Final Review I S 300
A ________ is a chart that lists project activities such as start and completion dates. A. Gantt B. DML C. GIS D. pie chart E. PERT
A. Gantt
________ may be used in order to speed up requirements determination and initial system design. A. Joint application design B. Rapid instructional technology C. Software standards D. Software express E. Joint development process
A. Joint application design
________ focuses on a specific measure of quality of 3.4 defects per million opportunities. A. Six sigma B. Sensitivity analysis C. A key performance indicator (KPI) D. Total quality management (TQM) E. A pivot table
A. Six sigma
The ________ strategy focuses on having components arriving exactly at the time they are needed. A. just-in-time B. instructional design C. bullwhip D. software E. ERD
A. just-in-time
The acronym KPI stands for ________. A. key performance indicator B. key performance instances C. key performance information D. key performance installations E. key performance infrastructure
A. key performance indicator
To transform information into _________, resources are used to discover patterns, rules, and context. A. knowledge B. skills C. data D. information E. instruction
A. knowledge
A project in which the user requirements are clear and stable is considered a(n) ________ project. A. structured B. redundant C. unstructured D. mandatory E. high-risk
A. structured
Last quarter's sales figures are considered ________ knowledge A. structured B. cloud computing C. database D. semi-structured E. tacit
A. structured
The first phase in the systems development process is ________. A. systems analysis B. programming C. systems design D. conversion E. testing
A. systems analysis
A decision about whether to enter a new market would be characterized as ________ and is the responsibility of ________ management. A. unstructured; senior B. unstructured; middle C. semistructured; middle D. structured; operational E. structured; middle
A. unstructured; senior
________ is a consequence of poor project management. A. Training B. Failure to obtain anticipated benefits C. Database utilization D. Scope E. Conducting a feasibility study
B. Failure to obtain anticipated benefits
________ feature(s) monitor the network at its most vulnerable points. A. Antivirus software B. Intrusion detection systems C. A sensor network D. Network address translation E. Unified threat management systems
B. Intrusion detection systems
Project management deals several major variables. Which of the following is the correct list? A. Scope, time, and cost B. Scope, time, cost, quality, and risk C. Time, cost, quality, and risk D. Scope, time, cost, quality, estimation, and risk E. Scope, time, cost, and risk
B. Scope, time, cost, quality, and risk
The most common form of organizational change is ________. A. a paradigm shift B. automation C. rationalization D. redesign E. sensitivity analysis
B. automation
Buying a gold coin from a leading online company (e.g., APMEX) is an example of ________ electronic commerce. A. traditional sales B. business-to-consumer (B2C) C. traditional marketing D. business-to-business (B2B) E. consumer-to-consumer (C2C)
B. business-to-consumer (B2C)
Craigslist is an example of a massive ________ electronic commerce organization. A. traditional marketing B. consumer-to-consumer (C2C) C. business-to-consumer (B2C) D. business-to-business (B2B) E. traditional sales
B. consumer-to-consumer (C2C)
An example of ________ includes a company being sold infrastructure as a service (IaaS) at the same time they purchased software as a service (SaaS) from a cloud services vendor. A. cross join B. cross-selling C. production selling D. knowledge selling E. commission selling
B. cross-selling
The two most important management challenges when building an e-commerce site include knowing how to choose the right technology and ________. A. hiring mostly web developers B. developing a clear understanding of your business objectives C. proved extensive training D. creating a mobile site E. locating headquarters in a large city
B. developing a clear understanding of your business objectives
Neural networks are now being used by companies (e.g., Visa International) to detect credit card fraud by ________. A. using spreadsheets B. learning from patterns in transaction data C. creating a database D. intranet technologies E. writing XML
B. learning from patterns in transaction data
Questions related to how you can induce change in local units to conform to international requirements is addressed in the international IS architecture ________ dimension. A. corporate global strategies B. management and business processes C. technology platform D. global environment business drivers and challenges E. communication structure
B. management and business processes
Smaller projects have a(n) ________ failure rate than larger projects A. unknown B. smaller C. similar D. larger E. dramatically larger
B. smaller
Examining college admission scores as the sole criteria for admission is an example of a(n) ________ decision. A. semi-structured B. structured C. good D. unstructured E. networking
B. structured
Enterprise applications include high ________, making it difficult to change vendors. A. meta data B. switching costs C. usage of cloud computing D. usage of analytics E. success rates
B. switching costs
Increased productivity, lower operational costs, and lower computer expenses are all considered ________ because they are quantifiable. A. intangible benefits B. tangible benefits C. ad hoc committees D. IS failures E. steering committees
B. tangible benefits
The organizational change model that focuses on achieving quality as a primary goal of all individuals within an organization is ________. A. six sigma B. total quality management (TQM) C. sensitivity analysis D. a pivot table E. a key performance indicator (KPI)
B. total quality management (TQM)
A(n) ________ is an Internet business model where users save time and money by processing online sales transactions and generating a fee for each transaction. A. community provider B. transaction broker C. content provider D. market creator E. e-tailer
B. transaction broker
Nike's contract suppliers are ________ in the supply chain. A. outside B. upstream C. owners D. optional E. downstream
B. upstream
A type of malware that takes advantage of poorly coded web applications is called ________. A. Conficker B. spyware C. SQL injection attacks D. Ransomware E. Storm
C. SQL injection attacks
A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________. A. hotspot B. switch C. firewall D. server E. router
C. firewall
Project risk ________ if the project team lacks the required technical experience. A. dramatically decreases B. remains unknown C. increases D. decreases E. remains the same
C. increases
Examining college admission scores in addition to interviewing the applicant is an example of a(n) ________ decision. A. unstructured B. structured C. semi-structured D. good E. networking
C. semi-structured
Customer relationship management applications that track social networking data are related to the ________ aspect of customer relationships. A. accounting B. marketing C. service D. sales E. database
C. service
Related to social e-commerce, small world theory suggests you are only ________ link(s) from every other person on earth. A. fifty B. two C. six D. one E. one hundred
C. six
E-commerce refers to the use of the ________ and ________ to transact business. A. DDL; DML B. advertising; marketing C. cash; credit D. Internet; Web E. spreadsheets; databases
D. Internet; Web
_________ describes the collective and individual experience of applying knowledge. A. Instruction B. Knowledge C. Information D. Wisdom E. Data
D. Wisdom
One challenge with training employees is that benefits are often ________ and difficult to quantify. A. steering committees B. free to the company C. ad hoc committees D. intangible E. tangible
D. intangible
The highest form of organizational change risk (are) ________. A. automations B. rationalizations C. sensitivity analyses D. paradigm shifts E. redesigns
D. paradigm shifts
If Politicit.com decides to quickly build a test system for its end users to evaluate, they are creating a(n) ________. A. systems analysis B. conversion C. systems design D. prototype E. programming
D. prototype
The phase of the systems development process when a feasibility study is conducted is ________. A. programming B. systems design C. testing D. systems analysis E. conversion
D. systems analysis
A lead chef quitting at a restaurant and taking her secret recipes with her is considered ________ knowledge. A. cloud computing B. database C. structured D. tacit E. semi-structured
D. tacit
Which of the knowledge management systems' IS activities involve data mining? A. Feedback B. Disseminate C. Store D. Apply E. Acquire
E. Acquire
________ avoid the problem of having databases in areas such as finance, human resources, sales and marketing, and manufacturing that are not capable of sharing information. A. Human resource systems (HRS) B. Quality control applications (QCA) C. Local area networks D. Data definition language (DDL) E. Enterprise resource planning (ERP) systems
E. Enterprise resource planning (ERP) systems
A ________ is a chart that depicts project tasks and their interrelationships. A. Gantt B. GIS C. DML D. pie chart E. PERT
E. PERT
A risk ________ determines the level of risk to an organization if an activity or process is not properly controlled. A. policy B. profile C. alignment D. audit E. assessment
E. assessment
Global communication and transportation technologies are an example of a(n) ________. A. business analytics toolset B. paradigm shift C. IS architecture D. sensitivity analysis E. business driver
E. business driver
Databases, data warehouses, data marts, and analytic platforms are part of the ________. A. BI and analytics for DSS platform B. user interface C. business analytics toolset D. managerial users and methods E. business intelligence infrastructure
E. business intelligence infrastructure
If top management is reluctant to implement a new system, it is probably wise to avoid a ________ implementation, which is the most aggressive approach. A. drop B. pilot C. parallel D. phased E. direct cutover
E. direct cutover
A company that is heavily centralized in the country (including production) of origin is considered ________ strategy. A. inter-border flow B. multinational C. franchiser D. data-flow E. domestic exporter
E. domestic exporter
Independent computer programs that copy themselves from one computer to others over a network are called ________. A. viruses B. Trojan horses C. Storm D. macro viruses E. worms
E. worms