cis 21-25

Ace your homework & exams now with Quizwiz!

Which of the following is the first value-adding step of information system activities in the knowledge management value chain? a. Disseminate b. Apply c. Acquire

Acquire

Craigslist is an example of: a. B2C e-commerce. b. B2B e-commerce. c. C2C e-commerce

C2C e-commerce

Which of the following is not one of four types of presence to be considered when building an e-commerce presence? a. Corporate b. Websites c. Offline media d. Email e. Social media

Corporate

Which of the following is not one of the five classical functions of managers? a.Deciding b. Creating c. Controlling

Creating

________ are visual tools for presenting performance data in a BI system. a. Scenarios and models b. Dashboards and scorecards c. Ad hoc report creation

Dashboards and scorecards

Which of the following type of system would be used to present senior marketing executives with high-level information about customer retention, satisfaction, and quality performance? a. TPS b. ESS c. MIS

ESS

Which of the following is the largest mobile advertising market? a. Yahoo b. Twitter c. Microsoft d. Facebook/Instagram e. Google

Facebook/Instagram

Symmetric encryption is more secure than public key encryption. True False

False

Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps? a. Location analytics b. DSS c. GIS

GIS

Which of the following is not one of the main four dimensions of knowledge described in the chapter? a. Knowledge has different forms. b. Knowledge is a firm asset. c. Knowledge is timeless.

Knowledge is timeless

What is the primary benefit to consumers of disintermediation? a. Lower costs b. Greater choices c. Higher quality d. Faster service

Lower costs

Which of the following companies uses the subscription revenue model? a. Netflix b. Facebook c. Expedia

Netflix

Which of the following is not one of Simon's four stages of decision making? a. Design b. Intelligence c. Prediction d. Choice

Prediction

Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages into a single marketing message and consumer experience? a. Ubiquity b. Interactivity c. Richnes

Richness

What is the second value-adding step in information system activities in the knowledge management value chain? a. Acquire b. Disseminate c. Store

Store

Which type of decision is determining vacation eligibility for an employee? a. Structured b. Procedural c. Ad hoc

Structured

Authentication refers to verifying that people are who they claim to be. True False

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. True False

True

All of the following are examples of social commerce companies except: a. Twitter. b. Instagram. c. Uber. d. Facebook.

Uber

Which type of decision is deciding whether to introduce a new product line? a.Structured b. Unstructured c. Predictive

Unstructured

Which of the following involves where, when, and how to apply knowledge? a. Tacit knowledge b. Wisdom c. Data

Wisdom

Google's search engine is an example of which of the following types of decision? a. High-velocity b. Semi-structured c. Financia

a. High-velocity

Behavioral models of management see managers as being ________ than does the classical model. a. more informal b. more well organized c. more systematic

a. more informal

Information ________ exists when one party in a transaction has more information that is important for the transaction than the other party. a. complexity b. transparency c. asymmetry

asymmetry

In the ________ revenue models, a firm offers some services for free but charges a subscription fee for premium services. a. transaction fee b. subscription c. free/freemium

free/freemium

Geoadvertising sends ads to users based on their: A) GPS locations. B) home addresses. C) shopping preferences. D) website behaviors. E) Google Maps settings.

gps locations

The Sarbanes-Oxley Act: a. requires financial institutions to ensure the security of customer data. b. imposes responsibility on companies and management to safeguard the accuracy of financial information. c. outlines medical security and privacy rules.

imposes responsibility on companies and management to safeguard the accuracy of financial information.

All of the following are intangible assets of a firm except its: a. brand. b. information technology. c. reputation. d. knowledge

information technology

Specialized systems that enable scientists and engineers to create and discover new knowledge for a company are called: . wikis. b. KWS. c. enterprise-wide knowledge management systems.

kWs

A firewall allows the organization to: a. create an enterprise system on the Internet. b. prevent unauthorized communication into and out of its network. c. check the accuracy of all transactions between its network and the Internet.

prevent unauthorized communication into and out of its network.

Selling the same goods to different targeted groups at different prices is called: a. cost optimization. b. price discrimination. c. price gouging.

price discrimination

Fault tolerant information systems create an environment designed to provide continuous, uninterrupted services by using: a. redundant hardware, software, and power supplies. b. high-capacity storage. c. a multitier server network.

redundant hardware, software, and power supplies.

A pivot table is a(n): a. spreadsheet tool that displays two or more dimensions of data in a convenient format. b. tool for performing sensitivity analysis. c. type of relational database.

spreadsheet tool that displays two or more dimensions of data in a convenient format.

Checking store inventory is an example of a(n) ________ decision. a. structured b. unstructured c. ad hoc

structured

In general, for digital goods, the marginal cost of producing another unit is about zero. true false

true

Knowledge is conditional. true false

true

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: a. biometric authentication. b. smart card authentication. c. two-factor authentication. d. token authentication.

two-factor authentication.

Establishing a firm's long-term goals is an example of a(n) ________ decision. a. structured b. unstructured c. analytic

unstructured


Related study sets

Introduction To Programming : Java : Chapter 8,9

View Set

BIO 111 CH. 4 Review: Mastering Biology

View Set

Vocabulary Workshop Level A Final Exam - DEFINITIONS

View Set

piel y tejidos blandos, sepsis, dengue, malaria, fiebre amarilla, fiebre tifoidea

View Set

MATH 2171 Homework #1 Algebra Review

View Set

UA geology exam 2 (Igneous and volcanos)

View Set