CIS 3700 Quiz

Ace your homework & exams now with Quizwiz!

conditional formatting

For example, you can have a cell appear bold only when the value of the cell is greater than 100.

File management environment; information silos

From the mid-1950s until the early 1970s, organizations managed their data in a _________; this created _______

Which of the following data is NOT currently collected by usage-based car insurance companies?

GPS

Acceptance

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk _________ strategy.

Business Process

Inputs: materials Resources: People and equipment for activities Outputs: Product or service created by the process

Baxter

Labor robot

"Fit Problem" Case Study

LoveThatFit- send pics in tight cloths and gets measurments from alg Bodymetrics- takes 150 measurments of cutomeres size and shape

ISP (Internet Service Provider)

Network neutrality is an operating model under which _______ must allow customers equal access to content and applications, regardless of the source or nature of the content

Disseminating

Performance Bicycle uses employee knowledge to help customers find products and relevant multimedia content about them. This is an example of ______ knowledge in the KMS cycle

financial; Enron

The Sarbanes-Oxley Act requires publicly held companies to implement _______ controls; it was passed to address the ______ crisis.

Employee Purchasing and Employee Consumer Tax

The US Office of Personnel Management hack involved the loss of _________ information.

common good

The ___________ approach highlights the interlocking relationships that underlie all societies

two

The relational database model is based on the concept of ________-dimensional tables

BofA Case Study

They cut back on its more than 18,000 applications and drastically consolidated their collateral management systems

Hadoop; structured and unstructured data

TrueCar adopted _______ because it had to handle _________

Cyberterrorism

US government considers the Sony attack an act of?

Procurement Process (1)

Warehouse, purchasing, accounting

slack

________ is a cloud-based team communication and collaboration software program that helps company employees communicate in real time.

Difficult to work with

________ is a disadvantage of fiber-optic cable

NIC (Network Interface Card)

________ s allow devices to physically connect to the LAN's communication's medium

Fiber-optic

__________ is a cable medium

VPN (Virtual Private Network)

__________ is a private network that uses a public network to connect users.

Wells Fargo Bank

__________ is the most recent example of ethical misbehavior in organizations

Nationwide

___________ does NOT offer usage-based automobile insurance

digital dossier

an electronic description of an individual and his or her habits

BitTorrent

file-sharing software that allows users to create "swarms" of data as they simultaneously download and upload "bits" of a given piece of content

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

value chain model

identifies points where an organization can use information technology to achieve competitive advantage

Pivot Table

in most spreadsheet software it is the name of the tool used to create summary tables.

Primary activities in the value chain

inbound logistics, operations, outbound logistics, marketing and sales, service

Porter's 5 Forces

*Rivalry among competitors; *Threat of new entrants; *Threat of substitute products; *Bargaining power of buyers; *Bargaining power of suppliers;

affinity portal

A Web site that offers a single point of entry to an entire community of affiliated interests.

Bit

A ________ represents the smallest unit of data a computer can process

Patent

A _____________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.

Balance Sheet

A financial statement that reports assets, liabilities, and owner's equity on a specific date.

broadband

A high-speed Internet connection that is always connected

peer-to-peer processing

A type of client/server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server.

Cross-Functional Process

A work process performed by people in separate organizations, departments, and divisions

Zappos

According to the Chapter 3 Opening Case, who did NOT get fined for blocking Wi-Fi access?

Data Rot

Also known as bit rot, the gradual decay of information stored on any device.

liability

An amount owed by a business

True

An intranet is a trusted network. True or False

Internet

An/The ______________ is a network of networks

Nascar Case Study

As opposed to having numerous handwritten inspection sheets they created a dashboard that tracks the care through its inspection process

Gartner Case Study

BPM skills

BPI

Business Process Improvement 1) Define Phase (as is operations) 2) Measure Phase (time and cost to generate) 3)Analysis Phase(identifies problems with process) 4)Improve Phase 5) Control Phase

a human error; unintentional

Careless Internet surfing is _________ and is an _________ mistake.

Strategies for Competitive Advantage

Cost leadership, differentiation, innovation, operational effectiveness, customer orientation

Non-volatile; cannot

Data marts and data warehouses are ________; this means they _____ be updated by users

Computer processing power

Doubles every 18 months

Moco

Ex: Blackboard and Canvas


Related study sets

Chapter 53: Management of ST-Elevation Myocardial Infarction

View Set

Immunology Exam 1 Practice Questions

View Set

AP World History - Chapter 14 - The Spread of Chinese Civilization: Japan, Korea, and Vietnam

View Set

Ultimate Vocabulary (Class of 2026) through 4th Quarter List II

View Set

Intro to Business: Strategic Management

View Set