misy exam 2
vendor selection
"Hidden costs," such as ________ costs, can easily undercut anticipated benefits from outsourcing.
False
A NOS must reside on all the local computers in a network.
touch point
A ________ is a method of interaction with a customer, such as telephone or customer service desk.
True
A computer worm is a program that can copy itself to other computers on the network.
True
A decision can be said to have improved if it is made by more than one manager.
Bullwhip
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
supply chain.
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a/an:
CAN
A network that spans a college or corporate facility is called a:
True
A new information system is not considered in production until implementation is complete.
click fraud.
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:
just-in-time
A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy.
pull-Based
A supply chain driven by actual customer orders is called a ________ model.
push-based
A supply chain driven by forecasts of consumer demand follows a ________ model.
spear phishing.
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:
True
Apple Pay uses an RFID-related technology called near field communication.
Implementation controls:
Audit the systems development process at various points to ensure that the process is properly controlled and managed.
True
Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel.
Managing the supply chain
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?
False
Because genetic algorithms produce generalized solutions, they are best used as aids or guides to human decision makers instead of substitutes for them.
False
Biometric authentication is the use of personal, biographic details such as the high school you attended and the first street you lived on to provide identification.
eight
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.
True
Business intelligence and analytics are products defined by software vendors.
are capable of generating realistic-looking three-dimensional graphic designs that can be rotated and viewed from all sides.
CAD systems:
False
Component-based development uses structured methodologies.
assigning and managing customer service requests.
Customer service modules in CRM systems provide tools for:
False
DSS primarily address structured problems.
True
Disintermediation provides major benefits to the consumer.
False
DoS attacks are used to destroy information and access restricted areas of a company's information system.
True
Documentation reveals how the system works from both a technical and end-user standpoint.
redundant hardware, software, and power supplies.
Fault tolerant information systems offer 100 percent availability because they use:
True
Fiber-optic cable is more expensive and harder to install than wireless media.
Create more IP addresses
IPv6 has been developed in order to:
change its procedures.
If an organization's requirements conflict with the software package chosen, and the package cannot be customized, the organization should:
True
Implementation refers to the steps taken to bring a new information system into production.
True
In a client/server network, a network server sets the rules of communication for the network.
view overall firm performance data.
In a dashboard, users can:
square boxes.
In a data flow diagram, external entities are represented by:
True
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
True
In a pull-based model of SCM systems, actual customer orders or purchases trigger events in the supply chain.
False
In a pull-based model of SCM systems, production master schedules are based on forecasts of demand for products.
Degree is a superclass to Mathematics and Physics.
In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related?
deep packet inspection
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
menu costs decline.
In digital markets:
tagged with a classification.
In order to search for and retrieve knowledge objects in an enterprise content management system, the objects themselves must be:
True
In public key encryption the keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.
free/freemium
In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services.
Symmetric key encryption
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
True
Inefficiencies in a supply chain are primarily caused by inaccurate or untimely information.
asymmetry
Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party.
False
RFID technology is being gradually replaced by less costly technologies such as WSNs.
managing customer service requests.
SFA modules in CRM systems provide tools for all of the following except:
False
Scope describes the full length of time required to complete a project.
False
Search engine marketing is the largest form of web marketing.
cross-selling.
Selling a customer with a checking account a home improvement loan is an example of:
True
Smartphones have the same security flaws as other Internet-connected devices.
False
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
True
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports
False
Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.
generating demand forecasts for products.
Supply chain execution systems provide all of the following functions except:
track the physical status of goods.
Supply chain planning systems perform all of the following functions except:
False
Symmetric encryption uses two keys.
tests the functioning of the system as a whole.
System testing:
True
TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances.
Wi-Fi.
The 802.11 set of standards is known as:
True
The Domain Name System (DNS) converts domain names to IP addresses.
True
The first step in the problem solving process is to define the problem that needs to be solved.
RAD
The process of creating workable information systems in a very short period of time is called:
DDoS
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
True
Viral marketing is like traditional word-of-mouth marketing except that it is spread via online communities.
True
VoIP technology delivers voice information in digital form using packet switching.
Application, Transport, Internet, and Network Interface
What are the four layers of the TCP/IP reference model?
Personalization refers to adjusting marketing messages for a consumer; customization refers to adjusting a product or service based on a user's preferences.
What is the difference between personalization and customization, as applied to e-commerce technologies?
Big data analytics
What kind of decision making tool could help you develop a recommended system for your firm's website which has 50,000 visitors a month?
55 percent
What percent of online retailers now have m-commerce websites?
DNS
What service converts IP addresses into more recognizable alphanumeric names?
Internet technology standards
What standards are referred to when discussing universal standards as a unique feature of e-commerce?
Zero-day vulnerability
When a hacker discovers a security hole in software that is unknown to the software vendor it is an example of:
Identity Theft
When hackers gain access to a database containing your personal private information, this is an example of:
unstructured
Where there is no well-understood or agreed-on procedure for making a decision, it is said to be:
Fairness
Which dimension of quality means that a decision faithfully reflects the concerns and interests of affected parties?
Defining the problem
Which is the first step in developing a new information system?
Classifying knowledge
Which of the following is a key problem in managing knowledge?
Responsive web design
Which of the following is a technique used to create websites that will conform to the screen resolution of the user?
How much of our product is selling in lower-income markets?
Which of the following is a typical middle management decision?
VW Group Supply
Which of the following is an example of a private industrial network?
JDA software
Which of the following is not an example of next-generation enterprise applications?
Corporate
Which of the following is not one of four types of presence to be considered when building an e-commerce presence?
Enterprise software is expressly built to allow companies to support their existing business practices.
Which of the following is not true about enterprise systems?
Which of the following is the largest mobile advertising market?
Supply chain execution system
Which of the following manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner?
VoIP is more secure than the switched voice network.
Which of the following statements about Internet security is not true?
It is not possible to make a smartphone part of a botnet
Which of the following statements about botnets is not true?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Which of the following statements is not true about search engines?
GIS
Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps?
Small value, routine decisions have business value because of their large number and frequency.
Why does improving a small value, routine decision have business value for a company?
It measures performance of more than just financial systems.
Why is the balanced scorecard method said to be "balanced"?
Prototyping
You are an IT project manager for an advertising firm. The firm wishes to create an online survey tool that will be used to survey focus group reactions to products in development. The most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the senior managers that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements during the course of development. What development method would be most successful for this project?
Two-factor authentication utilizes a(n):
a multistep process of authentication.
A trojan horse
is software that appears to be benign but does something other than expected.
Blockchain refers to a technology that:
uses a distributed ledger system of transactions.