ISA EXM 1 Quiz Study Questions

Ace your homework & exams now with Quizwiz!

The way a business can monitor the whole organization by viewing multiple inputs being processed and transformed to produce outputs while gathering feedback. -systems thinking -competitive advantage -strategy -the 5 forces

-systems thinking

What is clickstream analytics? -The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order. -A two-dimensional representation of data in which values are represented by colors. -Uses clickstream data to determine the efficiency of the site for the users and operates at the server level. -Uses clickstream data to determine the effectiveness of the site as a channel-to-market.

The process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order.

How do sustaining technologies lead to future growth from existing investments? -they enable the company to raise prices on existing products. -They enable a company to open new markets and destroy old ones. -They produce improved products in an established market. -They position companies expecting future growth from new investments.

They produce improved products in an established market.

What is a firewall expected to accomplish? -all of these are correct -examines each message that wants entrance to the network -detects computers communicating with the Internet without approval -blocks messages without the correct markings from entering the network

all of these are correct

There are many downtime-related threats to an organization's intellectual assets . From the list below, what is not considered a threat according to the text? -loss of power -loss of internet connectivity -terrorism -flood -all of these are threats to intellectual assets

all of these are threats to intellectual assets

Chloe needs to log into the HR system to update the employee headcount figures. She types in her User ID and Password in the sign-on page of the HR application. What concept below describes this protection technique? -encryption -authorization -intrusion detection -authentication

authentication

____________ is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs. -workflow -streamlining -business process modeling -automation

automation

in the required reading, Human values in the loop : Design principles for ethical AI, Deloitte described 3 core principles when thinking about the ethical use of AI. Which one of these is not a principle? -impact -bias -justice -autonomy

bias

What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making? -knowledge -suppliers intelligence -business intelligence -strategy

business intelligence

is a standardized set of activities that accomplishes a specific task. -business strategy -knowledge process -business process -business outcome

business process

What is a graphic description of a process, showing the sequence of process tasks, that is developed for a specific purpose and from a selected viewpoint? -business process -business process engineering -business process model -business process matrix

business process model

___________sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. -explicit knowledge -crowdfunding -crowdsourcing -tacit knowledge

crowdfunding

_________ is a new way of doing things that initially does not meet the needs of existing customers. -disruptive tech -innovator's dilemma -sustaining tech -digital darwinism

disruptive tech

_______________________ scrambles information into an alternative form that requires a key or password to decrypt the information -2-factor authentication -spyware -content filtering -encryption -none of these

encryption

is the confirmation or validation of an event or object. -fact or data -information -information tech -BI

fact or data

What refers to the level of detail in the model or the decision-making process? -visualization -digital dashboard -granularity -none of these are correct

granularity

___________ are measurements that evaluate results to determine whether a project is meeting its goals. -metrics -best practices -ROI -BPMN

metrics

_________ is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. -management system -knowledge system -open system -closed system

open system

Which of the following best describes Web 1.0? -intelligent applications -machine based learning -static text-based information websites -all are characteristics of Web 1.0

static text-based information websites

Decision making in organizations occur at 3 levels. What level has an external focus on the industry with an emphasis on a multi-year view? -managerial -none of the above -strategic -operational

strategic

The factor that significantly contributed to people's needs to use information systems to make decisions is ______. -impossible to answer because it depends on the industry -the amount of information people must understand to make good decisions is increasing exponentially -the amount of information people must understand to make good decisions has remained unchanged. -the amount of information people must understand to make good decisions is decreasing exponentially.

the amount of information people must understand to make good decisions is increasing exponentially

What is porters 5 forces model

the framework for analyzing a company's competitive environment

Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry. -structured -uncertain -supply side -transactional

transactional

is the technique used to execute the business strategy. -SWOT analysis -value chain -the 5 forces model

value chain

What allows users to access the WWW? -HTTP -web browser -Web 3.0 -HTML

web browser


Related study sets

Ch. 34: Obstetrics and Neonatal Care

View Set

Innovation and Entrepreneurship Ch 1 - 5

View Set

earth science- chapter 7 earthquakes

View Set

Week 3 Check Your Understanding Assignment

View Set

Finance chapter 15- Stock valuation

View Set

C. Week 3:Chemical Events at the Synapse

View Set