BUS. 188 FINAL

Ace your homework & exams now with Quizwiz!

CH 12)In the system implementation phase a ________ installation is when the organization implements the entire new system/business processes on a limited portion of the business. A) Pilot B) phased C) parallel D) plunge

A) Pilot

Ch 7) ________ is a measure of the ratio of process outputs to inputs. A) Process efficiency B) Process conformance C) Process effectiveness D) Process reliability

A) Process efficiency

VM

Virtual Machines

WAN

Wide area network

CPU

central processing unit

DSS

decision support system

EIS

executive information system

IP

internet protocol

LAN

local area network

TPS

transactional processing system

IS

Information system

IoT

Internet of THings

KISS

Keep it simple stupid

KPI

Key performance indicator

MDM

Mobile Device management

CVS

Concurrent Versioning Control

CRM

Customer Relationship Management

CH 9) ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data integration B) Data entry C) data mining D) Data acquisition

D) Data acquisition

Ch 7)________ processes span an organization and support activities in multiple departments. A) Reactive B) Inter-enterprise C) Strategic D) Enterprise

D) Enterprise

CH 9)________ is a term that refers to the level of detail represented by the data. A)Reliability B) Normalization depth C) Complexity D) Granularity

D) Granularity

SDLC

Software development lifecycle

CIO

Chief Information Officer

CKO

Chief Knowledge Officer

CPO

Chief Privacy Officer

CSO

Chief Security Officer

CTO

Chief Technology Officer

CD-Rom

Compact Disk Read-Only Memory

CD-RW

Compact Disk Read/Write Drive

BYOD

Bring Your Own Device

CH 9) ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data mining B) Data warehousing C) Data optimization D) Data normalization

A) Data mining

CH 11)If an organization does not develop programs in-house, then the development group of the information system (IS) department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. A) business and systems analysts B) programmers and development personnel C) technical writers D) PQA engineers

A) business and systems analysts

CH 12)In business process management (BPM), an as-is model ________. A) documents the existing business process B) represents the desired state of a business process C) represents the ideal state of a business process D) contrasts the current and new states of a business process

A) documents the existing business process

Ch 7) Which of the following is a solution for problems arising from information silos? A) integrating data into a single database B) matrix the organization C) isolating functional applications D) limiting communication to top-level management

A) integrating data into a single database

CH 8) Success metrics are also known as ________. A) key performance indicators (KPI) B) vanity metrics (VM) C) performance scale identifiers (PSI) D) Conversion Rates (CR)

A) key performance indicators (KPI)

CH 8)To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. A) strength of a relationship B) social action metric C) customer lifetime value D) value of social capital

A) strength of a relationship

CH 8)The ________ revenue model offers users a basic service for free, and then charges a premium for upgrades or advanced features. A)freemium B) premium C) licensing D) pay-per-click

A)freemium

CH 8)________ is the investment in social relations with the expectation of returns in the marketplace. A)social capital B) social stock C) multi-media capital D) humal capital

A)social capital

CH 10) Which of the following usually happens in a malicious denial-of-service attack? A)A phisher pretends to be a legitimate company and requests confidential data. B) A hacker floods a Web server with millions of bogus service requests. C) A hacker monitors and intercepts wireless traffic at will. D) An intruder uses another site's IP address to masquerade as that other site.

B) A hacker floods a Web server with millions of bogus service requests.

CH 10) Numerical passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters. A) DoS B) Brute force C) calculated D) Sniffing

B) Brute force

CH 8) ________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser. A) Continuance rate B) Conversion rate C) Click-through-rate D) Pay-per-click

B) Conversion rate

Ch 7) ________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. A) IRD B) ERP C) CRM D) SCM

B) ERP

CH 8)Which of the following statements is true about social CRM? A) All the customer relationship processes in social CRM are structured. B) Each customer crafts his or her own relationship with the company. C)Though relationships emerge from joint activity, companies control the customers' experience. D)Customers likely to generate the most business get the most attention from the organization.

B) Each customer crafts his or her own relationship with the company.

CH 12)Which of the following statements is true of information systems? A) Every business process should include at least one information system. B) Every information system has at least one application. C) Information systems should be bought entirely off-the-shelf. D) Information systems include all business process activities.

B) Every information system has at least one application.

CH 10)Jason attempts to hack into an attractive looking banking site to steal customer information. Jason is arrested the next day and charged with computer crime. The authorities were able to easily catch Jason because he had unknowingly attacked a ________. A) Hot site B) Honeypot C) Hacker trap D) cold site

B) Honeypot

CH 11) Which of the following statements is true about outsourcing? A) It invariably leads to diseconomies of scale. B) It saves both direct and indirect management time. C) It guarantees a higher level of quality than that provided in-house. D) It may increase budgetary instability due to the level of risk involved.

B) It saves both direct and indirect management time.

CH 10)________ is (are) a broad category of software that includes viruses, spyware, and adware. A) Phishing B) Malware C) Spam D) Cookies

B) Malware

CH 10) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. A) Black-hat(s) B) Threat C) Digital Criminal D) target

B) Threat

CH 8)Most social media companies rely on ________ for revenue. A) Monthly service charges B) advertising C) membership payments D) Venture capital

B) advertising

CH 12)Rapid application development, the unified process, extreme programming, and scrum have led to ________. A) parallel SDLC B) agile development C) dynamic systems development model (DSDM) D) joint application development

B) agile development

CH 9) In ________, statistical techniques can identify groups of entities that have similar characteristics. A) supervised data mining B) cluster analysis C) regression analysis D) neural networks

B) cluster analysis

CH 11)In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems. A) outsourcing B) development C) technology D) operations

B) development

CH 12)In a business process, resources are ________. A) collections of related tasks that receive inputs and produce outputs B) people or computer applications that are assigned to roles C) collections of procedures and activities D) the total number of points of work that can be accomplished in each scrum period

B) people or computer applications that are assigned to roles

BI

Business Intelligence

CH 10) Firewalls produce ________ that include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall. A) ETL logs B) meta-data C) Activity logs D) feeds

C) Activity logs

CH 9) ________ is defined as information containing patterns, relationships, and trends of various forms of data. A) Spatial intelligence B) Data mining C) Business intelligence D) Business information

C) Business intelligence

Ch 7) ________ is the activity of altering existing and designing new business processes to take advantage of new information systems. A) Business process modeling B) Business process outsourcing C) Business process reengineering D) Enterprise resource planning (wrong)

C) Business process reengineering

Ch 7) A(n)________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. A) CLM B) ERP C) CRM D) SCM

C) CRM

CH 9)________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. A) Transaction Processing Systems (TPS) B) Decision Suport Systems (DSS) C) Content Management Systems (CMS) D) Executive Information Systems (EIS)

C) Content Management Systems (CMS)

CH 12) The ________ is a sequence of activities that determine the earliest date by which a project can be completed. A) development cycle path B) shortest path C) Critical Path D) modifiable cycle path

C) Critical Path

CH 11) Which of the following is a risk of outsourcing information systems (IS)/information technology (IT) functions? A) It invariably results in diseconomies of scale. B) It is generally easy to break the contract. C) It involves the potential loss of intellectual capital. D) It is easier to end an agreement between a vendor and an organization that hired the vendor.

C) It involves the potential loss of intellectual capital.

CH 9)________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. A) Repository Management (RM) B) Content Management (CM) C) Knowledge Management (KM) D) Information Management (IM)

C) Knowledge Management (KM)

CH 11)Which of the following statements is true about the changes and developments foreseen by the year 2026? A) Most information systems will be Bring Your Own Device (BYOD). B) Software development lifecycle (SDLC) will be typically used for systems development. C) Most organizations will move their internal hardware infrastructure into the cloud. D) Cellular phone will not exist,

C) Most organizations will move their internal hardware infrastructure into the cloud.

CH 10) Email spoofing is a synonym for ________. A)Sniffing B) hacking C) Phishing D) usurping

C) Phishing

CH 12)________ play a key role in moving development projects through the SDLC or scrum development process. A) Business analysts B) Application programmers C) Systems analysts D) Database designers

C) Systems analysts

Ch 7) Information systems improve process quality by ________. A) reducing data flow B) entirely replacing human activity C) controlling process flow D) changing the work culture

C) controlling process flow

CH 12)According to Brooks' Law, adding more people to a late project will ________. A) speed up the project B) guarantee improved efficiencies C) create diseconomies of scale D) reduce the need for coordination

C) create diseconomies of scale

CH 11)Which of the following is generally a responsibility of users of information systems (IS)? A) installing hardware and programs B) installing hardware and programs fixing application issues C) following security and backup procedures D) replacing legacy systems

C) following security and backup procedures

CH 9)OLAP stands for ________. A) organizational lead analysis process B) object-based lead analysis procedure C) online analytical processing D) object-oriented analytical protocol

C) online analytical processing

CH 8)Which of the following is a dynamic, social media-based CRM process? A) multi-media CRM B) viral CRM C) social CRM D) virtual CRM

C) social CRM

CH 12) Organizational feasibility concerns ________. A) the organization's budget and schedule requirements B) the competitor's business process model C) whether the new system fits within the organization's customs or legal requirements D) whether the organization has the technical infrastructure to implement the new system

C) whether the new system fits within the organization's customs or legal requirements

CH 9)A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business. A)cube B)model C)Mart D)Mine

C)Mart

CH 10) In information security, which of the following is true about managing risk? A) Long, complex passwords are classified as technical safeguards B) Physical security is classified as human safeguards. C) All organizations should invest heavily in security safeguards. D) Organizations should implement safeguards that balance the trade-off between risk and cost.

D) Organizations should implement safeguards that balance the trade-off between risk and cost.

CH 8) ________ is the use of information technology to support the sharing of content among networks of users. A) Content publishing B) Multimedia C) Social programming D) Social Media

D) Social Media

Ch 7) ________ are formally defined, standardized processes that involve day-to-day operations. A) Dynamic Process B) Collaborative processes C) Unstructored processes D) Structured processes

D) Structured processes

CH 11)Which of the following statements is true about users of information systems? A) They have a responsibility to protect their computers from viruses by installing their choice of antivirus software. B) They are not responsible for protecting corporate information assets. C) They should learn to install hardware and software on their own to save time and money. D) They should learn standard techniques and procedures for the applications they use.

D) They should learn standard techniques and procedures for the applications they use.

CH 10) Which of the following statements is true about human safeguards for employees? A)Companies should provide user accounts and passwords to employees prior to their security training. B) System administrators should retain user accounts after an employee has been terminated. C) Security screening in an organization is a one-time process. D) User accounts should be defined to give users the least possible privilege needed to perform their jobs.

D) User accounts should be defined to give users the least possible privilege needed to perform their jobs.

CH 9)A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the "data shelves". A) data model B) data mine C) data link layer D) data warehouse

D) data warehouse

Ch 7) The two dimensions of process quality are ________ A) performance and reliability B) conformance and durability C) perception and serviceability D) efficiency and effectiveness

D) efficiency and effectiveness

CH 10) Which of the following is considered a computer crime? A) poorly written programs resulting in information loss B) accidental deletion of important records C) loss of data as a result of flooding D) hacking of information systems

D) hacking of information systems

Ch 7) Which of the following conditions exists when data are isolated in separated information systems? A) data segregation B) information encapsulation C) information overload D) information silo

D) information silo

CH 11)Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ . A) finance department B) operations department C) executive offices D) information system (IS) department

D) information system (IS) department

CH 11) Which of the following is a function of the technology office in an organization's information systems (IS) department? A) managing computing infrastructure B) maintaining existing information systems C) creating new information systems D) investigating new information systems

D) investigating new information systems

CH 11)Which of the following is a right of users of information systems? A) right to obtain the configuration of their choice B) right to install programs and applications of their choice C) right to make hardware modifications when desired D) right to receive effective training

D) right to receive effective training

CH 12) The traditional process for developing information systems is ________. A) product life cycle B) the software testing life cycle C) the software defect life cycle D) the systems development life cycle

D) the systems development life cycle

CH 8)Which of the following best represents the value of social capital? A) Entity Resources x (Number of Relationships + Relationship Strength) B) (Number of Relationships × Relationship Strength) / Entity Resources C)Number of Relationships + Relationship Strength + Entity Resource D)Number of Relationships × Relationship Strength × Entity Resources

D)Number of Relationships × Relationship Strength × Entity Resources

DBMS

Database management system

IT

Information Technology

GPL

General Public License

OS

Operating Systems

PCs

Personal Computers

RAM

Random Access Memory

HTTPS

Secure Hypertext Transfer Protocol

SSL

Secure Socket Layer

ALU

arithmetic log unit

MIS

management information systems

MMU

memory management unit

RFID

radio frequency identification

ROM

read only memory

SQL

standard query language


Related study sets

Unit 5 Yoost Ch. 5 Introduction to the Nursing Process

View Set

Cartesian Dualism, Strawson, Ryle, etc.

View Set

Chapter 20 PrepU (Assessment of respiratory function)

View Set

AP Environmental Science Unit 5B - Mrs. DiCrisi

View Set

McCance Ch. 31 Cardiac Practice Questions

View Set

Incident Recordkeeping in Health Care

View Set

Supply Chain Management Chapter 6

View Set