Jerrys Final

Ace your homework & exams now with Quizwiz!

Studies of actual managerial performance indicate that managers perform work at a pace of​ _______ different activities each day. A. 600 B. 160 C. 60 D. 1600 E. 16

A. 600

​________ are data files used to identify and protect online transactions using a trusted third party. A. Digital certificates B. Analog certificates C. SSL D. Digital confirmations E. Analog confirmations

A. Digital certificates

Which of the knowledge management​ systems' IS activities involve search​ engines? A. Disseminate B. Store C. Feedback D. Apply E. Acquire

A. Disseminate

Organizational learning is the result of knowledge​ ________. A. application B. acquisition C. scenarios D. dissemination E. storage

A. application

The field of management information systems​ (MIS) deals with​ ________ issues as well as technical issues related to the development and use of information systems in an organization. A. behavioral B. management C. software D. hardware E. personnel

A. behavioral

The data and software tools for​ organizing, analyzing, and providing access to data to help managers and other enterprise users make more informed decisions are referred to as​ ________ systems. A. business intelligence B. ​decision-support C. transaction processing D. executive support E. management information

A. business intelligence

A(n) ________ is a database that stores historic and current data for the use of decision makers in the organization. A. data warehouse B. ​in-memory database C. ​non-traditional database management system D. ​flat-file system E. transaction processing system

A. data warehouse

A​ manager's ________ role includes handling disputes. A. decisional B. informational C. data worker D. functional E. service

A. decisional

A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100, Course IS​ 101, and Grade A. A. field B. file C. bit D. record E. byte

A. field

The strategy used by an expert system to search the rule base to arrive at a conclusion is called​ ________. A. the inference engine B. genetic algorithm C. information chaining D. backward chaining E. neural network

A. the inference engine

Which of the following systems would BEST support managers who focus on unique problems for which the procedure to arrive at a solution may not be fully predefined in​ advance? A. ​Decision-support B. Business intelligence C. Executive support D. Management information E. Transaction processing

A. ​Decision-support

Storing past experiences in the form of cases is a KM method called​ ________. A. ​case-based reasoning​ (CBR) B. ​case-based approach​ (CBA) C. knowledge reasoning​ (KR) D. knowledge approach​ (KA) E. ​knowledge-based reasoning​ (KBR)

A. ​case-based reasoning​ (CBR)

What is structured​ knowledge? A. Tacit knowledge that exists in formal documents. B. Explicit knowledge that exists in formal​ documents, as well as in formal rules. C. Any knowledge that is in a structured format recognized by computer. D. Tacit knowledge that exists in SQL format. E. Explicit knowledge that exists in SQL format.

B. Explicit knowledge that exists in formal​ documents, as well as in formal rules.

The​ ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records. A. Privacy Act of 2000 B. Privacy Act of 1974 C. HIPA 1990 D. FERPA Act of 1999 E. Data Act of 2000

B. Privacy Act of 1974

A(n) ________, such as a​ clerk, uses data for things such as scheduling. A. production worker B. data worker C. hourly worker D. business function E. knowledge worker

B. data worker

A​ person, place, or thing which is stored in a database is called​ a(n) ________. A. bit B. entity C. file D. object E. attribute

B. entity

Information systems can be used to create products and services that are personalized to meet a specific​ customer's requirements, termed​ __________. A. product differentiation B. mass customization C. customer intimacy D. product capitalization E. information domination

B. mass customization

E-commerce has become more​ ________. A. ​stable, mobile, and less expensive B. ​social, mobile, and local C. ​individual, static, and global D. ​mobile, private, and global E. ​secure, private, and less expensive

B. ​social, mobile, and local

What is a touch​ point? A. The time when a sales person meets a customer B. A position on a screen​ (app) where the user touches​ (interacts) C. A method of interaction with a customer D. A position on Web page where the user clicks E. Software used for sales training enabling sales​ people's knowledge of products

C. A method of interaction with a customer

​________ businesses gather and sell personal information to government agencies. A. Data preservation B. Advertising C. Data broker D. Fraud detection E. Identity protection

C. Data broker

What is a Web​ beacon? A. A Bing initiative to increase traffic to OneDrive B. A Google program to direct clicks to a Web site C. Small software programs that keep a record of​ users' online clickstream D. A small program that calls to browsers to visit a Web site E. A Web program that forces users to click on a link

C. Small software programs that keep a record of​ users' online clickstream

What are knowledge work​ systems? A. Specialized systems running a working AI to derive knowledge from the Internet. B. Specialized systems running a working AI to automate the business processes. C. Specialized systems for discovering and creating new knowledge. D. Specialized systems for working knowledge. E. Specialized systems running a working AI to create new more efficient business processes.

C. Specialized systems for discovering and creating new knowledge.

Data mining and big data analytics are examples of​ ________. A. BI and analytics for DSS platforms B. managerial users and methods C. a business analytics toolset D. BI and analytics for DSS user interfaces E. business intelligence infrastructure

C. a business analytics toolset

An extranet is a system that shares data​ ________. A. within an​ organization's accounting area B. within an​ organization's productions area C. across multiple organizations D. within a single home E. within an organization

C. across multiple organizations

A​ ________ is a component in the computer system data hierarchy that consists of multiple records of the same type. A. record B. field C. file D. bit E. byte

C. file

The​ ________ role is NOT one of the activities that managers are expected to perform in an organization. A. informational B. interpersonal C. high velocity D. counseling support E. decisional

C. high velocity

A(n) ________ is an important resource for an organization to​ create, illustrating rules on how data is organized and who has access to what data. A. database B. data model C. information policy D. data requirements E. database approach

C. information policy

All of the following are general controls EXCEPT​ ________ controls. A. software B. data security C. input D. implementation E. hardware

C. input

________ use a more flexible data model and are designed for big data. A. Legacy systems B. Data warehouses C. ​Non-relational database management systems D. Online analytical processing systems E. Relational databases

C. ​Non-relational database management systems

What type of attack consists of malware that comes with a downloaded file that a user intentionally​ requests, such as a free game or​ coupon? A. SQL injection attack B. AppWorm C. ​drive-by download D. Rootkit attack E. Worm

C. ​drive-by download

________ consists of processes and tools to identify the valid users of a system. A. Security process B. Login accounts C. A security policy D. Identity management E. An acceptable use policy

D. Identity management

What makes a Blockchain system possible and attractive to business​ firms? A. Blockchain systems always include remote maintenance and support capabilities. B. Blockchain makes it easier for competitors to​ collude, ultimately to the detriment of consumers. C. Blockchain is easily implemented across larger enterprises. D. Its encryption and authentication processes make it highly secure for storing many kinds of data. E. It is free open source software​ (OSS), which means that the copyright holder grants users rights and privileges.

D. Its encryption and authentication processes make it highly secure for storing many kinds of data.

​________ encompasses a set of assumptions about what an organization should​ produce, how it is​ produced, and for whom. A. Disruptive technology B. Standard operating procedure C. Organizational environment D. Organizational culture E. Business process

D. Organizational culture

When demand for a product mistakenly gets distorted as it passes across the supply​ chain, it is called a​ ________. A. bull distortion B. process distortion C. process error D. bullwhip effect E. bulltrap effect

D. bullwhip effect

From an information technology​ perspective, ________ includes the infrastructure for​ warehousing, integrating,​ reporting, and analyzing data from the business environment. A. data​ (D) B. management information systems​ (MIS) C. information systems​ (IS) D. business intelligence​ (BI)

D. business intelligence​ (BI)

_______ model of management describes the five traditional functions of managers as​ planning, organizing,​ coordinating, deciding, and controlling. A. distributed B. behavioral C. trickle down D. classical E. economic

D. classical

The most common source of business system failure is​ (are) ________. A. software bugs B. viruses C. cyber crime D. data quality E. facility catastrophes

D. data quality

One downside to complex enterprise software occurs when it​ ________. A. increases collaboration among departments B. utilizes databases C. increases sharing of information D. degrades system performance E. requires training

D. degrades system performance

About 80 percent of online B2B​ e-commerce is still based on proprietary systems for​ ____________. A. electronic information interchange​ (EII) B. digital data​ interchange(DDI) C. binary data interchange​ (BDI) D. electronic data interchange​ (EDI) E. digital information interchange​ (DII)

D. electronic data interchange​ (EDI)

Information systems can​ ________ the organization by empowering​ lower-level employees. A. heighten B. reduce C. establish D. flatten E. hinder

D. flatten

Using Internet technology to create an internal system is called​ a(n) ________. A. digital firm B. Internet C. brick and mortar D. intranet E. enterprise system

D. intranet

The fact that universal technical standards for the Internet and electronic commerce exist lowers​ ________ costs, making it cheaper for merchants to sell their goods. A. product information B. supplier identification C. product development D. market entry E. customer search

D. market entry

All of the following are examples of functional business processes EXCEPT​ ________. A. paying creditors B. hiring employees C. identifying customers D. shipping a product E. assembling the product

D. shipping a product

A lead chef quitting at a restaurant and taking his secret recipes with him or her is considered​ ________ knowledge. A. structured B. ​semi-structured C. database D. tacit E. cloud computing

D. tacit

The knowledge an employee has in his mind that has not been documented is called​ ________. A. loose knowledge B. explicit knowledge C. explicit intelligence D. tacit knowledge E. tacit information

D. tacit knowledge

In​ 2017, American business spent​ ________ on information systems​ hardware, software, and telecommunications equipment. A. ​$100 million B. ​$10 million C. ​$1 million D. ​$1 trillion E. ​$100 billion

D. ​$1 trillion

Which of the following is NOT an example of a​ company's transaction processing​ system? A. UPS package tracking system B. Marriott reservation system C. ​Amazon.com's payroll records D. ​Walmart's internal email system E. Delta flight reservation system

D. ​Walmart's internal email system

Which below is the correct definition of​ "war driving"? A. After gaining access to a wireless signal​ "lock it​ up" and​ "drive" off, leaving the access point inaccessible B. Unauthorized access to a satellite ISP C. Eavesdroppers physically steal a wireless network router to gain access D. Gaining access to a network using physical force E. Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic

E. Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic

How do information systems improve business​ processes? A. Information systems make business processes less expensive. B. Information systems help workers maintain independence as they fill customer orders. C. Information systems modernize business processes every two years. D. Information systems make business processes spanning many different functional areas easier to manage. E. Information systems improve the efficiency​ and/or effectiveness of business processes.

E. Information systems improve the efficiency​ and/or effectiveness of business processes.

________ includes computer​ viruses, worms, and Trojan horses. A. Firewall B. ​Wi-fi C. Click fraud D. Security E. Malware

E. Malware

An approach to the study of information systems that focuses on changes in​ attitude, management, and organization policy is called the​ ________. A. sociotechnical approach B. technical approach C. psychological approach D. sociological approach E. behavioral approach

E. behavioral approach

​Databases, data​ warehouses, data​ marts, and analytic platforms are part of the​ ________. A. BI and analytics for DSS platform B. managerial users and methods C. user interface D. business analytics toolset E. business intelligence infrastructure

E. business intelligence infrastructure

Viruses differ from worms because worms​ ________. A. are more dangerous than all viruses B. are only sent as attachments C. are less dangerous than all viruses D. cannot operate on their own E. can operate on their own without attaching to other computer program files

E. can operate on their own without attaching to other computer program files

When technology must be changed and designed to fit the needs of the organization and​ individuals, it may need to be​ ________ to adjust the fit between the organizational needs and the technology. A. discarded B. reverse engineered C. deprecated D. optimized E. de-optimized​

E. de-optimized​

All of the following are technology trends that raise ethical issues EXCEPT​ ________. A. data storage costs rapidly decline B. network advances C. computing power doubles every 18 months D. data analysis advances E. disruptive technologies

E. disruptive technologies

Business processes that cross many different functional areas and require coordination across departments are supported by​ ________ among the participants. A. a​ top-down company approach B. more senior management that encourage loyalty C. less knowledge sharing and more independent work D. several static ways of communicating E. flows of​ material, information, and knowledge

E. flows of​ material, information, and knowledge

ReviewQuiz:Chapter 8 RAT Question 4, Chapter Quiz 8.1.5 Test Score: 93.33%, 28 of 30 points Points: 1 of 1 Close If someone loads a program that tracks everything you​ type, the specific spyware is​ a(n) ________. A. digital footprint B. SQL injection attack C. ​denial-of-service attack D. data mining error E. key logger

E. key logger

Combining data from multiple sources to create digital dossiers of detailed information on individuals is called​ ________. A. phishing B. spoofing C. hacking D. sniffing E. profiling

E. profiling

All of the following are interrelated changes in the technology area that impact businesses EXCEPT​ ________. A. the widespread adoption of the mobile computing platform B. the growth of cloud computing C. the Internet of Things D. the growing business use of big data E. quantum computing

E. quantum computing

The​ ________ of the web makes it possible to deliver messages with​ text, audio, and video simultaneously to large numbers of people. A. information density B. universal standards C. interactivity D. global reach E. richness

E. richness

The information systems approach to this textbook is the​ ________. A. database approach B. system network approach C. technical approach D. behavioral approach E. sociotechnical approach

E. sociotechnical approach

According to the value chain​ model, technology is considered a​ ________ of the firm. A. processing activity B. primary activity C. business intelligence activity D. data mining activity E. support activity

E. support activity

In the United​ States, the claim to privacy is protected primarily by​ ________. A. state government B. professional societies C. local government D. individual organizations E. the First Amendment

E. the First Amendment


Related study sets

Why did the Creoles lead the revolutions in Latin America?

View Set

体验汉语 Unit1 你好 Part 1

View Set

Basal ganglia- Direct pathway of movement

View Set

Streptococcus, Enterococcus and Similar Organisms

View Set

Quiz 3 Fossil Hominins (10 hominins) Part 3

View Set