees

EDI

___ enables the computer-to-computer exchange between two organizations

Enterprise resource planning (ERP) systems

___ help businesses become more flexible and productive by integrating groups of processes so they focus on efficient management of resources and customer service such as sales, marketing, and accounting

Business intelligence

___ in enterprise applications provides features for managers to obtain meaningful information from massive amounts of data

Malware

___ includes computer viruses, worms, and Trojan horses

XML

___ is the standard for wireless technologies

Authentication

___ is used to ensure the person who is he/she claims to be

HIPAA

___ was passed in 1996 to protect medical records

decreased

iTunes has dramatically ___ illegal music downloads

MySQL

is a widely used open source DBMS

802.15

Bluetooth is another name for the ___ wireless networking standard

connection medium

Coaxial cable is a(n) ___ for linking network components

sales

Customer relationship management applications that track Web sales and retail store sales are related to the ___ aspect of customer relationships

service

Customer relationship management applications that track social networking data are related to the ___ aspect of customer relationships

capturing and integrating customer data

Customer relationship management primarily includes

data scrubbing

Data cleansing, working to identify and fix incorrect data, is also called


Set pelajaran terkait

ECO 1305 - Exam Two (w/ Examples)

View Set

Critical Thinking Final Exam MJC

View Set

Molecular Bio chapter 16 dna repair and crossing over practice questions

View Set

Adult Health: Integumentary LVN/to be edited

View Set