CIS 2700 Final

Ace your homework & exams now with Quizwiz!

_________ is larger by volume; _________ is more complex.

B2B; B2C

___ is the ability of information systems to identify objects, scenes, and activities in images.

Computer vision

Cloud computing has the following benefit for companies:

Cost

_________ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else.

Cyber-squatting

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.

Cyberterrorism

Which of the following is NOT an example of excellent alignment?

Organizations allow IT employees to develop overarching goals for the business.

________ is a program or collection of programs that enable the hardware to process data.

Software

Considering the following tables, ________ is a primary key.

Student Table: ID

Which of the following is the correct order of networks from largest to smallest?

WAN, MAN, LAN, PAN

________ are applications delivered over the internet that MIS professionals can select and combine through almost any device.

Web services

_________ is the most recent example of ethical misbehavior in organizations.

Wells Fargo Bank

Bandwidth is stated in ________ per second.

bits

Which of the following is NOT a use for data mining?

comparing products

________ marketing is when companies use social computing tools to obtain feedback from customers.

conversational

A(n) ________ portal is an intranet.

corporate

________ is an advantage of cloud-based ERP systems.

cost

Companies purchase digital dossiers to ________.

create customer intimacy

Which of the following is NOT an organizational response to business pressures?

creating a digital divide

Information Systems for marketing incorporate the following functions: (check all that apply)

customer relationship management

_________ is the result of optimizing and aligning business processes to fulfill customers' needs, wants, and desires.

customer satisfaction

An/The ________ is a network of networks.

internet

SCM systems are ________ systems.

interorganizational

BPI is typically performed by ___________.

knowledge workers

Typing in your password to access a system is an example of something the user _________.

knows

Organizations typically invest in cloud-based ERP systems because they are _________.

less expensive

An electronic _________ is a collection of individual shops consolidated under one internet address.

mall

_________ is the current strategy for many manufacturers where a company produces a large quantity of items but customizes them to match the needs and preferences of individual customers.

mass customization

Databases ________ inconsistency; this means ________.

minimize; various copies of the data do not agree

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.

minimum; maximum

Data marts can be implemented ________ compared to data warehouses.

more quickly

_____ is NOT a statistical tool used for predictive analytics.

multidimensional analysis

________ advertising is a sales pitch that fits into the flow of information being shown.

native

________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content.

network neutrality

In ________, manufacturers or retailers sell directly to customers.

online direct marketing

_________ is an example of a primary activity for most firms.

operations

Europeans and privacy advocates prefer the _________ model of informed consent.

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

You would use optimization or simulation for ______ analytics.

prescriptive

The ________ process originates in the warehouse department and ends in the accounting department.

procurement

With ________, customers use the internet to self-configure products or services.

product customization

________ is an advantage of telecommuting.

productivity

_________ is the result of optimizing the design, development, and production processes.

quality

A ________ generally describes an entity.

record

Database systems minimize ________.

redundancy

_______ is a decisional role.

resource allocator

________ marketing is word-of-mouth advertising.

viral

Data marts and data warehouses typically use ________.

OLAP

If you analyze a data cube, this is an example of using

OLAP

The correct order of the BPI phases is ___________.

define, measure, analyze, improve, and control

__________ reports show a greater level of detail than is included in routine reports.

Drill-down

In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.

forward; higher

Organization's use Porter's competitive forces model to design _________ strategies; they use the value chain model to identify _________ activities to make the greatest impact.

general; specific

________ is NOT an advantage of twisted-pair wire.

high bandwidth

LinkedIn's main market segment is _________.

high-skill jobs

A(n) ________ is an intraorganizational system.

human resources system

Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC.

implementation

When you decide to start automating order entry by creating a website instead of forcing people to call into Inside Sales to place orders, you are in the _________ phase of BPI. Question options:

improve

________ is an example of effectiveness.

increasing customer satisfaction

The IS function has become ________ strategic within organizations, so a growing number of CIOs are coming from________.

increasingly; other business units

________ is a broadcast medium.

infrared

Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of a(n) _________ strategy.

innovation

The NBA's use of virtual reality indicates they are using Porter's __________ strategy for competitive advantage.

innovation

All the information about you in your university's database is a(n) ________.

instance

Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.

intelligence

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol.

optional many

_________ are people and equipment that perform process activities.

resources

Modern credit cards are _________ cards.

smart

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.

structured

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision.

structured; operational control

________ is an extended ERP module.

supply chain management

A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user.

true

A wiki is a website made up entirely of content posted by users.

true

Businesses must respond to customers more quickly and appropriately than they did prior to social computing.

true

Companies listen to consumers in the blogosphere who express their views on the companies' products. This is consumer-generated media.

true

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. part-structured

unstructured

It is possible to damage your own reputation on LinkedIn.

True

With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options.

vanilla

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.

warm

________ are an example of harnessing collective intelligence.

wikis

The "_______ Effect" sometimes drives physicians to provide care that patients do not actually need as a way of trying to make the patients happy.

yelp

________ are designed to correct a lack of communication among _________.

ERP; FAIS

_________ materials are those items that are needed for MRO.

Indirect

A(n) ___ agent is a software program that assists you, or acts on your behalf, in performing repetitive computer-related tasks.

Information

Ethernet is a technology associated with ________s.

LAN

________ satellites have an orbital life of 6-12 years.

MEO

Hackers would use a botnet to perform a _________.

DDoS

The ________ rule of thumb is that ________ percent of individuals contribute ________ percent of the content.

20-80; 20; 80

________ is expected to be deployed by 2020.

5G

Information Systems for production and operations management (POM) incorporate the following functions: (check all that apply)

?

________ is a two-dimensional code that can store much more information than ________.

A QR code; bar codes

________ is a collection of related files or tables containing data.

A database

_________ refers to determining who is responsible for actions that were taken.

Accountability

_________ reports contain special information not found in routine reports.

Ad hoc

________ does NOT currently have a GPS system planned or in use.

Australia

_________ comprises the vast majority of e-commerce by volume.

B2B

_________ integrates disparate BPI initiatives to ensure consistent strategy execution.

BPM

Many organizations find _________ too difficult, too radical, too lengthy, and too comprehensive.

BPR

_________ uses a "clean sheet" perspective.

BPR

_________ represents a huge challenge for IT departments because it means IT loses the ability to fully control and manage employee devices.

BYOD

Which of the following is NOT a problem associated with Big Data?

Big Data can be structured, unstructured, or semi-structured.

Social computing has vastly altered both the expectations of customers and the capabilities of corporations in the area of _________.

CRM

________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time.

Cable

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.

Cardinality

________ is the most recent evolution of the modern IT infrastructure.

Cloud computing

Your professor hands you a piece of paper with the number 75 on it. This is ________.

Data

________ refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning.

Data

___ is a subset of machine learning where the system discovers new patterns without being exposed to labeled historical or training data.

Deep learning

________ occurs when the functions of many physical devices are included in one other physical device.

Dematerialization

ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________.

ERP II

________ attempt to duplicate work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.

ES

Which of the following cloud computing characteristics allows organizations to share resources? Question

Encompasses the characteristics of grid computing

Which of the following cloud computing characteristics represents the "pay-as-you-go" concept?

Encompasses the characteristics of utility computing

_________ is an access control.

Encryption

________ is NOT a problem caused by computers.

Ergonomics

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

Espionage

_________ is the third step in the general framework for ethics.

Evaluate alternative actions

Expert systems always replace human decision makers.

False

Functional information systems support the entire enterprise or major portions of it.

False

If you grew up using IT, you are an informed user.

False

Only computer science majors can become CIOs.

False

The ultimate goal of AI is to build machines that replace human intelligence.

False

Transaction processing systems typically provide information to managers in the functional areas.

False

You have satellite TV. Providers use ________ satellites to get this service to you.

GEO

________ satellites are stationary relative to a point on the Earth.

GEO

Which of the following is an accuracy issue?

How can we ensure that the information will be processed properly and presented accurately to users?

Which of the following is an accessibility issue?

How much should companies charge for permitting access to information in their databases?

The adoption of ________ has been an important factor in the development of the Internet of Things.

IPv6

________ users install their operating system and their application software on the cloud computing provider's computers.

IaaS

The customer manages the most with ________.

Iaas

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

Increasing skills necessary to be a computer hacker

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. This is ________.

Information

________ is organized so that it has meaning and value to the recipient.

Information

_________ are materials, services, and information that flow through and are transformed as a result of process activities.

Inputs

Which of the following increases supplier power?

Integrated Supply Chains

The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.

Internet

Your professor hands you a piece of paper with the number 75 on it and tells you this is your current average in the class. Since this is your fourth year as a college student, you know you could work hard to bring that average up to a B by the end of the semester. This is ________.

Knowledge

A network that is restricted to a single building is a ________.

LAN

Medium-range wireless networks are ________ technology.

LAN

NICs allow devices to physically connect to the _______'s communications medium.

LAN

Satellite telephone services are provided through ________ satellites.

LEO

________ satellites have the most negligible transmission delay.

LEO

_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Liability

A network stretching across New York City would be a ________.

MAN

________ are/is a tool for democratizing higher education.

MOOCs

________ is part of the ________ process and occurs when the company is trying to increase its inventory.

Make-to-stock; production

BI systems provide computer-based primarily support _________.

Middle managers

________ make tactical decisions, which deal with activities such as short-term planning, organizing, and control.

Middle managers

________ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _________-range wireless network technology.

NFC; short

_________ appear(s) underneath the active windows.

Pop-under ads

A(n) ___ agent constantly observes and reports on some item of interest.

Predictive

_____ analytics require _______ analytics.

Prescriptive; predictive

________ clouds provide IT activities and applications as a service over an intranet within an enterprise.

Private

Which of the following is not a function of functional area information systems?

Providing data from business events to the corporate database

________ cloud services may be free or offered on a pay-per-usage model.

Public

Which of the following is NOT a benefit of IT?

Quantity of leisure time

_________ is the first step in the general framework for ethics.

Recognize an ethical issue

Which of the following is NOT a basic function of TCP/IP?

Responsible for disassembling, delivering, and reassembling data during transmission

________ is the most popular query language used for interacting with a database.

SQL

________ is the most widely used service model.

SaaS

________ transmission systems can have a large coverage area but are expensive.

Satellite

_________ occurs when shoppers visit a brick-and-mortar store but then purchase online.

Showrooming

________'s platform helps enterprises to manage the consumer experience at every interaction; the company provides social media marketing, social media monitoring, social advertising, content management, collaboration, and advocacy for large companies.

Sprinklr

_________ collects personal information about users without their consent.

Spyware

________ was/were NOT initially supported by firms' IT departments.

Stand-alone PCs

_________ cards allow you to store a fixed amount of prepaid money and then spend it as necessary.

Stored-value money

A URL that begins with https uses _________.

TLS

________ is the cumulative store of subjective or experiential learning.

Tacit knowledge

___ is a capability performed relatively better by AI than human intelligence.

Total cost of knowledge

A buyer agent is also called a shopping bot.

True

Customers want to be heard and to know whether other customers agree with them, so retailers should allow customers to post reviews and ratings for the best social computing results.

True

________ does NOT use a peer-to-peer business model.

Twitter

________ is a short-range wireless network.

UWB

Industry experts estimate that 80-90 percent of data in an organization is ________.

Unstructured

_________ organizations are only online.

Virtual

Which of the following cloud computing characteristics allows organizations to use a single physical server for multiple purposes?

Virtualization

_________ is a remote attack requiring user action.

Virus

The ________ is a system of universally accepted standards for storing, retrieving, formatting, and displaying information through a ________ architecture.

WWW; client/server

IBM's Watson is considered ___ AI.

Weak

Which of the following is a privacy issue?

What information about individuals should be kept in databases, and how secure is the information there?

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.

a human error; unintentional

Which of the following was NOT used in the cyberattack on Ukraine?

a logic bomb

If you bring your own router to school to set-up Wi-Fi but do not have permission from your university to do this, this is ________.

a rogue access point

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

accuracy

Many experts believe ________ is the solution to the challenge of making money from social networking sites and social commerce sites.

advertising

In the _________ phase of BPI, the BPI team examines the "as is" process map and the collected data to identify problems with the process and their root causes.

analysis

When you figure out that customer orders are delayed because you do not have enough employees picking orders in the warehouse, you are in the _________ phase of BPI.

analysis

The ________ coordinates and manages new systems development projects.

applications development manager

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.

around

_________ is an example of efficiency.

automating order entry

You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation.

best-of-breed

________ is an example of the third type of peer-to-peer processing that allows for advanced search and file sharing.

bit torrent

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit.

blue

The _________ is a model in which organizations attempt to procure needed products or services from other organizations electronically.

buy-side marketplace

Social computing increases _________.

buyer power

A ________ is a group of eight ________.

byte; bits

A _________ site is the least expensive option.

cold

A(n) ________ portal is intended for broad and diverse audiences, and it offers routine content, some of it in real time.

commercial

_________ is the result of optimizing the manufacturing and logistics processes.

cycle and fulfillment time reduction

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using

data mining

Data reduction is the conversion of raw _______ into a smaller amount of more useful _______.

data; information

In the _________ phase of BPI, the BPI team documents the existing "as is" process activities, process resources, and process inputs and outputs.

define

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

deontology

________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today.

dial-up

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using

digitized maps

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard.

drill down

You have to offer online banking if you want to operate a bank. This is a(n) ________.

entry barrier

________ is a common LAN protocol.

ethernet

Dashboards evolved from

executive information systems

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________.

explicit knowledge

An/The ________ connects networks of multiple organizations so they can communicate securely.

extranet

________ offer limited accessibility to the ________ of participating companies.

extranets; intranets

Any LinkedIn page is better than nothing.

false

Exception reports show a greater level of detail than is included in routine reports.

false

If a company is getting a lot of negative posts on its Wall, it is best to turn off features that let customers post comments without company approval.

false

Social media is a reliable method for communicating about emergencies, so emergency responders use social media in conjunction with the 911 system as much as possible.

false

The best thing about blogs is that they accurately reflect the opinions of customers.

false

Users had passive involvement with Web 2.0 websites. Web 3.0, on the other hand, facilitates more interactive social computing.

false

________ is a cable medium.

fiber-optic

Which of the following Internet services is typically NOT available in rural areas?

fiber-optics

________ are user-generated classifications that use ________ to categorize and retrieve web pages, photos, videos, and other web content.

folksonomies; tags

Organizations do NOT typically use wikis to _________.

follow consumers' social networking comments

Supplier power is _________ when buyers have few choices from whom to buy and _________ when buyers have many choices.

high; low

The threat of new competitors will enter your market is _________ when entry is easy and _________ when there are significant barriers to entry.

high; low

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.

sensitivity

________ is an example of the first type of peer-to-peer processing that accesses unused CPU power among networked computers.

seti@home

United Airlines originally apologized only for the "overbook situation" that caused Dr. Dao physical harm. After two days, United Airlines changed its public responses due to ________.

social media backlash

The digital divide is an issue associated with a _________ pressure.

societal

A(n) ________ is an interorganizational system.

supply chain system

_________ are the costs, in money and time, imposed by a decision to buy elsewhere.

switching costs

A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.

systems analyst

Information overload is a _________ pressure.

technology

Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this?

technology is getting cheaper to acquire, operate, and maintain

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of

the development of infrastructure to support enterprise-wide analytics

Data marts are typically associated with

the development of one or a few related analytics applications.

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______).

the outputs; inputs

The music and newspaper industries were hurt primarily by _________.

threat of substitutes

A _________ is an intellectual work that is not based on public information.

trade secret

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.

transference

Social computing empowers customers and enables them to become business advocates and influencers.

true

Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services.

true

________ is the greatest concern in the peer-to-peer economic model.

trust

Six Sigma is a popular _________ technique.

BPI

Buyer power is high when buyers have _________ choices from whom to buy and low when buyers have _________ choices.

many; few

________ feature remixable applications and data.

mashups

You want to be able to track the pencils in your store because they seem to be disappearing. You would want to mark the pencils with ________.

passive RFID codes

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach.

rights

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.

rot

The fulfillment process originates in the ________ department and ends in the ________ department.

sales; accounting

________ is part of the ________ process and involves sending goods that are in the warehouse to customers.

sell-from-stock; fulfillment

In the ________, organizations sell their products or services to other organizations electronically from their own private e-marketplace website or from a third-party website.

sell-side marketplace


Related study sets

Care of Women and Pediatric Client

View Set

Chapter 16: Security Policies, Standards, and Compliance

View Set

English with Smiling Sam 3. Unit 6. Hello, spring! Summer holidays

View Set

macroeconomics chapters 8&10 review problems

View Set

CompTIA 220-1001 Core 1 A+ Course Notes

View Set

Chapter 3 - Small Business Environment - Managing External Relations

View Set