Final Exam (Ch. 1- 9 Quiz Questions and Test 1 and 2 questions)

Ace your homework & exams now with Quizwiz!

Which domain is reserved for accredited postsecondary institutions?

.edu

What are the three cloud computing service delivery models?

1. Infrastructure as a service 2. software as a service 3. platform as service

What is Mozilla Firefox?

A competitor to internet explorer

What is a primary key?

A field (or group of fields) that uniquely identifies a given entity in a table

What is a foreign key?

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

What is the difference between a B2C and a C2B?

B2C focuses on business to consumers and C2B focuses on consumers to business

What is the next and future step of information management systems?

BPM (Business process management)

What measures network performance by the maximum amount of data that can pass from one point to another in a unit of time?

Bandwidth

What is it called when distorted product-demand information ripples from one partner to the next throughout the supply chain?

Bullwhip Effect

Which extended ERP component collects information used throughout an organization, organizes it, and applies analytical tools to assist managers with decisions?

Business intelligence

What is a standardized set of activities that accomplishes a specific task?

Business process

Which of the below does not represent a category of AI? genetic algorithms neural networks expert systems consolidation

Consolidation

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

Copyright

CSFs and KPIs are two core metrics used to evaluate results and measure the progress of a project for a business. Which of the below represents the acronyms for CSF and KPI?

Critical success factors and key performance indicators

What is information?

Data converted into a meaningful and useful context

which of the following represents the core drives of the information age? data, intelligence, business information, knowledge data, information, business intelligence, knowledge fact, data, intelligence, experience fact, intelligence, business skills, knowledge

Data, information, business intelligence, knowledge

What is at the heart of any ERP system?

Database

What maintains information about various types of objects, events, people, and places?

Database

What decodes information?

Decryption

which of the following is considered a managerial decision or semi-structured decision? investigating why payroll is having problems running tracking how much inventory is in the warehouse determining how many employees are out sick determining the impact of last month's marketing campaign

Determining the impact of last month's marketing campaign

Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing phase Analysis phase Development phase Planning phase

Development phase

What is the worldwide gap giving advantage to those with access to technology?

Digital divide

Which application's primary business benefits include forecasting, planning, purchasing, material management, warehousing, inventory, and distribution? CRM SCM ERP None of the above

ERP

A few examples of ebusiness advantages can include opening new markets, reducing costs, and expanding global reach. T/F

FALSE

Alpha testing occurs when programmers test the system to ensure it is bug-free. T/F

FALSE

Disruptive technology tends to provide us with better, faster, and cheaper products. T/F

FALSE

The structure of a typical organization is similar to a pyramid, with different levels that require one consistent type of information to assist with all managerial decision making. T/F

FALSE

effectiveness MIS metrics include throughput, transaction speed, and system availability. T/F

FALSE

buyer power is included as one of porter's three generic strategies T/F

FALSE 1. Cost leadership 2. Differentiation 3. Focus

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry? taylor swift, beyonce, the beatles, the stones game systems like wii, social networks like facebook established record labels like EMI, sony, and universal independent record labels

Game systems like Wii, and social networks like facebook

What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge known as?

Hacker

John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on fixing?

Hardware

What is the difference between hardware and software?

Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks

What is the support value activity that provides employees with training, hiring, and compensation?

Human resources management

What is the largest and most important network that has evolved into a global information superhighway?

Internet

What is an ISP?

Internet service provider is a company that provides access to the Internet for a monthly fee.

There are three phases in the evolution of CRM: (1) reporting, (2) analyzing, and (3) predicting. What do CRM predicting technologies help organizations accomplish?

Making predictions regarding customer behavior such as which customers are at risk of leaving.

Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organization pyramid would you categorize Jenny? managerial strategic owner operational

Managerial

What are measurements that evaluate results to determine whether a project is meeting its goals?

Metrics

What is software whose source code is available free for any third party to review and modify?

Open source

Which of the following represents the phases in the SDLC? Plan, analysis, design, test, maintain, develop, implement Analysis, plan, design, test, develop, maintain, implement Plan, analysis, design, develop, test, implement, maintain Analysis, plan, develop, design, test, implement, maintain

Plan, analysis, design, develop, test, implement, maintain

What is any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project?

Project deliverable

Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal? SCRUM XP RUP RAD

SCRUM

What is a combination of HTTP and SSL that provides encryption and secure identification of an Internet server?

Secure hyperteXt transfer protocol (HTTPS)

Which of the below represents the three different levels of a company pyramid from the top to the bottom?

Strategic --- Managerial --- Operational

Which of the below represents a company in a supply chain?

Supplier and Customer

A backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes. T/F

TRUE

A data warehouse is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks. T/F

TRUE

A domain name system (DNS) associates IP addresses with domain names, or identifying labels that use a variety of recognizable naming conventions. T/F

TRUE

A paradigm shift occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave. T/F

TRUE

A private cloud serves only the owner organization and can be located on the owner's premises or off the owner's premises. T/F

TRUE

A sustaining technology produces an improved product customers are eager to buy, such as a faster car or larger hard drive T/F

TRUE

A universal resource locator (URL) is the address of a file or resource on the web such as cofc.edu. T/F

TRUE

A variable is a business intelligence characteristic that stands for a value that is expected to change over time. T/F

TRUE

Broadband over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems. T/F

TRUE

Choosing not to fire a sales representative who is underperforming knowing that person is experiencing family problems is a form of knowledge. T/F

TRUE

Cloud computing could change not only the way businesses operate, but also the way people interact with technology. Google Apps is an example of a cloud computing service. T/F

TRUE

Cyberbullying is an act or object that poses a danger to people. T/F

TRUE

Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. T/F

TRUE

Enterprise application integration (EAI) connects the plans, methods, and tools aimed at integrating separate enterprise systems. T/F

TRUE

Fourth-generation languages (4GL) are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS "SMITH". T/F

TRUE

Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. T/F

TRUE

Key performance indicators can focus on external and internal measurements. T/F

TRUE

Middleware translates information between disparate systems. T/F

TRUE

Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs. T/F

TRUE

Order date, amount sold, and customer number are all forms of data T/F

TRUE

Plan, source, make, deliver, and return are the five basic supply chain management components. T/F

TRUE

RFID innovations and technologies are being used in many industries including retail, hospitals, pharmaceuticals, and ranchers to track people, products and animals. T/F

TRUE

Search engine optimization (SEO) combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking. T/F

TRUE

Software engineers use computer-aided software engineering (CASE) software tools to provide automated support for the development of the system. T/F

TRUE

The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. T/F

TRUE

The logical view of information focuses on how individual users logically access information to meet their own particular business needs. T/F

TRUE

The physical view of information deals with the physical storage of information on a storage device. T/F

TRUE

Uber created a first-mover advantage by developing its customer self-service software, which allows people to request and pay for a ride online. T/F

TRUE

Unstructured decisions occur in situations in which no procedures or rules exist to guide decision makers towards the correct choice. T/F

TRUE

at the operational level employees develop, control, and maintain core business activities required to run the day-to-day operations. T/F

TRUE

business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision-making T/F

TRUE

productivity is the rate at which goods and services are produced based upon total output given total input T/F

TRUE

What is the systems development life cycle?

The overall process for developing information systems from planning and analysis through implementation and maintenance

What is McDonald's performing when it asks its customers if they would like to super-size their meals?

Up-Selling

What is VoIP? VoIP uses IP technology to transmit telephone calls VoIP offers the low cost ability to receive personal and business calls via computer VoIP offers the ability to have more than one phone number VoIP offers All of the above

VoIP offers all of the above

what is a competitive advantage?

a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

Which of the following is not an example of unplanned downtime? power outages tornados a system upgrade network failure

a system upgrade

What is phishing?

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses

What is cloud computing services changing? the way people access information the way people deliver information the way people use information all of the above

all of the above

what are the characteristics of unstructured data? emails, twitter tweets, and text messages free-form text does not follow a specified format all of these

all of these choices

What is a business that operates in a physical store without an Internet presence?

brick-and-mortar business

Which of the following reflects Moore's law?

computer chip performance per dollar doubles every 18 months

What is a single unit of binary data routed through a network?

ethernet packet

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?

hardware key logger

Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

hot site

Which of the following include the three types of an MIS infrastructure?

information MIS, agile MIS, and sustainable MIS infrastructures

Which four elements are included in systems thinking?

input, process, output, feedback

which of the following represents the relationship between functional areas in a business? autonomous interdependent independent self-sufficient

interdependent

there are many different stakeholders found in an organization with common business interests. depending on the stakeholder's perspective, the business strategy can change. which of the following is not a main concern for shareholders/ investors? job security high return on investment maximize profits grow market share

job security

What is software whose source code is available free for any third party to review and modify?

open source

What is a computer dedicated to providing information in response to requests?

server

What verifies that the units or pieces of code function correctly when integrated together?

system testing

In terms of system thinking, what is output?

the resulting information from the computer program

How do the majority of potential customers find business websites?

through web search terms that match the content


Related study sets

CNA285 - Chapter 10 Selecting the Best Course of Action

View Set

Steve Jobs - 02/24/1955 - 10/5/2011

View Set

Networking Technology for Information Professionals Module 2

View Set

Organizmo valdymas ir koordinacija

View Set