FINAL CIS, IT101, CSC 220 CH 9, CTS115 Final, IS 220 Exam 3, CSC 220 Chapter 6, CTS115-L6B-Fall-2017 Unit 8, CTS 115 Fall 2017 Information Systems Unit 6

Ace your homework & exams now with Quizwiz!

Business needs and their importance are roughly the same for all companies so the IS solutions they choose are quite similar.

False

Business intelligence turns data into useful information that then is kept closely guarded to avoid this information from falling into the hands of the wrong employees.

False

Oracle is currently the market leader in general purpose databases, with about three-fourths of the multibillion dollar database market.

False

Basic data manipulations include__________which involves eliminating rows in a relational database.

Selecting

_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.​

Self-service analytics

_____ is responsible for implementing a new information systems required to support an organization's existing and future business needs.

Senior IS Managers

In some cases, multiple, multiple organizations collaborate in creating and using internationally databases.

True

Schema

Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____.

is the stage of systems development that creates a complete set of technical specifications that can be used to construct an information system.

System Design

The expert system knowledge acquisition facility serves as an interface between

System Developers and Explanation Facility

True

T/F-If you wish to have a visual depiction of relative frequencies of words in a document, a word cloud would be an appropriate option​.

True

T/F-The data for BI (business intelligence) comes from many sources​

In the relational model, each row of a table represents a data or record and each column of the table represents an attribute or field.

True

Online transaction processing

Which of the following is NOT considered a BI and analytics tool?​ 1. Drill-down analysis 2. Online transaction processing 3. Data visualization 4. Data mining

Format

Which of the following is NOT a component of a KPI (key performance indicator)? 1. Direction 2. Format 3. Measure 4. Time frame

Assistive technology

_____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing.

Multimedia

_____ is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals.

Informatics

_____ is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society.

____ is an approach that starts by investigating the general data and information needs of the organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization

enterprise data modeling

A(n) _____ is a person, place, or thing (object) for which data is collected, stored, and maintained.

entity

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

entity symbol

What determines the size of words in a word cloud?

frequency of occurrence of the word in source documents

refers to the level of detail in the model or the decision-making process.

granularity

_____ is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products, including all types of computers, printers, and printer materials such as cartridges and toner.

green computing

_____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

grid computing

Which of these analysis methods describes neural computing?​

historical data is examined for patterns that are then used to make predictions

The ______ is an advanced optical disk technology in development that would store more data than even the Blu-ray optical disk system.

holographic versatile disc

The area covered by one or more interconnected wireless access points is commonly called a(n)

hot spot

The fiber-optic cables that span the globe over land and under sea make up the

internet backbone

is a communication standard that enables computers to route communications traffic from one network to another as needed

internet protocol

Basic data manipulations include _____ that involves eliminating rows in a relational database according to certain criteria.

selecting

According to Anthony Gorry and Michael Scott Morton's framework on decision support systems, the decisions where only some of the variables can be measured quantitatively are called _____.

semi structured

An operating system with _____ capabilities allows a user to run more than one program concurrently.

multitasking

is a very short-range wireless connectivity technology designed for cell phones and credit cards

near field communication

According to Christensen, companies may have placed too great an emphasis on satisfying customers' current ___________, while forgetting to adopt new disruptive technology that will meet customers' future needs.

needs

._____ is a branch of artificial intelligence that allows computers to recognize and act on patterns or trends.

neural networks

.______ is a form of database processing that supports top-down, query-driven data analysis.

online analytical proccessing

A(n) _____ is an assessment of how well management uses the resources of an organization and how effectively organizational plans are being executed.

operational audit

_____ deals with how firms successfully plan for and implement reforms.

organizational change

.In a purchasing system, when an invoice arrives from a supplier, it is matched to ______ and a check is generated if all data is complete and consistent.

original order

Hiring an outside company to perform some or all of a systems development project is called

outsourcing

___________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

outsourcing

Data is broken into _____ to be transmitted over the Internet.

packets

RFID uses active or ________ tags in the form of chips or smart labels.

passive

The _____ is the number of years required to recover the initial cost of an investment.

payback period

__ is a form of data mining that combines historical data with assumptions about future conditions to forecast the outcomes of events.

predictive analysis

One of the goals of business intelligence is to _________.

present the results in an easy to understand manner

The primary outcome of systems analysis phase is

prioritized list of system requirements & recommendation of how to proceed with project.

Which of the following is NOT a core process associated with data management?​

process for gathering BI requirements

In the context of e-commerce software, _____ helps customers select the necessary components and options

product configuration

In an order processing system, a(n) _____ is printed at the warehouse from which an order is to be filled on the day the order is planned to be shipped.

product pick list

In the context of financial MIS subsystems and outputs, a _____ is an independent business unit that is treated as a distinct entity enabling its revenues and expenses to be determined and its profitability to

profit center

_____ are sets of keywords, symbols, and rules for constructing statements that people can use to communicate instructions to a computer.

programming languages

analysis checks the impact of a change in a variable or assumption on the model.

what-if

The Pareto principle is also known as the _____.

80-20 rule

12. Competitive intelligence is gained through industrial espionage and the gathering of this information often includes illegal or unethical means.

False

13. Solid state storage devices store data in memory chips rather than magnetic or optical media and require less power to operate while providing slower data access than magnetic data storage devices.

False

15. The ability of a computer to handle an increasing number of concurrent users smoothly is called multitasking

False

17. A database need not reflect the business processes of the organization.

False

17. Compared to main memory secondary storage offers the advantages of volatility, increased capacity, and lower costs

False

22. An attribute is a general class of people, places, or things for which data is collected, stored, and maintained.

False

29. Identification of who will have access to a database has little impact on organizing a database.

False

32. The overall trend in secondary storage devices is toward use of direct access methods, higher capacity, and increased volatility.

False

32. The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files.

False

35. Online Analytical Processing and data mining are essentially the same thing.

False

42. Business and technology vendors are working to develop blue data centers that run more efficiently and require less energy for processing and cooling.

False

42. Systems software consists of programs that help users solve particular computing problems.

False

43. Netbook computers are ideal for users who need to run demanding applications, have many applications open at once, or need lots of data storage capacity.

False

44. Most operating systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of ROM.

False

45. The domain for payrate would include both positive and negative numbers.

False

46. The Database Administrator decides the contents of the database with little or not input from the users of the database.

False

51. RAID is a method of storing data so that it can be accessed more quickly

False

Data Definition Language

A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report?

100,000 to 200,000

The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices.

128-bit

is a popular and sophisticated software package that can be used to edit visual images.

18. Adobe Photoshop

Michael Porter proposed a now widely accepted competitive forces model that includes _____ forces.

5

Neural Network

A _____ is a computer system that can act like or simulate the functioning of a human brain.

rule

A _____ is a conditional statement that links conditions to actions or outcomes.

community of practice (COP)

A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.

Data Mart

A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

Record

A collection of fields all related to a single object, activity, or individual is a(n) _____.

theory of evolution

A genetic algorithm is an approach to solving problems based on the _____.

Primary Key

A(n) _____ is a field or set of fields in a record that uniquely identifies the record.

Primary Key

A(n) _____ is a field or set of fields that uniquely identify a record.

Virtual Reality System

A(n) _____ is a system that enables one or more users to move and react in a computer-simulated environment.

Knowledge Management System (KMS)

A(n) _____ is an organized collection of people, procedures, software, databases, and devices used to create, store, share, and use the organization's knowledge and experience.

was the ancestor of the Internet.

ARPANET

The role of a system developer in a joint application development (JAD) is to

Accelerate efficiency & effectiveness of investigation

39. The smallest piece of data used by a computer is the _______.

Bit

Organizing

After entering data into a relational database, users can make all of the following basic data manipulations except: 1. Joining 2. Selecting 3. Projecting 4. Organizing

Your new software project manager is OK with requirements that are not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the _______ approach to software development.

Agile

is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months

Agile Development

_____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months.

Agile development

27. The process of selecting the best database management system for an organization considers ___________.

All of the above

36. A tool that database designers use to show the logical relationships among data is a(n) __________.

All of the above

45. An RFID tag on an inventory item might contain information _________.

All of the above

47. Green Computing is focused at the efficient and environmentally responsible______ of IS related products

All of the above

A risk involved with using an application service provider is that

All of the above

include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes, including learning, reasoning, and self-correction

Artificial Intelligence Systems

A business that operates in a physical store without an internet presence. Example: TJ Maxx

Brick-and-Mortar Business

A _____ is a defect in a computer program that keeps it from performing as its users expect it to perform.

Bug

Which of the following is a potential disadvantage with self-service BI?

Can lead to over spending on unapproved data sources and business analytics tools.

What are the disadvantages of hosted software model

Can't customize, don't control customer data, greater dependability on supplier, and sharing resources

. A(n) _____ is a basic building block of most information, consisting of upper-case letters, lowercase letters, numeric digits, or special symbols.

Character

Suppose management wishes to start a BI project at your new job. Which of following will you recommend as the first step?

Clarify business goals and design a project plan

A busniess that operates in a physical store and on the internet. Example: Barnes and Noble

Click-and-Mortar Business

Which of the following is IBM's BI product?

Cognos

refer to errors, failures, and other computer problems that make computer output incorrect or not useful

Computer-Related Mistakes

_____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process.

Consumer to Consumer (C2C)

36. Each central processing unit consists of two primary elements: the arithmetic/logic unit and the _________ unit.

Control

____ are divisions within a company that do not directly generate revenue.

Cost Center

48. _________ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.

Counterintelligence

Suppose your employer has four manufacturing units, each with its own data operations. They are considering using BI tools. Which of the following is a valid recommendation regarding the BI initiative?

Create a data warehouse so that data from the factories are combined for BI analysis

_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

Critical analysis

____ is a single Web site that offers many products and services at one Internet location.

Cybermall

The creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness

Cybermediation

Governance

Data _____ is the core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted.

The DBMS organizes the data independently of the application program, so the application is not affected by the location or type of data. This is an example of ____.

Data and Program Independence

Gather problem-related data, including who, what, where, why, and how. Be sure to gather facts not rumors or opinions about the problem.

Data Collection

(n)_____________ typically stores three to ten years of historical summary data records from many operational systems and external data sources so that it can be used for business analysis

Data Warehouse

(n) _________ contains a subset of data for a single aspect of a company's business and are used by smaller groups who want to access detailed data for business analysis.

Data mart

23. ___________ is an information analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.

Data mining

_____ is used to explore large amounts of data for hidden patterns to predict future trends.

Data mining

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?​

Data visualization tool

Summarized

Data within the data cube has been ______ by specific dimensional values.

14. With _______, the databases is stored on a service provider's server and accessed by the client over a network, typically the internet.

Database as a service

A(n) _____ is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision making.

Decision Support System (DSS)

15. Data warehouses allow managers to ______ to get increasing levels of detail about business conditions.

Drill down

Under the Identity Theft and Assumption Deterrence Act of 1998, the _____________ is assigned responsibility to help victims restore their credit and erase the impact of the imposter

Department of Homeland Security

____ is the last phase of the six-phase CRISP-DM method.

Deployment

develops detailed plans for a new or modified information system and interacts with the stakeholders and users, management, vendors and suppliers, external companies, programmers, and other IS support personnel

Development Team

_____ is a strategy for gaining competitive advantage wherein a company strives to deliver distinct products and services.

Differentiation

refers to the use of any of several technologies to enforce policies for controlling access to digital media, such as movies, music, and software.

Digital Rights Management (DRM)

Occurs when a business sells directly to the customer online and cuts out the intermediary.

Disintermediation

The elimination of intermediate organizations between the producer and the consumer is called _____.

Disintermediation

8. A database in which data can be spread across several smaller databases connected through telecommunications devices is called a(n)_________.

Distributed database

is the person or group with the expertise or knowledge an expert system is trying to capture.

Domain Expert

____ offers personalized shopping consultations for shoppers interested in upscale, contemporary clothing—dresses, sportswear, denim apparel, handbags, jewelry, shoes, and gifts.

E-Boutiques

_____ involves using information systems and the Internet to acquire parts and supplies.

E-Procurement

30. Many organizations are turning to_______, a set of integrated programs that manages a company's vital business operations for an entire multisite, global organization

ERP

evolved from materials requirement planning systems (MRP) that tied together the production planning, inventory control, and purchasing business functions for manufacturing organizations.

ERP

_____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive.

Economic feasibility

The focus of a DSS is on decision-making _____ when faced with unstructured or semistructured business problems.

Effectivness

is the direct sale of products or services by businesses to consumers through electronic storefronts, typically designed around the familiar electronic catalog and shopping cart model.

Electronic Retailing

.In the context of e-commerce software, _____ helps track the items selected for purchase.

Electronic Shopping Cart

___ is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.

Electronic exchange

23. People using commercially available software are usually asked to read and agree to a(n)_________.

End user license agreement

is the creation, modification, or extension of software by people who are nonprofessional software developers

End-User Systems Development

Mastery over which subject is NOT required for being a data scientist?​

English

.A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective.

Enterprise Resource Planning (ERP)

Many organizations are turning to _____, a set of integrated programs that manages a company's vital business operations for an entire multisite, global organization.

Enterprise resource planning software

In the context of data-flow diagrams, the ___________ shows either the source or destination of the data.

Entity Symbol

​getting employees to buy in

Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. As a means of convincing the other teams to adopt the new methods, they develop an incentive program that allows team members to earn a percentage of the money they save on each project. This is related to which phase of knowledge management project implementation?​

​leveraging the expertise of people across the organization

Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system?​

is the component of an expert system that allows a user to understand how the system arrived at its results.

Explanation Facility

The knowledge found in databases, memos, and written documents is an example of

Explicit Knowledge

_____ is a network based on Web technologies that allows only selected outsiders, such as business partners and customers, to access authorized resources of a company's intranet.

Extranets

Database management system cost in excess of one thousand dollars.

False

Due to their size, databases must be stored on mainframe computers or other large, powerful computers.

False

The components responsible for processing the CPU and memory are housed together in the same box or cabinet called the chip set.

False

RAID storage devices provide organizations with data storage that is ____

Fault tolerant

In information systems, _____ is information from a system that is used to make changes to input or processing activities

Feedback

19. Literally thousands of programming languages have been developed, but only ______ are commonly used today.

Few dozen

A(n) _____ is typically a name, number, or combination of characters that describes an aspect of a business object or activity.

Field

If convicted for copyright infringement, software pirates could be sentenced to jail for up to

Five years

Quality information that can be used for a variety of purposes is said to be _____.

Flexible

Join

For the ____ operation, it is required that the the two tables have a common attribute.

Developers of _____ try to build on the advantages of individual support systems while adding new approaches unique to group decision making.

GSS

One special application of computer technology is derived from a mathematical theory called _______ that involves the use of information systems to develop competitive strategies.

Game Theory

is a graphical tool used for planning, monitoring, and coordinating projects.

Gantt Chart

In some cases, inaccurate information is generated because inaccurate data is fed into the transformation process. This is commonly called _____.

Garbage In Garbage Out

A _____ displays icons and menus that people use to send commands to a computer system

Graphical User Interface (GUI)

31. __________ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem.

Grid Computing

.The _____ approach forces members of a decision making group to reach a unanimous decision.

Group Consensus Approach

An effective _____ MIS enables an organization to keep personnel costs at a minimum while serving the required business processes needed to achieve corporate goals.

HR

is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

Hacker

Variety

Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database.​ In terms of the characteristics of big data, Haley is dealing with ________.

Special purpose systems that help overcome disabilities or improve health are called

Health Systems

inference engine

In an expert system, the _____ is the component that delivers the expert advice.

A(n) _____ is a 64-bit number that identifies a computer on the Internet.

IP address

________ infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.

IT

Data Lake

If an organization is taking a "store everything" approach to data, it will save all the data in its raw and unaltered form in a _____.​

The two phases of problem solving added by Huber to Simon's original three-stage model of decision-making are _____.

Implementation and monitoring

Extract

In the _____ process, all of the data from various sources is converted into a single format suitable for processing.

The _____ is NOT a component of the typical DSS.

Inference Engine

is the component that delivers the expert advice.

Inference Engine

is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society.

Informatics

_____ are considered to be the most important element in a computer-based information system.

Information

A(n) _____ is a set of interrelated components that collect, manipulate, store, and disseminate data and information and provide a feedback mechanism to meet an objective.

Information System (IS)

identifies those information systems development initiatives needed to support organizational strategic goals

Information Systems Planning

Refers to the depth and breadth of deatils contained in a piece of textual, graphic, audio, or video information.

Information richness

have extra knowledge that make them especially dangerous—they know logon IDs, passwords, and company procedures that help them evade detection.

Insiders

A useful guideline to protect corporate computers from criminal hackers is to

Install antivirus software on all computers.

Agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.

Intermediaries

The _____ of an investment makes the net present value of all cash flows (benefits and costs) generated by a project equal to zero.

Internal rate of return

In the context of decision support system framework developed by Anthony Gorry and Michael Scott Morton, one characteristic of a structured decision is that _____.

It is straightforward, requiring known facts and relationships

Graphic images can be stored in a variety of formats including

JPEG and GIF

is an object-oriented programming language from Sun Microsystems based on the C++ programming language, which allows small programs, called applets, to be embedded within an HTML document.

Java

In the context of types of reports generated by management information systems (MIS), a(n) _____ summarizes the previous day's critical activities in an organization and is typically available at the beginning of each workday

Key-indicator

Tacit

Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge.

The process of defining relationships among data to create useful information requires ______.

Knowledge

is the awareness and understanding of a set of information and the ways that information can be made useful to support a specific task or reach a decision

Knowledge

stores all relevant information, data, rules, cases, and relationships that an expert system uses.

Knowledge Base

is a person who has training or experience in the design, development, implementation, and maintenance of an expert system

Knowledge Engineer

A(n) _____ is an organized collection of people, procedures, software, databases, and devices that stores and retrieves knowledge, improves collaboration, locates knowledge sources, captures and uses knowledge.

Knowledge Management System (KMS)

____ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas.

Knowledge workers

22. ________ displays are flat displays that use liquid crystals to form characters and graphic images on a backlit screen.

LCD

Web-based service system is one of several information systems used by law enforcement to recover stolen property

LeadsOnline

____ is an open source operating system whose source code is freely available to everyone.

Linux

.In the context of group decision support system alternatives, _____ can be used when group members are located in the same building or geographic area and under conditions in which group decision making is frequent.

Local Area Decision Network

is a type of Trojan horse that executes when specific conditions occur

Logic Bomb

Refers to the tail of a typical sales cycle

Long Tail

5. ___________ is an application of data mining the identifies the products and services most commonly purchased at the same time.

Market Basket analysis

The ability of an organization to tailor its products or services to the customers' specifications

Mass Customization

English

Mastery over which subject is NOT required for being a data scientist?​

.A(n) _____ is the component of a decision support system that allows managers and decision makers to perform quantitative analysis on both internal and external data.

Model Base

The practice of disguising illegally gained funds so that they seem legal is called

Money Laundering.

48. An operating system with _______ capabilities allows to run more than once application at the same time

Multitasking

35. A type of memory whose contents are not lost if the power is turned off is said to be __________.

NON volatile

Choosing the right computer hardware requires understanding it's relationship to the information system and the ____ of the organization.

Needs

can process many pieces of data at the same time and learn to recognize patterns

Neural Networks

33. The __________ display monitor uses the least amount of power.

OLED

18. ________ are frequently used to capture input in standardized test such as rhe SAT and GMAT.

OMR Readers

_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.

OMR Systems

Which of the following is NOT considered a BI and analytics tool?​

Online transaction processing

The Holographic Versatile Disc (HVD) is an advanced _____ technology still in the development stage and is the same size and shape as a regular digital video disc (DVD) but can hold 1 terabyte (or more) of information

Optical Disk

A _____ is a credit card issued to selected employees to help streamline the traditional purchase order and invoice payment processes.

P-Card

You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?

Parallel start up

is a small program hidden in a network or computer system that records identification numbers

Password Sniffer

allows a machine to approximate the way a person sees, hears, and feels objects.

Perceptive System

___________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.

Personalization

_____ involves running a complete new system for one group of users rather than all users.

Pilot start-up

A(n) _____ is s field or set of fields in a record that uniquely defines the record.

Primary key

The performance of decision support systems is typically a function of decision quality and _____.

Problem Complexity

Define the problem as clearly and precisely as possible.

Problem Identification

In the context of data-flow diagrams, the ___________ identifies the function being performed.

Process Symbol

takes the system design from the systems analysis team and builds or modifies the necessary software

Programmer

is a critical date for completing a major part of a project, such as program design, coding, testing, and cutover

Project Milestone

is a detailed description of when project activities are performed.

Project Schedule

is a key member and leader of a steering committee in systems development who has final approval of all requests for changes in project scope, budget, and schedule.

Project Sponsor

21. A database_________.

Provides an essential foundation for an organization's knowledge management and artificial intelligence systems

A business that operates on the Internet only without a physical store. Example: Google

Pure-Play Business

37. ___________ is a visual approach to developing database requests

Query by example

Some databases use ______, which is a visual approach to developing queries and requests.

Query by example

A type of memory that loses its contents if the power is turned off is said to be _____.

RAM

_____ is a technology that employs a microchip with an antenna to broadcast its unique identifier and location to receivers.

Radio Frequency Identification (RFID)

Steps are added to the value chain as new players find ways to add value to the business process.

Reintermediation

The final step to prevent computer-related waste is to

Review Existing Policies and Procedures

______ is a Web-delivered software application that combines hardware resources of the Web server and PC to deliver valuable software services through a Web browser interface.

Rich Internet Application

is a set of programs that enables its user to gain administrator level access to a computer or network.

Rootkit

From which vendor is the BI product Business Objects available?

SAP

The goal of _____ is to reduce costs and improve customer service, while at the same time reducing the overall investment in inventory in a supply chain.

SCM

26. _________ is a standardized data manipulation language developed in the 1970's that allows programmers to use one powerful language and use it on a variety of systems

SQL

____ databases rely upon concurrency control by locking database records to ensure that other transactions do not modify the database until the first transaction succeeds or fails, and as a result, can suffer from slow performance

SQL

Which of the following will be a 'fact' measure in a data cube used at a chain retail business?

Sales revenue

A _____ is a description that involves "telling" the database management system (DBMS) the logical and physical structure of the data and the relationships among the data for each user.

Schema

The ______ is a credit card-sized device with an embedded microchip to provide memory and processing capability.

Smart card

is a scam that attempts to steal an individual's private information by having them respond to a text message

Smishing

_____________ bookmarking allows users to share, organize, search, and manage bookmarks.

Social

_____ consists of computer programs that govern the operation of a computer.

Software

Detail every solution possible, including ideas that seem farfetched.

Solution Generation

If the solution solves the problem, then the decisions made were correct. If not, then the decisions were incorrect and the process begins again.

Solution Implementation

Evaluate solutions in terms of feasibility, suitability, and acceptability.

Solution Test

Select the solution that best solves the problem and meets the needs of the business.

Solution selection

10. ____________ involves using a database to store and access data according to the locations it describes and to permit spatial queries and analysis.

Spatial data technology

A ________ uses computer servers, distributed storage devices, and networks to tie everything together.

Storage area network.

54. ______ are the most powerful computers with the fastest processing speed and highest performance

Supercomputers

Data visualization tool

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?​

_____ is the process of analyzing systems to make sure they are operating as intended.

System review

_____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements.

System testing

phase of a traditional systems development life cycle attempts to answer the question "What must the information system do to solve the problem?"

Systems Analysis

involves successfully introducing an information system into an organization.

Systems Implementation

The purpose of the ___________ phase of a traditional systems development life cycle is to gain a clear understanding of the specifics of a problem to be solved or the opportunity to be addressed.

Systems Investigation

_____ creates a complete set of technical specifications that can be used to construct an information system.

Systems design

_____ involves using a new or modified system under all kinds of operating conditions.

Systems operation

False

T/F A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic.

True

T/F- A database must reflect the business processes of an organization.

True

T/F- A database, a database management system, and the application programs that use the data, make up a database environment.

True

T/F- A relational model splits the information up into many two dimensional data structures.

True

T/F- Artificial intelligence involves the development of machines and computer systems that can simulate human intelligence processes.

False

T/F- Data modeling usually involves setting a specific business goal and then analyzing the data and information needed to reach that goal.​

False

T/F- Data scientists do not need much business domain knowledge.​

True

T/F- During drill-down, you go from high-level summary data to detailed levels of data.

True

T/F- Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence.

False

T/F- Many organizations actively attempt to convert explicit knowledge to tacit knowledge.

True

T/F- Namaste Yoga Studio's website is a great example of multimedia because it uses text, photos, graphics, and video to communicate the message of the studio's owners.

False

T/F- Suppose a manager wishes to analyze historical trends in sales. He would use the online transaction processing (OLTP) system.

False

T/F- ​Online analytical processing is another name for enterprise application.

knowledge is hard to measure and document and is typically not objective or formalized

Tacit

Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of

Tacit knowledge

3. The ______ features of the operating system allocate computer resources to make the best use of each systems assets.

Task Management

_____ explains the purpose of every major piece of computer code and also identifies and describes key variables.

Technical documentation

has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help you locate your position.

Telepresence Tech

The _____ is the part of the central processing unit (CPU) that sequentially accesses program instructions, decodes them, and coordinates the flow of data in and out of the arithmetic/logic unit (ALU).

The Control Unit

What is a primary element of the central processing unit (CPU)?

The Control Unit

Relational

The ____ model database makes it easy to develop queries that involve joining two tables.

explanation facility

The _____ allows an expert system user to understand how the system arrived at its results.

Relational

The _____ model has become the most popular database model.

knowledge base

The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

​support and improve decision making

The goal of business intelligence is to _____.

A conversion funnel

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.

Touch

The haptic interface relays the sense of _____ in the virtual world.

Data Administrator

The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.

Bit

The smallest piece of data used by a computer is a(n) _____.

You are to advise XYZ so that their BI efforts are fruitful. Which among the following is the most crucial advice of all?

There must be strong commitment from the management

enterprise resource planning (ERP) vendors target large multinational firms with multiple geographic locations and annual revenue in excess of $1 billion.

Tier 1

The haptic interface relays the sense of __________ in the virtual world

Touch

One of the most effective counterintelligence measures is to define _____ information relevant to a company and control its dissemination.

Trade secret

life cycle is a sequential multistage process where work on the next stage cannot begin until the results of the previous stage are reviewed and approved or modified as necessary.

Traditional SDLC

____ is an approach to data management whereby each distinct operational system uses data files dedicated to that system.

Traditional approach to data management

A(n) _____ is an organized collection of people, procedures, software, databases, and devices used to perform and record business deals.

Transaction Processing System (TPS)

Which of the following is NOT considered business intelligence practice?​

Transaction processing

14. An application service provider is a company that can provide the software, support, and computer hardware on which to run the software from the users facilities over a network.

True

16. Outsourcing global software support to one or more third-party distributors is gaing acceptance in North America.

True

2. People involved in selecting their organizations computer hardware need to clearly understand current and future business requirements so they can make informed acquisition decisions

True

20. A software suite is a collection of single programs packaged together as a bundle and typically include word processing, spreadsheet, graphics, and more.

True

20. Data mining involves the automated discovery of patterns discovery of patterns and relationships in a data warehouse.

True

21. Utility programs help to perform maintenance, correct problems, merge and sort sets of data, keep track of computer jobs, and compress files of data.

True

25. The Snow Leopard operating system allows users to view their system as it looked in the past and resurrect deleted files.

True

28. Parallel processing is a form of multiprocessing and speeds processing by linking several processors to operate at the same time.

True

29. Application programs interact with systems software, and the systems software directs computer hardware to perform the necessary tasks.

True

31. A data warehouse stores historical data that has been extracted from operational systems, external sources, and, sometimes, even unique sources.

True

34. To, run applications request services from the operating system through a defined application program interface.

True

34. Today, most organizations use the database approach to data management, where multiple information systems share a pool of related data.

True

37. There are free web-based productivity software suites the require no installation on the computer.

True

38. The clock speed affects machine cycle time and the rate at which the computer executes instructions.

True

39. Support for green computing is emerging as a new business strategy for computer manufacturers to distinguish themselves from the competition.

True

40. One of the primary advantages of a relational database is that it allows tables to be linked to reduce data redundancy and allow data to be organized more logically.

True

41. Software as a service allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per use fee.

True

43. A data warehouse is used to support decision making while and OLTP database is used to support transaction processing.

True

49. Data centers are approaching the point of automation, where they can run and manage themselves while being monitored remotely in a "lights out" environment.

True

5. MICR is a technology from the 1950's, still used to process checks.

True

53. Information systems that operate within the enterprise sphere of influence support the firm in its interaction with customers, suppliers, shareholders, competitors, special-interest groups, the financial community, and government agencies.

True

9. The analysis of data on user traffic through an organizations web site is an example of data mining.

True

An application service provider is a company that can provide software, support, and computer hardware.

True

Carrying summary totals in the data records is an example of planned data redundancy.

True

Linux is not a full operating system and many distributions of Linux are available.

True

One of the first steps in installing and using a large database involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user.

True

People involved in selecting their organizations computer hardware need to clearly understand current and future business requirements so they can make and for decisions.

True

Projecting involves eliminating columns in a table.

True

The DBMS serves as an interface between an application program and the database.

True

The raw data necessary to make sound business decisions is stored in a variety of locations and formats.

True

Programming languages are sets of keywords, symbols, and rules for constructing statements that people can use to communicate instructions to a computer.

True.

The _____ visa program allows skilled employees from foreign lands into the United States.

U.S. H-1B and L-1

Which of the following statements is true of user acceptance testing (UAT)?

UAT must be completed successfully before newly developed software can be rolled out to the market.

49. ____ is a powerful operating system originally developed by AT&T for use on minicomputers but now runs on workstation, servers, and mainframe computers

UNIX

_____ is a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host.

URL

____ is a powerful operating system originally developed by AT&T for use on minicomputers but now runs on workstations, servers, and mainframe computers.

Unix

A typical decision support system (DSS) includes many components including a(n) _____ which allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases.

User interface (dialogue manager)

is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.

Variant

The most significant internal data sources for a management information system are an organization's _____.

Various TPS and ERP systems and related databases

_____ is a storage technology for less frequently needed data so that it appears to be stored entirely on tape cartridges, although some parts may be stored on faster hard disks.

Virtual Tape

In addition to the Web server operating system, each e-commerce Web site must have _____ to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, Web site development, and Web page development.

Web Server Software

Business leadership skills

Which of the following is NOT a characteristic of a data scientist? 1. Strong business acumen 2. Business leadership skills 3. A healthy appreciation of the limitations of their data 4. A deep understanding of analytics

​automated customer service

Which of the following is NOT a commonly used BI tool? 1. drill-down analysis ​2. automated customer service ​​3. data visualization 4. linear regression

Sales revenue

Which of the following will be a 'fact' measure in a data cube used at a chain retail business? 1. Product category 2. Sales revenue 3. Month Name 4. City name

The Internet Crime Computer Center (IC3) is an alliance between the

White-Collar Crime Center and the FBI.

is a file conversion program that can be used to compress multimedia files to make them easier to download from the Internet or send them as an e-mail attachment.

WinZip

Database as a Service

With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.

Structured Query Language (SQL)

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.

50. An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal.

Workgroup

you wish to use a visual approach to query building

You would use Query by Example, if _____.

Activities on the critical path of a project have _______ slack time

Zero

Excel

____ is the most popular spreadsheet program​.

Neural networks

_____ can process many pieces of data at the same time and learn to recognize patterns.

Knowledge users

_____ do not need any previous training in computers or expert systems.

Augmented reality

_____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position.

Artificial intelligence systems

_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction.

Game theory

_____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints.

Data Cleansing

_____ is the process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database.

Big Data

_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.

Data mining

_____ is used to explore large amounts of data for hidden patterns to predict future

Tacit

_____ knowledge is hard to measure and document and typically is not objective or formalized.

IF-THEN

_____ statements are rules that suggest certain conclusions based on certain conditions.

Self-service analytics

_________ encourages nontechnical end users to make decisions based on facts and analyses rather than intuition.​

What is the study of the impact that changes in one (or more) part of the model have on other parts of the model? a) Sensitivity analysis b) Drill-down c) What-if analysis d) Goal-seeking analysis

a

What is the systems development life cycle? a) The overall process for developing information systems, from planning and analysis through implementation and maintenance b) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system c) Involves establishing a high-level plan of the intended project and determining project goals d) Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation

a

What means a technology can travel with the user? a) Mobile technologies b) Wireless technologies c) WiMax technologies d) wLAN technologies

a

What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML? a) WWW b) URL c) Ebusiness d) Ecommerce

a

What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable? a) WiMAX wireless broadband b) satellite television c) Wireless local area network d) Cellular phones and pagers

a

Which of the following is one of the six ebusiness tools for connecting and communicating? a) Email b) Disintermediation c) Universal resource locator d) Web personalization

a

Which of the following refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information? a) Information richness b) Information reach c) Information system d) Personalization

a

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____.

a conversion funnel

The coefficient of determination, r squared, is ____.

a number that indicates how well data fits the statistical model

_____ is a good site to develop your professional network. a. LinkedIn b. Facebook c. Google d. Twitter

a. LinkedIn

When you are looking for a 'hotspot', you are searching for _____. a. a wireless access point b. bluetooth signals c. free charging stations d. strong satellite signals

a. a wireless access point

When you connect your computer to a printer using _____, the distance between them cannot be longer than 30 feet. a. Bluetooth b. Wi-Fi c. near field communication d. Infrared

a. bluetooth

The world-wide-web uses _____ protocol for transmitting content. a. hyper-text transfer b. mail transfer c. uniform resource location d. domain name server

a. hyper- text transfer

A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. a. metropolitan area network (MAN) b. local area network (LAN) c. wide area network (WAN) d. personal area network (PAN)

a. metropolitan area network

To analyze various alternative scenarios, a manager would use _______. a. the spreadsheet's 'what-if' capability b. the graphing features of spreadsheet software c. the reporting feature of a BI tool d. a data visualization tool

a. the spreadsheet's 'what-if' capability

_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. a. The Web b. A tag c. A cache d. The motherboard

a. the web

Many Internet addresses have a code denoting _____categories, such as com for business sites and edu for education sites.

affiliation

Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for _________.

alpha testing

The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.

analysis

Programmers use _____ to create application software without understanding the inner workings of an operating system as it provides a software-to-software interface, not an end user interface

application program interface

During modeling of the CRISP-DM method, we would ______.

apply selected modeling techniques

27. Embedded operating systems _______.

are changing the way we interact with many household devices.

24. As long as the tables in a relational database share one common _________, the tables can be linked to provide useful information and reports.

attribute

Which of the following is NOT a commonly used BI tool?

automated customer service

The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free—is known as ________. a) Web 1.0 b) Web 2.0 c) Web 3.0

b

What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards? a) Telematics b) Electronic tagging c) Mobile commerce d) None of these are correct.

b

What is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants can be easily interconnected using a short-range wireless connection? a) WiMAX b) Bluetooth c) GIS d) GPS

b

What is the implementation phase in the SDLC? a) Involves establishing descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation b) Involves placing the system into production so users can begin to perform actual business operations with the system c) Involves establishing a high-level plan of the intended project and determining project goals d) Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system

b

What is the science of making intelligent trade-offs between time, cost, and scope? a) Project deliverable b) Project management c) Project d) PMO

b

What is the type of knowledge that consists of anything that can be documented, archived, and codified, often with the help of an MIS department? a) Tacit knowledge b) Explicit knowledge c) Pure knowledge d) Virtual knowledge

b

What refers to any source code made available freely for any third party to review or modify? a) Open system b) Open source c) User-contributed content d) Collaboration software

b

Which of the following companies is an example of a pure-play or virtual business? a) Barnes & Noble b) Google c) T. J. Maxx d) All of these are correct

b

Which of the following is a key challenge associated with Business 2.0? a) Technology independence b) Information vandalism c) Copyright independence d) All of these are correct.

b

Which of the following is not a phase in the systems development life cycle? a) Analysis phase b) Prediction phase c) Planning phase d) Testing phase

b

Which of the following is the correct definition of RFID? a) Radio frequency internal diagnostics b) Radio frequency identification c) Radio fast internal diagnostics d) Radio frequency interoperability device

b

Which organization develops procedures and concepts necessary to support the profession of project management? a) Project Milestone Institute b) Project Management Institute c) Project Management Office d) None of these

b

What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report? a. 100,000 or less b. 100,000 to 200,000 c. 200,000 to 500,000 d. more than 500,000

b. 100,000 to 200,000

Which of the following is a markup language for defining the visual design of a Web page or group of pages? a. JavaScript b. Cascading Style Sheets (CSS) c. Java d. Extensible Markup Language (XML)

b. Cascading Style Sheets (CSS)

_____ is a markup language designed to transport and store data on the Web. a. Standard Generalized Markup Language (SGML) b. Extensible Markup Language (XML) c. Hypertext Markup Language (HTML) d. Hypermedia/Time-based Structuring Language (HyTime)

b. Extensible Markup Language (XML)

From which vendor is the BI product Business Objects available? a. IBM b. SAP c. Google d. Microsoft

b. SAP

Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____. a. Web portals b. Web browsers c. Web analytics software d. search engines

b. Web browsers

_____ consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. a. Web browsers b. Web services c. Hyperlinks d. Web forms

b. Web services

The coefficient of determination, r squared, is ____. a. the same as the error term in a linear regression b. a number that indicates how well data fits the statistical model c. a number that must be close to zero to be useful d. the same as the slope of the linear regression

b. a number that indicates how well data fits the statistical model

The fiber-optic cables that span the globe over land and under sea make up the Internet _____. a. ultrastructure b. backbone c. layer d. protocol

b. backbone

In a _____, all network devices are connected to a common backbone that serves as a shared communications medium. a. star network b. bus network c. ring network d. mesh network

b. bus network

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____. a. a word cloud b. a conversion funnel c. a scatter diagram d. a pivot chart

b. conversion funnel

_____ is used to explore large amounts of data for hidden patterns to predict future trends. a. Data governance b. Data mining c. Linear regression d. Drill down

b. data mining

The area covered by one or more interconnected wireless access points is commonly called a(n) _____. a. reception area b. hot spot c. coverage zone d. access area

b. hot spot

Data within the data cube has been ______ by specific dimensional values. a. correlated b. summarized c. regressed d. drilled into

b. summarized

The ancestor of the Internet was _____. a. TCP/IP b. the ARPANET c. Telnet d. Web 1.0

b. the ARPANET

With _____, business transactions are accumulated over a period of time for processing in a single unit.

batch processing system

46. One advantage of proprietary software versus off-the-shelf software is that_____

being involved in the development offers control over the results

The most efficient and effective ways to complete a business process are called _____.

best practices

____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of dealing with them.

big data

A(n) _____________ is another term for an online journal that allows users to post their own comments, graphics, and video.

blog

is a wireless communications specification that describes how cell phones, computers, and printers can be connected over distances of 10 to 30 feet at a rate of about 2 Mbps and allows users of multifunctional devices to synchronize information.

bluetooth

A Web __________, such as Internet Explorer or Mozilla's Firefox, allow users to access the World Wide Web.

browser

all network devices are connected to a common backbone that serves as a shared communications medium.

bus network

Which of the following is NOT a characteristic of a data scientist?

business leadership skills

is a subset of e-commerce in which all the participants are organizations

business-to-business (B2B) e-commerce

What applies to businesses buying from and selling to each other over the Internet? a) C2B b) C2C c) B2B d) B2C

c

What are specific key words or phrases incorporated into website content for means of classification or taxonomy? a) Social media b) Social networking analysis c) Tags d) All of these are correct.

c

What checks the impact of a change in a variable or assumption on the model? a) Sensitivity analysis b) Drill-down c) What-if analysis d) Goal-seeking analysis

c

What is a geographic information system (GIS)? a) A device that determines current latitude, longitude, speed, and direction of movement b) Contains a microchip and an antenna, and typically works by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag c) Designed to work with information that can be shown on a map d) Commonly used to transmit network signals over great distances

c

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house? a) Project management b) Insourcing c) Outsourcing d) None of these are correct.

c

What is an online journal that allows users to post their comments, graphics, and video? a) Microwiki b) Wiki c) Blog d) Mashup

c

What is consolidation? a) Enables users to view details, and details of details, of information. b) Finds the inputs necessary to achieve a goal such as a desired level of output. c) The aggregation of data from simple roll-ups to complex groupings of interrelated information. d) The ability to look at information from different perspectives.

c

What is the buying and selling of goods and services over the Internet? a) Emarket b) Emall c) Ebusiness d) Ecommerce

d

What is the ability to purchase goods and services through a wireless Internet-enabled device? a) Telematics b) Electronic tagging c) Mobile commerce d) None of these are correct.

c

What is the outsourcing option that includes the closest location and direct customer control? a) Offshore outsourcing b) Nearshore outsourcing c) Onshore outsourcing d) None of these are correct.

c

What measures the number of people a firm can communicate with all over the world? a) Mass customization b) Personalization c) Information reach d) Information richness

c

What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs? a) What-if analysis b) Sensitivity analysis c) Digital dashboard d) Drill-down dashboard

c

Which of the following is not an example of explicit knowledge? a) Patent b) Trademark c) Employee opinion d) Marketing research

c

Which of the following is not one of the four primary information technology areas where businesses are focusing in the 21st century? a) IT infrastructures b) Security c) DBMS d) Ebusiness

c

The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices. a. 32-bit b. 64-bit c. 128-bit d. 256-bit

c. 128-bit

Which of the following is IBM's BI product? a. Power BI b. Business objects c. Cognos d. Hyperion

c. Cognos

If your home air conditioner has an IP address, it is part of the ____. a. satellite communication network b. virtual private network c. Internet of Things d. satellite communication network

c. Internet of Things (IoT)

_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. a. Microwave transmission b. Wireless mesh c. Near field communication (NFC) d. Wi-Fi

c. Near Field communication (NFC)

Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document. a. cookies b. subroutines c. applets d. packets

c. applets

A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. a. very small aperture terminal (VSAT) b. microwave c. low earth orbit (LEO) d. geostationary

c. low earth orbit (LEO)

Which of the following is NOT considered a BI and analytics tool? a. Data visualization b. Drill-down analysis c. Online transaction processing d. Data mining

c. online transaction processing

The goal of business intelligence is to _____. a. provide access to novel tools to the users b. reduce the cost of data processing c. support and improve decision making d. improve employee morale

c. support and improve decision making

_____ is a communication standard that enables computers to route communications traffic from one network to another as needed. a. The ARPANET b. A Uniform Resource Locator (URL) c. The Internet Protocol (IP) d. A Wi-Fi

c. the Internet Protocol (IP)

Which of the following is NOT true about linear regression? a. both of the variables must be quantitative variables b. the line minimizes the sum of the squared errors of prediction c. the technique implies causality between the independent and the dependent variables d. consists of finding the best-fitting straight line through a set of observations

c. the technique implies causality between the independent and dependent variables

refers to the rate at which data is exchanged, usually measured in bits per second (bps).

channel bandwidth

During the _____ stage of the decision-making phase, a course of action is selected.

choice

In the context of number of technologies used to control and streamline a manufacturing process, the goal of a _____ system is to tie together all aspects of production, including order processing, product design, manufacturing, inspection and quality control, and shipping.

computer integrated manufacturing

Once new software has been selected, implementation will include all of these tasks EXCEPT _________.

consulting with stakeholders to establish future needs

A _____ contains an embedded chip that only needs to be held close to a terminal to transfer its data; no PIN number needs to be entered.

contactless payment card

The term _____ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.

counter intelligence

The process of switching from an old information system to a replacement system is called _____.

cutover

What applies to any business that sells its products or services to consumers over the Internet? a) C2B b) C2C c) B2B d) B2C

d

What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete? a) RAD methodology b) Agile methodology c) Waterfall methodology d) Extreme programming

d

What is it called when you engage another company within the same country for services? a) Outsourcing b) Business process outsourcing c) Insourcing d) Onshore outsourcing

d

What is the ability to purchase goods and service through a wireless Internet-enabled device? a) Semantic Web b) WWW c) Egovernment d) Mobile business

d

What is the innovator's dilemma? a) A new way of doing things that initially does not meet the needs of existing customers b) Produces an improved product that customers are eager to buy, such as a faster car or larger hard drive c) Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction d) Discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders

d

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system? a) Management system b) Reputation system c) Knowledge system d) open system

d

What is using organizations from developing countries to write code and develop systems? a) Outsourcing b) Business process outsourcing c) Insourcing d) Offshore outsourcing

d

What is wireless fidelity? a) Commonly used to transmit network signals over great distances b) An omnidirectional wireless technology that provides limited-range voice and data transmission over the unlicensed 2.4-GHz frequency band, allowing connections with a wide variety of fixed and portable devices that normally would have to be cabled together c) A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers d) A means of linking computers using infrared or radio signals

d

Which of the below is not a characteristic associated with Mozilla Firefox? a) Mozilla Firefox holds over 20 percent of the web browser market. b) Mozilla Firefox offers a free email service called Thunderbird. c) Mozilla Firefox is a prime example of open source software. d) Mozilla Firefox is a prime example of a reputation system.

d

Which of the below represents the three elements in the triple constraints of project management? a) Plan, analysis, design b) Deliverables, milestones, scope c) Development, testing, implementation d) Time, resources, scope

d

Which of the follow represents a trait of disruptive technology? a) Enters the marketplace at the low end b) Is a new way of doing things that initially doesn't meet the needs of existing customers c) Tends to open new markets and destroy old ones d) All of these are correct.

d

Which of the following are the primary challenges to the ebusiness models? a) Protecting customers b) Adhering to taxation rules c) Providing security d) All of these are correct.

d

Which of the following is a benefit an organization can receive from outsourcing? a) Increase technical abilities b) Financial savings c) Market agility d) All of these are correct.

d

Which of the following is a challenge of outsourcing? a) Length of contract b) Threat to competitive advantage c) Loss of confidentiality d) All of these are correct.

d

Which of the following is a common DSS analysis technique? a) What-if analysis b) Sensitivity analysis c) Optimization analysis d) All of these are correct.

d

Which of the following is a common use for GIS? a) Finding what is nearby b) Routing information c) Information alerts d) All of these are correct.

d

Which of the following is a fundamental of the RAD methodology? a) Focus initially on creating a prototype that looks and acts like the desired system. b) Accelerate collecting the business requirements through an interactive and iterative construction approach. c) Actively involve system users in the analysis, design, and development phases. d) All of these are correct.

d

Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption? a) Only authorized individuals can access applications for which they are entitled. b) Only authorized individuals can gain access to the network. c) Individuals cannot understand or alter information while it is in transit. d) All of these are correct.

d

Which of the following is not a form of outsourcing? a) Onshore outsourcing b) Offshore outsourcing c) Nearshore outsourcing d) Inshore outsourcing

d

_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. a. Grid computing b. Distributed computing c. Utility computing d. Cloud computing

d. Cloud computing

_____ is the standard page description language for Web pages. a. Extensible Markup Language (XML) b. JavaScript c. .NET d. Hypertext Markup Language (HTML)

d. Hypertext Markup Language

Which of the following is NOT considered business intelligence practice? a. Data extraction b. Visualization c. Analysis d. Transaction processing

d. Transaction processing

Which of the following is NOT a commonly used BI tool? a. data visualization b. linear regression c. drill-down analysis d. automated customer service

d. automated customer service

Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful? a. Word cloud tool b. Querying tool c. Reporting tool d. Data visualization tool

d. data visualization tool

____ is the last phase of the six-phase CRISP-DM method. a. Evaluation b. Modeling c. Business understanding d. Deployment

d. deployment

Which of the following is NOT a component of a KPI (key performance indicator)? a. direction b. measure c. time frame d. format

d. format

What determines the size of words in a word cloud? a. length of the word or phrase b. difficulty in pronouncing the word or phrase c. whether the word is a pronoun d. frequency of occurrence of the word in source documents

d. frequency of occurrence of the word in source documents

A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. a. cookie b. server c. Web portal d. search engine

d. search engine

A _____ network is one in which all network devices are connected to one another through a single central device called the hub node. a. mesh b. personal c. bus d. star

d. star

The ____ position is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.

data administrator

A _____ involves reentering data that was not typed or scanned properly.

data correction

A ______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

data definition language

.A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

data mart

41. _________ employs multidimensional databases and analytics to store and deliver data warehouse information efficiently.

data marts

____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.

data mining

involves updating one or more databases with new transactions

data storage

A business intelligence dashboard is a _____ tool that displays the current status of the key performance indicators (KPIs) for an organization.

data visualization

In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement.

data-flow line

16. Someone responsible for planning, designing, creating, operating, securing, monitoring, and maintain databses is called a(n)___________.

database administrator

With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet.

database as service

Project ___________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

deliverables

In the context of supply chain management (SCM), ____ refines the production plan by determining the amount of weekly or daily production needed to meet the requirement for individual products.

demand managment

In the _____ stage of the problem-solving process, alternative solutions to a problem are developed and their feasibility is evaluated.

design

Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.

drill down

A(n) _____ is a type of management report that is automatically produced when a situation is unusual or requires management action.

exception report

is a markup language for Web documents containing structured information, including words and pictures.

extensible markup language

making hardware decisions, the overriding considerations of a business should be technology cost and energy?

false

25. A database is a collection of integrated and related

files

A(n) _____ is a simple database program whose records have no relationship to one another.

flat files

Which of the following is NOT a component of a KPI (key performance indicator)?

format

_____ are specially denoted text or graphics on a Web page that, when clicked, open a Web page containing related content.

hyperlinks

The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.

implementation

_____ is the stage of the problem-solving process in which a solution is put into effect.

implementation stage

____ auditing is performed by employees within an organization

internal

One of the disadvantages of proprietary software is that:

it can take a long time and significant resources to develop the required software features

A scrum team usually consists of _________.

less than a dozen people

In a relational database, _____ is the ability to combine two or more tables through common data attributes to form a new table with only the unique data attributes.

linking

satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles.

low earth orbit satellite

The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.

maintenance

A project ___________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.

manager

The _____ MIS subsystems and outputs are used to monitor and control the flow of materials, products, and services through an organization.

manufacturing

A _____ MIS uses data gathered from both internal and external sources to provide reporting and aid decision making in areas of product design, media selection, channel distribution, and product pricing.

marketing

is a network that uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area.

mesh network

A(n) _____________ is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.

methodology

is a telecommunications network that connects users and their computers in a geographical area that spans a campus or city

metro area network

An ebusiness __________ is an approach to conducting electronic business by which a company can become a profitable business on the Internet.

model

is a telecommunications device that translates data from a digital form (as it is stored in the computer) into an analog signal that can be transmitted over ordinary telephone lines.

modem

Information __________ refers to the number of people a business can communicate with, on a global basis.

reach

11. A collection of fields about a specific object is a

record

After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a _______.

release

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.

schedule feasibility

A _____ is a description of the logical and physical structure of data and the relationships among the data for each user.

schema

The ____ is a description that involves "telling" the DBMS the logical and physical structure of the data and the relationships among the data for each user

schema

A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest.

search engine

is often conducted on phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user

social engineering

___ is a data visualization technique in which data is represented as networks where the vertices are the individual data points and the edges are the connections among them.

social graph analysis

is one in which all network devices are connected to one another through a single central device called the hub node.

star network

An agreement between two or more companies that involves the joint introduction and distribution of goods and services is called ______.

strategic partnership

Data within the data cube has been ______ by specific dimensional values.

summarized

._____ are the most powerful computers with the fastest processing speed and highest performance.

super computer

The goal of business intelligence is to _____.

support and improve decision making

A(n) ___________technology produces an improved product customers are eager to buy.

sustaining

The goal of the _____ step of systems development is to gain a clear understanding of the problem to be solved or opportunity to be addressed.

systems investigation

Social __________ describes the collaborative activity of marking shared online content with key words or tags as a way to organize it for future navigation, filtering, or search.

tagging

.Operating systems use _____ techniques to increase the amount of processing that can be accomplished in a given amount of time

task managment

A disruptive ___________ is a new way of doing things that initially does not meet the needs of existing customers.

technology

One advantage of proprietary software versus off-the-shelf software is that _____.

the software provides a company a competitive advantage by solving problems in a uniquemanner

1. A blade server houses many computer motherboards that include one or more processors, computer memory,secondary storage, network connections, and a common power supply and air-cooling source with a single chassis.

true

A new _____ is a major program change, typically encompassing many new features.

version

Companies such as IBM have developed ______ database systems to allow different databases to work together as unified database system

virtual

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.

volume testing

The Web as a computing platform that supports software applications and the sharing of information among users is referred to as _____.

web 2.0

A _____________is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.

wiki

A _____ is a single user, non-portable computer designed to perform engineering, computerassisted design (CAD), and heavy mathematical computing.

workstation

Visualization

​Data ______ tools can take raw data and immediately provide a rich visual image.

apply selected modeling techniques

​During modeling of the CRISP-DM method, we would ______.

Key performance indicators

​Metrics that track progress in executing strategies to attain organizational objectives are also known as _______ (KPIs).

Dashboards

​Similar to what you find in a car, a business _____ provides rapid access to information, in an easy-to-interpret and concise manner, which helps organizations

the spreadsheet's 'what-if' capability

​To analyze various alternative scenarios, a manager would use _______.

Frequency of occurrence of the word in source documents

​What determines the size of words in a word cloud?

Can lead to over spending on unapproved data sources and business analytics tools.

​Which of the following is a potential disadvantage with self-service BI? 1. Gets valuable data into the hands of the people who need it the most—end users. 2. Can lead to over spending on unapproved data sources and business analytics tools. ​3. Encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. 4. Accelerates and improves decision making.

Deployment

​____ is the last phase of the six-phase CRISP-DM method.

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

​entity symbol

Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.

​joint application development

Which of the following is NOT true about linear regression?

​the technique implies causality between the independent and the dependent variables


Related study sets

Disorders and conditions of the knee

View Set

"Road Rules & Road Signs" Practice Test

View Set

Documentation, Electronic Health Records, and Reporting

View Set

Townsend Ch 20 Electroconvulsive Therapy

View Set

SU 4: Self-Employment, Farming, and Adjustments

View Set

Chapter 7: The Control of Microbial Growth

View Set