UMIS Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Chapter 9

Social Media Information Systems

Organizations that play the role of providing platforms that enable the creation of social networks, or social relationships among people with common interests are know as...

Social media providers

What are the four phases of collaboration?

Starting, Planning, Doing, Finalizing

What type of decision requires the most collaboration?

Strategic

Chapter 2

Strategy and Information Systems

A manager will essentially require which of the following skills to clearly understand how the resources that his or her company uses are converted to desired outputs. A. B. C. D.

Systems Thinking

What are the 5 components of the "Five Component Model"? and what sides are they of?

Technical Safeguards: Hardware and Software Data Safeguard: Data Human Safeguards: Procedures and People

Business Process Management (BPM)

- is a cyclical process - includes viewing models of processes as they currently are (as-is) - includes continually evaluating processes - creates components and design of processes and implements them - can feed into the systems development process

What is an example of unauthorized data disclosure?

an employee sharing their login credentials with a scammer who is pretending to perform a company security audit

The scrum method of system development is superior because...

- the scrum work period is shorter and cyclical - it involves smaller, more interactive teams - it allows the development team to constantly reflect on work - it accommodates changing and fuzzy requirements better - it prioritizes requirements and considers the time it will take to complete each one

To effectively manage risk, organizations must proactively balance the trade-off between risk and ___.

cost

What are the 5 forces of Porter's that determine industry structure?

1. Threat of New Entrants 2. Bargaining Power of Suppliers 3. Bargaining Power of Buyers 4. Threat of Substitute Products/Services 5. Rivalry among Existing Competitors

Examples of metadata are...

1. a data type 2. a field property 3. a field description in design view

A database is a _______________, the DBMS_______________________, and a DB application __________.

1. collection of integrated rows of data 2. is the software that allows processing and management of the data 3. is a system of objects designed to help a user complete a job or requirement easily

The process of normalization...

1. ensures data integrity 2. organizes data into entities 3. eliminates almost all redundancy 4. ensures good table structure that adheres to forming rules

________ are collections of related tasks that receive inputs and produce outputs. A. Activities B. Repositories C. Resources D. Models

A. Activities

In which phase of the Systems Development Life Cycle (SDLC) should you determine project cost feasibility? A. Define System B. Determine Requirements C. Design System Components D. Implement System E. Maintain System

A. Define System

Which of the following is a function of an Internet service provider? A. It serves as a user's gateway to the Internet. B. It describes how messages must be processed for wired transmission. C. It connects computers within a LAN. D. It transmits data over short distances, replacing cables.

A. It serves as a user's gateway to the Internet.

The most important phase of the SDLC is...

determining requirements

Information systems can only improve the efficiency of business process activities.

false

Social capital is simply defined by the sum of the connections, the strength of the relationships, and the number of resources controlled.

false

Working together on the K204 Team Forming Contract to make decisions about rules and consequences requires:

feedback and iteration

_________________ is when teammates only give postive feedback and always agree with each other.

groupthink

The term for taking in-depth measures to reduce a system's vulnerability to harm caused by the public is...

hardening

Examples of technical safeguards include:

identification and authentication, encryption, firewalls, malware protection, and application design

A(n) ___________________________ is when two or more functional areas (departments) have independent and detached databases.

information silo

The primary risk of peer-to-peer support in the context of social media and customer service is ________.

loss of control

In the context of a collaboration information system, data about the way the team has decided to work on the project is called:

metadata

In the context of security, which of the following is true about managing risk?

organizations should implement safeguards that balance the trade-off between risk and cost

The gap that exists between the current state of things (as-is) and what it oughts to be (goal) is the:

problem

_____________________ are companies that provide platforms that enable the creation of social networks.

social media providers

The (business) process of checking out purchased items from a grocery store should be:

structured

The SDLC's critical problem is...

that it can't easily accommodate changing requirements

The three primary drivers of system development that can affect each other if changed are...

time, cost, and scope

A ________ is a balancing of three critical factors: requirements, cost, and time.

trade-off

Companies creating a social media strategy must gather the right amount of data to make informed decisions.

true

Enterprise Application Integration can be used to help manage information silos.

true

Organizations should practice implementing their incident response plans to ensure that the procedures are effective and that employees understand them.

true

A feature that allows saving documents multiple times with the same name and still recover previous work is:

version control

Which of the following is true for the relationship between business processes and information systems? A. Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction. B. Information systems incorporate all business process activities, and hence should be developed before business processes. C. Starting from processes and working toward information systems is the best option to anticipate future demands and new business processes. D. Developing information systems before business processes ensures that all activities are considered in the development process.

A. Starting with processes and working toward systems is more likely to result in processes and systems that are aligned with the organization's strategy and direction.

Malware protection can best be described as which of the following... A. Technical Safeguard B. Data Safeguard C. Human Safeguard D. Virus Safeguard

A. Technical Safeguard

A _____________ is a logical representation of a database that describes the data and relationships that will be stored in the database. A. data model B. crow's feet diagram C. database design schema D. requirements document

A. data model

A ___________ is a data collection, smaller than the data warehouse, that addresses a particular component or functional area of the business. A. datamart B. datamine C. datacube D. data model

A. datamart

Identify a characteristic that is a disadvantage of cloud-based hosting. A. loss of control over data location B. ongoing support costs C. increased management requirements D. significant development effort

A. loss of control over data location

A low inventory report that is automatically generated when the number of items reaches a certain number is an example of which of the following? A. push publishing B. pull publishing C. automated publishing D. BI publishing

A. push publishing

What is an example of incorrect data modification?

Accidentally deleting customer data while attempting to perform a backup

Which type of relationship would be necessary to have between the Employee and Sales entities in a grocery store database? A. N:M B. 1:N C. 1:1 D. M:M

B. 1:N

The process a company goes through to determine whether or not to invest in a new location is a ____________ process. A. structured B. dynamic C. difficult D. strategic

B. dynamic

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services? A. traditional marketing B. pay-per-click C. user participation D. venture capital

B. pay-per-click

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement? A. structural capital B. social capital C. process capital D. human capital

B. social capital

What are the four primary purposes of collaborative teams?

Become informed, make decisions, solve problems, manage projects

What is the most important quality to have as a collaborator?

Being able to give and receive critical feedback

Chapter 3

Business Intelligence Systems

Which of the following is defined as information containing patterns, relationships, and trends? A. Process mining B. Business process management C. Business intelligence D. Spatial intelligence

C. Business intelligence

A student management system allows students to have multiple majors and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship. A. 1:N B. 1:01 C. N:M D. M:1

C. N:M

Which of these is one of Porter's 5 forces that determine industry structure? A. Inbound logistics B. Customer service C. Threat of new entrants D. Differentiation

C. Threat of new entrants

Which of the following does knowledge management (KM) benefit organizations? A. improve process quality B. increase team strength C. both a and b D. it doesn't benefit organizations

C. both a and b

Because of the various problems with operational data, large organizations choose to extract operational data into which of the following?. A. OLAP cube B. neural network C. data warehouse D. Web server

C. data warehouse

In a data model, a(n) ________ represents something that a user wants to track. A. record B. byte C. entity D. primary key

C. entity

Which phase of the customer life cycle focuses on increasing the value of existing customers by selling them more products? A. marketing B. customer acquisition C. relationship management D. loss/churn

C. relationship management

Chapter 6

Cloud Computing

Chapter 7

Collaboration Information Systems

Which of the following is an effective technique to overcome employee resistance when implementing new enterprise systems? A. giving employees ultimatums and deadlines B. paying employees outright for transitioning to the new system C. coercing employees to learn the new system D. training employees on the successful use of the new system

D. training employees on the successful use of the new system

In the Five-Component Model, which component is considered the "bridge" that connects the computer side of the model to the human side?

Data

The centerpiece of an ERP application is the:

Database

Chapter 5

Database Processing

When a company tries to offer the same products at a lower cost they are trying to __________ a customer's buyer power.

Decrease

Using enterprise social networks in an organization is known as:

Enterprise 2.0

_______________________ are able to collect, include, and provide data from several departments or functional areas.

Enterprise Information systems

The overall goal of IS Security is to...

Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards

________ is a major task when implementing enterprise systems.

Gap identification

In the Five-Component Model, which component is the easiest to change?

Hardware

The automobile industry is characterized by many manufacturers and intense competition among them. This statement refers to ________.

High levels of Rivalry

Chapter 1

Importance of MIS

Chapter 12

Information Systems Development

Chapter 10

Information Systems Security

The two key characteristics of collaboration are...

Iteration and feedback

________ are large-scale high-speed centralized computers, used for internal corporate data processing needs.

Mainframes

________ is the dynamic social media process of employing users to participate in product design or product redesign.

Crowdsourcing

Which of the following can be described as a security threat? A. Human Error B. Cyber Terrorists C. Natural Disasters D. All of the Above

D. All of the Above

A ________ is an application program that runs on a server-tier computer and manages processes such as items in a shopping cart. A. database tier B. web server C. database D. commerce server

D. commerce server

Which of the following protocols guarantees secure data transmission? A. http B. ftp C. smtp D. https

D. https

Which of the following is a common description of information? A. information presented in a meaningful context B. unbiased information C. recorded facts or figures D. knowledge derived from facts or figures

D. knowledge derived from facts or figures

Which of the following is an accurate representation of the steps in the business process management cycle? A. model processes; implement processes; assess results; create components B. create components; model processes; implement processes; assess results C. implement processes; create components; model processes; asses results D. model processes; create components; implement processes; assess results

D. model processes; create components; implement processes; assess results

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? A. inbound logistics B. operations C. customer service D. outbound logistics

D. outbound logistics

The sales manager of a firm wants to generate a particular report containing sales analyses of the second and third quarter of the year. After accessing the DBMS, she should type the keywords (criteria) into a ________ to obtain the information that she wants. A. report B. reference C. data entry D. query

D. query

Transforming inputs into the final products describes which primary activity?

Operations/Manufacturing

You follow certain steps to access the supplementary readings for a course when using your organization's library management system. The steps that you follow are examples of the ________ component of an information system.

Procedure

Chapter 8

Processes, Organizations, and IS


Set pelajaran terkait

Exam 2 Chapters 5-8 Management JCCC

View Set

World geography south/east Asia review

View Set

Lewis Med-Surg Ch. 33 CAD and Acute Coronary Syndrome

View Set