MISY 3310 final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Gantt chart

A ________ shows each task as a horizontal bar whose length is proportional to the time required to complete it.

False

A bank's decision to give a customer a mortgage is an example of an unstructured decision

True

A coherent decision is one that can be rationally explained to others.

wide area network

A network that covers entire geographical regions is most commonly referred to as a(n):

CAN

A network that spans a college or corporate facility is called a:

False

A reduced workforce is an example of an intangible benefit of an information system.

Click fraud

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:

feasibility study

A systems analysis includes a ________ that is used to determine whether the solution is achievable from a financial, technical, and organizational standpoint

False

A test plan begins by testing how well the entire system works and identifying where it falls.

False

A typical end user concern about a new system is where the data will be stored

feasibility study

A(n) _____ details the costs and benefits of each alternative and the changes that the changes that the organization

drill-down

A(n) ________ capability allows users to view more detailed views of data.

RFP

A(n) ________ is a detailed list of questions submitted to external vendors to determine how well they meet the organization's specific requirements.

False

All CRM packages contain modules for PRM and ERM

Instagram

All of the following are examples of "on demand" companies except:

Transparency

All of the following are unique features of e-commerce technology, except:

False

Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification

uses a distributed ledger system of transactions

Blockchain refers to a technology that:

eight

Bluetooth can be used to link up to _____ devices within a 10-meter using low-power, radio-based communication

False

Component-based development uses structured methodologies

True

E-commerce refers to the use of the Internet and the web to transact business

True

End-user developed solutions can be developed much faster than other approaches

simple programs

End-user development is useful primarily for creating:

Business Intelligence

Enterprise application vendors are now including ____ features, such as tools for data visualization, flexible reporting, and ad-hoc analysis, as part of the application

e-business

Enterprise application vendors have created _______ to make their customer relationship management, supply chain management, and enterprise systems work together with each other.

False

Enterprise-wide knowledge management systems deal with structured and semi-structured knowledge, while other systems are used for unstructured knowledge

change it's procedures

If an organization's requirements conflict with the software package chosen and the package cannot be customized, the organization should:

and the old are run together

In a parallel conversion strategy, the new system:

deep packet inspection

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

True

In high-velocity automated decision making, humans are eliminated from the decision chain.

True

In neural networks, humans train the network by feeding it a set of known outputs

Combines data with processes

In object-oriented development, an object:

True

In public key encryption the keys are mathematically related so that the data encrypted with one key can be decrypted using only the other key

True

In the traditional systems development life cycle, each stage must be completed before the next stage begins

are limited to providing information requirements and reviewing the technical staff's work.

In the traditional systems development life cycle, end users:

Symmetric Key Encryption

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key

False

Information asymmetry exists when there is more information about one product than there is about a similar product

total amount and quantity of information available to all market participants.

Information density refers to the:

True

Intangible benefits of an information system are those that cannot be easily quantified

True

Major CRM application software vendors include Oracle, SAP, and Salesforce.com

False

Scope describes the full length of time required to complete a project

True

Shopping bots are a form of intelligent agent

False

Switching costs are the merchants' costs of changing prices.

True

Switching costs of enterprise systems occur when changing software vendors

True

Systems analysts typically gather facts about existing systems by interacting with end users

Wi-Fi

The 802.1 1 set of standards is known as

True

The Domain Name System (DNS) converts domain names to IP addresses

Delivery platform

The business intelligence environment includes all of the following except:

False

The internet increases information asymmetry

client//server computing, packet switching, and the development of communication standards for linking networks and computers

The internet is based on which three key technologies?

the Systems Development Life Cycle (SDLC)

The oldest method for building information systems is:

RAD

The process of creating workable information system in a very short period of time is called:

the required technical expertise

The project risk will rise if the project team and the IS staff lack:

the techniques are step by step, with each step building on the previous one

The term structured, when discussing structured methodologies, refers to the fact that:

structured

The type of decision that can be made by following a definite procedure is called a(n) ________ decision.

False

The use of high-velocity automated decision making eliminates the risk inherent in human decision making

are oriented to facilitating organizational tasks and solving business problems.

Users prefer systems that:

Big data analytics

What kind of decision making tool could help you develop a recommended system for your firm's website which has 50,000 visitors month?

False

What-if analysis allows the user to vary certain values to test results to predict outcomes when there are no changes in the value of key conditions

Implementing the system

Which is the last step in developing a new information system?

customer lifetime value

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?

Predictive Analytics

Which of the following BI functionalities would you use to assess the likelihood of students dropping out of a college program?

Community provider

Which of the following Internet business models involves a merchant creating an online digital environment that enables people with like interests to share information?

A collection of millions of social graphs

Which of the following best describes the digital social graph?

SEO

Which of the following can b used to help a website achieve a higher ranking with the major search engines?

An AUP

Which of the following defines acceptable uses of a firm's information resources and computing equipment?

An information recovery planning

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Classifying knowledge

Which of the following is a key problem in managing knowledge?

How much of out product is selling in lower-income markets?

Which of the following is a typical middle management decision?

Providing online search results

Which of the following is an example of a high-velocity automated decision process?

Executive users

Which of the following is not an element of the business intelligence environment?

The system may not be able to scale up to handle larger amounts of data

Which of the following is the biggest risk in using end-user development to create a new information system?

ERP systems

Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes?

upstream portion of the supply chain

Which of the following refers to a company's suppliers, supplier's suppliers, and the processes for managing relationships with them?

Some Net marketplaces are owned by a single firm and used to link solely to the firm's suppliers and key business partners

Which of the following statements about Net marketplaces is NOT true?

ICANN

Which organization coordinates the internet naming system?

Portfolio analysis

Which process is used to develop risk profiles for a firm's information system projects and assets?

Tunneling

Which process is used to protect transmitted data in a VPN?

Digital

Which signal types are represented by a binary waveform?

small value, routines decisions have business value because of their large number and frequency

Why does improving a small value, routine decision have business value for a company?

Due Process

You are answering phones for a local utilities provider and are speaking with an extremely angry customer. Because your company manual advises employees to transfer hostile calls to a superior, you do this. What quality dimension of decision does your action reflect?

GIS

You are the CEO of a national apparel retail chain and want to add three new stores. Which of the following tools will best help you find the most potentially profitable new locations?

High-risk, low-benefit projects

You have been hired by a pharmaceutical company to evaluate its portfolio of systems and IT projects. Which types of projects would be best avoided?

Neural networks

____ are intelligent techniques that parallel some aspects of the processing patterns f the biological brain.

Links to external knowledge bases

_______ are an essential component of a knowledge work system

Reduced workforce, lower outside vendor costs, and increased productivity

_______ are intangible benefits of information systems.

Unstructured

________ decisions are most common at higher levels of management.

Process specifications

________ describe the transformation occurring within the lowest level of the data flow diagrams. They express the logic of each process.

Project management

________ refers to the application of knowledge, skills, tools, and techniques to achieve specific targets within specified budget and time constraints

A PERT chart:

portrays a project as a network diagram consisting of numbered nodes that represent tasks.

System testing:

tests the functioning of the information system as a whole


Set pelajaran terkait

EXP PSYCH FINAL 8,9,10,11 TERMS & QUESTIONS & CONCEPTS

View Set

*Chapter 40: Care of Patients with Hematologic Problems

View Set