WGU DAC1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

ENSURING CONSUMER PROTECTION

An organization that wants to dominate with superior customer service as a competitive advantage must not only serve but also protect its customers, guarding them against unsolicited goods and communication, illegal or harmful goods, insufficient information about goods and suppliers, invasion of privacy and misuse of personal information, and online fraud. System security, however, must not make ebusiness websites inflexible or difficult to use.

The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.

Analysis

Which of the following is a phase in the SDLC?

Analysis

FAILURE TO MANAGE PROJECT SCOPE

As the project progresses, the project manager must track the status of each activity and adjust the project plan if an activity is added or taking longer than expected. Scope creep and feature creep are difficult to manage and can easily cause a project to fall behind schedule.

Halting transportation:

Disasters such as floods and hurricanes can have a deep effect on transportation. Disruption to major highways, roads, bridges, railroads, and airports can prevent business professionals from reporting to work or going home, slow the delivery of supplies, and stop the shipment of products.

Disasters can have the following effects on companies and their business operations.

Disrupting communications Damaging physical infrastructures Halting transportation Blocking utilities

Peter Drucker offers a helpful distinction between efficiency and effectiveness:

Doing things right addresses efficiency—getting the most from each resource. Doing the right things addresses effectiveness—setting the right goals and objectives and ensuring they are accomplished.

Which of the following measures the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases?

Effectiveness IT metrics

_________ focuses on the extent to which an organization is using its resources in an optimal way.

Efficiency

What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?

Electronic tagging

Which statement does not demonstrate unethical behavior?

Employees create proprietary organization information such as schematics, sketches, and customer lists.

What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?

Extreme programming

Which of the following is a fundamental of the RAD methodology?

Focus initially on creating a prototype that looks and acts like the desired system. Accelerate collecting the business requirements through an interactive and iterative construction approach. Actively involve system users in the analysis, design, and development phases. All of these are correct.

If you were asked to analyze Payless Shoes, which of Porter's three generic strategies would you determine that it was following?

Focused cost leadership

Of the below generic strategies, which one best represents the business strategy implemented by Tiffany & Co.?

Focused differentiation

Which of the following is one of Porter's three generic strategies?

Focused strategy

Which of the following is a method or system of government for information management or control?

Information governance

Media

Network transmission media Wire media Wireless media

____________supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers.

Operational CRM

A global ____________ system is a device that determines current latitude and longitude, speed, and direction of movement.

POSITIONING

Key performance indicators are the quantifiable metrics a company uses to evaluate progress toward critical success factors. Which one of the following is a key performance indicator?

Percentage of help-desk calls answered in the first minute is an example of a key performance indicator;

Recall the decision-making process highlighted in your text. Which of the below represents the first step in the process?

Problem identification

How do we describe a business that operates only online?

Pure play

What type of B2C model has Google implemented?

Pure-play business

Project objectives

Quantifiable criteria that must be met for the project to be considered a success.

A pharming attack uses

a zombie farm, often by an organized crime association, to launch a massive phishing attack.

A supply chain includes

all parties involved, directly or indirectly, in obtaining raw materials or a product.

social network is

an application that connects people by matching profile information

A foreign key is a primary key of one table that

appears as an attribute in another table and acts to provide a logical relationship between the two tables

Read-only memory (ROM) is the portion of a computer's primary storage that does not lose its contents when one switches off the power

ROM is nonvolatile, meaning it does not require constant power to function. ROM contains essential system programs that neither the user nor the computer can erase. Since the computer's internal memory is blank during start-up, the computer cannot perform any functions unless given start-up instructions. These instructions are stored in ROM.

What uses electronic tags and labels to identify objects wirelessly over short distances?

Radio frequency identification

Which of the following is the correct definition of RFID?

Radio frequency identification

Uses electronic tags and labels to identify objects wirelessly over short distances

Radio-frequency identification (RFID)

Which database model is a type of database that stores information in the form of logically related two-dimensional tables?

Relational database model

What ensures an MIS system is functioning correctly and providing accurate information?

Reliability

Project milestone

Represents key dates when a certain group of activities must be performed.

An electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

SSL Certificate

A(n) ___________technology produces an improved product customers are eager to buy.

SUSTAINING

A combination of HTTP and SSL to provide encryption and secure identification of an Internet server.

Secure hypertext transfer protocol (SHTTP OR HTTPS)

Solution Selection

Select the solution that best solves the problem and meets the needs of the business.

Which of the following represents knowledge?

Skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources

A disruptive ___________ is a new way of doing things that initially does not meet the needs of existing customers.

TECHNOLOGY

ITIL:

The Information Technology Infrastructure Library (ITIL) is a framework provided by the government of the United Kingdom and offers eight sets of management procedures: (1) service delivery, (2) service support, (3) service management, (4) Information and Communication Technology (ICT) infrastructure management, (5) software asset management, (6) business perspective, (7) security management, and (8) application management. ITIL is a good fit for organizations concerned about operations.

Test conditions

detail the steps the system must perform along with the expected result of each step

All of the following are characteristics of information, except __________.

quantity

Mass customization is

the ability of an organization to tailor its products or services to the customers' specifications.

Open ID:

the provision of an online identity that can be easily carried to a variety of devices (cell phones, PCs) allowing for easy authentication across different websites.

Information architecture is

the set of ideas about how all information in a given context should be organized.

Intelligent applications:

the use of agents, machine learning, and semantic web concepts to complete intelligent tasks for users.

Cyberterrorism is

the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals.

A model is

a simplified representation or abstraction of reality. Models help managers calculate risks, understand uncertainty, change variables, and manipulate time to make decisions.

Spyware is

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission. Spyware programs collect specific data about the user, ranging from general demographics such as name, address, and browsing habits to credit card numbers, Social Security numbers, and user names and password

Which of the below represents a challenge facing many businesses?

Collecting information Discerning patterns and meaning in the information Responding to the resultant information All of these are correct. All of the above are challenges facing businesses today.

A content creator is

the person responsible for creating the original website content.

A content editor is

the person responsible for updating and maintaining website content.

Egovernment involves

the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government.

Recovery is

the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup.

What is a constellation of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location?

global position system

Personal information management (PIM) software

handles contact information, appointments, task lists, and email.

Transport layer—

handles end-to-end packet transportation.

A network topology

refers to the geometric arrangement of the actual physical organization of the computers (and other network devices) in a network.

What are specific key words or phrases incorporated into website content for means of classification or taxonomy?

tags

A certificate authority is

a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

Project ___________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

deliverables

Operating cross-functionally means integrating the operations of all ________.

departments

project scope

describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project.

Optimization analysis, an extension of goal-seeking analysis,

finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints.

Organizational information comes in different levels, ___________, and granularities.

formats

Internet layer—

formats the data into packets, adds a header containing the packet sequence and the address of the receiving device, and specifies the services required from the network.

The amount of data a data center stores

has grown exponentially over the years as our reliance on information increases. Backups, graphics, documents, presentations, photos, audio and video files all contribute to the ever-expanding information footprint that requires storage.

Portability

iPad, iPhone

Some of the more popular examples of DBMS

include MySQL, Microsoft Access, SQL Server, FileMaker, Oracle, and FoxPro.

Hypertext transport protocol (HTTP)

is the Internet protocol web browsers use to request and display web pages using universal resource locators.

A record is a collection

of related data elements

Ebusinesses must have a revenue model,

or a model for making money. For instance, will they accept advertising, or sell subscriptions or licensing rights?

An integration allows

separate systems to communicate directly with each other.

An entity (also referred to as a table)

stores information about a person, place, thing, transaction, or event. EX LIKE THE NAME OF A SPREADSHEET

Operational decisions are considered___________, which arise in situations in which established processes offer potential solutions.

structured decisions

Project management is

the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

Capacity represents

the maximum throughput a system can deliver; for example, the capacity of a hard drive represents its size or volume.

Open source refers

to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify.

An RFID reader

transmitter/receiver that reads the contents of RFID tags in the area.

unstructured data

voice mail video clips tweets

reputation system,

where buyers post feedback on sellers

MIS infrastructure,

which includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. A solid MIS infrastructure can reduce costs, improve productivity, optimize business operations, generate growth, and increase profitability.

Ebusiness models fall into one of the four categories:

(1) business-to-business (2) business-to-consumer (3) consumer-to-business, (4) consumer-to-consumer

There are three phases of CRM

(1) reporting (2) analyzing (3) predicting.

PERT chart

A graphical network model that depicts a project's tasks and the relationships between them.

Dependency

A logical relationship that exists between the project tasks, or between a project task and a milestone.

What is wireless fidelity?

A means of linking computers using infrared or radio signals

Which of the following can a CRM system collect information from?

Accounting system Order fulfillment system Inventory system All of these are correct. A CRM system can collect information from accounting, order fulfillment, and inventory systems.

Five Common Characteristics of High-Quality Information

Accurate Complete Consistent Timely Unique

What is the maximum amount of data that can pass from one point to another in a unit of time?

Bandwidth

Where do organizations typically place firewalls?

Between the server and the Internet

Scalability

Customer growth

Phase 6: Implementation of SDCL

In the implementation phase, the organization places the system into production so users can begin to perform actual business operations with it

The Internet and globalization.

The pervasive nature of the Internet has made more people comfortable with outsourcing abroad as India, China, and the United States become virtual neighbors.

An output device is equipment used to see, hear, or otherwise accept the results of information processing requests.

Among output devices, printers and monitors are the most common; however, speakers and plotters (special printers that draw output on a page) are widely used (see Figure B3.7). In addition, output devices are responsible for converting computer-stored information into a form that can be understood.

Which of the following is one of Porter's three generic strategies?

Broad cost leadership

Which of the following best describes Web 2.0?

Collaboration, sharing, and free

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

Cookie

What is it called when the same data element has different values?

Data inconsistency

Information integrity issues occur when a system produces incorrect, inconsistent, or duplicate data.

Data integrity issues can cause managers to consider the system reports invalid and will make decisions based on other sources.

A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers using a database.

Data-driven capabilities are especially useful when a firm needs to offer large amounts of information, products, or services.

What is an interactive website that is kept constantly updated and relevant to the needs of its customers using a database?

Data-driven website

How do decision-making information systems work?

Decision-making information systems work by building models out of organizational information to lend insight into important business issues and opportunities.

What is the logical relationship that exists between the project tasks or between a project task and a milestone?

Dependency is the logical relationship that exists between the project tasks or between a project task and a milestone.

What is a geographic information system (GIS)?

Designed to work with information that can be shown on a map

What is the buying and selling of goods and services over the Internet?

ECOMMERCE

Occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match

Edge matching

Which of the following is not an example of explicit knowledge?

Employee opinion

What is encryption?

It scrambles information into an alternative form that requires a key or password to decrypt the information

What means a technology can travel with the user?

Mobile technologies

INCREASED FOCUS ON EBUSINESS

Mobility and wireless are the new focus in ebusiness, and some upcoming trends are mobile commerce, telematics, electronic tagging, and RFID.

What describes how products in a network increase in value to users as the number of users increases?

Network effect

What is the operating system that runs a network, steering information between computers and managing security and users?

Network operating system

Which of the following authentication methods is 100 percent accurate?

None of these are correct.

What is it called when a company uses organizations from developing countries to write code and develop systems?

Offshore outsourcing

RFID uses active or ________ tags in the form of chips or smart labels.

PASSIVE

Does not have a power source

Passive RFID tag

Sales

Performs the function of selling goods or services transnational data

What is the science of making intelligent trade-offs between time, cost, and scope?

Project management

A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

RFID accelerometer

What describes a format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format?

Real Simple Syndication

What is the ability to view all areas up and down the supply chain in real time?

Supply chain visibility

of the following infrastructures, which one focuses on grid computing, cloud computing, and virtualization?

Sustainable MIS infrastructure

Supporting the environment:

Sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

What is consolidation?

The aggregation of data from simple roll-ups to complex groupings of interrelated information.

Phase 3: Design of SDLC

The design phase establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation.

What are the three common tools to analyze competitive intelligence?

The five forces model ( for evaluating industry attractiveness) The three generic strategies ( for choosing a business focus) Value chain analysis ( for executing business strategies)

Why do relational databases use primary keys and foreign keys?

To create logical relationships

Fuzzy logic is

a mathematical method of handling imprecise or subjective information.

Through the use of virtualization,

computers can run multiple operating systems along with multiple software applications—all at the same time.

Product __________________ occurs when a company develops unique differences in its products with the intent to influence demand.

differentaion

Information management.

examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively

Object-oriented languages

group data and corresponding processes into objects.

Which of the following is the key element supply chain management manages?

information

Pirated software

is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Packet-switching

occurs when the sending computer divides a message into a number of efficiently sized units of data called packets, each of which contains the address of the destination computer.

Cloud computing offers new ways to

store, access, process, and analyze information and connect people and resources from any location in the world where an Internet connection is available.

An embedded operating system is used in computer appliances and special-purpose applications,

such as an automobile, ATM, or media player and are used for a single purpose. An iPod has a single-purpose embedded operating system.

A primary key is a field (or group of fields)

that uniquely identifies a given record in a table. Primary keys are a critical piece of a relational database because they provide a way of distinguishing each record in a table; EX NAME OF COLUMN OR ROLL

Fault tolerance is

the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service.

A worldwide database:

the ability for databases to be distributed and accessed from anywhere.

Conversion is

the process of transferring information from a legacy system to a new system.

What is the ease with which people perform transactions and/or find information?

useability

Drill-down enables

users to view details, and details of details, of information. This is the reverse of consolidation; a user can view regional sales data and then drill down all the way to each sales representative's data at each office. Drill-down capability lets managers view monthly, weekly, daily, or even hourly information.

Automatic vehicle location (AVL)

uses GPS tracking to track vehicles. AVL systems use a GPS receiver in the vehicle that links to a control center.

scrum methodology,

uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal

dynamic scaling,

which means the MIS infrastructure can be automatically scaled up or down based on needed requirements.

Network interface layer

—places data packets on the network for transmission.

Which project management methodology uses prototyping as an essential part of the analysis phase?

RAD methodology uses prototyping as an essential part of the analysis phase.

INFORMATION TYPE:

TRANSACTIONAL AND ANALYTICAL

PACE OF TECHNOLOGICAL INNOVATION IS INCREASING

Technology is advancing at a phenomenal pace. Medical knowledge is doubling every eight year

MANAGING CONSUMER TRUST

Trust in the ebusiness exchange deserves special attention. The physical separation of buyer and seller, the physical separation of buyer and merchandise, and customer perceptions about the risk of doing business online provide unique challenges. Internet marketers must develop a trustworthy relationship to make that initial sale and generate customer loyalty. A few ways to build trust when working online include being accessible and available to communicate in person with your customers; using customers' testimonials that link to your client website or to provide their contact information; accepting legitimate forms of payment such as credit cards.

Which of the following is a characteristic of information?

Type Quality Timeliness All of these +

In the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?

Upper right-hand corner

Mapping quantities.

Users can map quantities to find out where the most or least of a feature may be. For example, someone interested in opening a specialty coffee shop can determine how many others are already in the area, and city planners can determine where to build more parks.11

List three sustainable MIS infrastructure components

Virtualizaition Grid Computing Cloud Computing

Which website metric measures the count of the number of people who visit a site, click on an ad, and are taken to the site of the advertiser?

Click-through

Community Cloud

Community cloud serves a specific community with common business models, security requirements, and compliance considerations. Community clouds are emerging in highly regulated industries such as financial services and pharmaceutical companies.

WAYS TO DECREASE RIVALRY AMONG EXISTING COMPETITORS

Companies can use differentiation to reduce rivalry. For example, while many companies sell books and videos on the Internet, Amazon differentiates itself by using customer profiling. When a customer visits Amazon.com repeatedly, Amazon begins to offer products tailored to that particular customer based on his or her profile. In this way, Amazon has reduced its rivals' power by offering its customers a differentiated service.

____________ is the assurance that messages and information remain available only to those authorized to view them.

Confidentiality

Which of the following implies that aggregate or summary information is in agreement with detailed information?

Consistency

Digital dashboards offer the following capabilities:

Consolidation Drill-Down Slice-and-Dice

What are the technologies available to help prevent and build resistance to attacks?

Content filtering, encryption, firewalls

Which of the following is not one of Porter's Five Forces?

Manager power

EMAIL An Internet service provider (ISP) is

a company that provides access to the Internet for a monthly fee. Major ISPs in the United States include AOL, AT&T, Comcast, Earthlink, and Netzero, as well as thousands of local ISPs including regional telephone companies.

business model is

a plan that details how a company creates, delivers, and generates revenue

ebusiness model is

a plan that details how a company creates, delivers, and generates revenues on the Internet.

Typosquatting is

a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Benchmarking is

a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance.

Reliability (or accuracy) ensures

a system is functioning correctly and providing accurate information.

genetic algorithm is

an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. A genetic algorithm is essentially an optimizing system: It finds the combination of inputs that gives the best outputs. investment companies in trading decisions

legacy system is

an old system that is fast approaching or beyond the end of its useful life within an organization.

Cyberwar is

an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.

The ALU responds to the control unit

and does whatever it dictates, performing either arithmetic or logic operations.

Intangible benefits are

difficult to quantify or measure

An infographic (or information graphic)

displays information graphically so it can be more easily understood. Infographics cut straight to the point by taking complex information and presenting it in a simple visual format.

Tangible benefits are Intangible benefits are difficult to quantify or measure

easy to quantify and typically measured to determine the success or failure of a project.

Onshore outsourcing—

engaging another company within the same country for services.

Transborder data flows (TDF)

occur when business data flows across international boundaries over the telecommunications networks of global information systems.

sustaining technology, on the other hand,

produces an improved product customers are eager to buy, such as a faster car or larger hard drive.

A personal area network (PAN)

provides communication for devices owned by a single user that work over a short distance. PANs are used to transfer files, including email, calendar appointments, digital photos, and music.

Web browsers,

such as Internet Explorer or Mozilla's Firefox, allow users to access the WWW.

Primary storage is the computer's main memory,

which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU.

Reliability

99% accurate

A bit is the smallest element of data and has a value of which of the following?

0 or 1

Availability

24/7

What is a graphical network model that depicts a project's tasks and the relationships between those tasks?

A PERT chart is a graphical network model that depicts a project's tasks and the relationships between those tasks.

Which of the below represents information?

Data converted into a meaningful and useful context

Historical analysis:

Historical events are studied to anticipate the outcome of current developments.

What describes "what you see is what you get" (WYSIWYG) tools?

Mashup editors

CPU speed is usually quoted in megahertz and gigahertz.

Megahertz (MHz) is the number of millions of CPU cycles per second. Gigahertz (GHz) is the number of billions of CPU cycles per second.

Maintainability

Multiple currencies

A ___________________ is an exact copy of a system's information.

backup

Wi-Fi infrastructure

includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal.

Analytical ____________ encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks.

information

database maintains

information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

Infographics (information graphics) displays

information graphically so it can be easily understood. Infographics can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time.

A relational database model stores

information in the form of logically related two-dimensional tables. A relational database management system allows users to create, read, update, and delete data in a relational database. Although the hierarchical and network models are important, this text focuses only on the relational database model.

MULTIDIMENSIONAL ANALYSIS AND DATA MINING

information is multidimensional, meaning it contains layers of columns and rows. For this reason, most data warehouses and data marts are multidimensional databases. A dimension is a particular attribute of information. Each layer in a data warehouse or data mart represents information according to an additional dimension. A cube is the common term for the representation of multidimensional information.

Source code contains

instructions written by a programmer specifying the actions to be performed by computer software.

Intellectual property is

intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

Enterprise resource planning (ERP)

integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations.

WAYS TO REDUCE BUYER POWER

switching costs loyalty programs

Encryption scrambles information

into an alternative form that requires a key or password to decrypt. If there were a security breach and the stolen information were encrypted, the thief would be unable to read it.

Process modeling

involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.

Customer relationship management (CRM)

involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.

The implementation phase in the SDLC __________________________________.

involves placing the system into production so users can begin to perform actual business operations with the system

Management information systems (MIS)

is a business function which moves information about people, products and processes across the company to facilitate decision making and problem solving

PEER-TO-PEER NETWORKS

is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server Peer-to-peer computing enables immediate interaction among people and computer systems.1

Business strategy

is a leadership plan that achieves a specific set of goals or objectives EX: decreasing costs, attracting new customers, increasing sales, increasing customer loyalty, entering new markets and developing new products or services

Information governance

is a method or system of government for information management or control.

disruptive technology

is a new way of doing things that initially does not meet the needs of existing customers. Disruptive technologies tend to open new markets and destroy old ones.

A global positioning system (GPS)

is a satellite-based navigation system providing extremely accurate position, time, and speed information. GPS uses 24 global satellites that orbit Earth, sending signals to a receiver that can communicate with three or four satellites at a time.

A collaboration system

is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.

Online analytical processing (OLAP)

is the manipulation of information to create business intelligence in support of strategic decision making.

Structured decisions are

made frequently and are almost repetitive in nature; they affect short-term business strategies. Reordering inventory and creating the employee staffing and weekly production schedules are examples of routine structured decisions.

Destructive agents are

malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

Supply chain ____________ involves managing information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability.

management

Multi-tenancy in the cloud means

means that a single instance of a system serves multiple customers. In the cloud, each customer is called a tenant and multiple tenants can access the same system. Multi-tenancy helps to reduce operational costs associated with implementing large systems as the costs are dispersed across many tenants as opposed to single-tenancy,

Effectiveness MIS metrics

measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates.

Efficiency MIS metrics

measure the performance of MIS itself, such as throughput, transaction speed, and system availability.

cloud computing is a

model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

An open system consists

of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system.

Physical security is

tangible protection such as alarms, guards, fireproof doors, fences, and vaults.

Second is a structured query language (SQL)

that asks users to write lines of code to answer questions against a database.

Digital Darwinism implies

that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

Cryptography is the science

that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

Integration of legacy devices:

the ability to use current devices such as iPhones, laptops, and so on, as credit cards, tickets, and reservations tools.

benchmarks,

or baseline values the system seeks to attain.

A foreign key in the relational database model is a ___________ key of one table that appears as an attribute in another table.

primary

A requirements definition document

prioritizes all of the business requirements by order of importance to the company.

A business __________ is a standardized set of activities that accomplish a specific task.

process

Information cleansing or scrubbing is a

process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.

Supply chain measurements can cover many areas including

procurement, production, distribution, warehousing, inventory, transportation, and customer service. However, a good performance in one part of the supply chain is not sufficient. A supply chain is only as strong as its weakest link. The solution is to measure all key areas of the supply chain.

The World Wide Web (WWW)

provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.

acceptable use policy (AUP)

requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

Kill Switch

A trigger that enables a project manager to close the project before completion

Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on item location with little or no manual intervention

Asset tracking

Decision support systems (DSSs) model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.

DSSs enable high-level managers to examine and manipulate large amounts of detailed data from different internal and external sources. Analyzing complex relationships among thousands or even millions of data items to discover patterns, trends, and exception conditions is one of the key uses associated with a DSS.

How frequently should a large organization that deals with large volumes of critical information back up?

Daily

Solution Generation

Detail every solution possible, including ideas that seem farfetched.

Which is not one of the three primary information security areas?

Detection and resistance

Which phase of the SDLC takes all the detailed design documents from the design phase and transforms them into the actual system?

Development phase

A worldwide gap giving advantage to those with access to technology.

Digital Divide

Which of the follow represents a trait of disruptive technology?

Enters the marketplace at the low end Is a new way of doing things that initially doesn't meet the needs of existing customers Tends to open new markets and destroy old ones All of these are correct.

What in the relational database model is a person, place, thing, transaction, or event about which information is stored?

Entity

The establishment of and adherence to well-defined rules and policies will help organizations create an ethical corporate culture. These policies include:

Ethical computer use policy. Information privacy policy. Acceptable use policy. Email privacy policy. Social media policy. Workplace monitoring policy.

Project assumptions

Factors considered to be true, real, or certain without proof or demonstration.

Mapping densities.

GIS can map population and event densities based on a standard area unit, such as square miles, making it easy to see distributions and concentrations. Police can map crime incidents to determine where additional patrolling is required, and stores can map customer orders to identify ideal delivery routes.

What is designed to work with information that can be shown on a map?

Geographic information system (GIS)

Finding what is nearby.

Given a specific location, the GIS finds sources within a defined radius. These might be entertainme`nt venues, medical facilities, restaurants, or gas stations. Users can also use GIS to locate vendors that sell a specific item they want and get the results as a map of the surrounding area or an address.

A methodology is a

set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges. Firms use a methodology to manage the deployment of technology with work plans, requirements documents, and test plans, for instance. A formal methodology can include coding standards, code libraries, development practices, and much more.

Artificial intelligence (AI)

simulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence.

TIME IS BECOMING ONE OF THE WORLD'S MOST PRECIOUS COMMODITIES

In the United States, workers today spend around 10 percent more time on the job than they did a decade ago. European executives and nonunionized workers face the same trend. This high-pressure environment is increasing the need for any product or service that saves time or simplifies life.

OUTSOURCING BENEFITS The many benefits associated with outsourcing include:

Increased quality and efficiency of business processes. Reduced operating expenses for head count and exposure to risk for large capital investments. Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies. Increased flexibility for faster response to market changes and less time to market for new products or services.

What measures the number of people a firm can communicate with all over the world?

Information reach

In countries such as Burma, Libya, North Korea, Syria, and the countries of Central Asia and the Caucasus,

Internet access is either banned or subject to tight limitations through government-controlled ISPs. These countries face a lose-lose struggle against the information age. By denying or limiting Internet access, they stymie a major engine of economic growth.

A restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.

Intranet

Which of the following does a database maintain information on?

Inventory Transactions Employees All of these are correct. A database maintains information on inventory, transactions, and employees.

Coaxial cable is cable that can carry a wide range of frequencies with low signal loss.

It consists of a metallic shield with a single wire placed along the center of a shield and isolated from the shield by an insulator. Coaxial cable is similar to that used for cable television. This type of cable is referred to as coaxial because it contains one copper wire (or physical data channel) that carries the signal and is surrounded by another concentric physical channel consisting of a wire mesh.

Which of the following key terms represents applications that use location information to provide a service?

Location-based services

________________________includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets.

MIS infrastructure

Software Problems Are Business Problems

MIS project failures can cost companies financially and even ruin business reputations. The primary reasons for project failure are: Unclear or missing business requirements. Skipping SDLC phases. Failure to manage project scope. Failure to manage project plan. Changing technology.

Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry.

Managers use transactional information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry.

FAILURE TO MANAGE PROJECT PLAN

Managing the project plan is one of the biggest challenges during systems development. The project plan is the road map the organization follows during the development of the system. Developing the initial project plan is the easiest part of the project manager's job. Managing and revising the project plan is the hard part. The project plan is a living document since it changes almost daily on any project. Failing to monitor, revise, and update the project plan can lead to project failure.

virus is

software written with malicious intent to cause annoyance or damage.

Which of the below is not one of Porter's Five Forces?

Threat of managers

What is the primary purpose of business process reengineering?

To make all business processes best-in-class

Trend monitoring:

Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers.

3. Which of the following authentication methods is 100 percent accurate?

XX

A ________ is the common term for the representation of multidimensional information.

cube

Cybervandalism is

the electronic defacing of an existing website.

IT infrastructure—

the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.

Tacit knowledge is

the knowledge contained in people's heads.

Analytics is

the science of fact-based decision making.

Workplace MIS monitoring

tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

Routing information.

Once users have an idea where they want to go, GIS can provide directions to get there using either a map or step-by-step instructions. Routing information can be especially helpful when combined with search services.

VIOLATIONS OF COPYRIGHT AND PLAGIARISM

Online collaboration makes plagiarism as easy as clicking a mouse. Unfortunately a great deal of copyrighted material tends to find its ways to blogs and wikis where many times blame cannot be traced to a single person. Clearly stated copyright and plagiarism policies are a must for all corporate blogs and wikis.

Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?

Only authorized individuals can access applications for which they are entitled. Only authorized individuals can gain access to the network. Individuals cannot understand or alter information while it is in transit. All of these are correct. All of these are reasons why businesses want to have the appropriate levels of authentication, access control, and encryption.

INFORMATION VANDALISM

Open source and sharing are both major advantages of Business 2.0, and ironically they are major challenges as well. Allowing anyone to edit anything opens the door for individuals to purposely damage, destroy, or vandalize website content. Wiki vandalism is a hot issue and for this reason wiki software can now store all versions of a web page, tracking updates and changes and ensuring the site can be restored to its original form if the site is vandalized.

Optical medium is a secondary storage medium for computers on which information is stored at extremely high density in the form of tiny pits. The presence or absence of pits is read by a tightly focused laser beam. Optical medium types include:

Optical medium is a secondary storage medium for computers on which information is stored at extremely high density in the form of tiny pits. The presence or absence of pits is read by a tightly focused laser beam. Optical medium types include:

The web accessibility initiative (WAI) brings together people from

industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities.

The second line of defense is

investing in technology to help secure information through authentication and authorization, prevention and resistance, and detection and response.

The design phase in the SDLC _____________________________________.

involves describing the desired features and operations of the system

Competitive advantage

is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

System thinking

is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

Real Simple Syndication (RSS)

is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.

Wired equivalent privacy (WEP)

is an encryption algorithm designed to protect wireless transmission data.

Digital paper (or electronic paper)

is any paper that is optimized for any type of digital printing. In some ways, digital paper is produced much like a sheet of paper. It comes from a pulp and the finished product has the flexibility to be rolled into scrolls of "paper." However, the major difference between paper produced from a tree and paper produced in a laboratory is that information on a digital paper sheet can be altered thousands of times and not degrade over time

User-contributed content (or user-generated content)

is created and updated by many users for many users. Websites such as Flickr, Wikipedia, and YouTube, for example, move control of online media from the hands of leaders to the hands of users.

A local area network (LAN)

is designed to connect a group of computers in proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources such as files, printers, games, or other applications. A LAN in turn often connects to other LANs, and to the Internet or wide area networks.

Business process reengineering (BPR)

is the analysis and redesign of workflow within and between enterprises.

An organization can choose from two integration methods.

The first is to create forward and backward integrations that link processes (and their underlying databases) in the value chain.

explicit knowledge consists

of anything that can be documented, archived, and codified, often with the help of IT. Examples of explicit knowledge are assets such as patents, trademarks, business plans, marketing research, and customer lists.

Passive RFID tags do not

have a power source, Passive RFID tags draw power from the RFID reader, which sends out electromagnetic waves that induce a current in the tag's antenna.

What is data mining?

he process of analyzing data to extract information not offered by the raw data alone

content management systems (CMS)

help companies manage the creation, storage, editing, and publication of their website content. CMSs are user-friendly; most include web-based publishing, search, navigation, and indexing to organize information; and they let users with little or no technical expertise make website changes.

First is a query-by-example (QBE) tool that

helps users graphically design the answer to a question against a database.

DBMS use three primary data models for organizing information—

hierarchical, network, and the relational database, the most prevalent.

Performance measures

how quickly a system performs a process or transaction. Performance is a key component of scalability as systems that can't scale suffer from performance issues.

Serviceability is

how quickly a third party can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability.

Scalability describes

how well a system can scale up, or adapt to the increased demands of growth. Anticipating expected, and unexpected, growth is key to building scalable systems that can support that development.

A sustainable MIS infrastructure _________________________.

identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

Hackers are experts

in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

"Always" might really mean "most of the time,"

in which case it should be made more explicit. For example, the statement "We always run reports A and B together" could be challenged with "In other words, there is never any circumstance where you would run A without B and B without A?" If you build a system with an "always" requirement, then you are actually building the system to never run report A without report B. If a user suddenly wants report B without report A, you will need to make significant system changes.

single-tenancy,

in which each customer or tenant must purchase and maintain an individual system. With a multi-tenancy cloud approach, the service provider only has one place to update its system. With a single-tenancy cloud approach, the service provider would have to update its system in every company where the software was running.

Random access memory (RAM) is the computer's primary working memory,

in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor's high-speed external data bus. RAM is volatile, meaning it must have constant power to function; its contents are lost when the computer's electric supply fails.

Global Enterprise Architectures

includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets. An organization must manage its global enterprise architecture to support its global business operations

Ediscovery (or electronic discovery)

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Information richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.

Information granularity

refers to the extent of detail within the information (fine and detailed or coarse and abstract).

A knowledge management system (KMS)

supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. KMS can distribute an organization's knowledge base by interconnecting people and digitally gathering their expertise.

Pay-per-click:

generates revenue each time a user clicks on a link to a retailer's website.

Pay-per-conversion:

generates revenue each time a website visitor is converted to a customer.

Which phase of the SDLC gathers business requirements?

Analysis

Gannt chart

A simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally.

What is a firewall expected to accomplish?

A firewall can examine messages, block messages, and detect computers communicating with the Internet without approval.

______________ helps an emergency response system track each vehicle and dispatch the one closest to the scene of the accident.

A global positioning system

________________ is a satellite-based navigation system that provides extremely accurate position, time, and speed information.

A global positioning system

Virtualization creates multiple "virtual" machines on a single computing device.

A good analogy is a computer printer. In the past you had to purchase a fax machine, copy machine, answering machine, and computer printer separately. This was expensive, required enough energy to run four separate machines, not to mention created additional amounts of ewaste. Today, you can buy a virtualized computer printer that functions as a fax machine, answering machine, and copy machine all on one physical machine, thereby reducing costs, power requirements, and ewaste.

A communication device is equipment used to send information and receive it from one location to another.

A telephone modem connects a computer to a phone line in order to access another computer. The computer works in terms of digital signals, while a standard telephone line works with analog signals. Each digital signal represents a bit (either 0 or 1). The modem must convert the digital signals of a computer into analog signals so they can be sent across the telephone line. At the other end, another modem translates the analog signals into digital signals, which can then be used by the other computer

What does enterprise resource planning integrate?

All departments and functions throughout an organization

Hypertext markup language (HTML) links documents,

allowing users to move from one to another simply by clicking on a hot spot or link.

Of the following infrastructures, which one focuses on backup, recovery, disaster recovery, and business continuity planning?

An information MIS infrastructure contains backup, recovery, disaster recovery, and business continuity planning.

security policies include defining the best practices for

Applications allowed to be placed on the corporate network, especially various file sharing applications (Kazaz), IM software, and entertainment or freeware created by unknown sources (iPhone applications). Corporate computer equipment used for personal reason on personal networks. Password creation and maintenance including minimum password length, characters to be included while choosing passwords, and frequency for password changes. Personal computer equipment allowed to connect to the corporate network. Virus protection including how often the system should be scanned and how frequently the software should be updated. This could also include if downloading attachments is allowed and practices for safe downloading from trusted and untrustworthy sources.

Cloud computing relies on the time frames when a system is operational. Which of the following agile MIS infrastructures does this represent?

Availability

Imagine improve graduation rates as a CSF for a college. The KPIs to measure this CSF can include:

Average grades by course and gender. Student dropout rates by gender and major. Average graduation rate by gender and major. Time spent in tutoring by gender and major.

Who breaks into other people's computer systems and just looks around or steals and destroys information?

Black-hat hacker

What is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants can be easily interconnected using a short-range wireless connection?

Bluetooth

________________ is a high-speed Internet connection that is always connected.

Broadband

Virtualization is essentially a form of consolidation that can benefit sustainable MIS infrastructures in a variety of ways, for example:

By increasing availability of applications that can give a higher level of performance depending on the hardware used. By increasing energy efficiency by requiring less hardware to run multiple systems or applications. By increasing hardware usability by running multiple operating systems on a single computer.

ALTERNATIVE ENERGY SOURCES

By the end of the decade, wind, geothermal, hydroelectric, solar, and other alternative energy sources will increase from their present level of 10 percent of all energy use to about 30 percent.

The science and art of making an illustrated map or chart

Cartography

What provides connectivity for portable and mobile applications, both personal and business?

Cellular phones and pagers

What is an organization performing when it asks questions such as "why was customer revenue so high?"

CRM analyzing technologies

What is CRM?

CRM is both a technology and a strategy. CRM is not just a technology but a strategy that an organization must embrace on an enterprise level.

What is an organization applying when it asks questions such as "which customers are at risk of leaving?"

CRM predicting technologies

What helps an organization identify its customers across applications?

CRM reporting technologies

Potential Business Impact for alternative energy sources

China, Asia, India, South America, and Russia are modernizing their economies, which increasingly use large amounts of energy. The cost of alternative energy sources is dropping with technical advances. This growing competition from other energy sources will help limit the price of oil. The imminent deregulation of the energy industry is expected to create a huge spurt of innovative entrepreneurship, fostering a wide variety of new energy sources. Oil will remain the world's most important energy resource. However, in two or three decades a declining reliance on oil will help reduce air and water pollution. By 2060, a costly but pollution-free hydrogen economy may become possible.

Which of the following refers to the use of resources and applications hosted remotely on the Internet?

Cloud computing

Organizations can follow a few different IT governance frameworks, including:

CoBIT ITIL COSO CMMI

Computer simulation:

Complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis.

Common reasons companies outsource include:

Core competencies. Financial savings. Rapid growth. The Internet and globalization.

CMMI:

Created by a group from government, industry, and Carnegie Mellon's Software Engineering Institute, the Capability Maturity Model Integration method (CMMI) is a process improvement approach that contains 22 process areas. It is divided into appraisal, evaluation, and structure. CMMI is particularly well-suited to organizations that need help with application development, life cycle issues, and improving the delivery of products throughout the life cycle.

_________________ are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.

Critical success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.

Which of the following is not one of the four primary information technology areas where businesses are focusing in the 21st century?

DBMS

Potential Business Impact for THE GLOBAL ECONOMY IS BECOMING MORE INTEGRATED

Demand for personnel in distant countries will increase the need for foreign-language training, employee incentives suited to other cultures, and many other aspects of performing business globally. The growth of ebusiness and the use of the Internet to shop globally for raw materials and supplies will reduce the cost of doing business. The Internet will continue to enable small companies to compete with worldwide giants with relatively little investment. Internet-based operations require sophisticated knowledge workers and thus people with the right technical skills will be heavily recruited over the next 15 years.

Critical Path

Estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.

Ethernet is a physical and data layer technology for LAN networking.

Ethernet is the most widely installed LAN access method, originally developed by Xerox and then developed further by Xerox, Digital Equipment Corporation, and Intel.

Solution Test

Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or a temporary fix?), and acceptability (can all participants form a consensus?).

Any organization processing personal data of a person living in the European Union must comply with these key principles as outlined in the directive; these state that the data must be:

Fairly and lawfully processed. Processed for limited purposes. Adequate, relevant, and not excessive. Accurate. Not kept longer than necessary. Processed in accordance with the data subject's rights. Not transferred to countries without adequate protection.

Which of the following is a common use for GIS?

Finding what is nearby Routing information Information alerts All of these are correct. All of the above are common uses for GIS.

The newest standard for wireless networking.

IEEE 802.11n

4.3 depicts the interrelationships between efficiency and effectiveness.

Ideally, a firm wants to operate in the upper right-hand corner of the graph, realizing both significant increases in efficiency and effectiveness. However, operating in the upper left-hand corner (minimal effectiveness with increased efficiency) or the lower right-hand corner (significant effectiveness with minimal efficiency) may be in line with an organization's particular strategies. In general, operating in the lower left-hand corner (minimal efficiency and minimal effectiveness) is not ideal for the operation of any organization.

What allows separate systems to communicate directly with each other?

Integration

ADHERING TO TAXATION RULES

Many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail-order companies, and online merchants. Yet the Internet marketplace remains mostly free of traditional forms of sales tax, partly because ecommerce law is vaguely defined and differs from state to state. For now, companies that operate online must obey a patchwork of rules about which customers are subject to sales tax on their purchases and which are not.

What is a wireless mobile content service that provides location-specific information to mobile users moving from location to location?

Location-based service (LBS)

Advances in CPU Design

Most CPUs are complex instruction set computer (CISC) chips, which is a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly. Reduced instruction set computer (RISC) chips limit the number of instructions the CPU can execute to increase processing speed. The idea of RISC is to reduce the instruction set to the bare minimum, emphasizing the instructions used most of the time and optimizing them for the fastest possible execution. An RISC processor runs faster than a CISC processor.

According to Christensen, companies may have placed too great an emphasis on satisfying customers' current ___________, while forgetting to adopt new disruptive technology that will meet customers' future needs.

NEEDS

The countries that are expected to have the largest increases in population between 2000 and 2050 are:

Palestinian Territory—217 percent increase. Niger—205 percent increase. Yemen—168 percent increase. Angola—162 percent increase. Democratic Republic of the Congo—161 percent increase. Uganda—133 percent increase.

What is not a reason for the growth of decision-making information systems?

People no longer have to worry about protecting the corporate asset of organizational information.

Private Cloud

Private cloud serves only one customer or organization and can be located on the customer's premises or off the customer's premises. A private cloud is the optimal solution for an organization such as the government that has high data security concerns and values information privacy. Private clouds are far more expensive than public clouds because costs are not shared across multiple customers.

What uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers?

RFID

Chipless RFID tags use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip. Examples of the innovative uses of RFID include:

RFID chips injected under the skin of animals using a syringe can help ranchers meet regulations, track wild animals for ecological studies, and return lost pets to their owners. Retail stores use RFID to track and monitor inventory. Hospitals and pharmaceutical companies meet government regulations and standards with RFID. Even local libraries are using RFID to control theft and speed up the checkout process. Car manufacturers install RFID antitheft systems. Toll roads use RFID to collect payments from passing cars. Hospitals track patients', doctors', and nurses' locations to facilitate emergency situations and ensure safety. RFID also tracks equipment location to ensure quick response times during an emergency. American Express and MasterCard use RFID for automatic payments. Walmart and other large retailers use RFID to maintain inventory, stop shoplifting, and speed customer checkout processes.

A standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private.

Security Sockets Layer (SSL)

Uses a battery to run the microchip's circuitry, but communicates by drawing power from the RFID reader

Semi-passive RFID tag

Decision making is a challenging task. Review the below lists and determine which employees typically do not make operational decisions.

Senior management

What is the study of the impact that changes in one (or more) part of the model have on other parts of the model?

Sensitivity analysis

What describes the collaborative activity of marking shared online content with key words or tags as a way to organize it for future navigation, filtering, or search?

Social tagging

Software upgrade occurs when the software vendor releases a new version of the software, making significant changes to the program. Application software can be distributed using one of the following methods:

Single user license—restricts the use of the software to one user at a time. Network user license—enables anyone on the network to install and use the software. Site license—enables any qualified users within the organization to install the software, regardless of whether the computer is on a network. Some employees might install the software on a home computer for working remotely. Application service provider license—specialty software paid for on a license basis or per-use basis or usage-based licensing.

which phase of the SDLC brings all the project pieces together into a special testing environment to eliminate errors and bugs?

Testing phase

Of the well-known project management methodologies, which is the oldest and the best known?

The waterfall methodology is the oldest and the best-known project management methodology.

A CPU contains two primary parts: control unit and arithmetic/logic unit.

The control unit interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions. The arithmetic-logic unit (ALU) performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers).

The balanced scorecard views the organization from four perspectives, and users should develop metrics, collect data, and analyze their business relative to each of these perspectives:

The learning and growth perspective. The internal business process perspective. The customer perspective. The financial perspective

What is the systems development life cycle?

The overall process for developing information systems, from planning and analysis through implementation and maintenance

Executive sponsor

The person or group who provides the financial resources for the project.

active RFID tags have their own transmitter and a power source (typically a battery).

The power source runs the microchip's circuitry and broadcasts a signal to the reader (similar to the way a cell phone transmits signals to a base station).

Phase 5: Testing of SDCL

The testing phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.

Potential Business Impact for PACE OF TECHNOLOGICAL INNOVATION IS INCREASING

The time to get products and services to market is being shortened by technology. Products must capture their market quickly before the competition can copy them. During the 1940s the average time to get a product to market was 40 weeks. Today, a product's entire life cycle seldom lasts 40 weeks. Industries will face tighter competition based on new technologies. Those who adopt state-of-the-art technology first will prosper, while those who ignore it eventually will fail.

What are the three primary variables (or triple constraints) in any project?

Time, cost, and scope are the three project variables.

Which of the below represents the three elements in the triple constraints of project management?

Time, resources, scope

Sending information alerts.

Users may want to be notified when information relevant to them becomes available near their location. A commuter might want to know that a section of the highway has traffic congestion, or a shopper might want to be notified when a favorite store is having a sale on a certain item.

Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet.

Virtual private network

_______________ creates multiple "virtual" machines on a single computing device.

Virtualization

The practice of tagging pavement with codes displaying where Wi-Fi access is available.

WAR CHALKING

Deliberately searching for Wi-Fi signals while driving by in a vehicle.

WAR DRIVING

The following metrics will help managers measure and manage their strategic initiatives:

Website metrics. Supply chain management (SCM) metrics. Customer relationship management (CRM) metrics. Business process reengineering (BPR) metrics. Enterprise resource planning (ERP) metrics.

What checks the impact of a change in a variable or assumption on the model?

What-if analysis

Which of the following is a common DSS analysis technique?

What-if analysis Sensitivity analysis Optimization analysis All of these are correct. All of the above are DSS analysis techniques.

A Gantt chart is

a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally. A Gantt chart works well for representing the project schedule. It also shows actual progress of tasks against the planned duration.

Which of the following is an example of a semistructured decision?

Who are our best customers by region? Who are our best customers by sales representative? Who are our best customers by product? All of these are correct. All of the above are examples of semistructured decisions.

What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?

WiMAX wireless broadband

An encryption algorithm designed to protect wireless transmission data.

Wired equivalent privacy (WEP)

Virtual reality is

a computer-simulated environment that can be a simulation of the real world or an imaginary world. Virtual reality is a fast-growing area of artificial intelligence that had its origins in efforts to build more natural, realistic, multisensory human-computer interfaces. Virtual reality enables telepresence where users can be anywhere in the world and use virtual reality systems to work alone or together at a remote site.

The RFID accelerometer is

a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.

Software engineering is

a disciplined approach for constructing information systems through the use of common methods, techniques, or tools. Software engineers use computer-aided software engineering (CASE) tools, which provide automated support for the development of the system.

A data center is

a facility used to house management information systems and associated components, such as telecommunications and storage systems. Data centers, sometimes referred to as server farms, consume power and require cooling and floor space while working to support business growth without disrupting normal business operations and the quality of service.

Governance is

a method or system of government for management or control.

A wireless MAN (WMAN) is

a metropolitan area network that uses radio signals to transmit and receive data.

Magnetic medium is

a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.

Autonomic computing is

a self-managing computing model named after, and patterned on, the human body's autonomic nervous system.

The oldest and the best known is the waterfall methodology,

a sequence of phases in which the output of each phase becomes the input for the next . In the SDLC, this means the steps are performed one at a time, in order, from planning through implementation and maintenance.

Control objects for information and related technology (COBIT) is

a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.

intelligent agent is

a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users. Intelligent agents usually have a graphical representation, such as "Sherlock Holmes" for an information search agent. One of the simplest examples of an intelligent agent is a shopping bot. Environmental scanning and competitive intelligence

The introduction of ebusiness brought

about disintermediation, which occurs when a business sells directly to the customer online and cuts out the intermediary

smartphones that offer more

advanced computing ability and connectivity than basic cell phones. They allow for web browsing, emailing, listening to music, watching video, computing, keeping track of contacts, sending text messages, and taking and sending photos. The Apple iPhone and RIM BlackBerry are examples of smartphones

Intermediaries are

agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.

Fourth-generation languages (4GL)

are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS "SMITH"."

Computer-aided software engineering (CASE) tools

are software suites that automate systems analysis, design, and development. Process models and data flow diagrams can provide the basis for the automatic generation of the system if they are developed using a CASE tool.

A network is a

communications system created by linking two or more devices and establishing a standard methodology by which they can communicate. provides two principle benefits: the ability to communicate and the ability to share.

A client is a

computer designed to request information from a server.

Bugs are

defects in the code of an information system.

Pay-per-call:

generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call.

Intrusion detection software (IDS)

features full-time monitoring tools that search for patterns in network traffic to identify intruders. IDS protects against suspicious network traffic and attempts to access files and data. If a suspicious event or unauthorized traffic is identified, the IDS will generate an alarm and can even be customized to shut down a particularly sensitive part of a network.

COPPA is a

federal law established in 1998 that applies to the collection of personal information from American children who are under 13 years of age. The act outlines what a website should include in its privacy policy, how to seek consent from a parent or guardian, and the responsibilities a website operator has to protect children's online safety and privacy.

The logical view of information (INCREASED FLEXIBILITY)

focuses on how individual users logically access information to meet their own particular business needs

Strategic decisions are

highly unstructured decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice. They are infrequent, extremely important, and typically related to long-term business strategy. Examples include the decision to enter a new market or even a new industry over, say, the next three years. In these types of decisions, managers rely on many sources of information, along with personal knowledge, to find solutions.

An information security plan details

how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan.

The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.

implementation

Edge matching (warping, rubber sheeting)

occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Edge matching is a critical component of creating a GIS database because map misalignments occur frequently for many reasons, including survey error and cartographic errors. GIS map automation links business assets to a centralized system where they can be tracked and monitored over time.

A universal resource locator (URL) is the address

of a file or resource on the web such as www.apple.com. A domain name identifies a URL address and in the previous example apple.com is the domain name.

Data mining is the process

of analyzing data to extract information not offered by the raw data alone.

A zombie is a

program that secretly takes over another computer for the purpose of launching attacks on other computers. Zombie attacks are almost impossible to trace back to the attacker.

A standard that specifies the format of data as well as the rules to be followed during transmission is called ____________.

protocol

Pharming reroutes

requests for legitimate websites to false websites. For example, if you were to type in the URL to your bank, pharming could redirect to a fake site that collects your information.

Top-level MIS employees

require administrator access, or unrestricted access to the entire system. Administrator access can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems.

The first line of defense is

securing intellectual capital by creating an information security plan detailing the various information security policies.

Energy consumption is

the amount of energy consumed by business processes and systems. Huge increases in technology use have greatly amplified energy consumption. The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by an automobile. Computer servers in the United States account for about 1 percent of the total energy needs of the country. Put in perspective, this is roughly equivalent to the energy consumption of Mississippi.

Ecommerce is

the buying and selling of goods and services over the Internet. Ecommerce refers only to online transactions.

Copyright is

the legal protection afforded an expression of an idea, such as a song, book, or video game.

Information privacy concerns

the legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent information about them is communicated to others. In essence, information privacy is about how personal information is collected and shared.

Granularity refers to

the level of detail in the model or the decision-making process. The greater the granularity, the deeper the level of detail or fineness of data

Supply chain management (SCM) is

the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.

Feasibility is

the measure of the tangible and intangible benefits of an information system

One of the most effective ways to limit

the power consumption and cooling requirements of a data center is to consolidate parts of the physical infrastructure, particularly by reducing the number of physical servers through virtualization. For this reason, virtualization is having a profound impact on data centers as the sheer number of servers a company requires to operate decreases, thereby boosting growth and performance while reducing environmental impac

Social networking is

the practice of expanding your business and/or social contacts by constructing a personal network Social networking sites provide two basic functions. The first is the ability to create and maintain a profile that serves as an online identity within the environment. The second is the ability to create connections between other people within the network.

Authorization is

the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.

A data element (or data field) is

the smallest or basic unit of information. Data elements can include a customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on.

Workflow includes

the tasks, activities, and responsibilities required to execute each step in a business process.

Augmented reality is

the viewing of the physical world with computer-generated layers of information added to it.

Tips for Reviewing Business Requirements When reviewing business requirements always look for the following words to help dramatically reduce ambiguity:

the words and or always never and boundry conditions

clickstream data

they can observe the exact pattern of a consumer's navigation through a site.

Implementing information security lines of defense

through people first and through technology second is the best way for an organization to protect its vital intellectual capital

Sustainable MIS disposal refers

to the safe disposal of MIS assets at the end of their life cycle. It ensures that ewaste does not end up in landfills causing environmental issues. A single computer contains more than 700 chemicals; some are toxic, such as mercury, lead, and cadmium. If a computer ends up in a landfill, the toxic substances it contains can leach into our land, water, and air.

Accessibility refers

to the varying levels that define what a user can access, view, or perform when operating a system.

Teleliving refers to

using information devices and the Internet to conduct all aspects of life seamlessly. This can include such things as shopping, working, learning, playing, healing, and praying. Even today, homes, autos, and work environments are wired into intelligent networks that interact with one another. Each year, 4 billion chips are embedded in everything from coffeemakers to Cadillacs.

What is a competitive advantage?

A product or service that an organization's customers value more highly than similar offerings from a competitor

Which of the following possible answers best describes asynchronous communications?

Communication, such as email, in which the message and the response do not occur at the same timecorrect

Potential Business Impact for TIME IS BECOMING ONE OF THE WORLD'S MOST PRECIOUS COMMODITIES

Companies must take an active role in helping their employees balance their time at work with their family lives and need for leisure. Stress-related problems affecting employee morale and wellness will continue to grow. As time for shopping continues to evaporate, Internet and mail-order marketers will have a growing advantage over traditional stores.

Potential Business Impact for digital paper

Digital paper is driving a new wave of innovation in the content distribution field. Paperlike displays will replace newspapers, magazines, and books since they will be almost as manageable as paper and allow display resolution close to print. The concept of a reusable paper product is an environmentally sound idea considering that a major portion of the world's paper goes to printing newspapers, magazines, pamphlets, and so on.

Select the four business continuity planning focus areas

Disaster recovery plan Business impact analysis emergency notification systems Technology recovery strategies

Usability

Easy to learn

Which of the following possible answers represents the Business 2.0 characteristic of collaboration inside the organization?

Explicit and tacit knowledge are found in collaboration inside the organization.

What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS

Explicit knowledge

An extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers.

Extranet

Project constraint

Factors that can limit options including budget, delivery dates, available skilled resources, and organizational policies.

Some common GIS uses include:

Finding what is nearby. Routing information. Sending information alerts. Mapping densities. Mapping quantities.

Damaging physical infrastructures:

Fire and flood can directly damage buildings, equipment, and systems, making structures unsafe and systems unusable. Law enforcement officers and firefighters may prohibit business professionals from entering a building, thereby restricting access to retrieve documents or equipment.

Support value activities

Firm infrastructure: includes the company format or departmental structures, environment, and systems. Human resource management: provides employee training, hiring, and compensation. Technology development: applies MIS to processes to add value. Procurement: purchases inputs such as raw materials, resources, equipment, and supplies.

There are a number of advantages to using the web to access company databases.

First, web browsers are much easier to use than directly accessing the database using a custom-query tool. Second, the web interface requires few or no changes to the database model. Finally, it costs less to add a web interface in front of a DBMS than to redesign and rebuild the system to support changes. Easy to manage content: Website owners can make changes without relying on MIS professionals; users can update a data-driven website with little or no training. Easy to store large amounts of data: Data-driven websites can keep large volumes of information organized. Website owners can use templates to implement changes for layouts, navigation, or website structure. This improves website reliability, scalability, and performance. Easy to eliminate human errors: Data-driven websites trap data-entry errors, eliminating inconsistencies while ensuring all information is entered correctly.

Static information includes fixed data incapable of change in the event of a user action.

For example, static websites supply only information that will not change until the content editor changes the information.

A coding process that assigns a digital map feature to an attribute that serves as a unique ID or classification

Geocoding

Management __________ systems is a business function, like accounting or human resources, that moves information about people, products, and processes across the company to facilitate decision making and problem solving.

INFORMATION

Phase 2: Analysis of SDLC

In the analysis phase the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.

PaaS helps companies minimize operational costs and increase productivity by providing all the following without up-front investment:

Increased security. Access to information anywhere and anytime. Centralized information management. Easy collaboration with partners, suppliers, and customers. Increased speed to market with significantly less cost.

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring it has the types of data/information required to function and grow effectively?

Information management

What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users?

Intelligent agent

How do we describe agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?

Intermediaries

What is one of the biggest pitfalls associated with real-time information?

It continually changes.

Goal-seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output.

It is the reverse of what-if and sensitivity analysis. Instead of observing how changes in a variable affect other variables, goal-seeking analysis sets a target value (a goal) for a variable and then repeatedly changes other variables until the target value is achieved. For example, goal-seeking analysis could determine how many customers must purchase a new product to increase gross profits to $5 million.

The control unit obtains instructions from the software.

It then interprets the instructions, decides which tasks other devices perform, and finally tells each device to perform the task.

What is a program that, when installed on a computer, records every keystroke and mouse click?

Key logger software

Accessibility

Logon ID

The terms ____________ and wireless are often used synonymously but actually denote two different technologies.

MOBILE

what is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures?

Network convergence

The primary forms of agile methodologies include:

Rapid prototyping or rapid application development methodology. Extreme programming methodology. Rational unified process (RUP) methodology. Scrum methodology.

INSTANT MESSAGING

Real-time communication occurs when a system updates information at the same rate it receives it.

Reviews and customer feedback on sellers is what type of user-generated content?

Reputation system

What is the most costly and intrusive form of authentication?

Something that is part of the user such as a fingerprint or voice signature

Marketing

Support sales by planning, pricing, and promoting goods and services transnational data

Phase 4: Development of SDLC

The development phase takes all the detailed design documents from the design phase and transforms them into the actual system. In this phase, the project transitions from preliminary designs to actual physical implementation.

What is it called if the sales information in your data is five years old?

The information is not timely

Utility software provides additional functionality to the operating system.

Utility software includes antivirus software, screen savers, and anti-spam software. Operating systems are customized by using the control panel, which is a Windows feature that provides options that set default values for the Windows operating system.

First mover advantage

a company can significantly increase its market share by being first with a new competitive advantage

A zombie farm is

a group of computers on which a hacker has planted zombie programs.

Boundary conditions are statements

about the line between true and false and do and do not. These statements may or may not be meant to include end points. For example, "We want to use method X when there are up to 10 pages, but method Y otherwise." If you were building this system, would you include page 10 in method X or in method Y? The answer to this question will vary causing an ambiguous business requirement.

The ________characteristic of high-quality information ensures that all the values are correct.

accuracy

Sign-off consists of the users'

actual signatures indicating they approve all of the business requirements.

A(n) _____________ is another term for an online journal that allows users to post their own comments, graphics, and video.

blog

THREE GENERIC STRATEGIES

broad cost leadership broad differentiation focused strategy. Broad strategies reach a large market segment, while focused strategies target a niche or unique market with either cost leadership or differentiation.

War driving is

deliberately searching for Wi-Fi signals while driving by in a vehicle.

Software as a Service (SaaS)

delivers applications over the cloud using a pay-per-use revenue model.

A smart card is a

device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. Smart cards can act as identification instruments, a form of digital cash, or a data storage device with the ability to store an entire medical record.

A cell phone is a

device for voice and data, communicating wirelessly through a collection of stationary ground-based sites called base stations, each of which is linked to its nearest neighbor stations. Base station coverage areas are about 10 square miles and are called cells,

Rapid application development (RAD) methodology (also called rapid prototyping)

emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process.

SOA is based on standards that

enable interoperability, business agility, and innovation to generate more business value for those who use these principles.

Business-critical integrity constraints

enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints. Consider a supplier of fresh produce to large grocery chains such as Kroger. The supplier might implement a business-critical integrity constraint stating that no product returns are accepted after 15 days past delivery. That would make sense because of the chance of spoilage of the produce. Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.

A forward integration takes information

entered into a given system and sends it automatically to all downstream systems and processes.

The TCP/IP suite of applications includes five protocols—

file transfer, simple mail transfer, telnet, hypertext transfer, and simple network management

Information security policies .

identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days

The National Institute of Standards and Technology (NIST)

introduced an advanced encryption standard (AES) designed to keep government information secure.

A metropolitan area network (MAN)

is a large computer network usually spanning a city.

Counterfeit software

is software that is manufactured to look like the real thing and sold as such.

Sensitivity analysis, a special case of what-if analysis,

is the study of the impact on other variables when one variable is changed repeatedly.

Extreme programming (XP) methodology,

like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete.

A wireless LAN (WLAN) is a

local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.

Prototyping is a

modern design approach where the designers and system users use an iterative approach to building the system.

Deperimeterization

occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security.

Spear phishing is a

phishing expedition in which the emails are carefully designed to target a particular person or organization.

Epolicies are

policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

Software customization modifies

software to meet specific user or business requirements.

Corrective maintenance makes

system changes to repair design flaws, coding errors, or implementation issues.

Semi-passive RFID

tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.

Web 1.0 is a term

to refer to the World Wide Web during its first few years of operation between 1991 and 2003.

Geoeconomic refers

to the effects of geography on the economic realities of international business activities

Search engine ranking evaluates

variables that search engines use to determine where a URL appears on the list of search results.

Production

Input>process>output

Supporting operations:

Information MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured.

CLIENT/SERVER NETWORKS

A client/server network is a model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients

The other wireless WAN technology is a satellite communication system.

A satellite is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area.

Potential Business Impact for THE GROWTH IN INFORMATION INDUSTRIES IS CREATING A KNOWLEDGE-DEPENDENT GLOBAL SOCIETY

Top managers must be computer-literate to retain their jobs and achieve success. Knowledge workers are generally higher paid and their proliferation is increasing overall prosperity. Entry-level and unskilled positions are requiring a growing level of education. Information now flows from front-office workers to higher management for analysis. Thus, in the future, fewer midlevel managers will be required, flattening the corporate pyramid. Downsizing, restructuring, reorganization, outsourcing, and layoffs will continue as typical large organizations struggle to reinvent and restructure themselves for greater flexibility.

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?

INCREASED CARBON EMISSIONS part 2

When left on continuously, a single desktop computer and monitor can consume at least 100 watts of power per hour. To generate that much energy 24 hours a day for a year would require approximately 714 pounds of coal. When that coal is burned, it releases on average 5 pounds of sulfur dioxide, 5 pounds of nitrogen oxides, and 1,852 pounds (that is almost a ton) of carbon dioxide.2

Trend projection:

When numerical data are available, a trend can be plotted to display changes through time and into the future.

Network signals are transmitted through all media as a type of waveform.

When transmitted through wire and cable, the signal is an electrical waveform. When transmitted through fiber-optic cable, the signal is a light wave, either visible or infrared light. When transmitted through the Earth's atmosphere, the signal can take the form of waves in the radio spectrum, including microwaves, infrared, or visible light.

Most WLANs use a

Wi-Fi infrastructure in which a wireless device, often a laptop, communicates through an access point or base station by means of, for instance, wireless fidelity.

What is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access?

WiMAX

Failover,

a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and high-cost method of backup and recovery.

A vulnerability is

a system weakness, such as a password that is never changed or a system left on while an employee goes to lunch, that can be exploited by a threat. Reliable systems ensure that vulnerabilities are kept at a minimum to reduce risk.

Electronic tagging—

a technique for identifying and tracking assets and individuals via technologies such as radio frequency identification and smart cards.

Digital rights management is

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Microblogging is

the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages.

(RFID interrogator) is

a A RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas (one on the tag and one on each reader), RFID application software, and a computer system or server

Geocoding in spatial databases is

a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.

Grid computing is

a collection of computers, often geographically dispersed, that are coordinated to solve a common problem. With grid computing a problem is broken into pieces and distributed to many machines, allowing faster processing than could occur with a single system (

semantic web as

a component of Web 3.0 that describes things in a way that computers can understand. The semantic web is not about links between web pages; rather it describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price).

Drive-by hacking is

a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Mobile commerce (m-commerce)—

the ability to purchase goods and services through a wireless Internet-enabled device.

"Never" might mean "rarely," in

which case it should be made more explicit. For example, the statement "We never run reports A and B in the same month" could be challenged with, "So that means that if I see that A has been run, I can be absolutely certain that no one will want to run B." Again, if you build a system that supports a "never" requirement then the system users can never perform that requirement. For example, the system would never allow a user to run reports A and B in the same month, no matter what the circumstances.

business continuity planning (BCP),

which details how a company recovers and restores critical business operations and systems after a disaster or extended disruption. BCP includes such factors as identifying critical systems, business processes, departments, and the maximum amount of time the business can continue to operate without functioning systems.

knowledge management (KM),

which involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. The primary objective of knowledge management is to be sure that a company's knowledge of facts, sources of information, and solutions are readily available to all employees whenever it is needed.

digital dashboard, which tracks key performance indicators (KPIs) and critical success factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs. Following is a list of potential features included in a dashboard designed for a manufacturing team:

which tracks key performance indicators (KPIs) and critical success factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs. Following is a list of potential features included in a dashboard designed for a manufacturing team: A hot list of key performance indicators, refreshed every 15 minutes. A running line graph of planned versus actual production for the past 24 hours. A table showing actual versus forecasted product prices and inventories. A list of outstanding alerts and their resolution status. A graph of stock market prices.

Adware is software that,

while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

Compliance is

the act of conforming, acquiescing, or yielding.

The central processing unit (CPU) (or microprocessor) is

the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together.

IP provides

the addressing and routing mechanism that acts as a postmaster.

Consolidation is

the aggregation of data from simple roll-ups to complex groupings of interrelated information. For example, data for different sales representatives can then be rolled up to an office level, then a state level, then a regional sales level.

The factor that significantly contributed to people's needs to use information systems to make decisions is:

the amount of information people must understand to make good decisions is increasing exponentially.

transaction processing system (TPS) is

the basic business system that serves the operational level (analysts) and assists in making structured decisions. The most common example of a TPS is an operational accounting system such as a payroll system or an order-entry system.

Information secrecy is

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

An access point (AP) is

the computer or network device that serves as an interface between devices and the network

Open technologies:

the design of websites and other software so they can be easily integrated and work together.

Information ethics govern

the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).

The Five Forces Model—Evaluating Industry Attractiveness

the following pressures that can hurt potential sales: Knowledgeable customers can force down prices by pitting rivals against each other.(buyer power) Influential suppliers can drive down profits by charging higher prices for supplies. (SUPPLIER POWER) Competition can steal customers. (RIVALRY AMONG EXISTING COMPETITORS) New market entrants can steal potential investment capital. (THREAT OF NEW ENTRANTS) Substitute products can steal customers. (THREAT OF SUBSTITUTE PRODUCTS OR SERVICES)

What-if analysis checks

the impact of a change in a variable or assumption on the model. For example, "What will happen to the supply chain if a hurricane in South Carolina reduces holding inventory from 30 percent to 10 percent?"

If your data states that a customer paid $1.5 million for shipping a letter from Ohio to Colorado, you could confidently conclude that ______________________.

the information is not accurate

The graphical user interface (GUI) is

the interface to an information system. GUI screen design is the ability to model the information system screens for an entire system using icons, buttons, menus, and submenus. Data models represent a formal way to express data relationships to a database management system (DBMS). Entity relationship diagrams document the relationships between entities in a database environment

SaaS offers a number of advantages;

the most obvious is tremendous cost savings. The software is priced on a per-use basis with no up-front costs, so companies get the immediate benefit of reducing capital expenditures. They also get the added benefits of scalability and flexibility to test new software on a rental basis.

Best practices are

the most successful solutions or problem-solving methods that have been developed by a specific organization or industry. Measuring MIS projects helps determine the best practices for an industry.

Data flow diagram (DFD) illustrates

the movement of information between external entities and the processes and data stores within the system

IEEE 802.11n (or Wireless-N) is

the newest standard for wireless networking. Compared with earlier standards such as 802.11b, Wireless-N offers faster speeds, more flexibility, and greater range.

War chalking is

the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.

Cloud fabric is

the primary reason cloud computing promotes all of the seven abilities, allowing a business to make its data and applications accessible, available, maintainable, portable, reliable, scalable, and usable.

Requirements management is

the process of managing changes to the business requirements throughout the project. Projects are typically dynamic in nature, and change should be expected and anticipated for successful project completion.

Incident management is

the process responsible for managing how incidents are identified and corrected.

Mutation is

the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome.

In-sourcing (in-house development) uses

the professional expertise within an organization to develop and maintain its information technology systems. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.

Business requirements are

the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort. A sample business requirement might state, "The CRM system must track all customer inquiries by product, region, and sales representative." The business requirement will state what the system must accomplish to be considered successful.

The four primary information technology areas where organizations are focusing are:

IT infrastructures Security Ebusiness Integration

What best describes an information MIS infrastructure?

Identifies where and how important information, such as customer records, is maintained

Solution Implementation

If the solution solves the problem, then the decisions made were correct. If not, then the decisions were incorrect and the process begins again.

which phase of the SDLC places the system into production so users can begin to perform actual business operations?

Implementation phase

Potential Business Impact for teleliving

In the future, people will move through a constant stream of information summoned at the touch of a finger. They will interact with life-size images, data, and text in homes and offices. The days of hunching over a computer will be gone. The virtual assistant (VA) will be a small program stored on a PC or portable device that monitors emails, faxes, messages, and phone calls. Virtual assistants will help individuals solve problems in the same way a real assistant would. In time, the VA will take over routine tasks such as writing a letter, retrieving a file, and making a phone call. Robotic salespeople will take on human appearances and have the ability to perform all tasks associated with a sales job.

Phase 7: Maintenance

In the maintenance phase, the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals. This phase continues for the life of the system because the system must change as the business evolves and its needs change, which means conducting constant monitoring, supporting the new system with frequent minor changes (for example, new reports or information capturing), and reviewing the system to be sure it is moving the organization toward its strategic goals.

There is always a risk to using low-quality information. What is a consequence of using low-quality information?

Inability to identify selling opportunities

Primary value activities

Inbound logistics: acquires raw materials and resources and distributes to manufacturing as required. Operations: transforms raw materials or inputs into goods and services. Outbound logistics: distributes goods and services to customers. Marketing and sales: promotes, prices, and sells products to customers. Service: Provides customer support after the sale of goods and services.

Which of the following is a benefit an organization can receive from outsourcing?

Increase technical abilities Financial savings Market agility All of these are correct. All of these are benefits an organization can receive from outsourcing.

All of the following are advantages of database-stored information, except:

Increased information redundancy

Customer relationship management involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention. How does CRM ultimately impact an organization?

Increases profitability

CoBIT:

Information Systems Audit and Control Association (ISACA) is a set of guidelines and supporting tools for IT governance that is accepted worldwide and generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives.

Which of the following represents business intelligence?

Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making

BUSINESS INTELLIGENCE (BI)

Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making EX: Lowest sales per week with the economic interest rates Best selling product by month compared to sports season and city team wins and losses.

What are the rules that enforce basic and fundamental information-based constraints? Data redundancy

Information integrity

INCREASED INFORMATION INTEGRITY (QUALITY)

Information integrity is a measure of the quality of information. Integrity constraints are rules that help ensure the quality of information. The database design needs to consider integrity constraints. The database and the DBMS ensures that users can never violate these constraints. There are two types of integrity constraints: (1) relational and (2) business critical.

Which of the following describes information technology monitoring?

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

The Four Primary Traits of the Value of Information

Information type Information timeliness Information quality Information governance

What are the four primary traits that help determine the value of information?

Information type, information timeliness, information quality, and information governancecorrect

Which of the following is a key challenge associated with Business 2.0?

Information vandalism, technology dependence, and violations of copyright are key challenges associated with Business 2.0.

What is the name for using the professional expertise within an organization to develop and maintain the organization's information technology systems?

Insourcing

The second integration method builds a central repository for a particular type of information.

Integrating Customer Information among Databases Users can create, update, and delete customer information only in the central customer information database. As users perform these tasks on the central customer information database, integrations automatically send the new and/or updated customer information to the other systems. The other systems limit users to read-only access of the customer information stored in them. Again, this method does not eliminate redundancy—but it does ensure consistency

A few of the more common financial ratios include:

Internal rate of return (IRR)—the rate at which the net present value of an investment equals zero. Return on investment (ROI)—indicates the earning power of a project and is measured by dividing the benefits of a project by the investment. Payback method—number of years to recoup the cost of an initiative based on projected annual net cash flow. Break-even analysis—determines the volume of business required to make a profit at the current prices charged for the products or services. For example, if a promotional mailing costs $1,000 and each item generates $50 in revenue, the company must generate 20 sales to break even and cover the cost of the mailing. The break-even point is the point at which revenues equal costs. The point is located by performing a break-even analysis. All sales over the break-even point produce profits; any drop in sales below that point will produce losses

What is the implementation phase in the SDLC?

Involves placing the system into production so users can begin to perform actual business operations with the system

Ethernet is one of the most popular LAN technologies for the following reasons:

Is easy to implement, manage, and maintain. Allows low-cost network implementations. Provides extensive flexibility for network installation. Guarantees interoperability of standards-compliant products, regardless of manufacturer.2

What clause is part of a typical email privacy policy?

It describes the legitimate grounds for reading someone's email.

Financial savings.

It is far cheaper to hire people in China and India than pay the required salaries for similar labor in the United States.

Which of the following is a challenge of outsourcing?

Length of contract Threat to competitive advantage Loss of confidentiality All of these are correct. All of the above are challenges of outsourcing.

___________provides the technical foundation for the public Internet as well as for large numbers of private networks.

TCP/IP

An organization that researches and institutes electrical standards for communications and other technologies.

The Institute of Electrical and Electronics Engineers (IEEE

What type of chart typically displays the critical path?

The PERT chart typically displays the critical path.

Potential Business Impact for autonomic computing

The complex IT infrastructures of the future will require more computer automation than ever before. Autonomic computing will be used in a variety of areas that include security, storage, network management, and new redundancy and fail-over capabilities. Autonomic computers will continuously seek out ways to optimize computing. In the autonomic environment, computers will monitor components and fine-tune workflows to achieve system performance goals. Autonomic computers will be able to "self-heal." In the event of a component failure, an autonomic computer will be able to diagnose the failure and develop a workaround that allows the computer to continue with its functions. Autonomic computers will be able to "self-protect." Protection for computing resources primarily takes the form of fighting off invasive viruses and security intrusion attempts.

________________ focuses on accessibility, availability, maintainability, portability, reliability, scalability, and usability.

Agile MIS infrastructure

Which of the following describes ETL? A process that transforms information using a common set of enterprise definitions

A process that loads information into a data warehouse A process that extracts information from internal and external databases All of these are correct. All of the above describe ETL.

Trend analysis:

A trend is examined to identify its nature, causes, speed of development, and potential impacts.

WAYS TO DECREASE SUPPLIER POWER

ALTERNATIVE PRODUCTS INCREASING THE SIZE OF THE BUYER GROUP

DEPARTMENTS IN COMPANIES

Accounting Finance Human Resources Marketing Operations Management Sales

The tradeoff for perfect information lies in accuracy versus completeness.

Accurate information means it is correct, while complete information means there are no blanks.

Has its own transmitter and a power source (typically a battery)

Active RFID tag

Supporting change:

Agile MIS Infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.

The threat of new entrants is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market.

An entry barrier is a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival.

What can an information systems model accomplish?

An information systems model can calculate risks, understand uncertainty, and manipulate time.

.Which phase of the SDLC analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system?

Analysis phase

hich is not a type of organizational information system?

Analysis processing system is not a type of organizational information systems.

What encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks?

Analytical information .

Instant messaging (IMing) is a service that enables instant or real-time communication between people. Businesses immediately saw what they could do:

Answer simple questions quickly and easily. Resolve questions or problems immediately. Transmit messages as fast as naturally flowing conversation. Easily hold simultaneous IM sessions with multiple people. Eliminate long-distance phone charges. Quickly identify which employees are at their computers.

Project deliverable

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

Networks are differentiated by the following:

Architecture—peer-to-peer, client/server. Topology—bus, star, ring, hybrid, wireless. Protocols—Ethernet, transmission control protocol/Internet protocol (TCP/IP). Media—coaxial, twisted-pair, fiber-optic.

Which of the following is a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action?

Balance scorecard

What is an online journal that allows users to post their comments, graphics, and video?

Blog

What type of B2C business model has T. J. Maxx implemented?

Brick-and-mortar business

Based on the examples of Porter's three generic strategies in your textbook, which of the following is Walmart following?

Broad cost leadership

In analyzing Neiman Marcus, which of Porter's three generic strategies would you determine that it was following?

Broad differentiation

COMPETITIVE SCOPES

Broad market and low cost: Walmart competes by offering a broad range of products at low prices. Its business strategy is to be the low-cost provider of goods for the cost-conscious consumer. Broad market and high cost: Neiman Marcus competes by offering a broad range of differentiated products at high prices. Its business strategy offers a variety of specialty and upscale products to affluent consumers. Narrow market and low cost: Payless competes by offering a specific product, shoes, at low prices. Its business strategy is to be the low-cost provider of shoes. Payless competes with Walmart, which also sells low-cost shoes, by offering a far bigger selection of sizes and styles. Narrow market and high cost: Tiffany & Co. competes by offering a differentiated product, jewelry, at high prices. Its business strategy allows it to be a high-cost provider of premier designer jewelry to affluent consumers.

What occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain?

Bullwhip effect

What is a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption?

Business continuity plan

INFORMATION QUALITY

Business decisions are only as good as the quality of the information used to make them. Information inconsistency occurs when the same data element has different values.

Which of the following is not part of Porter's three generic strategies?

Business process strategy

Which of the following forces is commonly reduced through the use of a loyalty program?

Buyer power To reduce buyer power, an organization must make it more attractive for customers to buy from them than from their competition. One of the best IT-based examples is the loyalty program that many organizations offer.

Value __________________ analysis is a highly useful tool in that it provides hard-and-fast numbers for evaluating the activities that add value to products and services.

CHAIN

The question "what is the total revenue by customer?" is an example of ___________________.

CRM reporting technologies Total revenue by customer is a report.

Three Phases of CRM

CRM reporting technologies help organizations identify their customers across other applications. CRM analysis technologies help organizations segment their customers into categories such as best and worst customers. CRM predicting technologies help organizations predict customer behavior, such as which customers are at risk of leaving.

Does not depend on a silicon microchip and uses plastic or conductive polymers instead of silicon-based microchips allowing it to be washed or exposed to water without damaging the chip

Chipless RFID tag

THE ECONOMY AND SOCIETY ARE DOMINATED BY TECHNOLOGY

Computers are becoming a part of our environment. Mundane commercial and service jobs, environmentally dangerous jobs, standard assembly jobs, and even the repair of inaccessible equipment such as space stations will be increasingly performed by robots. Artificial intelligence and expert systems will help most companies and government agencies assimilate data and solve problems beyond the range of today's computers including energy prospecting, automotive diagnostics, insurance underwriting, and law enforcement.

Which of the below represents a variable?

Data characteristic that stands for a value that changes or varies over time

This occurs when a system produces incorrect, inconsistent, or duplicate data.

Data integrity issues

________________ occur when a system produces incorrect, inconsistent, or duplicate data.

Data integrity issues

Which of the following is not a reason for low-quality information issues?

Data-entry personnel rarely try to save time by entering abbreviated information

Which of the following is an organizational result from an effective and efficient supply chain management system?

Decrease the power of its buyers Create entry barriers, thereby reducing the threat of new entrants Increase efficiencies while seeking a competitive advantage through cost leadership All of these are correct. All of these are results from an effective and efficient SCM system.

Effective and efficient supply chain management systems can enable an organization to:

Decrease the power of its buyers. Increase its own supplier power. Increase switching costs to reduce the threat of substitute products or services. Create entry barriers thereby reducing the threat of new entrants. Increase efficiencies while seeking a competitive advantage through cost leadership

Problem Identification

Define the problem as clearly and concisely as possible

Generally, an Internet use policy:

Describes the Internet services available to users. Defines the organization's position on the purpose of Internet access and what restrictions, if any, are placed on that access. Describes user responsibility for citing sources, properly handling offensive material, and protecting the organization's good name. States the ramifications if the policy is violated.

Which phase of the SDLC establishes descriptions of the desired features and operations of the system?

Design phase

What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?

Digital dashboard

The following technologies are changing our world, our future, and our lives.

Digital ink Digital paper Teleliving Alternative energy sources Autonomic computing

Potential Business Impact for digital ink

Digital ink has broad usage in many applications, from point-of-sale signs in retail stores, to next generation displays in mobile devices and PDAs, to thin, portable electronic books and newspapers. E Ink has collaborated with various companies like Lucent Technologies to produce reusable paper with digital ink. The ultimate dream of E Ink is RadioPaper, a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere. RadioPaper will be thin and flexible and could be used to create an electronic book or newspaper with real pages.

What is the detailed process for recovering information or a system in the event of a catastrophic disaster?

Disaster recovery plan is the detailed process for recovering information or a system in the event of a catastrophic disaster.

What is the innovator's dilemma?

Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders

Rapid growth.

Firms must get their products to market quickly and still be able to react to market changes. By taking advantage of outsourcing, an organization can acquire the resources required to speed up operations or scale to new demand levels.

This term is similar to taxonomy except that crowdsourcing determines the tags or key-word-based classification system.

Folksonomy

INCREASED FOCUS ON SECURITY

For businesses it is important to have the appropriate levels of authentication, access control, and encryption in place, which help to ensure (1) that only authorized individuals can gain access to the network, (2) that they have access to only those applications for which they are entitled, and (3) that they cannot understand or alter information while in transit.

Dynamic information includes data that change based on user actions.

For example, Dynamic information changes when a user requests information. A dynamic website changes information based on user requests such as movie ticket availability, airline prices, or restaurant reservations. Dynamic website information is stored in a dynamic catalog, or an area of a website that stores information about products in a database.

Metadata provides details about data.

For example, metadata for an image could include its size, resolution, and date created. Metadata about a text document could contain document length, data created, author's name, and summary. Each data element is given a description, such as Customer Name; metadata is provided for the type of data (text, numeric, alphanumeric, date, image, binary value) and descriptions of potential predefined values such as a certain area code; and finally the relationship is defined.

STORING DATA ELEMENTS IN ENTITIES AND ATTRIBUTES

For flexibility in supporting business operations, managers need to query or search for the answers to business questions such as which artist sold the most albums during a certain month. The relationships in the relational database model help managers extract this information. Figure 7.2 illustrates the primary concepts of the relational database model—entities, attributes, keys, and relationships

Links business assets to a centralized system where they can be tracked and monitored over time

GIS Map automation

The gates include for RUP

Gate one: inception. This phase ensures all stakeholders have a shared understanding of the proposed system and what it will do. Gate two: elaboration. This phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it. Gate three: construction. This phase includes building and developing the product. Gate four: transition. Primary questions answered in this phase address ownership of the system and training of key personnel.

Data Collection

Gather problem-related data, including who, what, where, why, and how. Be sure to gather facts not rumors or opinions about the problem.

Stores, views, and analyzes geographic data creating multidimensional charts or maps

Geographic information system (GIS)

Potential Business Impact for increases in population

Global agriculture will be required to supply as much food as has been produced during all of human history to meet human nutritional needs over the next 40 years. Developed nations will find that retirees will have to remain on the job to remain competitive and continue economic growth. Developed nations will begin to increase immigration limits.

global markets offer many opportunities yet are laced with significant challenges and complexities including cultural, political, and geoeconomic issues, such as: the 4 global IT business management areas

Global business strategies. Global enterprise architectures. Global information issues. Global systems development.

Potential Business Impact for population living longer

Global demand for products and services for the elderly will grow quickly in the coming decades. The cost of health care is destined to skyrocket. Pharmaceutical companies will be pushed for advanvances in geriatric medicine.

__________ refers to the level of detail in the model or the decision-making process.

Granularity

Hybrid Cloud

Hybrid cloud includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability. For example, a company might use a private cloud for critical applications that maintain sensitive data and a public cloud for nonsensitive data applications. The usage of both private and public clouds together is an example of a hybrid cloud. Cloud bursting is when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes.

Which of the following refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information?

INFORMATION RICHNESS

________ infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.

IT

OUTSOURCING CHALLENGES

Length of contract. Most companies look at outsourcing as a long-term solution with a time period of several years. Training and transferring resources around the globe is difficult and expensive, hence most companies pursuing offshore outsourcing contract for multiple years of service. A few of the challenges facing the length of the contract include: It can be difficult to break the contract. Forecasting business needs for the next several years is challenging and the contract might not meet future business needs. Re-creating an internal MIS department if the outsource provider fails is costly and challenging. Threat to competitive advantage. Many businesses view MIS as a competitive advantage and view outsourcing as a threat because the outsourcer could share the company's trade secrets. Loss of confidentiality. Information on pricing, products, sales, and customers can be a competitive asset and often critical for business success. Outsourcing could place confidential information in the wrong hands. Although confidentiality clauses contained in the contracts are supposed to protect the company, the potential risk and costs of a breach must be analyzed.

What is the ability to purchase goods and services through a wireless Internet-enabled device?

MOBILE COMMERCE

An ebusiness __________ is an approach to conducting electronic business by which a company can become a profitable business on the Internet.

MODEL

Common storage devices include:

Magnetic medium Optical medium

Human Resources

Maintains polices, procedures and plans for the effective management of employees. employee data

Which of the following is a reason why managerial decision making is challenging?

Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions, is a reason why managerial decision making is challenging.

INCREASED INFORMATION SECURITY

Managers must protect information, like any asset, from unauthorized users or misuse.

Operations Management

Manages the process of converting or transforming resources into goods or services production data

Core competencies.

Many companies have recently begun to consider outsourcing as a way to acquire best-practices and the business process expertise of highly skilled technology resources for a low cost. Technology is advancing at such an accelerated rate that companies often lack the technical resources required to keep current.

TECHNOLOGY DEPENDENCE

Many people today expect to be continuously connected, and their dependence on technology glues them to their web connections for everything from web conferencing for a university class or work project to making plans with friends for dinner. If a connection is down, how will they function? How long can people go without checking email, text messaging, or listening to free music on Pandora or watching on-demand television? As society becomes more technology-dependent, outages hold the potential to cause ever-greater havoc for people, businesses, and educational institutions.

CHANGING TECHNOLOGY

Many real-world projects have hundreds of business requirements, take years to complete, and cost millions of dollars. Gordon Moore, co-founder of Intel Corporation, observed in 1965 that chip density doubles every 18 months. This observation, known as Moore's law, simply means that memory sizes, processor power, and so on, all follow the same pattern and roughly double in capacity every 18 months. As Moore's law states, technology changes at an incredibly fast pace; therefore, it is possible to have to revise an entire project plan in the middle of a project as a result of a change in technology. Technology changes so fast that it is almost impossible to deliver an information system without feeling the pain of changing technology.

_____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.

Methodology

A(n) __________ is a standard measure to assess performance in a particular area.

Metric

What describes the practice of sending brief posts to a personal blog, either publicly or to a private group of subscribers who can read the posts as instant messages (IMs) or as text messages?

Microblogging

INCREASED ELECTRONIC WASTE

Moore's Law has made technological devices smaller, cheaper, and faster, allowing more people from all income levels to purchase computing equipment. This increased demand is causing numerous environmental issues.

Disrupting communications:

Most companies depend on voice and data communications for daily operational needs. Widespread communications outages, from either direct damage to the infrastructure or sudden spikes in usage related to an outside disaster, can be as devastating to some firms as shutting down the whole business.

Deploying an MIS infrastructure in the cloud forever changes the way an organization's MIS systems are developed, deployed, maintained, and managed.

Moving to the cloud is a fundamental shift from moving from a physical world to a logical world, making irrelevant the notion of which individual server applications or data reside on. As a result, organizations and MIS departments need to change the way they view systems and the new opportunities to find competitive advantages.

Neural networks analyze large quantities of information to establish patterns and characteristics in situations where the logic or rules are unknown.

Neural networks' many features include: Learning and adjusting to new circumstances on their own. Lending themselves to massive parallel processing. Functioning without complete or well-structured information. Coping with huge volumes of information with many dependent variables. Analyzing nonlinear relationships in information (they have been called fancy regression analysis systems).

Potential Business Impact for THE ECONOMY AND SOCIETY ARE DOMINATED BY TECHNOLOGY

New technologies provide dozens of new opportunities to create businesses and jobs. Automation will continue to decrease the cost of products and services, making it possible to reduce prices while improving profits. The Internet is expected to push prices of most products to the commodity level. The demand for scientists, engineers, and technicians will continue to grow.

In concert with these trends, a new series of business success factors and challenges has emerged that is helping to determine marketplace winners and losers:

Organization agility, often supported by a "plug and play" IT infrastructure (with a flexible and adaptable applications architecture). A focus on core competencies and processes. A redefinition of the value chain. Instantaneous business response. The ability to scale resources and infrastructure across geographic boundaries.

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

Outsourcin

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

Outsourcing

A __________ area network provides communication over a short distance that is intended for use with devices that are owned and operated by a single user.

PERSONAL

The Five Basic Supply Chain Activities

PLAN SOURCE MAKE DELIVER RETURN

What measures how quickly a system performs a certain process or transaction?

Performance

___________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.

Personalization

Which of the following represents the unauthorized use, duplication, distribution, or sale of copyrighted software?

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Which phase of the SDLC establishes a high-level plan of the intended project and determines project goals?

Planning phase

Which of the following is not a phase in the systems development life cycle?

Prediction phase

Which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services?

Primary value activities

What term represents the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

core business relationships and models are dramatically changing, including shifts from:

Product-centricity to customer-centricity. Mass production to mass customization. The value in material things to the value of knowledge and intelligence.

A network typically includes four things (besides the computers themselves):

Protocol—a set of communication rules to make sure that everyone speaks the same language. Network interface card (NIC)—card that plugs into the back (or side) of your computers and lets them send and receive messages from other computers. Cable—the medium to connect all of the computers. Hub (switch or router)—hardware to perform traffic control.

Public Cloud

Public cloud promotes massive, global, and industrywide applications offered to the general public. In a public cloud, customers are never required to provision, manage, upgrade, or replace hardware or software. Pricing is utility-style and customers pay only for the resources they use. A few great examples of public cloud computing include Amazon Web Services (AWS), Windows Azure, and Google Cloud Connect.

Blocking utilities:

Public utilities, such as the supply of electric power, water, and natural gas, can be interrupted for hours or days even in incidents that cause no direct damage to the physical infrastructure. Buildings are often uninhabitable and systems unable to function without public utilities.

Information __________ refers to the number of people a business can communicate with, on a global basis.

REACH

A transmitter/receiver that reads the contents of RFID tags in the area

RFID reader (RFID interrogator)

An electronic identification device that is made up of a chip and antenna

RFID tag

__________________ value activities include firm infrastructure, human resource management, technology development, and procurement.

SUPPORT

_____________ refers to how well a system can adapt to increased demands. A number of factors can create organizational growth including market, industry, and economy factors.

Scalability

Who finds hacking codes on the Internet and click-and-points their way into systems to cause damage or spread viruses?

Script kiddies

Authentication and authorization techniques fall into three categories; the most secure procedures combine all three:

Something the user knows, such as a user ID and password. Something the user has, such as a smart card or token. Something that is part of the user, such as a fingerprint or voice signature.

What ensures supply chain cohesion by automating the different activities of the supply chain?

Supply chain execution system

What is the term for the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability?

Supply chain management

According to PR Newswire, infographics gain the greatest competitive advantage when they have the following:

Survey results that are too hard to understand in text format. Statistical data that are not interesting for readers. Comparison research where the impact can be far more dramatic when presented visually. Messages for multilingual audiences.

Which of the below defines synchronous communications?

Synchronous communications are communications that occur at the same time such as IM or chat.

System software controls how the various technology tools work together along with the application software.

System software includes both operating system software and utility software.

SKIPPING SDLC PHASES

The first thing individuals tend to do when a project falls behind schedule is to start skipping phases in the SDLC. For example, if a project is three weeks behind in the development phase, the project manager might decide to cut testing down from six weeks to three weeks. It is critical that an organization perform all phases in the SDLC during every project. Skipping any of the phases is sure to lead to system failure.

COSO:

The framework developed by the Committee of Sponsoring Organizations (COSO) is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting. This is a more business-general framework that is less IT-specific.

IDENTIFYING LIMITED MARKET SEGMENTS

The main challenge of ebusiness is the lack of growth in some sectors due to product or service limitations. The online food sector has not grown in sales, in part because food products are perishable and consumers prefer to buy them at the supermarket as needed. Other sectors with limited ebusiness appeal include fragile or consumable goods and highly sensitive or confidential businesses such as government agencies.

INCREASED CARBON EMISSIONS

The major human-generated greenhouse gases, such as carbon emissions from energy use, are very likely responsible for the increases in climatic temperature over the past half a century. Additional temperature increases are projected over the next hundred years, with serious consequences for Earth's environment, if carbon emissions, including the carbon dioxide and carbon monoxide produced by business processes and systems, are not reduced.

UNCLEAR OR MISSING BUSINESS REQUIREMENTS

The most common reason systems fail is because the business requirements are either missing or incorrectly gathered during the analysis phase. The business requirements drive the entire system. If they are not accurate or complete, the system will not be successful.

Phase 1: Planning of SDLC

The planning phase establishes a high-level plan of the intended project and determines project goals. Planning is the first and most critical phase of any systems development effort, regardless of whether the effort is to develop a system that allows customers to order products online, determine the best logistical structure for warehouses around the world, or develop a strategic information alliance with another organization.

Protection and Electronic Document Act (PIPEDA).

The purpose of PIPEDA is to provide Canadians with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization. This is most important today, especially in the private sector, when information technology increasingly facilitates the collection and free flow of information.

The Triple Constraint: Changing One Changes All

The relationship among these variables is such that if any one changes, at least one other is likely to be affected. For example, moving up a project's finish date could mean either increasing costs to hire more staff or decreasing the scope to eliminate features or functions. Increasing a project's scope to include additional customer requests could extend the project's time to completion or increase the project's cost—or both—to accommodate the changes

The directive on the protection of personal data grants European Union members the following rights:

The right to know the source of personal data processing and the purposes of such processing. The right to access and/or rectify inaccuracies in one's own personal data. The right to disallow the use of personal data.

Knowledge

The skills, expertise, and experience, coupled with information and intelligence, that creates a person's intellectual resources. EX: Choosing not to fire an employee who is underperforming knowing that person is experiencing family problems. Listing products that are about to expire first on the menu or creating them as a daily special to move the product.

INFORMATION TIMELINESS

Timeliness is an aspect of information that depends on the situation. Real-time information means immediate, up-to-date information. Real-time systems provide real-time information in response to requests. The growing demand for real-time information stems from organizations' need to make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully. Information also needs to be timely in the sense that it meets employees' needs, but no more.

A data mart contains a subset of data warehouse information.

To distinguish between data warehouses and data marts, think of data warehouses as having a more organizational focus and data marts as having focused information subsets particular to the needs of a given business unit such as finance or production and operations.

Finance

Tracks strategic financial issues including money, banking credit, investments, and assetts monetary data

What encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks?

Transactional information

Reasons to Watch Trends Organizations anticipate, forecast, and assess future events using a variety of rational, scientific methods including:

Trend analysis Trend monitoring Trend projection Computer simulation Historical analysis

A wireless security protocol to protect Wi-Fi networks.

WI-FI PROCTECTED ACCESS (WPA)

____________ refers to any type of operation accomplished without the use of a hard-wired connection.

WIRELESS

Knowledge __________ are individuals valued for their ability to interpret and analyze information.

WORKERS

What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML?

WWW

The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free—is known as ________.

Web 2.0

Ewaste refers to

discarded, obsolete, or broken electronic devices. Ewaste includes CDs, DVDs, thumb drives, printer cartridges, cell phones, iPods, external hard drives, TVs, VCRs, DVD players, microwaves, and so on

A company should ask a few key questions when creating a global website:

Will the site require new navigational logic to accommodate cultural preferences? Will content be translated? If so, into how many languages? Will multilingual efforts be included in the main site or will it be a separate site, perhaps with a country-specific domain? Which country will the server be located in to support local user needs? What legal ramifications might occur by having the website targeted at a particular country, such as laws on competitive behaviors, treatment of children, or privacy?

Competitive click-fraud is

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

Nonrepudiation is

a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions. A nonrepudiation clause is typically contained in an acceptable use policy.

Sustainable MIS is

a critical part of corporate social responsibility, that is, companies' acknowledged responsibility to society. Building sustainable MIS infrastructures is a core initiative and critical success factor for socially responsible corporations.

A digital certificate is

a data file that identifies individuals or organizations online and is comparable to a digital signature.

A PERT (Program Evaluation and Review Technique) chart is

a graphical network model that depicts a project's tasks and the relationships between them. A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone. PERT charts define dependency between project tasks before those tasks are scheduled

A wide area network (WAN) spans

a large geographic area, such as a state, province, or country. WANs often connect multiple smaller networks, such as local area networks or metropolitan area networks. The world's most popular WAN is the Internet.

phishing expedition is

a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter his or her username, password, and sometimes credit card information.

mail bomb sends

a massive amount of email to a specific person or system that can cause that user's server to stop functioning.

The Internet is

a massive network that connects computers all over the world and allows them to communicate with one another.

Authentication is

a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user.

Latitude represents

a north/south measurement of position.

change agent is

a person or event that is the catalyst for implementing major changes for a system to meet business changes.

Vishing (or voice phishing) is

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

scripting language is

a programming method that provides for interactive modules to a website.

PMI defines

a project as a temporary activity a company undertakes to create a unique product, service, or result.

A geocoin,

a round coin-sized object, is uniquely numbered and hidden in geocache.

executive information system (EIS) is

a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight. These decisions do not have a right or wrong answer, only efficient and effective answers Also they get information from external sources

A metric is nothing more than

a standard measure to assess performance in a particular area. Metrics are at the heart of a good, customer-focused management system and any program directed at continuous improvement

A business process is

a standardized set of activities that accomplish a specific task, such as processing a customer's order. Business processes transform a set of inputs into a set of outputs—goods or services—for another person or process by using people and tools. Understanding business processes helps a manager envision how the entire company operates.

A mashup is

a website or web application that uses content from more than one source to create a completely new product or service. The term is typically used in the context of music; putting Jay-Z lyrics over a Radiohead song makes something old new. The web version of a mashup allows users to mix map data, photos, video, news feeds, blog entries, and so on to create content with a new purpose.

A wireless WAN (WWAN) is

a wide area network that uses radio signals to transmit and receive data. WWAN technologies can be divided into two categories: cellular communication systems and satellite communication systems.

Bluetooth is

a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.

Wi-Fi Protected Access (WPA),

a wireless security protocol to protect Wi-Fi networks. It is an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy (WEP), and provides more sophisticated data encryption and user authentication.

Asset tracking occurs when a company places

active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention. Asset tracking allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines.

Web conferencing, or a webinar,

blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants. Regardless of the type of hardware or software the attendees are running, every participant can see what is on anyone else's screen.

Worldwide Interoperability for Microwave Access (WiMAX), a communications technology

aimed at providing high-speed wireless data over metropolitan area networks. In many respects, WiMAX operates like Wi-Fi, only over greater distances and with higher bandwidths. A WiMAX tower serves as an access point and can connect to the Internet or another tower.

business impact analysis identifies

all critical business functions and the effect that a specific disaster may have upon them. A business impact analysis is primarily used to ensure a company has made the right decisions about the order of recovery priorities and strategies. For example, should the accounting department have its systems up and running before the sales and marketing departments? Will email be the first system for recovery to ensure employees can communicate with each other and outside stakeholders such as customers, suppliers, and partners? The business impact analysis is a key part of BCP as it details the order in which functional areas should be restored, ensuring the most critical are focused on first.

An incident record contains

all of the details of an incident.

Databases today scale to exceptional levels, (INCREASED SCALABILITY AND PERFORMANCE)

allowing all types of users and programs to perform information-processing and information-searching tasks.

Social bookmarking

allows users to share, organize, search, and manage bookmarks.

A neural network,

also called an artificial neural network, is a category of AI that attempts to emulate the way the human brain works. credit card companies checking for fraud

Teergrubing is

an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

Outsourcing is

an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. In some cases, the entire MIS department is outsourced, including planning and business analysis as well as the design, development, and maintenance of equipment and projects

Podcasting converts

an audio broadcast to a digital music player. Podcasts can increase marketing reach and build customer loyalty. Companies use podcasts as marketing communication channels discussing everything from corporate strategies to detailed product overviews.

Longitude represents

an east/west measurement of position.

An RFID tag is

an electronic identification device that is made up of a chip and antenna.

Information property is

an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

A backup is

an exact copy of a system's information.

A patent is

an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

A project manager is

an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget. The project manager is the person responsible for executing the entire project and defining the project scope that links the project to the organization's overall business goals.

A cloud fabric controller is

an individual who monitors and provisions cloud resources, similar to a server administrator at an individual company. Cloud fabric controllers provision resources, balance loads, manage servers, update systems, and ensure all environments are available and operating correctly.

Operating system software controls the application software

and manages how the hardware devices work together. When using Excel to create and print a graph, the operating system software controls the process, ensures that a printer is attached and has paper, and sends the graph to the printer along with instructions on how to print it.

Location-based services (LBS),

applications that use location information to provide a service.

The five common characteristics of quality information

are accuracy, completeness, consistency, uniqueness, and timeliness.

reintermediation, steps

are added to the value chain as new players find ways to add value to the business process.

Relational integrity constraints

are rules that enforce basic and fundamental information-based constraints. For example, a relational integrity constraint would not allow someone to create an order for a nonexistent customer, provide a markup percentage that was negative, or order zero pounds of raw materials from a supplier. A business rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer. Stating that merchandise returns are allowed within 10 days of purchase is an example of a business rule.

Critical success factors (CSFs)

are the crucial steps companies perform to achieve their goals and objectives and implement their strategies

Attributes (also called columns or fields)

are the data elements associated with an entity.

Key performance indicators (KPIs)

are the quantifiable metrics a company uses to evaluate progress toward critical success factors. KPIs are far more specific than CSFs. KPIs can focus on external and internal measurements.

__________ are baseline values the system seeks to attain.

benchmarks

Telematics—

blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations. The most notable example of telematics may be the Internet itself, since it depends on a number of computer networks connected globally through telecommunication devices.

Strategic Initiatives for Competitive Advantages

business process reengineering supply chain management customer relationship management enterprise resource planning

WAYS TO DECREASE THREAT OF SUBSTITUTE

by offering additional value through wider product distribution. Soft-drink manufacturers distribute their products through vending machines, gas stations, and convenience stores, increasing the availability of soft drinks relative to other beverages. Companies can also offer various add-on services, making the substitute product less of a threat. For example, iPhones include capabilities for games, videos, and music, making a traditional cell phone less of a substitute.

Information _____________ or scrubbing is the process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.

cleansing

Barnes & Noble is a good example of a business that has used the __________________ model.

click-and-mortar business

users connect to the cloud from their personal computers or portable devices using a

client, such as a web browser. To these individual users, the cloud appears as their personal application, device, or document. It is like storing all of your software and documents "in the cloud," and all you need is a device to access the cloud.

Collective intelligence is

collaborating and tapping into the core knowledge of all employees, partners, and customers.

Search engine optimization (SEO)

combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking

network is a

communications system created by linking two or more devices and establishing a standard methodology in which they can communicate

A data dictionary

compiles all of the metadata about the data elements in the data model. Looking at a data model along with reviewing the data dictionary provides tremendous insight into the database's functions, purpose, and business rules.

Model of a Typical Data Warehouse

compiles information from internal databases or transactional/operational databases and external databases through extraction, transformation, and loading (ETL), which is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse.

A server is a

computer dedicated to providing information in response to requests. A good way to understand this is when someone uses a web browser (this would be the client) to access a website (this would be a server that would respond with the web page being requested by the client).

Time bombs are

computer viruses that wait for a specific date before executing their instructions.

Expert systems are

computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. Typically, they include a knowledge base containing various accumulated experience and a set of rules for applying the knowledge base to each particular situation. The best-known systems play chess and assist in medical diagnosis.

iterative development

consists of a series of tiny projects. It has become the foundation of multiple agile methodologies.

Course management software

contains course information such as a syllabus and assignments and offers drop boxes for quizzes and homework along with a grade book.

Nearshore outsourcing—

contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

In this phase, the detailed user documentation is

created that highlights how to use the system and how to troubleshoot issues or problems.

A database management system (DBMS)

creates, reads, updates, and deletes data in a database while controlling access and security.

Successful companies operate ______________, integrating the operations of all departments.

cross-functionally

What is the overall management of the availability, usability, integrity, and security of company data called?

data governance

Information

data that have a particular meaning within a specific context. EX: best-selling product, best customer, worst selling product, and worst customer

Infrastructure as a Service (IaaS)

delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model. With IaaS the customer rents the hardware and provides its own custom applications or programs. IaaS customers save money by not having to spend a large amount of capital purchasing expensive servers, which is a great business advantage considering some servers cost more than $100,000.

The network effect

describes how products in a network increase in value to users as the number of users increases. The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on. For example, Wikipedia becomes more valuable to users as the number of its contributors increases.

Social tagging

describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.

Sustainable, or green, MIS

describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment.

Hotspots are

designated locations where Wi-Fi access points are publically available. Hotspots are found in places such as restaurants, airports, and hotels—places where business professionals tend to gather.

Adaptive computer devices are input devices

designed for special applications for use by people with different types of special needs. An example is a keyboard with tactile surfaces, which can be used by the visually impaired.

The Project Management Institute (PMI)

develops procedures and concepts necessary to support the profession of project management

Ebusiness includes

ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information. During Web 1.0, entrepreneurs began creating the first forms of ebusiness.

Interactivity measures advertising

effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement. Interactivity measures are a giant step forward for advertisers, since traditional advertising methods—newspapers, magazines, radio, and television—provide few ways to track effectiveness.

managerial level,

employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change. They us semi-structured decisions. Managerial decisions cover short- and medium-range plans, schedules, and budgets along with policies, procedures, and business objectives for the firm. They also allocate resources and monitor the performance of organizational sub units, including departments, divisions, process teams, project teams, and other work groups

operational level,

employees develop, control, and maintain core business activities required to run the day-to-day operations. Operational decisions are considered structured decisions, which arise in situations where established processes offer potential solutions.

Telecommunication systems

enable the transmission of data over public or private networks.

A wireless access point (WAP)

enables devices to connect to a wireless network to communicate with each other.

HIPAA was

enacted by the U.S. Congress in 1996. Provisions in HIPPA establish national standards for the electronic data interchange of health care-related transactions between health care providers, insurance plans, and employers. Embedded in these standards are rules for the handling and protection of personal health care information.

Transactional information

encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks. Organizations need to capture and store transactional information to perform operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.

Analytical information

encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks. Analytical information is useful when making important decisions such as whether the organization should build a new manufacturing plant or hire additional sales personnel. Analytical information makes it possible to do many things that previously were difficult to accomplish, such as spot business trends, prevent diseases, and fight crime.

A backward integration takes information

entered into a given system and sends it automatically to all upstream systems and processes.

___________ resource planning systems integrate all departments and functions throughout an organization into a single IT system.

enterprise

Data-mining tools use a variety of techniques to

find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making. Data-mining tools for data warehouses and data marts include query tools, reporting tools, multidimensional analysis tools, statistical tools, and intelligent agents.

Technology recovery strategies focus

focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements. A technology recovery strategy details the order of importance for recovering hardware, software, data centers, and networking (or connectivity).

An agile methodology aims

for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. Agile methodology is what it sounds like: fast and efficient, with lower costs and fewer features

The project plan is a

formal, approved document that manages and controls project execution. The project plan should include a description of the project scope, a list of activities, a schedule, time estimates, cost estimates, risk factors, resources, assignments, and responsibilities. In addition to these basic components, most project professionals also include contingency plans, review and communications strategies, and a kill switch—a trigger that enables a project manager to close the project before completion.

The project plan is a

formal, approved document that manages and controls the entire project.

Capacity planning determines

future environmental infrastructure requirements to ensure high-quality system performance. It is cheaper for a company to design and implement agile infrastructure that envisions growth requirements than to update all the equipment after the system is already operational. Planning for increases in capacity can ensure systems perform as expected. Waiting for a system to respond to requests is not productive.

A technology that consists of hardware, software, and data that provide location information for display on a multidimensional map is called a _________________.

geographic information system

Imagine an airline and shipping company that could plot routes with up-to-the second information about their location. In which category would this type of technology belong?

geographic information system.

Internet censorship is

government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

Through social engineering,

hackers use their social skills to trick people into revealing access credentials or other valuable information.

A firewall is

hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings. If they are missing, the firewall prevents the information from entering the network.

Online transaction processing (OLTP)

is the capture of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information. During OLTP, the organization must capture every detail of transactions and events. A

FirstGov.gov, the official U.S. gateway to all government information,

is the catalyst for a growing electronic government. Its powerful search engine and ever-growing collection of topical and customer-focused links connect users to millions of web pages, from the federal government, to local and tribal governments, to foreign nations around the world.

FACT

is the confirmation or validation of an event or object

Web 2.0 (or Business 2.0)

is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. Business 2.0 encourages user participation and the formation of communities that contribute to the content.

The systems development life cycle (SDLC)

is the overall process for developing information systems, from planning and analysis through implementation and maintenance. The SDLC is the foundation for all systems development methods, and hundreds of different activities are associated with each phase. These activities typically include determining budgets, gathering system requirements, and writing detailed user documentation.

Competitive Intellilgence

is the process of gathering information about the competitive environment, including competitor's plans, activities and products to improve a company's ability to succeed

Website name stealing

is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

Estimated time enroute (ETE)

is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.

Informing is accessing

large amounts of data from different management information systems.

DATA WAREHOUSING

logical collection of information—gathered from many different operational databases—that supports business analysis activities and decision-making tasks. The primary purpose of a data warehouse is to aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities. Therefore, while databases store the details of all transactions (for instance, the sale of a product) and events (hiring a new employee), data warehouses store that same information but in an aggregated form more suited to supporting decision-making tasks. Aggregation, in this instance, can include totals, counts, averages, and the like. Because of this sort of aggregation, data warehouses support only analytical processing.

Data models are

logical data structures that detail the relationships among data elements using graphics or pictures.

The _____-cost operator saves on expenses and passes the savings along to customers in the form of _______ prices.

low; low

The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.

maintenance

The cloud fabric is the software that

makes possible the benefits of cloud computing, such as multi-tenancy.

BUSINESS PROCESS REENGINEERING (BPR) AND ENTERPRISE RESOURCE PLANNING (ERP) METRICS The balanced scorecard is a

management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action. It provides feedback around both the internal business processes and external outcomes in order to continuously improve strategic performance and results. When fully deployed, the balanced scorecard transforms strategic planning from an academic exercise into the nerve center of an enterprise

strategic level,

managers develop overall business strategies, goals, and objectives as part of the company's strategic plan. They also monitor the strategic performance of the organization and its overall direction in the political, economic, and competitive business environment. They use highly unstrucutred decisions.

Social networking analysis (SNA)

maps group contacts (personal and professional) identifying who knows each other and who works together. In a company it can provide a vision of how employees work together. It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.

Wireless fidelity (Wi-Fi) is a

means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.

Information reach

measures the number of people a firm can communicate with all over the world. Buyers need information richness to make informed purchases, and sellers need information reach to properly market and differentiate themselves from the competition.

Streaming is a

method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred. Streaming is not limited to cellular usage; all wireless and even wired networks can take advantage of this method.

A(n) _____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.

methology

What is the ability to purchase goods and service through a wireless Internet-enabled device?

mobile business

Failback

occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

Information inconsistency

occurs when the same data element has different values.

Digital ink (or electronic ink)

refers to technology that digitally represents handwriting in its natural form

grid computing takes advantage

of this unused processing power by linking thousands of individual computers around the world to create a "virtual supercomputer" that can process intensive tasks. Grid computing makes better use of MIS resources, allowing greater scalability as systems can easily grow to handle peaks and valleys in demand, become more cost efficient, and solve problems that would be impossible to tackle with a single computer

Interoperability is the capability

of two or more computer systems to share data and resources, even though they are made by different manufacturers. The most popular network protocols used are Ethernet and transmission control protocol/Internet protocol (TCP/IP).

Utility computing

offers a pay-per-use revenue model similar to a metered service such as gas or electricity. Many cloud computing service providers use utility computing cloud infrastructures.

What is the outsourcing option that includes the closest location and direct customer control?

onshore outsourcing

What refers to any source code made available freely for any third party to review or modify?

open source

A(n) _______________consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system.

open system

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

open system

asynchronous communications,

or communication such as email in which the message and the response do not occur at the same time.

Business 2.0 brought synchronous communication,

or communications that occur at the same time such as IM or chat.

Cache memory is a small unit of ultra-fast memory that is used to store recently accessed

or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM

Dumpster diving,

or looking through people's trash, is another way hackers obtain information.

market share,

or the proportion of the market that a firm captures. We calculate it by dividing the firm's sales by the total market sales for the entire industry.

Information redundancy is the duplication of data,

or the storage of the same data in multiple places. Redundant data can cause storage issues along with data integrity issues, making it difficult to determine which values are the most current or most accurate.

Videoconference allows

people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards. Point-to-point videoconferences connect two people, and multipoint conferences connect more than two people at multiple locations.

enterprise architect is a

person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business. Firms employ enterprise architects to help manage change and dynamically update MIS infrastructure

Phishing is a technique to gain

personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses. The messages appear to be genuine, with official-looking formats and logos, and typically ask for verification of important information such as passwords and account numbers, ostensibly for accounting or auditing purposes.

XP has four basic phases:

planning, designing, coding, and testing. Planning can include user interviews, meetings, and small releases. During design, functionality is not added until it is required or needed. During coding, the developers work together soliciting continuous feedback from users, eliminating the communication gap that generally exists between developers and customers. During testing, the test requirements are generated before any code is developed. Extreme programming saves time and produces successful projects by continuously reviewing and revamping needed and unneeded requirements.

__________________ value activities acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services.

primary

The rational unified process (RUP) methodology, owned by IBM,

provides a framework for breaking down the development of software into four "gates." Each gate consists of executable iterations of the software in development. A project stays in a gate waiting for the stakeholder's analysis, and then it either moves to the next gate or is cancelled. The gates include: Gate one: inception. This phase ensures all stakeholders have a shared understanding of the proposed system and what it will do. Gate two: elaboration. This phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it. Gate three: construction. This phase includes building and developing the product. Gate four: transition. Primary questions answered in this phase address ownership of the system and training of key personnel.

Transmission control protocol/Internet protocol (TCP/IP)

provides the technical foundation for the public Internet as well as for large numbers of private networks. The key achievement of TCP/IP is its flexibility with respect to lower-level protocols.

There are two primary tools available for retrieving information from a DBMS.

query-by-examply (QBE) structured query language (SQL)

DATA

raw facts that describe a particular phenomenon. EX: order date, amount sold, customer number, quantity ordered.

Accounting

records, measures, and reports monetary transactions monetary data

Information ___________ is the duplication of information or storage of the same information in multiple places.

redundancy

long tail,

referring to the tail of a typical sales curve.

Wireless, on the other hand,

refers to any type of operation accomplished without the use of a hard-wired connection.

INFORMATION GOVERNANCE

refers to the overall management of the availability, usability, integrity, and security of company data. A company that supports a data governance program has a defined a policy that specifies who is accountable for various portions or aspects of the data, including its accuracy, accessibility, consistency, timeliness, and completeness. The policy should clearly define the processes concerning how to store, archive, back up, and secure the data. In addition, the company should create a set of procedures identifying accessibility levels for employees. Then, the firm should deploy controls and procedures that enforce government regulations and compliance with mandates such as Sarbanes-Oxley.

Network transmission media

refers to the various types of media used to carry the signal between computers. When information is sent across the network, it is converted into electrical signals. These signals are generated as electromagnetic waves (analog signaling) or as a sequence of voltage pulses (digital signaling). The physical path that is used to carry a signal between a signal transmitter and a signal receiver is called the transmission media. The two types of transmission media are wire (guided) and wireless (unguided).

In ______________, steps are added to the value chain as new players find ways to add value to the business process.

reintermediation

The Institute of Electrical and Electronics Engineers (IEEE)

researches and institutes electrical standards for communication and other technologies.

An is an intelligent connecting device that examines each packet of date it receives and then decides which way to send it onward toward its destination

router

A wiki (the word is Hawaiian for quick) i

s a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required. While blogs have largely drawn on the creative and personal goals of individual authors, wikis are based on open collaboration with any and everybody.

Managers focusing on reengineering can instead use several criteria to identify opportunities: I

s the process broken? Is it feasible that reengineering of this process will succeed? Does it have a high impact on the agency's strategic direction? Does it significantly impact customer satisfaction? Is it antiquated? Does it fall far below best-in-class? Is it crucial for productivity improvement? Will savings from automation be clearly visible? Is the return on investment from implementation high and preferably immediate?

Antivirus software

scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware. Antivirus software must be frequently updated to protect against newly created viruses.

Taxonomy is the

scientific classification of organisms into groups based on similarities of structure or origin. Taxonomies are also used for indexing the content on the website into categories and subcategories of topics.

Tokens are

small electronic devices that change user passwords automatically. The user enters his or her user ID and token-displayed password to gain access to the network.

Discovery prototyping builds a

small-scale representation or working model of the system to ensure it meets the user and business requirements. The advantages of prototyping include: Prototyping encourages user participation. Prototypes evolve through iteration, which better supports change. Prototypes have a physical quality allowing users to see, touch, and experience the system as it is developed. Prototypes tend to detect errors earlier. Prototyping accelerates the phases of the SDLC, helping to ensure success.

A shopping bot is

software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability

source documents, the original transaction record.

source documents for a payroll system can include time sheets, wage rates, and employee benefit reports. Transformation includes common procedures such as creating, reading, updating, and deleting (commonly referred to as CRUD) employee records, along with calculating the payroll and summarizing benefits. The output includes cutting the paychecks and generating payroll reports.

Unsolicited email that plagues employees at all levels within an organization, from receptionist to CEO, and clogs email systems and siphons management information systems (MIS) resources away from legitimate business projects is called _____________.

spam

Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more

spatial data

What are the primary differences between types of backup/recovery media such as DVDs and redundant storage servers?

speed and associated costs.

A geographic information system (GIS)

stores, views, and analyzes geographic data creating, multidimensional charts or maps. For example, GIs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.

What includes all parties involved, directly or indirectly, in obtaining raw materials or a product?

supply chain The supply chain includes all parties involved, directly or indirectly, in obtaining raw materials or a product.

What uses advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory?

supply chain planning system Supply chain planning systems use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory.

Off-the-shelf application software

supports general business processes and does not require any specific software customization to meet the organization's needs.

Service oriented architecture (SOA)

supports organizational computing needs with utility-based computing concepts. Service oriented architecture begins with a service—an SOA service being simply a business task, such as checking a potential customer's credit rating when opening a new account. It is important to stress that this is part of a business process

Information compliance is

the act of conforming, acquiescing, or yielding information.

Platform as a Service (PaaS)

supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model. PaaS is a perfect solution for a business as it passes on to the service provider the headache and challenges of buying, managing, and maintaining web development software.

Preventive maintenance makes

system changes to reduce the chance of future system failure. During the maintenance phase, the system will generate reports to help users and MIS specialists ensure it is functioning correctly

Social __________ describes the collaborative activity of marking shared online content with key words or tags as a way to organize it for future navigation, filtering, or search.

tagging

Data visualization describes

technologies that allow users to "see" or visualize data to transform information into a business perspective. Data visualization tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more. Data visualization tools can help uncover correlations and trends in data that would otherwise go unrecognized.

Radio frequency identification (RFID)—

technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. Within the supply chain, RFID can enable greater efficiencies in business processes such as inventory, logistics, distribution, and asset management. On the mobile commerce side, RFID can enable new forms of ebusiness through mobile phones and smart cards. This can increase loyalty by streamlining purchases for the consumer. For example, RFID readers are being embedded in store shelving to help retailers, including Marks & Spencer and The Gap, to better manage their assets and inventories and understand customer behavior.

WAPs with multiple-in/multiple-out (MIMO)

technology have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices.

IP provides the addressing and routing mechanism

that acts as a postmaster. An IP address is a unique 32-bit number that identifies the location of a computer on a network. It works like a street address—as a way to find out exactly where to deliver information.

Wireless media are natural parts of the Earth's environment

that can be used as physical paths to carry electrical signals. The atmosphere and outer space are examples of wireless media that are commonly used to carry these signals. Today, technologies for wireless data transmission include microwave transmission, communication satellites, (see Figure B5.12) mobile phones, personal digital assistants (PDAs), personal computers (e.g., laptops), and mobile data networks.

emergency notification service,

that is, an infrastructure built for notifying people in the event of an emergency. Radio stations' occasional tests of the national Emergency Alert System are an example of a very large-scale emergency notification system. A firm will implement an emergency notification service to warn employees of unexpected events and provide them with instructions about how to handle the situation.

Web accessibility means

that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web.

Geocache is a GPS technology adventure game

that posts the longitude and latitude location for an item on the Internet for users to find

A protocol is a standard

that specifies the format of data as well as the rules to be followed during transmission. Simply put, for one computer (or computer program) to talk to another computer (or computer program) they must both be talking the same language, and this language is called a protocol.

Internet protocol version 6 (IPv6) is

the "next generation" protocol designed to replace the current version Internet protocol, IP version 4 (IPv4). However, IPv6 will take several years to implement because it requires modification of the entire infrastructure of the Internet. The main change brought by IPv6 is a much larger address space that allows greater flexibility in assigning addresses. IPv6 uses a 128-bit addressing scheme that produces 3.4 × 1038 addresses.5

Portability refers to

the ability of an application to operate on different devices or software platforms, such as different operating systems. Apple's iTunes is readily available to users of Mac computers and also users of PC computers, smartphones, iPods, iPhones, iPads, and so on. It is also a portable application.

Slice-and-dice is t

the ability to look at information from different perspectives. One slice of information could display all product sales during a given promotion. Another slice could display a single product's sales for all promotions. Slicing and dicing is often performed along a time axis to analyze trends and find time-based patterns in the information. One thing to remember when making decisions is the old saying, "Garbage in, garbage out." If the transactional data used in the support system are wrong, then the managerial analysis will be wrong and the DSS will simply assist in making a wrong decision faster. Managers should also ask, "What is the DSS not telling me before I make my final decision?"

System virtualization is

the ability to present the resources of a single computer as if it is a collection of separate computers ("virtual machines"), each with its own virtual CPUs, network interfaces, storage, and operating system.

Mobile business (or mbusiness, mcommerce) is

the ability to purchase goods and services through a wireless Internet-enabled device. The emerging technology behind mbusiness is a mobile device equipped with a web-ready micro-browser that can perform the following services: Mobile entertainment—downloads for music, videos, games, voting, ring tones, as well as text-based messaging services. Mobile sales/marketing—advertising, campaigns, discounts, promotions, and coupons. Mobile banking—manage accounts, pay bills, receive alerts, and transfer funds. Mobile ticketing—purchase tickets for entertainment, transportation, and parking including the ability to automatically feed parking meters. Mobile payments—pay for goods and services including in-store purchases, home delivery, vending machines, taxis, gas, and so on.

Click-fraud is

the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

Mobile means

the technology can travel with the user, for instance, users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference. Information collected while on the road can be synchronized with a PC or company server.

semi structured decisions;

they occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision. For example, decisions about producing new products or changing employee benefits range from unstructured to semistructured.

Cyberbullying includes

threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

Availability refers to the

time frames when the system is operational. A system is called unavailable when it is not operating and cannot be used. High availability occurs when a system is continuously operational at all times. Availability is typically measured relative to "100 percent operational" or "never failing." A widely held but difficult-to-achieve standard of availability for a system is known as "five 9s" (99.999 percent) availability. Some companies have systems available around the clock to support ebusiness operations, global customers, and online suppliers.

Twisted-pair cable refers

to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath. The wires are twisted to reduce outside electrical interference. Twisted-pair cables come in shielded and unshielded varieties. Shielded cables have a metal shield encasing the wires that acts as a ground for electromagnetic interference. Unshielded twisted-pair (UTP) is the most popular and is generally the best option for LAN networks.

To decrypt information is

to decode it and is the opposite of encrypt.

Maintainability (or flexibility) refers

to how quickly a system can transform to support environmental changes. Maintainability helps to measure how quickly and effectively a system can be changed or repaired after a failure. Building and deploying flexible systems allow easy updates, changes, and reconfigurations for unexpected business or environmental changes.

Cybermediation refers

to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank.

Fiber optic (or optical fiber) refers

to the technology associated with the transmission of information as light impulses along a glass wire or fiber. Fiber-optic cable is the same type used by most telephone companies for long-distance service. Fiber-optic cable can transmit data over long distances with little loss in data integrity. In addition, because data are transferred as a pulse of light, fiber optical is not subject to interference. The light pulses travel through a glass wire or fiber encased in an insulating sheath. Fiber optic's increased maximum effective distance comes at a price. Optical fiber is more fragile than wire, difficult to split, and labor intensive to install. For these reasons, fiber optics is used primarily to transmit data over extended distances where the hardware required to relay the data signal on less expensive media would exceed the cost of fiber-optic installation. It is also used where large amounts of data need to be transmitted on a regular basis.

Usability is the degree

to which a system is easy to learn and efficient and satisfying to use. Providing hints, tips, shortcuts, and instructions for any system, regardless of its ease of use, is recommended.

Business intelligence dashboards

track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis. The majority of business intelligence software vendors offer a number of different data visualization tools and business intelligence dashboards.

Wire media are

transmission material manufactured so that signals will be confined to a narrow path and will behave predictably. The three most commonly used types of guided media are Twisted-pair cable Coaxial cable Fiber optic (or optical fiber)

TCP provides

transport functions, ensuring, among other things, that the amount of data received is the same as the amount transmitted.

"And" and "or" have well-defined meanings and o

ught to be completely unambiguous, yet they are often understood only informally and interpreted inconsistently. For example, consider the statement "The alarm must ring if button T is pressed and if button F is pressed." This statement may be intended to mean that to ring the alarm, both buttons must be pressed or it may be intended to mean that either one can be pressed. A statement like this should never appear in a requirement because the potential for misinterpretation is too great. A preferable approach is to be very explicit, for example, "The alarm must ring if both buttons T and F are pressed simultaneously. The alarm should not ring in any other circumstance."

Active and semi-passive tags are

useful for tracking high-value goods that need to be scanned over long ranges, such as railway cars on a track. The cost of active and semi-passive RFID tags is significant; hence, low-cost items typically use passive RFID tags.

Public key encryption (PKE)

uses two keys: a public key that everyone can have and a private key for only the recipient

Web 3.0 is based on "intelligent" web applications

using natural language processing, machine-based learning and reasoning, and intelligent applications. Web 3.0 is the next step in the evolution of the Internet and web applications. Web 3.0 offers a way for people to describe information such that computers can start to understand the relationships among concepts and topics. Web 3.0 brings machines closer together using information. These new relationships unite people, machines, and information so a business can be smarter, quicker, more agile, and more successful.

Offshore outsourcing—

using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away.

A smart grid delivers electricity

using two-way digital technology. It is meant to solve the problem of the world's outdated electrical grid, making it more efficient and reliable by adding the ability to remotely monitor, analyze, and control the transmission of power. Smart grids provide users with real-time usage monitoring, allowing them to choose off-peak times for noncritical or less urgent applications or processes.

Intelligent systems are

various commercial applications of artificial intelligence. They include sensors, software, and devices that emulate and enhance human capabilities, learn or understand from experience, make sense of ambiguous or contradictory information, and even use reasoning to solve problems and make decisions effectively.

In a Gantt chart, tasks are listed _____________ and the project's timeframe is listed ____________.

vertically, horizontally

A search engine is

website software that finds other pages based on keyword matching similar to Google

_____________ analysis checks the impact of a change in a variable or assumption on the model.

what if

Personalization occurs

when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.

A paradigm shift occurs

when a new radical form of business enters the market that reshapes the way companies and organizations behave. Ebusiness created a paradigm shift, transforming entire industries and changing enterprisewide business processes that fundamentally rewrote traditional business rules.

Content filtering occurs

when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

technology failure occurs

when the ability of a company to operate is impaired because of a hardware, software, or data outage. Technology failures can destroy large amounts of vital data, often causing incidents, unplanned interruption of a service.

Virtualization allows multiple virtual computers to exist on a single machine,

which allows it to share its resources, such as memory and hard disk space, to run different applications and even different operating systems.

disaster recovery plan,

which is a detailed process for recovering information or a system in the event of a catastrophic disaster. This plan includes such factors as which files and systems need to have backups and their corresponding frequency and methods along with the strategic location of the storage in a separate physical site that is geographically dispersed.

Content used in mashups is typically sourced from an application programming interface (API),

which is a set of routines, protocols, and tools for building software applications. A programmer then puts these building blocks together.

Moore's Law,

which refers to the computer chip performance per dollar doubles every 18 months.

crowdsourcing,

which refers to the wisdom of the crowd. The idea that collective intelligence is greater than the sum of its individual parts has been around for a long time

value chain analysis

which views a firm as a series of business processes that each add value to the product or service.

Insiders are legitimate users

who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. For example, many individuals freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open for hackers.

A _____________is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.

wiki

The physical view of information deals (INCREASED FLEXIBILITY)

with the physical storage of information on a storage device.

Business process reengineering is the analysis and redesign of __________ within and between enterprises.

workflow

Application layer

—serves as the window for users and application processes to access network services.


Set pelajaran terkait

Possessive Adjectives & Pronouns

View Set

Dividend & Share Repurchase (Analysis) (R23)

View Set

Chapter 5: Life Insurance Underwriting and Policy Issue

View Set

Chapter 4 and 5 Questions - World Geography

View Set