Information Systems Final Exam
Software used to apply the computer to a specific task for an end user is called
Application software
Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
Assign responsibility
Which of the following would be a typical production report for an organization's financial division?
Cash Flow
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members is called its
Culture
What service converts IP addresses into more recognizable alphanumeric names?
DNS
All of the follow can be considered managerial responsibilities except
Designing new information systems
Reducing the business process layers in a distribution channel is called
Disintermediation
A company's organizations and processes for distributing and delivering products to the final customers is the
Downstream portion of the supply chain.
An information system can enhance core competencies by
Encouraging the sharing of knowledge across business units.
Which of the following is not true about enterprise systems?
Enterprise software is expressly built to allow companies to mimic their unique business practices.
A business process is a single step taken in a set of logically related activities that accomplish a specific business task
False
Advances in data storage have made routine violation of individual privacy more difficult
False
Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support
False
E-commerce refers to the use of any networking technologies to transact business
False
Executive support systems focus on using parameterized reports and data mining to analyze large pools of data in major corporate systems
False
HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons, such as Flash animations, in web pages
False
IT infrastructure technology is the set of physical devices required to operate the entire enterprise
False
Information systems literacy describes the behavioral approach to information systems, while computer literacy describes the technical approach
False
More timely information is a tangible benefit of information systems
False
Supply chain management systems are a type of enterprise system
False
The term cracker is used to identify a hacker whose specialty is breaking open security systems
False
Which type of information system uses data visualization technology to analyze and display data for planning and decision making in the form of digitized maps?
GIS
In network economics, the value of a commercial software vendor's software products
Increases as more people use them
A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line best describes a ________ strategy
Just-in-time
Which of the following is not one of the unique considerations in developing applications for a mobile platform?
Keyboard configuration
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
May be accessable by anyone who has access to the same network
The ________ strategy concentrates financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries
Multinational
NORA is a
New data analysis technology that finds hidden connections between data in disparate sources.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called
Normalization
A field identified in a table as holding the unique identifier of the table's records is called the
Primary key
Converting raw data into a more meaningful form is called
Processing
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
Profiling
The effort required to locate a suitable product is called
Search costs
_______ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards
Security
The three principal levels of hierarchies within a business organization are
Senior management, middle management, and operational management
The type of decision that can be made by following a definite procedure is called a(n) ________ decision
Structured
Order the following steps in the systems development lifecycle in the correct sequence
Systems analysis, systems design, programming, testing, conversion, production and maintenance
System Testing
Tests the functioning of the system as a whole.
The quality of ubiquity, as it relates to e-commerce, is illustrated by
The availability of the Internet everywhere and anytime.
A business model describes how a computer produces, delivers, and sells a product or service to create wealth
True
A decision can be said to have improved if it can be made more quickly
True
A native app is one that is designed to run on a specific platform
True
A primary challenge in BPM is employee resistance
True
Data cleansing is the same process as data scrubbing
True
Decision-support systems often use information from external sources
True
Enterprise systems include analytical tools
True
Fiber-optic cable is more expensive and harder to install than wire media
True
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations
True
Smartphones have the same security flaws as other Internet-connected devices
True
Software localization refers to the entire process of converting software to operate in a second language
True
Telephone networks are fundamentally different from computer networks
True
The Internet shrinks information asymmetry
True
Transaction processing systems are the basic business systems that serve the operational level of the organization
True
Viruses can be spread through e-mail
True
Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information
True
Web mining is the discovery of useful patterns on the Web
True
A virtual company
Uses the capabilities of other companies without being physically tied to those companies.
T-Lines
are high-speed, leased data lines providing guaranteed service levels.
The most basic business database is comprised of
five tables: for customers, employees, suppliers, parts, and sales.
The five basic entities that make up any business are suppliers, customers, employees, products and services, and
invoices and payments