Test One

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is ___________ and is ___________.

piracy; illegal

You are a nice person, so you hold the door open for the person running in behind you. Since you needed to use your ID badge to open the door, the person running in behind you is __________; this is _____________.

tailgating; an unintentional threat to your organization

__________ is a physical control.

A Company gate

Responsibility

Acceptance

What is one of the major concerns about information you provide that is stored in databases? (Hint: use a one word answer)

Access

___________ causes pop-up advertisements to appear on your screen.

Adware

All of the following are examples of transactions that flow through a Transaction Processing System (TPS), except:

All of these are examples of transactions

Which of the following is a way to measure competitive performance?

All of these are measures

Information systems includes:

All of these: Information Technology, People, and Processes

Information systems help employees within the organization. Certain workers help certain managers and different systems help these managers make their specific decisions. Which system supports complex, non-routine decisions that typically middle managers and knowledge workers make?

Business Intelligent Systems

When business processes are not on target, we can choose different approaches to fix the problem. If the company is not concerned with cost or much lower-level employee input and decides to take a radical approach that involves a high risk and a lot of time, which approach have they decided to use?

Business Process Reengineering (BPR)

Increase in the use of artificial intelligence

Cognitive computing in many industries

_____________ is any asset that provides an organization with an edge against its competitors.

Competitive advantage

An Information system collects, processes, stores, analyzes, and disseminates information for a specific purpose. It's intended to supply useful information for decision making. When deciphering what is being recorded or stored, we must differentiate between a few terms. Starting with the most elementary and unorganized term, choose the correct flow of how they build on each other.

Data, Information, Knowledge

Right/wrong based on the action rather than the circumstances

Deontology

When ordering a pizza online, which of the following elements in the business process would be considered the output?

Desired Pizza

While Walmart may use more than one competitive strategy, according to your notes, which is most dominant?

Differentiation

Increase in the use of ergonomics which promotes quality of life, but increases loneliness and depression

Employees' option to work from home

________ is the principle of right and wrong that individuals use to make choices that guide their behavior.

Ethics

Equality or fairness based on a realistic standard

Fairness

Quicker, better diagnosis

Healthcare

A business process includes three elements. Which of the following describes materials, services, and information that flow through and are transformed as a result of the process activities?

Inputs

Biometrics is an example of something the user _____.

Is

Passwords are examples of something the user _____.

Knows

Globalization is a __________ pressure.

Market

Homo Conexus refers to the most connected generation in history so far. According to the text, who is this informed user referring to?

Me

Decrease in number needed, but increase in workload

Middle Managers

As strategies are chosen to gain a competitive advantage, a company may use more than one. However, there is one that is more dominant. If a company is able to create products/services that no one else can or just create faster and better, what strategy are they using?

Operational effectiveness

Intellectual property is NOT protected under ______ laws.

Privacy

_________ is the right to be left alone.

Privacy

Information systems can help to evaluate if a business process is on target. These evaluations can be performed at two different levels. Which level would assess a process from order to delivery?

Process Level

Liability

Right to recover

Increase in number, but decrease in jobs

Robot Revolution

Careless internet surfing is ____________ and is an ____________ mistake.

a human error; unintentional

Assessing a company's competitive situation can be done through the use of Porter's 5 forces model. Which force is being assessed if a company discusses the need for companies to offer pay-at-the-pump options if they want to compete in the gas station market?

Threat to entry of new entrants

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.

Transference

This communication control shows a padlock in the web address bar when a credit card transaction is being made online.

Transport Layer Security

My right to privacy can be violated if the need for society to know something about me is present.

True

The greatest good for all involved

Utilitarian

Accountability

Who is responsible


Set pelajaran terkait

Source Factors (Factors Influencing Persuasive Effectiveness)

View Set

Ch 8 definitions radiographic equipment

View Set

Biology: Natural Selection + Evolution Language

View Set