IS Exam

Ace your homework & exams now with Quizwiz!

Your new boss lets you know that, if you choose to bring your personal laptop to work, you will be held responsible for any damage or information loss. This is an example of... An open-sourced project A BYOD policy A closed-source project A native application

A BYOD policy

What is true about the diagram below? Department--->Advisor--->Student Deptname. AdvisorName Student# ------------ --------------- ------------ Admin. Phone. Stu. name Phone. CampusAdd. HW1 Email. Emailadd. HW2 Midterm -A department may not have any adviser. -An adviser does not need to belong to any department. -There exists a many-to-many relationship between Adviser and Student. -Phone is a primary key for the Adviser entity.

A department may not have any adviser.

Which of the following statement is true about unsupervised data mining? -Neural networks are a popular unsupervised data mining application. -Data miners develop a model prior to the analysis and apply statistical techniques to data. -Unsupervised data mining requires tools such as regression analysis. -Analysts do not create a model or hypothesis before running the analysis.

Analysts do not create a model or hypothesis before running the analysis

Pokémon Go is a mobile application that uses the camera and GPS system of a user's phone to digitally superimpose imaginary creatures on top of real-world scenery. This is an example of... BYOD Augmented reality Virtual reality Internet of Things

Augmented reality

______ is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.

Big data

Best Buy has an approarch that involves greeting customers when they walk through the front doors, offering assistance when people begin browsing through their product offerings, assisting with payment through payment plans, and offering returns for products that didn't meet customer expectations. What is this approach known as? bargaining power of customers Cost Leader Strategy Public Relations Business Process

Business process

McDonald's chooses a division of labor where their staff is inexperienced and must be trained before they can serve the general public. Thus, they do not have to pay high salaries to their workers. What kind of strategy has McDonald's successfully employed? Product Differentiation Cost Leadership Early Adopter industry-wide

Cost Leadership

Garlicoin- which traded at a price as high as $2.11 per "coin" on January 29, 2018- is a digital only currency that was first developed as a bit of an online joke. It was able to gain real value because of its popularity- despite having no gold backing. What is Garlicoin an example of? Digital reality Internet of Things Cryptocurrency Stock

Cryptocurrency

You are tasked with helping a startup company create a new database. However, you do not know much about database processing. You choose to hire a vendor such as IBM or Microsoft to help through this process. What is this type of program called? Database Model Business Process Development Software Database Defined Querying Database Management System

Database management System

Many business students may question why a database is necessary for a business to track information. "Why not just use an Excel spreadsheet?" Which reason explains why database processing is a crucial feature for any business to utilize? -Databases can keep track of multiple themes. -Not every machine has access to Excel. -Databases have an online component that spreadsheets do not. -Databases are easier for entry-level employees to understand.

Databases can keep track of multiple themes.

Problematic operational data is termed as ______

Dirty Data

You own a company that outsources the manufacture of its product. The larger your order, the lower average cost per unit. What benefit does your company have in common with the cloud? The Internet of Things Economies of Scale Product Differentiation Ethernet

Economies of Scale

Similar to home electricity use, the cloud allows organizations to dynamically increase and decrease programmatically so that they only pay for the resources that they actually use. This is because cloud use is ____. Rigid Inelastic Elastic Static

Elastic

A lawyer with high-profile clients is concerned with the security of their data and wishes to maintain complete control over their data location. Under these circumstances, it would make sense for this legal office to store their data in the cloud. True False

False

You have been assigned the task of creating a data model for the organization you work for. You begin to research the various components of a data model and find that entities are the "verbs" of a model and attributes are the "nouns." True False

False

You have just begun working at a company who is starting to restructure their database. They have asked you to review the data model that was once used to build the database that is in effect today. However, you realize that the data model has two entities that were never added into the real database. Since they are not part of the actual database, it is not necessary to question if they should be incorporated when you meet with the IS department after your review. True False

False

Uber, a ride-sharing app, began offering their services much before other now popular ride-sharing apps such as Lyft and Juno. What strategy did Uber benefit from? Product Differentiation Establish Alliances Early High Switching Costs First Mover Advantage

First Mover advantage

Your startup company has begun making sales across the nation. You want to find out exactly how well the sales of your company has been doing by city. However, your data analyst tells you that they only have a system that can determine total sales by state. What problem is occurring with your startup's data? Granularity Inconsistent Data Dirty data Too Many Data Points

Granularity

A computer's CPU controls the flow of data according to its instructions. CPU's depend on a group of microchips located on the motherboard to process information. What is the CPU an example of? Software Firmware A byte Hardware

Hardware

A criminal investigator is working on a case involving cybercrime. They've been able to trace the origin of the suspicious activity to a local public library. Which of the following made this discovery possible? CDN TCP IP Address PAN

IP Address

After working closely with the operations team of your company, you notice that the value chain seems to be more integrated than ever. What concept from the textbook did your firm successfully utilize? activities linkages margin outputs

Linkages

iPhones come with a pre-downloaded application called "Weather-" in which information can be found on the current and predicted weather anywhere in the world. This application is only available to and compatible with iOS. What type of application is this an example of? Thin-client application Native application One-of-a-kind application Web application

Native application

When you begin entering data into the database you have created for your organization, you realize that information is poorly structured and will cause issues further down the road. Perhaps you should break up the information into more, well-structured tables. Which process should you most likely undergo to alleviate the database of future error? Database Redesign Normalization Database Integrity Database Process Remodel

Normalization

A baking company uses eggs, sugar, flour, chocolate chips, and water to create cookies. This is the ______ activity of their value chain. marketing outbound logistics inbound logistics operations

Operations

After a successful marketing campaign, your company has sold over 125,000 units of its automated flying car. However, you have no idea how you plan to ship all these huge cars. What primary activity is your issue derived from? Customer Service Operations/Manufacturing Outbound Logistics Inbound Logistics

Outbound Logistics

Apple's Airpods are able to utilize wireless network technology to connect to a user's cellular device and play high-quality audio. Which type of network is this an example of? MAN PAN WAN LAN

PAN

BI systems have 5 standard components. These are hardware, software, data, procedures, and _______. Machines People Programs Policies

People

You run Salt Lake's most successful diamond and jewelry store. One morning, you hear the news that overnight, one of the mines that your gems are harvested from has been detonated with C4. According to Porter's 5 Forces model, which threat is your jewelry store facing? Power of Customers Correct! Power of Suppliers Rivalry Threat of New Entrants

Power of suppliers

If you are asking questions such as, "How can we increase sales?" and, "How can we reduce food waste?" You are in the _________ task of Business Intelligence Systems. Informing Project Management Problem Solving Deciding

Problem Solving

________ requires the user to request business intelligence (BI) results.

Pull publishing

At the end of each year, Spotify, a digital musical service, sends a report to each of their listeners explaining how much time they spent listening to music, their favorite artists, songs, and albums. This is an example of _____ publishing. Pull Push

Push

_______ analysis is a way of analyzing and ranking customers according to their purchasing patterns.

RFM

King Kong Construction implements DOMO Business Intelligence software to achieve optimal efficiency and cost in allocating workforce to construction projects. By doing this, King Kong has achieved competitive advantage by ___________________________________. creating a new product or service raising barriers of entry enhancing its products or services reducing cost via process implementations

Reducing cost via process implementations

Which programming language do businesses utilize to code inside a database? Python Java SQL PHP

SQL

University of Utah employees utilize Office 365 and its cloud capabilities to store and collaborate on files from multiple devices. This is an example of...SaaS (Software as a Service) Traditional On-Premises PaaS (Platform as a Service) IaaS (Infrastructure as a Service)

SaaS (Software as a Service)

The University of Utah has legally obtained the right to install Microsoft Office software on all of the computers available to students for use at the Marriot Library. This is an example of a... Open Source Application Closed Source Application PC Virtualization Site License

Site License

Content Delivery Networks are able to decrease load-time, increase reliability, and reduce the workload on the origin server. Which of the following characteristics of CDNs contributes to these benefits? -They hold specialized information that is frequently updated -They utilize Transmission Control Protocol (TCP) -They increase delivery costs -They are geographically distributed

They are geographically distributed

The United States Military requires a high-security, one of a kind application to fit their unique needs. Which of the following is NOT true about a one of a kind application? -They are typically closed source -They are relatively inexpensive to develop -They require maintenance -Only trusted programmers can make changes to the code

They are relatively inexpensive to develop

You are developing a new scheduling application for your personal business. The project has a relatively small budget and you don't believe it will increase appointments- merely the convenience of scheduling them. What type of application best suits your needs? Thick-client application Native application Thin-client application Social application

Thin-client application

After a piece of mail is addressed, the Postal system puts a "registered mail" sticker on the package. This sticker guarantees the delivery of the package. Similarly, after a packet of information is addressed on the Internet to a specific IP, what guarantees the timely and accurate delivery of the information packet? Domain Name IP Address Transmission Control Protocol (TCP) Domain Name System (DNS)

Transmission Control Protocol (TCP)

Before companies actually start on building a database, they often start out with a data model to determine which components are required for the database to be effective. True False

True

Netflix accounts for more than 30 percent of all Internet traffic in North America between 9 PM and 12 AM. Video streaming requires a relatively high amount of bandwidth to process. For this reason, Netflix most likely supports Net Neutrality. True False

True

You are the CFO of a large firm in Salt Lake City. You receive a report each quarter of all the data your Finance department has utilized for the past three months. It is likely that the data was obtained from a data mart. True False

True

Your boss wishes for you to find all customers who live out of state by using a SQL command within the database. Is this something that is possible to achieve through SQL? True False

True

Each year, you become excited when the new Apple iPhone releases. In your eyes, you would pay $2,000 for the latest and greatest Apple technology. What concept does this demonstrate? Margin Cost Value Profit

Value

Your local dentist utilizes a complex application that specifically tracks the status of teeth and the progression of abnormalities, such as cavities. What type of application is being used? Vertical market application Horizontal market application One-of-a-kind application Free application

Vertical market application

You are a small vendor that operates an online store. You decide to use cloud technology to help process orders/online activity and to store data. Which of the following is NOT a benefit of this decision? Small capital requirements Speedy development Visibility of security Known cost structure

Visibility of security

Snapchat is a social media application that is free to download and to use. What is Snapchat's monetized product? Freemium services Filters You are the product News/content

You are the product

Jason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________. r-educe costs -create a new product -lock in customers -raise barriers to market entry establish alliances

lock in customers

Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n) ________. key attribute functionally dependent record primary key foreign key

primary key


Related study sets

Honan-Chapter 25: Patients With Hepatic and Biliary Disorders

View Set

ATI HIV AIDS Targeted MEd Surg practice test

View Set

SB 17 Integrated Marketing Communications

View Set

R/E Finance: Unit 11 - Deeds of Trust & Mortgages

View Set

Honors Chemistry 1 Semester Exam (Part 2)

View Set